CN109840578A - A kind of electronic equipment - Google Patents

A kind of electronic equipment Download PDF

Info

Publication number
CN109840578A
CN109840578A CN201711219057.0A CN201711219057A CN109840578A CN 109840578 A CN109840578 A CN 109840578A CN 201711219057 A CN201711219057 A CN 201711219057A CN 109840578 A CN109840578 A CN 109840578A
Authority
CN
China
Prior art keywords
identification information
identity identification
information
random
default identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711219057.0A
Other languages
Chinese (zh)
Inventor
黄建东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Ploughed Rock Intelligent Technology Co Ltd
Shanghai Harvest Intelligence Tech Co Ltd
Original Assignee
Shanghai Ploughed Rock Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Ploughed Rock Intelligent Technology Co Ltd filed Critical Shanghai Ploughed Rock Intelligent Technology Co Ltd
Priority to CN201711219057.0A priority Critical patent/CN109840578A/en
Priority to PCT/CN2018/087798 priority patent/WO2019104957A1/en
Priority to TW107120857A priority patent/TWI739010B/en
Publication of CN109840578A publication Critical patent/CN109840578A/en
Priority to US16/886,763 priority patent/US11533180B1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Software Systems (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The present invention provides a kind of electronic equipment, the electronic equipment includes main circuit board, processor, senser element and storage medium;It is provided with Universal Integrated Circuit Card card slot on the main circuit board, is provided with Universal Integrated Circuit Card in the Universal Integrated Circuit Card card slot;The senser element is connect with processor.The present invention is by being stored in UICC card for user's physiological characteristic information, without being verified by cloud server in identification verification process, but the default identity identification information in UICC card is obtained by processor, and it is compared with the identity information to be certified that senser element collects, realize identity identifying and authenticating process.Since identity information is real-time acquisition, real-time authentication, it is ensured that the verification operation person of equipment is lawful registration user, effectively increases the safety of verification process.

Description

A kind of electronic equipment
Technical field
The present invention relates to safety certification fields, in particular to a kind of electronic equipment.
Background technique
Universal Integrated Circuit Card (Universal Integrated Circuit Card, UICC) is with physical characteristic Smart card general name.If applying in the terminal installation of broadband mobile network, UICC can be used as in terminal one it is removable Smart card, for storing the information such as user information, authentication key (including public key and key), way of paying.ISO/IEC is international Change normal structure and formulated a series of smart card security characteristic agreement, to ensure the terminal installation pair of broadband mobile network user The secure access of UICC file.UICC introduces the concept of multi-application platform, realizes multiple Logic applications while running more Channel mechanism.It may include a variety of logic modules in UICC, such as Subscriber Identity Module (Subscriber Identity Module, SIM), universal subscriber identity module (Universal Subscriber Identity Module, USIM), IP it is more Media service identification module (IP Multimedia Service Identity Module, ISIM) and other such as electronics label The non-telecom application modules such as name certification, stored value card.Logic module in UICC multiple can also can be deposited simultaneously with individualism ?.
Although UICC, which has been used in terminal installation related electron underwriting authentication, stored value card etc., is related to privacy of user Application module, and the security feature agreement of ISO/IEC International Standards Organization has ensured terminal installation to the safety of UICC file Access, but for the mobile terminal identification being becoming increasingly popular and be not suitable for.Such as fingerprint recognition, face recognition etc., mesh Preceding method is still the senser element configured by terminal and application program to realize, known this kind of identification function is to solve Lock terminal installation as the main purpose, or in the application program of opposite consideration information security realizes unlocking function, has identification The application program or knowledge hardware processor of function are only the identification images (such as finger print information) that user is pressed to input, are penetrated The image (fingerprint image pre-set) that the software or hardware that terminal installation is configured are stored in terminal with original compares, and It is not bound together with the encryption function of UICC.
However, applying upper, more and more rigorous identity to the higher financial payment of information security, physiological health monitoring etc. Certification has been trend of the times with information encryption, and the especially this kind of application for requiring extreme information security is all usually with Cloud Server As rear end calculation process platform.The server of cloud operation is registration for the terminal installation for guaranteeing transmission physiological characteristic information Terminal installation, generally can to the legitimacy of terminal installation carry out safety verification.Such as in the application program for carrying out financial transaction In, for user after sending authentication requesting to the financial transaction cloud platform, cloud platform would generally send safety verification code to together One terminal installation or different terminal installations prompt user to input identifying code to improve E-Security.Even if such as This, the platform of this cloud verifying can not still improve operate the terminal installation user be exactly the lawful registration user I, Whether although realizing the verifying to terminal installation legitimacy, can not identify using the terminal installation is householder (i.e. legitimate user), however it remains biggish security risk.
Summary of the invention
For this reason, it may be necessary to provide a kind of electronic equipment, solving current cloud server can not be to the user of operating terminal device It is authenticated, leads in information verification process that there are security risks.
To achieve the above object, a kind of electronic equipment is inventor provided, the electronic equipment includes main circuit board, processing Device, senser element and storage medium;Universal Integrated Circuit Card card slot, the universal integrated circuit are provided on the main circuit board Universal Integrated Circuit Card is provided in card card slot;The senser element is connect with processor;Being stored in the storage medium can Computer program is executed, the computer program performs the steps of when being executed by processor
Default identity identification information is received, and Universal Integrated Circuit Card is written into the default identity identification information;
The identity information to be certified for receiving ID authentication request and senser element acquisition, from the Universal Integrated Circuit Card It is middle to obtain default identity identification information, identity information to be certified is compared with corresponding default identity identification information, if Then authentication is successful for successful match, otherwise authentification failure.
Further, the computer program realize when being executed by processor step " receive default identity identification information, and Universal Integrated Circuit Card is written into the default identity identification information " it include: to receive presetting for external identity senser element acquisition Identity identification information, and Universal Integrated Circuit Card, the external identity senser element is written into the default identity identification information For the senser element being arranged independently of electronic equipment.
Further, the computer program realize when being executed by processor step " receive default identity identification information, and Universal Integrated Circuit Card is written into the default identity identification information " include: receive electronic equipment senser element acquisition it is pre- If identity identification information, and Universal Integrated Circuit Card is written into the default identity identification information.
Further, the senser element include common camera, infrared camera, in microphone any one or it is more Kind, the default identity identification information include face information, eyeball information, iris information, in voice messaging any one or It is a variety of.
Further, it is also performed the steps of when the computer program is executed by processor
Default identity identification information default identity identification information is converted to using cryptographic Hash function to make a summary, it is described default Identity identification information is stated to preset the form of identity identification information abstract and be stored in Universal Integrated Circuit Card.
Further, the quantity of the senser element is multiple, is respectively used to acquire different default identity identification informations; The computer program performs the steps of when being executed by processor
The collected different default identity identification information of multiple sensors part is received, will be acquired using cryptographic Hash function To a variety of default identity identification informations be converted to default identity identification information abstract.
Further, it is performed the steps of when the computer program is executed by processor
The multiple default identity identification informations for receiving same senser element acquisition, will be acquired using cryptographic Hash function To a variety of default identity identification informations be converted to default identity identification information abstract.
Further, it is also performed the steps of when the computer program is executed by processor
Authentication key is stored in integrated circuit card, the authentication key includes public key and private key;
The public key in Universal Integrated Circuit Card is obtained, using RSA cryptographic algorithms application public key to default identity identification information Abstract is encrypted, and obtains predetermined encryption information, the predetermined encryption information includes that encrypted default identity identification information is plucked It wants;
After receiving identity information to be certified, identity information to be certified is converted to using cryptographic Hash function to be certified Identity information abstract;And authenticating identity informative abstract is treated using the application of RSA cryptographic algorithms public key and is encrypted, it obtains wait recognize Encryption information is demonstrate,proved, the encryption information to be certified includes encrypted identity information abstract to be certified;
The private key in Universal Integrated Circuit Card is obtained, predetermined encryption information is carried out using RSA cryptographic algorithms application private key Decryption obtains default identity identification information abstract, default identity identification information abstract and identity information to be certified abstract is carried out Compare, the authentication success if successful match, otherwise authentification failure.
Further, it is also performed the steps of when the computer program is executed by processor
After receiving default identity identification information, the random first random digit word string that generates fills in the blanks at random with first, institute First is stated to be filled in the blanks at random to generate, being filled in the character of default identity identification information abstract at random;The predetermined encryption letter Breath further includes that encrypted first random digit word string fills in the blanks at random with first;
After receiving identity information to be certified, the random second random digit word string that generates fills in the blanks at random with second, institute Second is stated to be filled in the blanks at random to generate, being filled in the character of identity information abstract to be certified at random;
The private key in Universal Integrated Circuit Card is obtained, predetermined encryption information is carried out using RSA cryptographic algorithms application private key Decryption obtains the first random digit word string and fills in the blanks at random with first;
Compare the first random digit word string and the second random digit word string, first fill in the blanks at random and the second random filling Blank whether successful match, if then authentication success, otherwise authentification failure.
Further, it is also performed the steps of when the computer program is executed by processor
Secret grade setting instruction is received, the secret grade of electronic equipment is set, the secret grade includes the first encryption Grade, the second secret grade and third secret grade;
When electronic equipment is in the first secret grade, the successful condition of authentication is judged to preset identity identification information Abstract fills in the blanks with identity information to be certified abstract, the first random digit word string with the second random digit word string, first at random With second at random fill in the blanks between the equal successful match of three;
When electronic equipment is in the second secret grade, the successful condition of authentication is judged to preset identity identification information Abstract and identity information digests match to be certified success and the first random digit word string and the second random digit word, first with Machine fills in the blanks and second random any one of the two successful match that fills in the blanks;
When electronic equipment is in third secret grade, the successful condition of authentication is judged to preset identity identification information Abstract and identity information digests match to be certified success.
The present invention is by being stored in UICC card for user's physiological characteristic information, without passing through cloud in identification verification process Server is verified, but obtains the default identity identification information in UICC card by processor, and by itself and senser element Collected identity information to be certified is compared, and realizes identity identifying and authenticating process.Due to identity information be real-time acquisition, Real-time authentication, it is ensured that the verification operation person of equipment is lawful registration user, effectively increases verification process Safety.
Detailed description of the invention
Fig. 1 is the schematic diagram for the electronic equipment that an embodiment of the present invention is related to;
Fig. 2 is the circuit diagram for the pixel detection region that an embodiment of the present invention is related to;
Fig. 3 is the structural schematic diagram that the light that an embodiment of the present invention is related to detects film;
Fig. 4 is the structural schematic diagram that the light that another embodiment of the present invention is related to detects film;
Fig. 5 is the schematic diagram for the source electrode and drain electrode structure cooperation that an embodiment of the present invention is related to;
Fig. 6 is the schematic diagram of the distribution mode for the optical device that an embodiment of the present invention is related to;
Fig. 7 is the flow chart for the preparation method that the light that an embodiment of the present invention is related to detects film;
Fig. 8 is the schematic diagram in the detecting membrane-film preparation process of light described in an embodiment of the present invention;
Fig. 9 is the schematic diagram in light detecting membrane-film preparation process described in another embodiment of the present invention;
Figure 10 is the schematic diagram in light detecting membrane-film preparation process described in another embodiment of the present invention;
Figure 11 is the schematic diagram in light detecting membrane-film preparation process described in another embodiment of the present invention;
Figure 12 is step flow chart when computer program described in an embodiment of the present invention is executed by processor;
Figure 13 is step flow chart when computer program described in another embodiment of the present invention is executed by processor;
Description of symbols:
1, grid;2, source electrode;3, it drains;4, insulating layer;5, light absorption semiconductor layer;
101, touch screen or cover-plate glass;102, display unit;103, low-refraction glue;105, flexible circuit board;106, Main circuit board;107, Universal Integrated Circuit Card card slot;108, Universal Integrated Circuit Card.
Specific embodiment
Technology contents, construction feature, the objects and the effects for detailed description technical solution, below in conjunction with specific reality It applies example and attached drawing is cooperated to be explained in detail.
Referring to Fig. 1, the schematic diagram for the electronic equipment being related to for an embodiment of the present invention;The electronic equipment be with The equipment of touch display screen, such as mobile phone, tablet computer, personal digital assistant Intelligent mobile equipment, can also be individual calculus The electronic equipments such as machine, industrial equipment computer.The electronic equipment includes main circuit board 106, processor, senser element and deposits Storage media;Universal Integrated Circuit Card card slot 107, the Universal Integrated Circuit Card card slot 107 are provided on the main circuit board 106 In be provided with Universal Integrated Circuit Card 108.The processor is electronic component having data processing function, such as central processing unit (Central Processing Unit, abbreviation CPU), digital signal processor (Digital Signal Processor, letter Claim DSP) or System on Chip/SoC (System on Chip, abbreviation SoC).The storage medium is the electricity with data storage function Subcomponent, including but not limited to: RAM, ROM, magnetic disk, tape, CD, flash memory, USB flash disk, mobile hard disk, storage card, memory stick etc..
Executable computer program, the realization when computer program is executed by processor are stored in the storage medium Following steps: default identity identification information is received, and Universal Integrated Circuit Card is written into the default identity identification information;It receives The identity information to be certified of ID authentication request and senser element acquisition obtains default body from the Universal Integrated Circuit Card Part identification information, identity information to be certified is compared with corresponding default identity identification information, the body if successful match Part authenticates successfully, otherwise authentification failure.
Since default identity identification information is previously stored in Universal Integrated Circuit Card (hereinafter referred to as UICC card), handle Default identity identification information in the available UICC card of device, and it is compared with identity information to be certified, realize body Part identification verification process.Since identity information is real-time acquisition, real-time authentication, it is ensured that the verification operation person of equipment is Lawful registration user effectively increases the safety of verification process compared to the mode that server beyond the clouds is authenticated.
In the present embodiment, the senser element include common camera, it is infrared camera, any one in microphone Kind or it is a variety of, the default identity identification information includes face information, eyeball information, iris information, any in voice messaging It is one or more.Specifically, common camera can be used for acquiring face information and eyeball information, and infrared camera can be used for Iris information is acquired, microphone can be used for acquiring voice messaging.User can open on electronic equipment not according to actual needs Same senser element, carries out the acquisition of identity information.The setting of multiple sensors part provide the user more selections, effectively Improve the sensory experience of user.
In certain embodiments, realize that step " receives default identification when the computer program is executed by processor Information, and Universal Integrated Circuit Card is written into the default identity identification information " it include: to receive the acquisition of external identity senser element Default identity identification information, and Universal Integrated Circuit Card is written into the default identity identification information, the external identity passes Inductor component is the senser element being arranged independently of electronic equipment.In further embodiments, the computer program is by processor Realize that step " receives default identity identification information, and universal integrated circuit is written in the default identity identification information when execution Card " includes: the default identity identification information for receiving the senser element acquisition of electronic equipment, and by the default identity identification information Universal Integrated Circuit Card is written.In short, can both pass through the biography on electronic equipment for the typing for presetting identity identification information Inductor component (camera, the microphone that are such as integrated on electronic equipment) is completed to acquire, and also may rely on external identity biography Inductor component (such as external camera, External microphone) is completed, to be applicable in more application scenarios.
In certain embodiments, the electronic equipment further includes display unit 102, and the display unit 102 is set to master The top of circuit board 106, display unit 102 are the display using active array thin film transistor (TFT) as turntable driving with transmission data Screen.The display screen includes AMOLED display screen or micro- light emitting diode (LED) display screen.The light transmittance of display screen is greater than 3%, thus It is sufficiently large through the luminous flux of the light of display screen during realizing light detecting function, and then be arranged at below display screen Optical detector part receive, to realize light detecting function.In further embodiments, the top of the display unit 102 is also It is provided with touch screen or cover-plate glass 101, to meet the needs of different terminals product.
In certain embodiments, the display unit 102 is attached with main circuit board 106 by flexible circuit board 105, The flexible circuit board 105 includes the chip that there is video signal to read identification function.The chip of the identification function includes referring to Schlieren picture reads chip, algorithm for recognizing fingerprint chip etc., the ADAS1256 chip of chip model such as Analog Devices company. Flexible circuit board is also known as flexible circuit board, flex circuit application.Abbreviation soft board or FPC, be relative to common animi resin wiring board and Speech, flexible circuit board have many advantages, such as that Distribution density is high, light-weight, thickness is thin, wiring space less-restrictive, flexibility ratio are high.It is soft Property circuit board setting light arrangement for detecting can be made whole more lightening, meet the market demand.
In order to reinforce presetting the safety of identity identification information in UICC card, and saves default identity identification information and exist Memory space in UICC card, in certain embodiments, the computer program also perform the steps of when being executed by processor Default identity identification information is converted to default identity identification information using cryptographic Hash function to make a summary, the default identification Information is stated to preset the form of identity identification information abstract and be stored in Universal Integrated Circuit Card.Cryptographic Hash function, that is, Hash Function's (also have direct transliteration be " Hash "), exactly the input of random length (be called and do preliminary mapping, pre- Image), by hashing algorithm, it is transformed into the output of regular length, which is exactly hashed value.This conversion is a kind of compression Mapping, it is, the space of hashed value is generally much less than the space inputted, different inputs may hash to identical defeated Out.In short, cryptographic Hash function is exactly a kind of eap-message digest of the message compression by random length to a certain regular length (Digest) function can compress the memory space of default identity identification information by converting, to preset identification letter Breath preferably stores.
In certain embodiments, the quantity of the senser element is multiple, is respectively used to acquire different default identity knowledges Other information;The computer program performs the steps of when being executed by processor receives the collected difference of multiple sensors part Default identity identification information, collected a variety of default identity identification informations are converted to by default body using cryptographic Hash function Part identification information abstract.In further embodiments, reception is performed the steps of when the computer program is executed by processor Multiple default identity identification informations of same senser element acquisition, will be collected a variety of default using cryptographic Hash function Identity identification information is converted to default identity identification information abstract.
Such as default identity identification information can be multistage voice messaging, user can by the microphone of electronic equipment according to The different voice messaging of secondary input multistage, processor receive multistage voice messaging after (i.e. same senser element acquisition it is multiple Default identity identification information), the multistage voice messaging of acquisition is converted to by voice abstract using cryptographic Hash function.It is more for another example A default identity identification information includes a certain section of voice messaging and face information, cryptographic Hash function will be used face information Corresponding identification abstract is converted to the voice messaging.Default identity identification information be it is multiple, on the one hand provide the user with On the other hand more selections also effectively increase the safety and accuracy of identity information certification.
As shown in figure 12, step process when being executed by processor for computer program described in an embodiment of the present invention Figure.The computer program also performs the steps of when being executed by processor
Initially enter step S1201 authentication key is stored in integrated circuit card, the authentication key include public key and Private key;
The public key in S1202 acquisition Universal Integrated Circuit Card is then entered step, using RSA cryptographic algorithms application public key pair Default identity identification information abstract is encrypted, and obtains predetermined encryption information, the predetermined encryption information includes encrypted pre- If identity identification information is made a summary;
It then enters step after S1203 receives identity information to be certified, using cryptographic Hash function by body to be certified Part information is converted to identity information abstract to be certified;And authenticating identity information is treated using the application of RSA cryptographic algorithms public key and is plucked It is encrypted, obtains encryption information to be certified, the encryption information to be certified includes that encrypted identity information to be certified is plucked It wants;
The private key in S1204 acquisition Universal Integrated Circuit Card is then entered step, using RSA cryptographic algorithms application private key pair Predetermined encryption information is decrypted, and obtains default identity identification information abstract;
S1205 is then entered step to be compared default identity identification information abstract and identity information to be certified abstract, S1207 authentication success is entered step if successful match, otherwise enters step S1206 authentification failure.By the above method, By the way of public key encryption, private key decryption, since public key and private key are stored in UICC card, preset so that extracting in UICC card The extraction safety of identity identification information abstract is significantly more.In further embodiments, abstract is encrypted or is decrypted Algorithm is not limited to RSA Algorithm, is also possible to other existing encryption-decryption algorithms.
As shown in figure 13, in order to further increase the safety of authentification of message, in certain embodiments, the computer journey It is also performed the steps of when sequence is executed by processor
It initially enters after step S1301 receives default identity identification information, it is random to generate the first random digit word string and the One fills in the blanks at random.Described first fills in the blanks at random to generate, being filled in the word of default identity identification information abstract at random Symbol;The predetermined encryption information further includes that encrypted first random digit word string fills in the blanks at random with first;Then enter After step S1302 receives identity information to be certified, the random second random digit word string that generates fills in the blanks at random with second, institute Second is stated to be filled in the blanks at random to generate, being filled in the character of identity information abstract to be certified at random;Then enter step S1303 The private key in Universal Integrated Circuit Card is obtained, predetermined encryption information is decrypted using RSA cryptographic algorithms application private key, is obtained First random digit word string fills in the blanks at random with first;It then enters step S1304 and compares the first random digit word string and the Two random digit word strings, first at random fill in the blanks with second at random fill in the blanks whether successful match, if then entering step S1306 authentication success, otherwise enters step S1305 authentification failure.In short, identity information to be certified is to by recognizing Card also requires first random other than the default identity identification information abstract in the abstract and UICC card that it is generated matches Digital word string and the second random digit word string, first fill in the blanks at random one of to fill in the blanks or a variety of phases at random with second Matching, to effectively increase the safety of identity information certification.
In order to allow user to can be set according to actual needs the encryption etc. of different application software or electronic equipment booting Grade, in certain embodiments, the computer program also performs the steps of when being executed by processor
Secret grade setting instruction is received, the secret grade of electronic equipment is set, the secret grade includes the first encryption Grade, the second secret grade and third secret grade;
When electronic equipment is in the first secret grade, the successful condition of authentication is judged to preset identity identification information Abstract fills in the blanks with identity information to be certified abstract, the first random digit word string with the second random digit word string, first at random With second at random fill in the blanks between the equal successful match of three;
When electronic equipment is in the second secret grade, the successful condition of authentication is judged to preset identity identification information Abstract and identity information digests match to be certified success and the first random digit word string and the second random digit word, first with Machine fills in the blanks and second random any one of the two successful match that fills in the blanks;
When electronic equipment is in third secret grade, the successful condition of authentication is judged to preset identity identification information Abstract and identity information digests match to be certified success.
In short, level of encryption is the first secret grade, the second secret grade, third secret grade from high to low.For Some applications for needing strong encryption, for example, be related to financial transaction, business secret data, on-line payment password software, user The first secret grade can be set by the secret grade of these application programs, so as in identity information verification process, only When default identity identification information abstract and identity information to be certified abstract, the first random digit word string and the second random digit word String, first fill in the blanks at random with second fill in the blanks at random between three's equal successful match when, can just complete to solve accordingly Lock operation or delivery operation, to improve the safety of information data.And the application for not needing strong encryption, such as photograph album figure The browsing of piece, user can set the second secret grade for the level of encryption of application program according to their needs or third encrypts Grade.
In certain embodiments, the electronic equipment further includes optical detector part, is provided with identity on the display unit Cog region, the optical detector part are set to the lower section in identification area, the lower end surface of the display unit 102 and optical detector The upper surface of part can be by low-refraction glue bond, and the refractive index of the low-refraction glue is less than 1.4.One side of low-refraction glue Face can play adhesive effect, so that light detecting film is anchored on the bottom surface of display unit, is not easy transmission and falls off;On the other hand it adopts With the glue of low-refraction, when light is irradiated into light detecting film through display unit, due to the refraction action of low-refraction glue (refractive index of glue lower than the refractive index at position contacted on light detecting film, under normal conditions on light detecting film with it is low Refractive index is glued the refractive index at the position of touching 1.4 or more) it, can be with so that after light is reflected in low-refraction glue position Light detecting film is incident to vertical direction as far as possible, can effectively improve photoelectric conversion rate.In the present embodiment, described low Refractive index glue is with carbon-fluorine bond organic compound glue material.
When electronic equipment further includes optical detector part, default identity identification information can also be believed for blood volume information, fingerprint Breath etc..By taking default identity identification information is blood volume information as an example, when light pass through human skin enter the following human body of body surface its The variation of situations such as when hetero-organization, some light will be absorbed, and reflection, scattering can occur for some light, optical path depends on skin With the construction of undertissue.Under normal circumstances, light more more than surrounding tissue can be absorbed in blood of human body, thus when optical signal encounters When more blood, the optical signal being reflected back is fewer.Therefore the optical signal information that can be reflected back by detecting body part, Obtain the corresponding blood volume information of user, and according to the corresponding blood volume information of user can by convert obtain user other are pre- If identity identification information (such as blood pressure index, body fat content, blood oxygen saturation, cardiopulmonary index, electrocardiogram).
It further, is with default on display unit when electronic equipment is acquired identity information to be certified Pixelated array combination, irradiates physical feeling where the identity identification information of preparation acquisition, and receive reflected light by optical detector part Signal is to obtain identity identification information.When described pair of default identity identification information acquires, computer program can be to display unit On pixelated array group cooperative coding, physical feeling is irradiated with encrypted combined light source, and receive what physical feeling was fed back to Optical information.Default pixelated array combination can be a certain component arrangement on display unit and preset at the pixel array of predetermined pattern Pattern can be configured according to actual needs.It is above-mentioned compared to the mode that pixelated array whole on display unit issue light source Method can be further improved the safety of information collection.
In certain embodiments, the optical detector part is TFT image sensing array film, including MxN pixel detecting Area, each pixel detection region are correspondingly arranged more than one thin-film electro crystalline substance pipe and form one group of turntable driving and transmit the pixel of data Thin film circuit and a light detect film;The light detecting film includes photodiode or the brilliant pipe of photosensitive electricity.It is detected with light thin For film includes photodiode, the basic circuit composition of each pixel detection region is as shown in Figure 2.Photodiode is to be formed Light detects the main sensors part of film, and controlling grid scan line is with the frame rate (Frame Rate) of fixation by thin film transistor (TFT) (TFT) operation is in the mode of opening, and when the optical detector part detects optical signal, the thin film transistor (TFT) of opening can be by capacitor electricity Pressure data are transferred to reading chip.It can specifically refer to following two documents: [1] " M.J.Powell, I.D.French, J.R.Hughes,N.C.Bird,O.S.Davies,C.Glasse,and J.E.Curran,【2】“Amorphous silicon image sensor arrays,”in Mater.Res.Soc.Symp.Proc.,1992,vol.258,pp.1127–1137”、 “B.Razavi,“Design of Analog CMOS Integrated Circuits,”McGraw-Hill,2000”。
The optical detector part be TFT image sensing array film, light detect wave-length coverage include visible light wave range or It is infrared band.The TFT image sensing array film is made of MXN light detecting film, and each light detecting film is corresponding A pixel is detected, thus TFT image sensing array film can be used for detecting MXN pixel, to form corresponding image.For For each light detects film, there are following several implementations:
Embodiment one:
The TFT image sensing array film (i.e. optical detector part) is that photodiode is formed by array, the light It includes photodiode induction zone that quick diode, which is formed by array,.Existing liquid crystal display (LCD) panel or organic light emission two Pole pipe (OLED) display panel is all to scan single pixel with TFT structure driving, to realize the display function of pixel array on panel Energy.The primary structure for forming TFT switch function is semiconductcor field effect transistor (FET), wherein well known semiconductor layer material master There are amorphous silicon, polysilicon, indium gallium zinc (IGZO) or the organic compound for being mixed with carbon nanomaterial etc..Due to light The structure of sensing diode also can be used the preparation of such semiconductor material, and production equipment is also compatible with the production in tft array and sets It is standby, therefore TFT light detecting diode (i.e. photodiode) beginning in recent years is produced with tft array preparation method.It is existing The specific structure of photodiode can refer to United States Patent (USP) US6943070B2, People's Republic of China's patent To the description of optical detector part structure in CN204808361U.The production technology and display panel of TFT image sensing array film Unlike TFT structure: originally in the pixel openings region of display panel, photo-sensing area is changed in production technology.Its TFT Preparation method can use thin glass for substrate, and it is substrate, such as United States Patent (USP) that high temperature resistant plastic, which also can be used, Described in US6943070B2.
The visible light that existing TFT image sensing array film is issued vulnerable to surrounding environment light or display screen matrix The factors such as reflection, refraction influence, and cause optical interference, seriously affect the TFT image sensing array being embedded in below display panel The signal noise ratio (SNR) of film, in order to improve signal noise ratio, as shown in figure 3, light detecting film of the invention has been done into one Step is improved, and improved TFT image sensing array film is allowed to detect the infrared letter that identification user body part is reflected back Number.Specific structure is as follows:
The photodiode layer includes p-type semiconductor layer, i-type semiconductor layer, n-type semiconductor layer, p-type semiconductor layer, i Type semiconductor layer, n-type semiconductor layer stack setting from top to bottom, and the i-type semiconductor layer is microcrystal silicon structure or amorphous silicon Change germanium junction structure.The microcrystal silicon structure is the semiconductor layer of silane and hydrogen by chemical vapor deposition film-formation, the knot of microcrystal silicon The crystallinity of structure is greater than 40%, and its forbidden bandwidth is less than 1.7eV.The noncrystalline silication germanium junction structure is silane, hydrogen and germanium Alkane passes through the non-crystalline semiconductor layer of chemical vapor deposition film-formation, and its forbidden bandwidth is less than 1.7eV.
Forbidden bandwidth (Band gap) refers to a band gap width (unit is electron-volt (eV)), the energy of electronics in solid Amount cannot continuous value, but some discontinuous energy bands want conduction that will deposit with the presence of free electron, free electron Energy band be known as conduction band (can conductive), bound electronics will become free electron, must just obtain enough energy from valence band Conduction band is transitted to, the minimum value of this energy is exactly forbidden bandwidth.Forbidden bandwidth is an important feature parameter of semiconductor, Size depends mainly on the band structure of semiconductor, i.e., related with the binding property of crystal structure and atom etc..
(300K) at room temperature, the forbidden bandwidth of germanium are about 0.66ev, contain Germanium in silane, when incorporation Germanium Afterwards, the forbidden bandwidth of i-type semiconductor layer can be made to decline, when meeting less than 1.7eV, illustrate that i-type semiconductor layer can receive Optical signal in visible light to infrared light (or near infrared light) wave-length coverage.By adjusting the GeH4 concentration of chemical meteorology deposition, The operating wavelength range of photodiode containing amorphous or microcrystalline silicified germanium junction structure optical wavelength 600nm can be expanded to arrive The range of 2000nm.
Embodiment two:
On the basis of using embodiment one, in order to improve the quantum efficiency of photoelectric conversion, amorphous silicon photodiodes The above p-type of binode/i type/N-shaped build stack can be used to be formed.Photodiode the first knot layer p-type/i type/n-type material is still For amorphous silicon structures, the above p-type of second junction layer/i type/n-type material can be microstructure, polycrystalline structure or mixed with expansible The compound-material of photoactive wavelength range.In short, can realize composition using multiple groups p-type/i type/N-shaped structure stacked on top Photodiode structure, for each p-type/i type/N-shaped structure, then using photodiode knot described in embodiment one Structure.
Embodiment three:
On the basis of using embodiment one or embodiment two, for each p-type/i type/N-shaped structure, wrapped The p-type semiconductor layer contained can be the multilayered structure greater than two layers.Such as p-type semiconductor layer is three-decker, is wrapped from top to bottom Include the first p-type semiconductor layer (p1 layers), the second p-type semiconductor layer (p2 layers), third p-type semiconductor layer (p3 layers).Wherein, p1 layers Non-crystalline structure and heavy doping boron twice or more of standard technology (boron concentration for) can be used;P2 and p3 uses crystallite knot Structure, and boron (according to standard technology doped in concentrations profiled) normally is adulterated, the p2 layer being thinned by thickness and the p3 layers of suction reduced to light It receives, so that light enters i layers as much as possible and absorbed by i layers, improves photoelectric conversion rate;P2 layers and p3 layers of another aspect are adopted With normal boron doping it is possible to prevente effectively from the heavy doping due to p1 layers causes to deteriorate built in potential.When p-type semiconductor layer includes Similar for the multilayered structure of other numbers of plies, details are not described herein again.
Likewise, n-type semiconductor layer may be the multilayered structure greater than two layers.Such as n-type semiconductor layer is three-layered node Structure includes the first n-type semiconductor layer (n1 layers), the second n-type semiconductor layer (n2 layers), third n-type semiconductor layer (n3 from top to bottom Layer).Wherein, non-crystalline structure and heavy doping phosphorus can be used for n3 layers (phosphorus content is twice of standard technology or more);N1 and n2 are adopted Phosphorus (according to standard manufacturing process) is adulterated with microstructure, and normally, the n1 layer being thinned by thickness and n2 layers of reduction are to light Absorption improve photoelectric conversion rate so that light enters i layers as much as possible and absorbed by i layers;N1 layers of another aspect and n2 Layer is using normal phosphorus doping it is possible to prevente effectively from the heavy doping due to n3 layers causes to deteriorate built in potential.Work as n-type semiconductor layer Including similar for the multilayered structure of other numbers of plies, details are not described herein again.
Example IV:
The present embodiment is specifically included as shown in (a) in Fig. 6 for the further improvement of embodiment one or two or three: The upper surface of the p-type semiconductor layer is provided with the first optical device, first optical device is for reducing light in p-type The reflectivity or reduction light of the upper surface of semiconductor layer are in the refraction angle of p-type semiconductor layer to increase light amount of incident.Subtract Small light can allow light as much as possible to inject p-type semiconductor close to vertical direction in the refraction angle of p-type semiconductor layer Layer, so that light is absorbed by the i-type semiconductor layer below p-type semiconductor layer as much as possible, to further increase photosensitive two The photoelectric conversion rate of pole pipe.When p-type semiconductor layer is multilayered structure, the first optical device is set to one layer of p-type of the top The upper surface of semiconductor layer.
First optical device include refractive index in periodically variable photon crystal structure or microlens array structure, Or refractive index is in the diffusing scattering structure of aperiodicity change.The refractive index of first optical device is less than p-type semiconductor layer Refractive index, can make light after the first optical device reflects, incidence angle is less than refraction angle, i.e., light is as much as possible To inject p-type semiconductor layer close to vertical direction.
Embodiment five:
The present embodiment is the further improvement for embodiment one or two or three or four, as shown in (b) (c) in Fig. 6, institute The lower end surface for stating n-type semiconductor layer is additionally provided with the second optical device, and second optical device is for improving light in N-shaped half The multipath reflection rate of the lower end surface of conductor layer.The multipath reflection rate refers to that light enters after the reflection of the second optical device I-type semiconductor layer is absorbed by i-type semiconductor layer again, and the light after absorption is once more after the reflection of the second optical device Into i-type semiconductor layer, repeatedly repeatedly, the photoelectric conversion rate of i-type semiconductor layer is improved.When n-type semiconductor layer is multilayer When structure, the second optical device is set to the lower end surface of one layer of n-type semiconductor layer of bottom.
Second optical device includes that refractive index is in periodically variable photon crystal structure or refractive index in non-week The diffusing scattering structure of phase property variation, and the refractive index of second optical device is less than the refractive index of n-type semiconductor layer.In this way, Light can be made to reflect as far as possible in the lower end surface of n-type semiconductor layer, so that the light after reflecting partly is led by i type again Body layer is absorbed, and then amplifies the signal belonged in the absorbable optical wavelength range of i-type semiconductor layer in right amount, improves the wavelength model Enclose interior photoelectricity flow.
Embodiment six:
As shown in figure 4, the TFT image sensing array film (i.e. optical detector part) is that the brilliant pipe of photosensitive electricity is formed by battle array Column, it includes the brilliant pipe induction zone of photosensitive electricity that the photosensitive brilliant pipe of electricity, which is formed by array, and the photosensitive brilliant pipe induction zone of electricity is provided with Photoconductive film transistor, the photoconductive film transistor include grid 1, source electrode 2, drain electrode 3, insulating layer 4, light absorption semiconductor layer 5;The photoconductive film transistor is the coplanar formula structure of standing upside down, and coplanar formula structure of standing upside down includes: the grid 1, absolutely Edge layer 4, source electrode 2 are longitudinal to be arranged from bottom to top, and the drain electrode 3 is laterally coplanar with the source electrode 2;Insulating layer 4 wraps up described Grid 1, so that not contacted between grid 1 and source electrode 2, grid 1 and drain electrode 3;Clearance fit between source electrode 2 and drain electrode 3, source Photosensitive leakage currents channel is formed between 3 transverse directions of pole 2 and drain electrode, the light absorption semiconductor layer 5 is set to photosensitive leakage currents channel It is interior.
When generally operating in off position by grid voltage control TFT, source electrode does not have electric current between draining and passes through; However when TFT is irradiated by light source, since the energy of light inspires electron-hole pair in semiconductor, the field-effect of TFT structure is made With electron-hole pair being made to separate, and then TFT is made to generate photosensitive leakage currents.Such photosensitive leakage currents characteristic allows tft array can It applies in the technology of light detecting or light detecting.Compared to the general device for making photoconductive film transistor using TFT leakage current, originally Invention is configured at the top light-absorption layer to stand upside down coplanar type field effect transistor structure for light absorption semiconductor layer, is added significantly to Photoelectronic excitation, improves photoelectric conversion efficiency.
As shown in fig. 7, detecting the flow chart of the preparation method of film for the light that an embodiment of the present invention is related to.The side Method is used to prepare the photoconductive film transistor (i.e. light detecting film) of embodiment six, specifically includes the following steps:
It initially enters step S801 and goes out grid by changing magnetron sputtering plating on the substrate of pixel thin film transistor.Pixel The substrate of thin film transistor (TFT) can use hardboard, can also use flexible material (such as polyimides);
It is exhausted out by chemical vapor deposition or magnetron sputtering plating in the top of the grid then to enter step S802 Edge layer;
Then enter step the n that S803 goes out source electrode and drain electrode in the top of the insulating layer by chemical vapor deposition plated film Type doping semiconductor layer, and go out by magnetron sputtering plating the metal layer of source electrode and drain electrode, it is defined by yellow light etch process The source electrode and drain electrode of preset structure, it is laterally coplanar to obtain source electrode and drain electrode, and clearance fit, and makes source electrode and drain electrode transverse direction Between formed photosensitive leakage currents channel;
It then enters step S804 chemical gas-phase deposition coating in the photosensitive leakage currents channel and goes out light absorption semiconductor Layer.
Embodiment seven:
For well known field effect transistor structure, the TFT as turntable driving and data transfer switch is not required to special needle The structure that photoelectric current is collected between source electrode and drain electrode is designed;However the detecting in photosensitive leakage currents is applied to field-effect transistor On, if after the electron-hole pair excited by light is separated by field effect, by drift (Drift) Path too long of electric field driven, pole It is possible that just make with hole in conjunction with (Recombination) before photoelectron fails smoothly to arrive at electrode, or by Hanging bond (Dangling Bond) defect of light absorption semiconductor layer itself can not be contributed effectively to capture and make light detecting Photoelectric current output.
It is influenced to improve photosensitive leakage currents by passage length between source electrode and drain electrode, absorbs light half to reach to increase Conductor area is but not the purpose of deterioration photoelectric conversion efficiency, carries out one to the source electrode and drain electrode of example IV in the present embodiment Step is improved, and the new structure of a source electrode and drain electrode is proposed.
As shown in figure 5, the quantity of the source electrode and drain electrode be it is multiple, it is parallel with one another between source electrode and source electrode, drain electrode and It is parallel with one another between drain electrode;Clearance fit between the source electrode and drain electrode forms photosensitive leakage currents between source electrode and drain electrode transverse direction Channel includes: that the first gap is formed between adjacent source electrode, and a drain electrode is placed in first gap, between adjacent drain electrode The second gap is formed, a source electrode is placed in second gap, is staggered between source electrode and drain electrode and clearance fit.It is each The distance between source electrode and adjacent drain electrode are less than electronics drift distance, and the electronics drift distance is under electronics effect effect on the scene The distance that can be survived.In this way, detecting in pixel at each, multiple source electrodes of affiliated same pixel are all parallel with one another, and institute The multiple drain electrodes for belonging to same pixel are also all parallel with one another, and photo-excited electron and hole compound probability again can be effectively reduced, mention High field-effect acts on lower electrode and collects photoelectronic probalility of success, maximumlly improves TFT leakage current photo-conductive film crystal The light sensitivity of pipe.
It is the process for gradually preparing the photoconductive film transistor (i.e. light detecting film) of embodiment seven as shown in Fig. 8 to 11, Its general steps is similar with the preparation photoconductive film transistor of embodiment six.Difference is, when preparing source electrode and drain electrode, step In S803 " source electrode and drain electrode of preset structure is defined by yellow light etch process, it is laterally coplanar to obtain source electrode and drain electrode, and Gap cooperation, and to form photosensitive leakage currents channel between source electrode and drain electrode transverse direction " it include: to be defined by yellow light etch process Source electrode group and drain electrode group, each source electrode group includes multiple source electrodes, parallel with one another between source electrode and source electrode;Often One drain electrode group includes multiple drain electrodes, parallel with one another between drain electrode and drain electrode;The first gap is formed between adjacent source electrode, One drain electrode is placed in first gap, the second gap is formed between adjacent drain electrode, a source electrode is placed between described second It is staggered in gap, between source electrode and drain electrode and clearance fit.
In certain embodiments, the optical detector part detects state in light for receiving detecting trigger signal, and connects The optical signal of detecting position (such as fingerprint, eyeball, iris) reflection is received to capture the detecting location information of user;And for connecing Light source trigger signal is received, in light source (such as infrared light supply) state of sending.Preferably, light source trigger signal and detecting trigger signal Alternately switch, and meets a predeterminated frequency.By taking optical detector part is formed by array for photodiode as an example, in practical application In the process, can make by TFT the additional bias of turntable driving (including forward bias or zero-bias or back bias voltage) p-type/i type/ Between N-shaped photodiode, realize that TFT image sensing array film issues infrared light function.
Specifically, it can replace and apply forward bias or zero-bias or negative between p-type/i type/infrared photodiode of N-shaped Bias, to trigger first trigger signal or the second trigger signal.Being formed by array with infrared photodiode has 10 column For pixel-matrix, forward bias is applied to the infrared photodiode of p-type/i type/N-shaped within the period 1, so that 10 column pixels Dot matrix, which is in, issues infrared light state;Within second round to the infrared photodiode of p-type/i type/N-shaped apply zero-bias or Back bias voltage, so that 10 column pixel-matrixs are in infrared light detecting state, the infrared light letter being reflected back for capturing user eyeball Breath, and generate corresponding infrared image output;The infrared photodiode of p-type/i type/N-shaped is applied again within the period 3 positive Bias, so that 10 column pixel-matrixs, which are in, issues infrared light state, alternately and repeatedly, and so on.Further, light source triggers Signal (i.e. the first trigger signal) replaces switching with detecting trigger signal (i.e. the second trigger signal), and it is pre- that the frequency of switching meets one If frequency.Time interval between the adjacent period can be arranged according to actual needs, and preferably time interval can be set to The tft array driving scanning infrared photodiode arrangement of each frame (Frame) can at least receive the complete video signal of a frame Required time, i.e. predeterminated frequency are once switched to be every by above-mentioned time interval.
In certain embodiments, the identification region includes multiple identification subregions, each identification An optical detector part is correspondingly arranged below region.By taking fingerprint recognition as an example, when the computer program is executed by processor Perform the steps of the enabled instruction received to fingerprint recognition subregion (i.e. identification subregion), detecting control circuit Open the optical detector part of the lower section of the fingerprint recognition subregion (i.e. identification subregion);Alternatively, receiving to fingerprint Identify the out code of subregion, detecting control circuit opens the optical detector part of the lower section of the fingerprint recognition subregion.
By taking the quantity of fingerprint recognition subregion is two as an example, two fingerprint recognition subregions can one on the other or one is left One right side is uniformly distributed in screen, can also be distributed in screen with other arrangement modes.Below to two fingerprint recognitions The application process of the terminal of subregion illustrates: in use, receiving the enabling signal of user's triggering, two are referred to Optical detector part (i.e. optical detector part) below line identification subregion is arranged to open state.In preferred embodiment, two The range that a fingerprint recognition subregion is constituted covers entire display screen, can guarantee in this way when under two fingerprint recognition subregions When the optical detector part of side is arranged to open state, the optical signal into display screen can be by the TFT image sensing battle array of lower section Column film (i.e. optical detector part) is absorbed, to capture the finger print information or body part information of user in time.Certainly, it uses Family can also be liked according to itself, and the optical detector part below some fingerprint recognition subregion is arranged and opens, another fingerprint Identify that the optical detector part below subregion is closed.
It should be noted that being not intended to limit although the various embodiments described above have been described herein Scope of patent protection of the invention.Therefore, it based on innovative idea of the invention, change that embodiment described herein is carried out and is repaired Change, or using equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it directly or indirectly will be with Upper technical solution is used in other related technical areas, is included within scope of patent protection of the invention.

Claims (10)

1. a kind of electronic equipment, which is characterized in that the electronic equipment includes main circuit board, processor, senser element and storage Medium;It is provided with Universal Integrated Circuit Card card slot on the main circuit board, is provided in the Universal Integrated Circuit Card card slot logical Use integrated circuit card;The senser element is connect with processor;Executable computer program, institute are stored in the storage medium It states when computer program is executed by processor and performs the steps of
Default identity identification information is received, and Universal Integrated Circuit Card is written into the default identity identification information;
The identity information to be certified for receiving ID authentication request and senser element acquisition, is obtained from the Universal Integrated Circuit Card Default identity identification information is taken, identity information to be certified is compared with corresponding default identity identification information, if matching Successful then authentication is successful, otherwise authentification failure.
2. electronic equipment as described in claim 1, which is characterized in that realize step when the computer program is executed by processor Suddenly " receiving default identity identification information, and Universal Integrated Circuit Card is written in the default identity identification information " includes: to receive The default identity identification information of external identity senser element acquisition, and general integrated electricity is written into the default identity identification information An outpost of the tax office, the external identity senser element are the senser element being arranged independently of electronic equipment.
3. electronic equipment as described in claim 1, which is characterized in that realize step when the computer program is executed by processor Suddenly " receiving default identity identification information, and Universal Integrated Circuit Card is written in the default identity identification information " includes: to receive The default identity identification information of the senser element acquisition of electronic equipment, and the default identity identification information write-in is general integrated Circuit card.
4. electronic equipment as claimed in claim 3, which is characterized in that the senser element includes common camera, infrared takes the photograph As any one or more in head, microphone, the default identity identification information includes face information, eyeball information, iris Any one or more in information, voice messaging.
5. such as the described in any item electronic equipments of Claims 1-4, which is characterized in that the computer program is held by processor It is also performed the steps of when row
Default identity identification information is converted to default identity identification information using cryptographic Hash function to make a summary, the default identity Identification information is stated to preset the form of identity identification information abstract and be stored in Universal Integrated Circuit Card.
6. the electronic equipment as described in claim 1 or 3 or 4, which is characterized in that the quantity of the senser element be it is multiple, point Different default identity identification informations Yong Yu not acquired;The computer program performs the steps of when being executed by processor
The collected different default identity identification information of multiple sensors part is received, it will be collected using cryptographic Hash function A variety of default identity identification informations are converted to default identity identification information abstract.
7. the electronic equipment as described in claim 1 or 3 or 4, which is characterized in that when the computer program is executed by processor It performs the steps of
The multiple default identity identification informations for receiving same senser element acquisition, will be collected using cryptographic Hash function A variety of default identity identification informations are converted to default identity identification information abstract.
8. electronic equipment as claimed in claim 5, which is characterized in that the computer program is also realized when being executed by processor Following steps:
Authentication key is stored in integrated circuit card, the authentication key includes public key and private key;
The public key in Universal Integrated Circuit Card is obtained, is made a summary using RSA cryptographic algorithms application public key to default identity identification information It is encrypted, obtains predetermined encryption information, the predetermined encryption information includes encrypted default identity identification information abstract;
After receiving identity information to be certified, identity information to be certified is converted to by identity to be certified using cryptographic Hash function Informative abstract;And authenticating identity informative abstract is treated using the application of RSA cryptographic algorithms public key and is encrypted, obtain to be certified add Confidential information, the encryption information to be certified include encrypted identity information abstract to be certified;
The private key in Universal Integrated Circuit Card is obtained, predetermined encryption information is decrypted using RSA cryptographic algorithms application private key, Default identity identification information abstract is obtained, default identity identification information abstract and identity information to be certified abstract are compared, Authentication is successful if successful match, otherwise authentification failure.
9. electronic equipment as claimed in claim 8, which is characterized in that the computer program is also realized when being executed by processor Following steps:
After receiving default identity identification information, the random first random digit word string that generates fills in the blanks at random with first, and described the One fills in the blanks at random to generate, being filled in the character of default identity identification information abstract at random;The predetermined encryption information is also It fills in the blanks at random including encrypted first random digit word string with first;
After receiving identity information to be certified, the random second random digit word string that generates fills in the blanks at random with second, and described the Two fill in the blanks at random to generate, being filled in the character of identity information abstract to be certified at random;
The private key in Universal Integrated Circuit Card is obtained, predetermined encryption information is decrypted using RSA cryptographic algorithms application private key, The first random digit word string is obtained to fill in the blanks at random with first;
Compare the first random digit word string to fill in the blanks at random with the second random digit word string, the first random fill in the blanks with second Whether successful match, if then authentication success, otherwise authentification failure.
10. electronic equipment as claimed in claim 9, which is characterized in that go back reality when the computer program is executed by processor Existing following steps:
Receive secret grade setting instruction, the secret grade of electronic equipment be set, the secret grade include the first secret grade, Second secret grade and third secret grade;
When electronic equipment is in the first secret grade, judge the successful condition of authentication for default identity identification information abstract It fills in the blanks at random and the with identity information to be certified abstract, the first random digit word string and the second random digit word string, first Two at random fill in the blanks between the equal successful match of three;
When electronic equipment is in the second secret grade, judge the successful condition of authentication for default identity identification information abstract It is filled out at random with identity information digests match to be certified success and the first random digit word string with the second random digit word, first Fill blank and second random any one of the two successful match that fills in the blanks;
When electronic equipment is in third secret grade, judge the successful condition of authentication for default identity identification information abstract With identity information digests match to be certified success.
CN201711219057.0A 2017-11-28 2017-11-28 A kind of electronic equipment Pending CN109840578A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201711219057.0A CN109840578A (en) 2017-11-28 2017-11-28 A kind of electronic equipment
PCT/CN2018/087798 WO2019104957A1 (en) 2017-11-28 2018-05-22 Electronic device
TW107120857A TWI739010B (en) 2017-11-28 2018-06-15 Electronic equipment
US16/886,763 US11533180B1 (en) 2017-11-28 2020-05-28 Storage device and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711219057.0A CN109840578A (en) 2017-11-28 2017-11-28 A kind of electronic equipment

Publications (1)

Publication Number Publication Date
CN109840578A true CN109840578A (en) 2019-06-04

Family

ID=66665324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711219057.0A Pending CN109840578A (en) 2017-11-28 2017-11-28 A kind of electronic equipment

Country Status (3)

Country Link
CN (1) CN109840578A (en)
TW (1) TWI739010B (en)
WO (1) WO2019104957A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111126291A (en) * 2019-12-25 2020-05-08 奕力科技股份有限公司 Multi-fingerprint detection device and multi-fingerprint authentication method
CN111523633A (en) * 2020-07-02 2020-08-11 华为技术有限公司 Data transmission method, multifunctional card and electronic equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726526A (en) * 2019-07-05 2021-11-30 创新先进技术有限公司 Method, device and system for acquiring and verifying face data
CN111159679A (en) * 2019-12-27 2020-05-15 上海闻泰信息技术有限公司 Identity recognition method and device, electronic equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819700A (en) * 2012-06-23 2012-12-12 郁晓东 Device and method for identifying a plurality of biological characteristics in isolation environment
CN104778392A (en) * 2015-04-15 2015-07-15 苏州海博智能系统有限公司 Privilege validation method and system on basis of biological identification
CN107358286A (en) * 2017-07-24 2017-11-17 深圳华视微电子有限公司 A kind of biometric security authentication smart card and authentication method towards passive scene

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9275212B2 (en) * 2012-12-26 2016-03-01 Cellco Partnership Secure element biometric authentication system
AU2016235515B2 (en) * 2015-03-22 2020-05-21 Apple Inc. Methods and apparatus for user authentication and human intent verification in mobile devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819700A (en) * 2012-06-23 2012-12-12 郁晓东 Device and method for identifying a plurality of biological characteristics in isolation environment
CN104778392A (en) * 2015-04-15 2015-07-15 苏州海博智能系统有限公司 Privilege validation method and system on basis of biological identification
CN107358286A (en) * 2017-07-24 2017-11-17 深圳华视微电子有限公司 A kind of biometric security authentication smart card and authentication method towards passive scene

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111126291A (en) * 2019-12-25 2020-05-08 奕力科技股份有限公司 Multi-fingerprint detection device and multi-fingerprint authentication method
CN111523633A (en) * 2020-07-02 2020-08-11 华为技术有限公司 Data transmission method, multifunctional card and electronic equipment
CN111523633B (en) * 2020-07-02 2021-02-23 华为技术有限公司 Data transmission method, multifunctional card and electronic equipment

Also Published As

Publication number Publication date
TWI739010B (en) 2021-09-11
WO2019104957A1 (en) 2019-06-06
TW201926102A (en) 2019-07-01

Similar Documents

Publication Publication Date Title
CN109840578A (en) A kind of electronic equipment
CN109842491A (en) A kind of electronic equipment
CN110502177A (en) A kind of unlocking screen method and apparatus of synchronous verifying finger print information
JP4844481B2 (en) Imaging apparatus and apparatus equipped with the same
US20170357979A1 (en) Organic light emitting diode ("oled") security authentication system
US20100088754A1 (en) Authentication Method and Token Using Screen Light for Both Communication and Powering
WO2019052215A1 (en) Fingerprint recognition based command execution method for electronic device, and electronic device
CN107451576A (en) Array substrate, preparation method thereof, display panel and display device
CN109427244A (en) A kind of operating method and device of physiological health detection
TWI720484B (en) Touch element operation method and device for synchronously verifying fingerprint information
CN102567686A (en) Security authentication method of application software of mobile terminal based on human body stable characteristics
TW200535723A (en) Biometric data card and authenticaiton method
CN109255278A (en) A kind of method and apparatus of synchronous acquisition finger print information
CN104751154A (en) Fingerprint safe encryption method based on intelligent mobile information device
CN109788168A (en) Synthesis physics unclonable function from imaging sensor
WO2022138064A1 (en) Biometric authentication system and biometric authentication method
EP3686788A1 (en) Method for verifying a biometric authentication
CN109713000A (en) A kind of smooth arrangement for detecting and optical detector part
US11533180B1 (en) Storage device and electronic device
US11250257B2 (en) Method and device for iris recognition
CN108878447A (en) Array substrate, display device and terminal unlock method
CN108492424A (en) A kind of access control system based on quantum cryptography
KR102461889B1 (en) Artificial intelligence type celebrity four-cut system and its celebrity photo output method
EP3926499A1 (en) Method for authenticating a user on a client device
FR2829334A1 (en) Key free identification system for electronic commerce uses personal data seed to secret algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190604