WO2016150023A1 - 一种指纹解密的方法和系统 - Google Patents

一种指纹解密的方法和系统 Download PDF

Info

Publication number
WO2016150023A1
WO2016150023A1 PCT/CN2015/082993 CN2015082993W WO2016150023A1 WO 2016150023 A1 WO2016150023 A1 WO 2016150023A1 CN 2015082993 W CN2015082993 W CN 2015082993W WO 2016150023 A1 WO2016150023 A1 WO 2016150023A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
decrypted
fingerprint
module
security module
Prior art date
Application number
PCT/CN2015/082993
Other languages
English (en)
French (fr)
Inventor
吴炽强
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2016150023A1 publication Critical patent/WO2016150023A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • the present invention relates to the field of data encryption, and in particular, to a method and system for fingerprint decryption.
  • a fingerprint is a line created by unevenness on the front surface of a human finger.
  • the lines are regularly arranged to form different patterns.
  • the starting point, end point, joint point and bifurcation point of the line are called the detailed feature points of the fingerprint.
  • Fingerprints are born by one person and are always the same. Because fingerprint encryption has high confidentiality, more applications are in the encryption and decryption system.
  • the application processor performs the decryption process after the fingerprint recognition is passed, and the application processor needs to separately obtain the user fingerprint and the pre-stored verification fingerprint from other different modules when performing fingerprint recognition, and the application processor In the process of obtaining verification fingerprints from other modules, verification fingerprints often have the risk of being tampered with, reducing the security of the data.
  • the technical problem to be solved by the embodiments of the present invention is to provide a method and a system for fingerprint decryption, which compares the verification fingerprint pre-existing in the security module with the user fingerprint sent by the fingerprint identification module through the security module, and when the verification passes Decrypting the decrypted data reduces the risk of pre-stored verification fingerprints being tampered with and improves data security.
  • the first aspect of the embodiment of the present invention discloses a fingerprint decryption side. Law, including:
  • a second aspect of the embodiment of the present invention discloses a fingerprint decryption system, including: a fingerprint acquiring module, configured to acquire a user fingerprint by using a fingerprint identification module; and a first sending module, configured to send the user fingerprint acquired by the fingerprint acquiring module To the security module;
  • a verification module configured to verify, by the security module, the user fingerprint sent by the first sending module according to a preset verification fingerprint, where the verification fingerprint is stored in the security module;
  • a decryption module configured to decrypt the data to be decrypted when the verification module passes the verification.
  • the verification fingerprint pre-existing in the security module and the user fingerprint sent by the fingerprint identification module are compared and verified by the security module, and when the verification is passed, the data to be decrypted is decrypted.
  • the pre-stored verification fingerprint is stored in the security module, and the fingerprint verification is performed by the security module, which reduces the risk of the pre-stored verification fingerprint being tampered with; avoids sending the verification fingerprint pre-stored in the security module to other modules for fingerprint ratio The risk of being tampered with in the process of solving the technical problem of verifying that the fingerprint was tampered in the transmission process in the prior art;
  • the key is stored in the security module, and the received data to be decrypted is decrypted by the security module, thereby avoiding the risk that the key is leaked during the transmission process;
  • FIG. 1 is a schematic flowchart of an implementation manner of a fingerprint decryption method according to an embodiment of the present invention
  • FIG. 2 is a schematic flow chart of another embodiment of a fingerprint decryption method provided by the present invention.
  • FIG. 3 is a schematic flow chart of still another embodiment of a fingerprint decryption method provided by the present invention.
  • FIG. 4 is a schematic structural diagram of an implementation manner of a fingerprint decryption system according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another embodiment of a fingerprint decryption system provided by the present invention.
  • FIG. 6 is a schematic structural diagram of still another embodiment of a fingerprint decryption system provided by the present invention.
  • FIG. 7 is a schematic structural diagram of an embodiment of a fingerprint decryption device according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of an implementation manner of a fingerprint decryption method according to an embodiment of the present disclosure, where the method includes:
  • Step S102 acquiring a user fingerprint by using a fingerprint identification module; specifically, a Finger Print Verification (FP) includes but is not limited to a scratch type,
  • the user's fingerprint can be collected through the fingerprint identification module.
  • the fingerprint recognition module can collect and obtain the fingerprint of the user A.
  • Step S104 Send the user fingerprint to the security module.
  • the user fingerprint acquired in step S102 is sent to a security module (Secure Element, SE).
  • the security module and the fingerprint identification module can be connected via a communication interface.
  • the fingerprint identification module can send the collected user fingerprint to the security module through the SPI interface.
  • the communication interfaces in various embodiments of the present invention include, but are not limited to, an SPI interface, an SDIO interface, an MIPI interface, and the like.
  • Step S106 The user fingerprint is verified by the security module according to the preset verification fingerprint, and the verification fingerprint is stored in the security module;
  • the security module may receive the verification fingerprint input by the user in advance, and the security module may also be the verification fingerprint obtained from other modules, and the security module may store the verification fingerprint.
  • the security module may compare the user fingerprint received in step S104 with the pre-stored verification fingerprint. When the user fingerprint received by the security module is identical or partially identical to the pre-stored verification fingerprint, the verification may be considered as passing.
  • the security module may pre-store the verification fingerprint input by the user A.
  • the security module may compare the user fingerprint with the verification fingerprint, when the user fingerprint and the verification fingerprint are identical. Or if 98% are the same, the verification can be considered as passed.
  • step S108 can be performed.
  • Step S108 decrypt the data to be decrypted when the verification is passed
  • the system can decrypt the data to be decrypted acquired from the memory.
  • a key is stored in the security module, and the key corresponds to the data to be decrypted.
  • the key can be obtained from the security module, and the decrypted data can be decrypted to obtain the decrypted data.
  • FIG. 2 is a schematic flowchart diagram of another embodiment of a fingerprint decryption method provided by the present invention, where the method includes:
  • Step S202 Acquire the data to be decrypted from the memory; specifically, the data to be decrypted is stored in the memory.
  • the system can retrieve the data to be decrypted from the memory.
  • Step S204 Send data to be decrypted to the security module
  • the data to be decrypted acquired in step S202 is sent to an application processor (AP), and the application processor may forward the data to be decrypted to the security module.
  • Modules can communicate via a communication interface.
  • the memory can pass The SDIO interface sends the data to be decrypted to the application processor, and the application processor sends the data to be decrypted to the security module through the SPI interface or the SDIO interface.
  • Step S206 Acquire a user fingerprint by the fingerprint identification module.
  • the Fingerprint Verification (FP) includes but is not limited to a scratch type or a press type, and the fingerprint of the user can be collected by the fingerprint identification module.
  • the fingerprint recognition module can collect and obtain the fingerprint of the user A.
  • Step S208 Send the user fingerprint to the security module
  • the user fingerprint acquired in step S206 is sent to a security element (SE).
  • SE security element
  • the security module and the fingerprint identification module can be connected via a communication interface.
  • the user fingerprint acquired by the fingerprint identification module is sent to the security module through the SPI interface.
  • Step S210 The user fingerprint is verified by the security module according to a preset verification fingerprint, where the verification fingerprint is stored in the security module;
  • the security module may receive the verification fingerprint input by the user in advance, and the security module may also be the verification fingerprint obtained from other modules, and the security module may store the verification fingerprint.
  • the security module may compare the user fingerprint received in step S208 with the pre-stored verification fingerprint.
  • the security module may pre-store the verification fingerprint input by the user A.
  • the security module may compare the user fingerprint with the verification fingerprint, when the user fingerprint and the verification fingerprint are identical. Or if 98% are the same, the verification can be considered as passed.
  • step S212 can be performed.
  • Step S212 Decrypt the data to be decrypted according to the pre-stored key by the security module, where the key is stored in the security module;
  • the system can decrypt the data to be decrypted acquired from the memory.
  • a key is stored in the security module, and the key corresponds to the data to be decrypted.
  • the key can be obtained from the security module, and the decrypted data is decrypted by the key to obtain the decrypted data.
  • the security module stores the corresponding key "0x28a246d3" for the data "hello", or security.
  • the key "0x6a43ad90" corresponding to the data "hello” is stored in the module.
  • the security module can decrypt the decrypted data "hello” according to the stored key "0x28a246d3".
  • the security module can decrypt the decrypted data "hello” according to the stored key "0x6a43ad90".
  • the security module can generate and store a key in advance before the security module decrypts the data.
  • the security module can obtain the data to be encrypted, the security module can read the random number and generate a key, and the security module can store the generated key.
  • the security module after receiving the data to be encrypted "hello”, the security module reads the random number and generates the key "0x28a246d3", and the security module can store the data "hello” key "0x28a246d3", the encrypted data " Hello” can be "0x456f04d”.
  • the security module After receiving the data to be encrypted “hello", the security module reads the random number and generates the key “0x6a43ad90", and the security module can store the key "0x6a43ad90" of the data "hello", and the encrypted data "hello” “Can be "0x4b50e7a6".
  • Step S214 The decrypted data is sent to the application processor by the security module; specifically, the decrypted data is obtained after the security module decrypts the data according to step S212.
  • the security module can send the decrypted data to the application processor through the communication interface.
  • the security module can send the decrypted data to the application processor via the SPI interface or the SDIO interface.
  • the application processor can output the decrypted data through the communication interface.
  • the application processor can output the decrypted data "hello" through the terminal display.
  • the terminal includes, but is not limited to, an electronic device such as a mobile phone, a computer, a personal computer, a watch, and the like.
  • FIG. 3 is a schematic flowchart of still another embodiment of a fingerprint decryption method provided by the present invention, where the method includes:
  • Step S302 Acquire the data to be decrypted from the memory; specifically, the data to be decrypted is stored in the memory.
  • the system can retrieve the data to be decrypted from the memory.
  • Step S304 The fingerprint of the user is obtained by the fingerprint identification module.
  • the Finger Print Verification (FP) includes, but is not limited to, a scratch type or a press type, and the fingerprint of the user can be collected by the fingerprint identification module.
  • the fingerprint recognition module can collect and obtain the fingerprint of the user A.
  • Step S306 Send the user fingerprint to the security module.
  • the user fingerprint acquired in step S304 is sent to a security module (Secure Element, SE).
  • SE Secure Element
  • the security module and the fingerprint identification module can be connected via a communication interface.
  • the user fingerprint acquired by the fingerprint identification module is sent to the security module through the SPI interface.
  • Step S308 The user fingerprint is verified by the security module according to a preset verification fingerprint, and the verification fingerprint is stored in the security module;
  • the security module may receive the verification fingerprint input by the user in advance, and the security module may also be the verification fingerprint obtained from other modules, and the security module may store the verification fingerprint.
  • the security module may compare the user fingerprint received in step S306 with the pre-stored verification fingerprint. When the user fingerprint received by the security module is identical or partially identical to the pre-stored verification fingerprint, the verification may be considered as passing.
  • the security module may pre-store the verification fingerprint input by the user A.
  • the security module may compare the user fingerprint with the verification fingerprint, when the user fingerprint and the verification fingerprint are identical. Or if 98% are the same, the verification can be considered as passed.
  • step S310 can be performed.
  • Step S310 The security module sends the stored key to the application processor; specifically, the security module stores a key, and the key corresponds to the data to be decrypted.
  • the application processor may first obtain the data to be decrypted sent by the memory, and the application processor may send a request for acquiring the data key to be decrypted to the security module, and the security module may send the to-be-decrypted according to the request.
  • the key of the data to the application processor.
  • the application processor can decrypt the decrypted data by using the key to obtain the decrypted data.
  • the security module can send the corresponding key of the data to be decrypted to the application processor (AP) through the communication interface.
  • AP application processor
  • the application processor can receive the data to be decrypted by the memory through the SDIO interface, “Hello”, and the application processor can send a request for obtaining the key of the “hello” data to be decrypted to the security module through the SPI interface or the SDIO interface.
  • the module may send the corresponding key “0x728a246d” of the data “hello” to be decrypted to the application processor through the SPI interface or the SDIO interface according to the request.
  • the security module can generate and store a key in advance before the security module decrypts the data. For example, when encrypting data, the security module can obtain the data to be encrypted, the security module can read the random number and generate a key, and the security module can store the generated key. For example, after receiving the data to be encrypted "hello”, the security module reads the random number and generates the key "0x28a246d3". The security module can store the data "hello” key "0x28a246d3", and the encrypted data "hello” can be "0x456f04d”.
  • the security module After receiving the data to be encrypted “hello", the security module reads the random number and generates the key “0x6a43ad90", and the security module can store the key "0x6a43ad90" of the data "hello", and the encrypted data "hello” “Can be "0x4b50e7a6".
  • Step S312 The application processor decrypts the data to be decrypted acquired from the memory according to the key.
  • the application processor may decrypt the data to be decrypted acquired from the memory according to the key acquired in step S310.
  • the application processor may decrypt the decrypted data "hello” according to the key "0x28a246d3" to obtain the decrypted data "hello”; for example, the application processor may decrypt the data "hello” according to the key "0x6a43ad90". "Decryption is performed to obtain the decrypted data "hello”.
  • the application processor can output the decrypted data through the communication interface.
  • the application processor can output the decrypted data "hello" through the terminal display.
  • the terminal includes, but is not limited to, an electronic device such as a mobile phone, a computer, a personal computer, a watch, and the like.
  • FIG. 4 is a schematic structural diagram of an implementation manner of a fingerprint decryption system according to an embodiment of the present invention.
  • the fingerprint decryption system 50 may include: a fingerprint obtaining module 502, a first sending module 504, and a verification.
  • the Finger Print Verification (FP) includes but is not limited to a scratch type or a push type, and can be collected by the fingerprint identification module.
  • the fingerprint to the user. For example, when the user A can touch the fingerprint identification module by touch or the like, the fingerprint recognition module can collect and obtain the fingerprint of the user A.
  • the first sending module 504 is configured to send the user fingerprint acquired by the fingerprint acquiring module 502 to the security module; and send the user fingerprint acquired by the fingerprint acquiring module 502 to a security element (SE).
  • SE security element
  • the security module and the fingerprint identification module can be connected via a communication interface.
  • the fingerprint identification module can send the collected user fingerprint to the security module through the SPI interface.
  • the verification module 506 is configured to verify, by the security module, the user fingerprint sent by the first sending module according to a preset verification fingerprint; the security module may receive the verification fingerprint input by the user in advance, and the security module may also be from another The verification fingerprint is obtained in the module, and the security module can store the verification fingerprint. The security module can forward the user fingerprint received by the first sending module 504 with the advance The stored verification fingerprints are compared. When the user fingerprint received by the security module is identical or partially identical to the pre-stored verification fingerprint, the verification may be considered as passing. For example, the security module may pre-store the verification fingerprint input by the user A. When the security module receives the user fingerprint sent by the fingerprint identification module, the security module may compare the user fingerprint with the verification fingerprint, when the user fingerprint and the verification fingerprint are identical. Or if 98% are the same, the verification can be considered as passed.
  • the decryption module 508 can be triggered when the verification passes.
  • the decryption module 508 is configured to decrypt the data to be decrypted when the verification module 506 passes the verification.
  • a key is stored in the security module, and the key corresponds to the data to be decrypted.
  • the key can be obtained from the security module, and the decrypted data can be decrypted to obtain the decrypted data.
  • the security module stores the corresponding key "0x28a246d3" of the data "hello"
  • the security module stores the corresponding key "0x6a43ad90" of the data "hello”.
  • the key "0x28a246d3" of the data "Hello” to be decrypted can be obtained from the security module, and the decrypted data "Hello” is decrypted by the key "0x28a246d3".
  • the key "0x6a43ad90" of the data to be decrypted "hello” can be obtained from the security module, and the decrypted data "hello” is decrypted by the key "0x6a43ad90".
  • the security module can generate and store a key in advance before the security module decrypts the data.
  • the security module can obtain the data to be encrypted, the security module can read the random number and generate a key, and the security module can store the generated key.
  • the security module after receiving the data to be encrypted "hello”, the security module reads the random number and generates the key "0x28a246d3", and the security module can store the data "hello” key "0x28a246d3", the encrypted data " Hello” can be "0x456f04d”.
  • the security module After receiving the data to be encrypted “hello", the security module reads the random number and generates the key “0x6a43ad90", and the security module can store the key "0x6a43ad90" of the data "hello", and the encrypted data "hello” “Can be "0x4b50e7a6".
  • FIG. 5 is a schematic structural diagram of another embodiment of a fingerprint decryption system provided by the present invention.
  • the fingerprint decryption system 50 includes a fingerprint obtaining module 502, a first sending module 504, and a verification module 506, as shown in FIG.
  • the decryption module 508 may further include an obtaining module 510, a second sending module 512, and a third sending module 514, where:
  • the obtaining module 510 is configured to save the data to be decrypted before the decryption module decrypts the data to be decrypted.
  • the memory acquires the data to be decrypted; the memory stores data to be decrypted.
  • the system can retrieve the data to be decrypted from the memory.
  • the second sending module 512 is configured to send the data to be decrypted acquired by the acquiring module 510 to the security module.
  • the second sending module may include a first sending unit and a second sending unit, where:
  • the first sending unit may send the data to be decrypted acquired by the obtaining module 510 through the memory to an application processor (AP), and the memory and the application processor may be communicatively connected through the communication interface.
  • AP application processor
  • the memory can send data to be decrypted to the application processor via the SDIO interface.
  • a second sending unit configured to send, by the application processor, the data to be decrypted to the security module.
  • the application processor may forward the data to be decrypted to the security module, and the memory and the security module may be communicatively connected through the communication interface.
  • the application processor can send the data to be decrypted to the security module through the SPI interface or the SDIO interface.
  • the third sending module 514 is configured to send the decrypted data to the application processor by using the security module after the decrypting module 508 decrypts the data to be decrypted.
  • the decryption module 508 decrypts the data to be decrypted by the security module to obtain the decrypted data.
  • the security module can send the decrypted data to the application processor through the communication interface. For example, the security module can send the decrypted data to the application processor via the SPI interface or the SDIO interface.
  • the application processor can output the decrypted data through the communication interface.
  • the application processor can output the decrypted data "hello" through the terminal display.
  • the terminal includes, but is not limited to, an electronic device such as a mobile phone, a computer, a personal computer, a watch, and the like.
  • FIG. 6 is a schematic structural diagram of another embodiment of a fingerprint decryption system provided by the present invention.
  • the fingerprint decryption system 50 includes a fingerprint obtaining module 502, a first sending module 504, and a verification module 506, as shown in FIG. a decryption module 508, wherein the decryption module 508 can include a third sending unit and a decryption unit, wherein: the third sending unit is configured to send the stored key to the application processor; the security module stores the secret The key, the key corresponds to the data to be decrypted.
  • the application processor may first obtain the number of to-be-decrypted packets sent by the memory.
  • a request for acquiring the data key to be decrypted may be sent to the security module, and the security module may send the key of the data to be decrypted to the application processor according to the request.
  • the application processor can decrypt the decrypted data by using the key to obtain the decrypted data.
  • the security module can send the corresponding key of the data to be decrypted to the application processor (AP) through the communication interface.
  • the application processor can receive the data to be decrypted by the memory through the SDIO interface, “Hello”, and the application processor can send a request for obtaining the key of the “hello” data to be decrypted to the security module through the SPI interface or the SDIO interface.
  • the module may send the corresponding key “0x28a246d3” of the data “hello” to be decrypted to the application processor through the SPI interface or the SDIO interface according to the request.
  • the security module can generate and store a key in advance before the security module decrypts the data. For example, when encrypting data, the security module can obtain the data to be encrypted, the security module can read the random number and generate a key, and the security module can store the generated key. For example, after receiving the data to be encrypted "Hello”, the security module reads the random number and generates the key "0x28a246d3", and the security module can store the key "0x28a246d3" of the data "hello”.
  • the security module After receiving the data to be encrypted “hello", the security module reads the random number and generates a key "0x6a43ad90", and the security module can store the key "0x6a43ad90" of the data "hello”.
  • a decryption unit configured to decrypt, by the application processor, the data to be decrypted acquired from the memory according to the key.
  • the application processor may decrypt the data to be decrypted obtained from the memory according to the key acquired by the third sending unit. For example, the application processor may decrypt the decrypted data "hello" according to the key "0x28a246d3" to obtain the decrypted data "hello”.
  • the application processor can output the decrypted data through the communication interface.
  • the application processor can output the decrypted data "hello" through the terminal display.
  • the terminal includes, but is not limited to, an electronic device such as a mobile phone, a computer, a personal computer, a watch, and the like.
  • FIG. 7 is a schematic structural diagram of an implementation manner of a fingerprint decryption device according to an embodiment of the present invention.
  • the device may include: a fingerprint identification module 702, a security module 704, an application processor 706, a memory 708, an input device 710, and an output device 712, where:
  • Input device 710 includes, but is not limited to, a keyboard, a touch screen, and the like.
  • the user can input a trigger instruction through the input device 701.
  • the user can input an instruction to decrypt data or the like through a touch screen.
  • the user can click the image to be decrypted through the keyboard, and trigger the device to decrypt the image to be decrypted.
  • Application processor 706 can retrieve the encrypted data from memory 708.
  • Application processor 706 can send the acquired encrypted data to the security module 704 through the communication interface.
  • the communication interfaces in various embodiments of the present invention include, but are not limited to, an SPI interface, an SDIO interface, an MIPI interface, and the like.
  • the application processor 706 can retrieve the encrypted data from the memory 708 via the SDIO interface and send the encrypted data to the security module 704 via the SPI interface or the SDIO interface.
  • the application processor 706 can send a fingerprint collection instruction to the fingerprint identification module 920 (Finger Print Verification, FP).
  • the fingerprint identification module 702 can collect the fingerprint of the user according to the fingerprint collection instruction.
  • the fingerprint identification module 702 includes but is not limited to a scratching type and a pressing. formula.
  • the security module 704 can receive the fingerprint collected by the fingerprint identification module 702 through the communication interface.
  • the communication interfaces in various embodiments of the present invention include, but are not limited to, an SPI interface, an SDIO interface, an MIPI interface, and the like.
  • the security module 704 can receive the fingerprint collected by the fingerprint recognition module 702 through the SPI interface.
  • the security module 704 can have a storage function, and the security module 704 can store the user fingerprints collected from the fingerprint recognition module 702.
  • the security module 704 can compare the user fingerprint collected by the fingerprint identification module 702 with the pre-stored verification fingerprint. After the fingerprint comparison is successful, the security module 704 can extract the pre-stored key to decrypt the decrypted data.
  • the application processor 706 can receive the decrypted data of the security module 704 through the communication interface.
  • the application processor 706 can receive the decrypted data of the security module 704 via an SPI interface or an SDIO interface.
  • the application processor 706 can trigger the output device 712 to output the decrypted data.
  • Output device 712 includes, but is not limited to, a display, a speaker, and the like.
  • the decrypted data is displayed through the screen of the mobile phone.
  • the decrypted voice or the like is output through the speaker of the mobile phone.
  • a method and a system for decrypting a fingerprint are provided.
  • the security fingerprint module compares the verification fingerprint pre-existing in the security module with the user fingerprint sent by the fingerprint identification module, and the verification is passed.
  • the decrypted data is decrypted.
  • the pre-stored verification fingerprint is stored in the security module, and the fingerprint verification is performed by the security module.
  • the risk of the pre-stored verification fingerprint being falsified is reduced; the risk of tampering in the process of fingerprint verification by the pre-stored verification fingerprint sent by the security module is avoided, and the verification of the fingerprint in the prior art is solved.
  • Technical problems that have been tampered with in the process ;
  • the key is stored in the security module, and the received data to be decrypted is decrypted by the security module, thereby avoiding the risk that the key is leaked during the transmission process;
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

一种指纹解密方法,包括:通过指纹识别模块获取用户指纹(S102);发送所述用户指纹至安全模块(S104);通过所述安全模块根据预设的验证指纹来验证用户指纹,所述验证指纹存储于所述安全模块中(S106);当验证通过时,对待解密的数据进行解密(S108)。通过安全模块将预设在安全模块中的验证指纹与指纹识别模块发送的用户指纹进行比对验证,当验证通过时,对待解密的数据进行解密,降低了预设的验证指纹被纂改的风险,提高了数据的安全性。

Description

一种指纹解密的方法和系统
本申请要求于2015年3月25日提交中国专利局,申请号为201510133060.5、发明名称为“一种指纹解密的方法和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数据加密领域,尤其涉及一种指纹解密的方法和系统。
背景技术
随着科学技术的发展,大量的数据需要传输与存储。为了保证数据在传输或者存储的过程中防止他人窃取而导致机密泄露,往往需要对这些数据进行加密处理。目前,数据加密的方式越来越多样化,例如,指纹识别、掌纹识别、虹膜识别、面部识别等。
指纹是指人的手指末端正面皮肤上凸凹不平产生的纹线。纹线有规律的排列形成不同的纹型。纹线的起点、终点、结合点和分叉点,称为指纹的细节特征点。指纹是一个人天生就有而且终老不变。指纹加密因具有较高的保密性,较多的应用在加解密系统中。
目前,现有的加解密系统中,应用处理器在指纹识别通过之后进行解密过程,而应用处理器在进行指纹识别时,需要分别从其他不同模块获取用户指纹和预存的验证指纹,应用处理器从其他模块获取验证指纹的过程中,验证指纹往往有被纂改的风险,降低了数据的安全性。
发明内容
本发明实施例所要解决的技术问题在于,提供一种指纹解密的方法和系统,通过安全模块将预存在安全模块中的验证指纹与指纹识别模块发送的用户指纹进行比对验证,当验证通过时,对待解密的数据进行解密,降低了预存的验证指纹被纂改的风险,提高了数据的安全性。
为了解决上述技术问题,本发明实施例第一方面公开了一种指纹解密方 法,包括:
通过指纹识别模块获取用户指纹;
发送所述用户指纹至安全模块;
通过所述安全模块根据预设的验证指纹来验证用户指纹,所述验证指纹存储于所述安全模块中;
当验证通过时,对待解密的数据进行解密。本发明实施例第二方面公开了一种指纹解密系统,包括:指纹获取模块,用于通过指纹识别模块获取用户指纹;第一发送模块,用于发送所述指纹获取模块获取的所述用户指纹至安全模块;
验证模块,用于通过所述安全模块根据预设的验证指纹来验证所述第一发送模块发送的所述用户指纹,所述验证指纹存储于所述安全模块中;
解密模块,用于当所述验证模块验证通过时,对待解密的数据进行解密。实施本发明实施例,通过安全模块将预存在安全模块中的验证指纹与指纹识别模块发送的用户指纹进行比对验证,当验证通过时,对待解密的数据进行解密。本发明实施例具有如下有益效果:
1、预存的验证指纹存储于安全模块中,通过安全模块进行指纹比对验证,降低了预存的验证指纹被纂改的风险;避免了将安全模块中预存的验证指纹发送给其他模块进行指纹比对的过程中被纂改的风险,解决了现有技术中验证指纹在传输的过程中被纂改的技术问题;
2、密钥存储于安全模块中,通过安全模块对接收到的待解密数据进行解密,避免了密钥在传输的过程中被泄露的风险;
3、当除安全模块以外的其他模块被病毒侵入时,也不能获取安全模块中存储的密钥,也不能纂改预存的验证指纹,提高了数据安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的指纹解密方法一种实施方式的流程示意图;
图2是本发明提供的指纹解密方法的另一实施例的流程示意图;
图3是本发明提供的指纹解密方法的又一实施例的流程示意图;
图4是本发明实施例提供的指纹解密系统一种实施方式的结构示意图;
图5是本发明提供的指纹解密系统的另一实施例的结构示意图;
图6是本发明提供的指纹解密系统的又一实施例的结构示意图;
图7是本发明实施例提供的指纹解密设备一种实施方式的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明的是,在本发明实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本发明。在本发明实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
参见图1,是本发明实施例提供的指纹解密方法一种实施方式的流程示意图,该方法包括:
步骤S102:通过指纹识别模块获取用户指纹;具体地,指纹识别模块(Finger Print Verification,FP)包含但不限于刮擦式、
按压式,通过指纹识别模块可以采集到用户的指纹。例如,用户A可以通过触摸等方式接触指纹识别模块时,指纹识别模块可以采集获取到用户A的指纹。
步骤S104:发送所述用户指纹至安全模块;
具体地,将步骤S102获取到的用户指纹发送至安全模块(Secure Element, SE)。安全模块与指纹识别模块可以通过通讯接口进行通讯连接。例如,指纹识别模块可以通过SPI接口将采集到的用户指纹发送至安全模块。
需要说明的是,本发明各个实施例中的通讯接口包含但不限于SPI接口、SDIO接口、MIPI接口等。
步骤S106:通过所述安全模块根据预设的验证指纹来验证用户指纹,所述验证指纹存储于所述安全模块中;
具体地,安全模块可以接收用户预先输入的验证指纹,安全模块也可以是从其他模块中获取的验证指纹,安全模块可以将验证指纹进行存储。安全模块可以将步骤S104接收到的用户指纹与预先存储的验证指纹进行比对。当安全模块接收到的用户指纹与预先存储的验证指纹完全相同或者部分相同时,可以认为验证通过。例如,安全模块可以预先存储用户A输入的验证指纹,当安全模块接收到指纹识别模块发送的用户指纹时,安全模块可以将用户指纹与验证指纹进行比对,当用户指纹与验证指纹完全相同时或者有98%相同时,可以认为验证通过。
当验证不通过时,可以结束当前操作,实际应用中可以不同,这里不做限制。当验证通过时,可以执行步骤S108。
步骤S108:当验证通过时,对待解密的数据进行解密;
具体地,当步骤S106验证指纹通过时,系统可以对从存储器中获取的待解密数据进行解密。安全模块中存储有密钥,密钥与待解密的数据相对应。当需要对待解密的数据进行解密时,可以从安全模块中获取密钥,可以对待解密数据进行解密,可以获得解密后的数据。
参见图2,是本发明提供的指纹解密方法的另一实施例的流程示意图,该方法包括:
步骤S202:从存储器获取所述待解密的数据;具体地,存储器中存储有待解密的数据。系统可以从存储器中获取到待解密的数据。
步骤S204:发送待解密的数据至安全模块;
具体地,可以步骤S202获取到的待解密的数据发送至应用处理器(Application Processor,AP),应用处理器可以将所述待解密的数据转发至安全模块。模块之间可以通过通讯接口进行通信连接。例如,存储器可以通过 SDIO接口将待解密的数据发送至应用处理器,应用处理器通过SPI接口或者SDIO接口将待解密的数据发送至安全模块。
步骤S206:通过指纹识别模块获取用户指纹;具体地,指纹识别模块(FingerPrint Verification,FP)包含但不限于刮擦式、按压式,通过指纹识别模块可以采集到用户的指纹。例如,用户A可以通过触摸等方式接触指纹识别模块时,指纹识别模块可以采集获取到用户A的指纹。
步骤S208:发送所述用户指纹至安全模块;
具体地,将步骤S206获取到的用户指纹发送至安全模块(Secure Element,SE)。安全模块与指纹识别模块可以通过通讯接口进行通讯连接。例如,通过SPI接口,将指纹识别模块获取到的用户指纹发送至安全模块。
步骤S210:通过所述安全模块根据预设的验证指纹来验证用户指纹,所述验证指纹存储于所述安全模块中;
具体地,安全模块可以接收用户预先输入的验证指纹,安全模块也可以是从其他模块中获取的验证指纹,安全模块可以将验证指纹进行存储。安全模块可以将步骤S208接收到的用户指纹与预先存储的验证指纹进行比对。当安全模块接收到的用户指纹与预先存储的验证指纹完全相同或者部分相同时,可以认为验证通过。例如,安全模块可以预先存储用户A输入的验证指纹,当安全模块接收到指纹识别模块发送的用户指纹时,安全模块可以将用户指纹与验证指纹进行比对,当用户指纹与验证指纹完全相同时或者有98%相同时,可以认为验证通过。
当验证不通过时,可以结束当前操作,实际应用中可以不同,这里不做限制。当验证通过时,可以执行步骤S212。
步骤S212:通过所述安全模块根据预存的密钥对所述待解密的数据进行解密,所述密钥存储于所述安全模块中;
具体地,当步骤S210验证指纹通过时,系统可以对从存储器中获取的待解密数据进行解密。安全模块中存储有密钥,密钥与待解密的数据相对应。当需要对待解密的数据进行解密时,可以从安全模块中获取密钥,并通过所述密钥对待解密数据进行解密,获得解密后的数据。
例如,安全模块中存储有数据“你好”相应的密钥“0x28a246d3”,或者安全 模块中存储有数据“hello”相应的密钥“0x6a43ad90”。当用户验证指纹通过后,安全模块可以根据存储的密钥“0x28a246d3”对待解密数据“你好”进行解密。或者当用户验证指纹通过后,安全模块可以根据存储的密钥“0x6a43ad90”对待解密数据“hello”进行解密。
可以理解的是,安全模块对数据进行解密之前,安全模块可以预先产生、存储密钥。例如,对数据进行加密时,安全模块可以获取到待加密数据,安全模块可以读取随机数并生成密钥,安全模块可以将生成的密钥进行存储。例如,安全模块接收到待加密数据“你好”后,读取随机数并生成密钥“0x28a246d3”,安全模块可以将数据“你好”的密钥“0x28a246d3”进行存储,加密后的数据“你好”可以为“0x456f04d”。再例如,安全模块接收到待加密数据“hello”后,读取随机数并生成密钥“0x6a43ad90”,安全模块可以将数据“hello”的密钥“0x6a43ad90”进行存储,加密后的数据“hello”可以为“0x4b50e7a6”。
步骤S214:通过所述安全模块将解密后的数据发送至应用处理器;具体地,根据步骤S212安全模块对待解密的数据进行解密后获得解密后的数据。安全模块可以通过通讯接口将解密后数据发送至应用处理器。例如,安全模块可以通过SPI接口或者SDIO接口将解密后的数据发送至应用处理器。
应用处理器可以通过通讯接口将解密后的数据进行输出。例如,应用处理器可以将解密后的数据“你好”通过终端显示器进行输出。所述终端包含但不限于手机、计算机、个人电脑、手表等电子设备。
参见图3,是本发明提供的指纹解密方法的又一实施例的流程示意图,该方法包括:
步骤S302:从存储器获取所述待解密的数据;具体地,存储器中存储有待解密的数据。系统可以从存储器中获取到待解密的数据。
步骤S304:通过指纹识别模块获取用户指纹;具体地,指纹识别模块(Finger Print Verification,FP)包含但不限于刮擦式、按压式,通过指纹识别模块可以采集到用户的指纹。例如,用户A可以通过触摸等方式接触指纹识别模块时,指纹识别模块可以采集获取到用户A的指纹。
步骤S306:发送所述用户指纹至安全模块;
具体地,将步骤S304获取到的用户指纹发送至安全模块(Secure Element, SE)。安全模块与指纹识别模块可以通过通讯接口进行通讯连接。例如,通过SPI接口,将指纹识别模块获取到的用户指纹发送至安全模块。
步骤S308:通过所述安全模块根据预设的验证指纹来验证用户指纹,所述验证指纹存储于所述安全模块中;
具体地,安全模块可以接收用户预先输入的验证指纹,安全模块也可以是从其他模块中获取的验证指纹,安全模块可以将验证指纹进行存储。安全模块可以将步骤S306接收到的用户指纹与预先存储的验证指纹进行比对。当安全模块接收到的用户指纹与预先存储的验证指纹完全相同或者部分相同时,可以认为验证通过。例如,安全模块可以预先存储用户A输入的验证指纹,当安全模块接收到指纹识别模块发送的用户指纹时,安全模块可以将用户指纹与验证指纹进行比对,当用户指纹与验证指纹完全相同时或者有98%相同时,可以认为验证通过。
当验证不通过时,可以结束当前操作,实际应用中可以不同,这里不做限制。当验证通过时,可以执行步骤S310。
步骤S310:所述安全模块将存储的密钥发送至应用处理器;具体地,安全模块中存储有密钥,密钥与待解密的数据相对应。当需要对待解密的数据进行解密时,应用处理器可以先获取存储器发送的待解密数据,应用处理器可以发送获取待解密数据密钥的请求至安全模块,安全模块可以根据所述请求发送待解密数据的密钥至应用处理器。应用处理器可以通过所述密钥对待解密数据进行解密,获得解密后的数据。安全模块可以通过通讯接口将待解密数据相应的密钥发送至应用处理器(Application Processor,AP)。例如,应用处理器可以通过SDIO接口接收存储器发送的待解密数据“你好”,应用处理器可以通过SPI接口或者SDIO接口发送获取待解密数据“你好”的密钥的请求至安全模块,安全模块可以根据所述请求通过SPI接口或者SDIO接口将待解密的数据“你好”相应的密钥“0x728a246d”发送至应用处理器。
可以理解的是,安全模块对数据进行解密之前,安全模块可以预先产生、存储密钥。例如,对数据进行加密时,安全模块可以获取到待加密数据,安全模块可以读取随机数并生成密钥,安全模块可以将生成的密钥进行存储。例如,安全模块接收到待加密数据“你好”后,读取随机数并生成密钥“0x28a246d3”, 安全模块可以将数据“你好”的密钥“0x28a246d3”进行存储,加密后的数据“你好”可以为“0x456f04d”。再例如,安全模块接收到待加密数据“hello”后,读取随机数并生成密钥“0x6a43ad90”,安全模块可以将数据“hello”的密钥“0x6a43ad90”进行存储,加密后的数据“hello”可以为“0x4b50e7a6”。
步骤S312:所述应用处理器根据所述密钥,将从存储器获取的所述待解密的数据进行解密;
具体地,应用处理器可以根据步骤S310获取的密钥,对从存储器获取的待解密数据进行解密。例如,应用处理器可以根据密钥“0x28a246d3”对待解密数据“你好”进行解密,获取解密后的数据“你好”;再例如,应用处理器可以根据密钥“0x6a43ad90”对待解密数据“hello”进行解密,获取解密后的数据“hello”。应用处理器可以通过通讯接口将解密后的数据进行输出。例如,应用处理器可以将解密后的数据“你好”通过终端显示器进行输出。所述终端包含但不限于手机、计算机、个人电脑、手表等电子设备。
参见图4,是本发明实施例提供的指纹解密系统一种实施方式的结构示意图,其中,如图4所示,该指纹解密系统50可以包括:指纹获取模块502、第一发送模块504、验证模块506、解密模块508,其中指纹获取模块502,用于通过指纹识别模块获取用户指纹;指纹识别模块(Finger Print Verification,FP)包含但不限于刮擦式、按压式,通过指纹识别模块可以采集到用户的指纹。例如,用户A可以通过触摸等方式接触指纹识别模块时,指纹识别模块可以采集获取到用户A的指纹。
第一发送模块504,用于发送所述指纹获取模块502获取的所述用户指纹至安全模块;可以将指纹获取模块502获取到的用户指纹发送至安全模块(Secure Element,SE)。安全模块与指纹识别模块可以通过通讯接口进行通讯连接。例如,指纹识别模块可以通过SPI接口将采集到的用户指纹发送至安全模块。
验证模块506,用于通过所述安全模块根据预设的验证指纹来验证所述第一发送模块发送的所述用户指纹;安全模块可以接收用户预先输入的验证指纹,安全模块也可以是从其他模块中获取到验证指纹,安全模块可以将验证指纹进行存储。安全模块可以将通过第一发送模块504接收到的用户指纹与预先 存储的验证指纹进行比对。当安全模块接收到的用户指纹与预先存储的验证指纹完全相同或者部分相同时,可以认为验证通过。例如,安全模块可以预先存储用户A输入的验证指纹,当安全模块接收到指纹识别模块发送的用户指纹时,安全模块可以将用户指纹与验证指纹进行比对,当用户指纹与验证指纹完全相同时或者有98%相同时,可以认为验证通过。
当验证不通过时,可以结束当前操作,实际应用中可以不同,这里不做限制。当验证通过时,可以触发解密模块508。
解密模块508,用于当所述验证模块506验证通过时,对待解密的数据进行解密。安全模块中存储有密钥,密钥与待解密的数据相对应。当需要对待解密的数据进行解密时,可以从安全模块中获取密钥,可以对待解密数据进行解密,可以获得解密后的数据。例如,安全模块中存储有数据“你好”相应的密钥“0x28a246d3”,或者安全模块中存储有数据“hello”相应的密钥“0x6a43ad90”。当用户验证指纹通过后,可以从安全模块中获取待解密数据“你好”的密钥“0x28a246d3”,通过密钥“0x28a246d3”对待解密数据“你好”进行解密。或者当用户验证指纹通过后,可以从安全模块中获取待解密数据“hello”的密钥“0x6a43ad90”,通过密钥“0x6a43ad90”对待解密数据“hello”进行解密。
可以理解的是,安全模块对数据进行解密之前,安全模块可以预先产生、存储密钥。例如,对数据进行加密时,安全模块可以获取到待加密数据,安全模块可以读取随机数并生成密钥,安全模块可以将生成的密钥进行存储。例如,安全模块接收到待加密数据“你好”后,读取随机数并生成密钥“0x28a246d3”,安全模块可以将数据“你好”的密钥“0x28a246d3”进行存储,加密后的数据“你好”可以为“0x456f04d”。再例如,安全模块接收到待加密数据“hello”后,读取随机数并生成密钥“0x6a43ad90”,安全模块可以将数据“hello”的密钥“0x6a43ad90”进行存储,加密后的数据“hello”可以为“0x4b50e7a6”。
参见图5,是本发明提供的指纹解密系统的另一实施例的结构示意图,其中,如图5所示,该指纹解密系统50包括指纹获取模块502、第一发送模块504、验证模块506、解密模块508之外,还可以包括获取模块510、第二发送模块512、第三发送模块514,其中:
获取模块510,用于在所述解密模块对待解密的数据进行解密之前,从存 储器获取所述待解密的数据;存储器中存储有待解密的数据。系统可以从存储器中获取到待解密的数据。
第二发送模块512,用于发送所述获取模块510获取的所述待解密的数据至所述安全模块。
进一步地,所述第二发送模块可以包括第一发送单元和第二发送单元,其中:
第一发送单元,用于将所述待解密的数据发送至应用处理器。第一发送单元可以将获取模块510通过存储器获取到的待解密的数据发送至应用处理器(Application Processor,AP),存储器与应用处理器之间可以通过通讯接口进行通信连接。例如,存储器可以通过SDIO接口将待解密的数据发送至应用处理器。
第二发送单元,用于所述应用处理器将所述待解密的数据发送至所述安全模块。应用处理器可以将所述待解密的数据转发至安全模块,存储器与安全模块之间可以通过通讯接口进行通信连接。例如,应用处理器可以通过SPI接口或者SDIO接口将待解密的数据发送至安全模块。
第三发送模块514,用于在所述解密模块508对待解密的数据进行解密之后,通过所述安全模块将解密后的数据发送至应用处理器。解密模块508通过安全模块对待解密的数据进行解密后获得解密后的数据。安全模块可以通过通讯接口将解密后数据发送至应用处理器。例如,安全模块可以通过SPI接口或者SDIO接口将解密后的数据发送至应用处理器。
可以理解的是,应用处理器可以通过通讯接口将解密后的数据进行输出。例如,应用处理器可以将解密后的数据“你好”通过终端显示器进行输出。所述终端包含但不限于手机、计算机、个人电脑、手表等电子设备。
参见图6,是本发明提供的指纹解密系统的又一实施例的结构示意图,其中,如图6所示,该指纹解密系统50包括指纹获取模块502、第一发送模块504、验证模块506、解密模块508,其中所述解密模块508可以包括第三发送单元和解密单元,其中:第三发送单元,用于所述安全模块将存储的密钥发送至应用处理器;安全模块中存储有密钥,密钥与待解密的数据相对应。当需要对待解密的数据进行解密时,应用处理器可以先获取存储器发送的待解密数 据,应用处理器可以发送获取待解密数据密钥的请求至安全模块,安全模块可以根据所述请求发送待解密数据的密钥至应用处理器。应用处理器可以通过所述密钥对待解密数据进行解密,获得解密后的数据。安全模块可以通过通讯接口将待解密数据相应的密钥发送至应用处理器(Application Processor,AP)。例如,应用处理器可以通过SDIO接口接收存储器发送的待解密数据“你好”,应用处理器可以通过SPI接口或者SDIO接口发送获取待解密数据“你好”的密钥的请求至安全模块,安全模块可以根据所述请求通过SPI接口或者SDIO接口将待解密的数据“你好”相应的密钥“0x28a246d3”发送至应用处理器。可以理解的是,安全模块对数据进行解密之前,安全模块可以预先产生、存储密钥。例如,对数据进行加密时,安全模块可以获取到待加密数据,安全模块可以读取随机数并生成密钥,安全模块可以将生成的密钥进行存储。例如,安全模块接收到待加密数据“你好”后,读取随机数并生成密钥“0x28a246d3”,安全模块可以将数据“你好”的密钥“0x28a246d3”进行存储。再例如,安全模块接收到待加密数据“hello”后,读取随机数并生成密钥“0x6a43ad90”,安全模块可以将数据“hello”的密钥“0x6a43ad90”进行存储。
解密单元,用于所述应用处理器根据所述密钥,将从存储器获取的所述待解密的数据进行解密。应用处理器可以根据第三发送单元获取的密钥,对从存储器获取的待解密数据进行解密。例如,应用处理器可以根据密钥“0x28a246d3”对待解密数据“你好”进行解密,获取解密后的数据“你好”。
可以理解的是,应用处理器可以通过通讯接口将解密后的数据进行输出。例如,应用处理器可以将解密后的数据“你好”通过终端显示器进行输出。所述终端包含但不限于手机、计算机、个人电脑、手表等电子设备。
参见图7,是本发明实施例提供的指纹解密设备一种实施方式的结构示意图。其中,如图7所示,该设备可以包括:指纹识别模块702、安全模块704、应用处理器706、存储器708、输入设备710、输出设备712,其中:
输入设备710包含但不限于键盘、触屏等。用户可以通过输入设备701输入触发指令。例如,用户可以通过触屏输入解密数据的指令等。再例如,用户可以通过键盘点击待解密图片,触发设备对所述待解密图片进行解密。
应用处理器706可以从存储器708中获取经过加密的数据。应用处理器 706可以将获取的加密数据通过通讯接口发送至安全模块704中。需要说明的是,本发明各个实施例中的通讯接口包含但不限于SPI接口、SDIO接口、MIPI接口等。例如,应用处理器706可以通过SDIO接口从存储器708中获取经过加密的数据,并通过SPI接口或者SDIO接口将经过加密的数据发送至安全模块704。
应用处理器706可以发送指纹采集指令至指纹识别模块702(Finger Print Verification,FP),指纹识别模块702可以根据指纹采集指令采集到用户的指纹;指纹识别模块702包含但不限于刮擦式、按压式。
安全模块704可以通过通讯接口接收指纹识别模块702采集到用户的指纹。需要说明的是,本发明各个实施例中的通讯接口包含但不限于SPI接口、SDIO接口、MIPI接口等。例如,安全模块704可以通过SPI接口接收指纹识别模块702采集到用户的指纹。安全模块704可以具有存储功能,安全模块704可以将从指纹识别模块702采集到的用户指纹进行存储。安全模块704可以将从指纹识别模块702采集到的用户指纹与预存的验证指纹进行比对,当指纹比对成功之后,安全模块704可以提取预存的密钥对待解密数据进行解密。
应用处理器706可以通过通讯接口接收安全模块704解密后的数据。例如,应用处理器706可以通过SPI接口或者SDIO接口接收安全模块704解密后的数据。
应用处理器706可以触发输出设备712将解密后的数据进行输出。输出设备712包含但不限于显示器、扬声器等。例如,通过手机屏幕显示解密后的数据。再例如,通过手机扬声器输出解密后的语音等。
需要说明的是,本实施例的具体实施方式可以参考上述图1至图6实施例,这里不再赘述。
综上所述,通过实施本发明实施例,提供一种指纹解密的方法和系统,通过安全模块将预存在安全模块中的验证指纹与指纹识别模块发送的用户指纹进行比对验证,当验证通过时,对待解密的数据进行解密。本发明实施例具有如下有益效果:
1、预存的验证指纹存储于安全模块中,通过安全模块进行指纹比对验证, 降低了预存的验证指纹被纂改的风险;避免了将安全模块中预存的验证指纹发送给其他模块进行指纹比对的过程中被纂改的风险,解决了现有技术中验证指纹在传输的过程中被纂改的技术问题;
2、密钥存储于安全模块中,通过安全模块对接收到的待解密数据进行解密,避免了密钥在传输的过程中被泄露的风险;
3、当除安全模块以外的其他模块被病毒侵入时,也不能获取安全模块中存储的密钥,也不能纂改预存的验证指纹,提高了数据安全性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
以上所揭露的仅为本发明一种较佳实施例而已,当然不能以此来限定本发明之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本发明权利要求所作的等同变化,仍属于发明所涵盖的范围。

Claims (12)

  1. 一种指纹解密方法,其特征在于,包括:
    通过指纹识别模块获取用户指纹;
    发送所述用户指纹至安全模块;
    通过所述安全模块根据预设的验证指纹来验证用户指纹,所述验证指纹存储于所述安全模块中;
    当验证通过时,对待解密的数据进行解密。
  2. 如权利要求1所述的方法,其特征在于,所述待解密的数据存储于存储器中,所述对待解密的数据进行解密之前,还包括:
    从所述存储器获取所述待解密的数据;
    发送所述待解密的数据至所述安全模块。
  3. 如权利要求2所述的方法,其特征在于,所述发送所述待解密的数据至所述安全模块,包括:
    将所述待解密的数据发送至应用处理器;
    所述应用处理器将所述待解密的数据发送至所述安全模块。
  4. 如权利要求1-3任一项所述的方法,其特征在于,所述对待解密的数据进行解密,包括:
    通过所述安全模块根据预存的密钥对所述待解密的数据进行解密,所述密钥存储于所述安全模块中。
  5. 如权利要求4所述的方法,其特征在于,所述对待解密的数据进行解密之后,还包括:
    通过所述安全模块将解密后的数据发送至应用处理器。
  6. 如权利要求1所述的方法,其特征在于,所述对待解密的数据进行解密,包括:
    所述安全模块将存储的密钥发送至应用处理器;
    所述应用处理器根据所述密钥,将从存储器获取的所述待解密的数据进行解密。
  7. 一种指纹解密系统,其特征在于,包括:
    指纹获取模块,用于通过指纹识别模块获取用户指纹;
    第一发送模块,用于发送所述指纹获取模块获取的所述用户指纹至安全模块;
    验证模块,用于通过所述安全模块根据预设的验证指纹来验证所述第一发送模块发送的所述用户指纹,所述验证指纹存储于所述安全模块中;
    解密模块,用于当所述验证模块验证通过时,对待解密的数据进行解密。
  8. 如权利要求7所述的系统,其特征在于,所述系统还包括:
    获取模块,用于在所述解密模块对待解密的数据进行解密之前,从存储器获取所述待解密的数据;
    第二发送模块,用于发送所述获取模块获取的所述待解密的数据至所述安全模块。
  9. 如权利要求8所述的系统,其特征在于,所述第二发送模块包括:
    第一发送单元,用于将所述待解密的数据发送至应用处理器;
    第二发送单元,用于所述应用处理器将所述待解密的数据发送至所述安全模块。
  10. 如权利要求7-9任一项所述的系统,其特征在于,所述解密模块具体包括:
    通过所述安全模块根据预存的密钥对所述待解密的数据进行解密,所述密钥存储于所述安全模块中。
  11. 如权利要求10所述的系统,其特征在于,所述系统还包括:
    第三发送模块,用于在所述解密模块对待解密的数据进行解密之后,通过所述安全模块将解密后的数据发送至应用处理器。
  12. 如权利要求7所述的系统,其特征在于,所述解密模块包括:
    第三发送单元,用于所述安全模块将存储的密钥发送至应用处理器;
    解密单元,用于所述应用处理器根据所述密钥,将从存储器获取的所述待解密的数据进行解密。
PCT/CN2015/082993 2015-03-25 2015-06-30 一种指纹解密的方法和系统 WO2016150023A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510133060.5A CN104794430B (zh) 2015-03-25 2015-03-25 一种指纹解密的方法和系统
CN201510133060.5 2015-03-25

Publications (1)

Publication Number Publication Date
WO2016150023A1 true WO2016150023A1 (zh) 2016-09-29

Family

ID=53559218

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/082993 WO2016150023A1 (zh) 2015-03-25 2015-06-30 一种指纹解密的方法和系统

Country Status (2)

Country Link
CN (1) CN104794430B (zh)
WO (1) WO2016150023A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598466A (zh) * 2022-03-08 2022-06-07 山东云海国创云计算装备产业创新中心有限公司 一种生产数据处理方法、装置、计算机设备及存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295368A (zh) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 一种移动终端的数据安全保护方法和系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885315A (zh) * 2006-05-26 2006-12-27 上海一维科技有限公司 嵌入式单安全芯片生物指纹识别系统及其方法
WO2009083528A1 (fr) * 2007-12-21 2009-07-09 Thales Procédé et système pour générer des données biométriques stables
CN202049500U (zh) * 2011-05-12 2011-11-23 国民技术股份有限公司 一种基于tcm的指纹识别系统
CN102273128A (zh) * 2008-12-08 2011-12-07 茂福公司 认证或授权的方法以及相关的系统和安全模型
CN202433919U (zh) * 2011-12-06 2012-09-12 四川久远新方向智能科技有限公司 高精度指纹识别器

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202045900U (zh) * 2010-12-07 2011-11-23 东莞宝元数控科技有限公司 工具机定位机构

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885315A (zh) * 2006-05-26 2006-12-27 上海一维科技有限公司 嵌入式单安全芯片生物指纹识别系统及其方法
WO2009083528A1 (fr) * 2007-12-21 2009-07-09 Thales Procédé et système pour générer des données biométriques stables
CN102273128A (zh) * 2008-12-08 2011-12-07 茂福公司 认证或授权的方法以及相关的系统和安全模型
CN202049500U (zh) * 2011-05-12 2011-11-23 国民技术股份有限公司 一种基于tcm的指纹识别系统
CN202433919U (zh) * 2011-12-06 2012-09-12 四川久远新方向智能科技有限公司 高精度指纹识别器

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598466A (zh) * 2022-03-08 2022-06-07 山东云海国创云计算装备产业创新中心有限公司 一种生产数据处理方法、装置、计算机设备及存储介质
CN114598466B (zh) * 2022-03-08 2024-05-28 山东云海国创云计算装备产业创新中心有限公司 一种生产数据处理方法、装置、计算机设备及存储介质

Also Published As

Publication number Publication date
CN104794430A (zh) 2015-07-22
CN104794430B (zh) 2019-04-12

Similar Documents

Publication Publication Date Title
JP6264674B2 (ja) Qrコードを用いた認証システム及びその方法
TWI536790B (zh) Communication method using fingerprint information authentication
CN1889419B (zh) 一种实现加密的方法及装置
CN103747012A (zh) 网络交易的安全验证方法、装置及系统
US20220360440A1 (en) Image acquisition apparatus, server, and encryption and decryption methods
EP3319268A1 (en) Identity information authentication method, user terminal, service terminal, authentication server, and service system
WO2017128486A1 (zh) 解锁方法、解锁装置及可穿戴智能设备和终端
KR20180129475A (ko) 인증을 수행하기 위한 방법, 사용자 단말 및 인증 서비스 서버
US20100005519A1 (en) System and method for authenticating one-time virtual secret information
CN103701586A (zh) 获取密钥的方法和装置
CN104715537A (zh) 一种基于数字标签的加密和解密方法
WO2017080355A1 (zh) 一种通过手机确认网上交易安全的方法及其系统
CN111177748A (zh) 指纹存储加密方法、装置及系统
WO2016150023A1 (zh) 一种指纹解密的方法和系统
KR102375287B1 (ko) 제 3자 검증에 사용되는 신분 등록 및 액세스 제어 방법
KR102068041B1 (ko) 유저 바이오 데이터를 이용한 유저 인증 및 서명 장치와 방법
CN109426461A (zh) 一种打印机安全控制芯片
KR101500947B1 (ko) 생체 정보 생성 및 인증
KR101429737B1 (ko) 보안 토큰을 이용한 본인 인증 서비스 시스템, 본인 인증 서비스 방법, 이를 위한 장치
CN107172718B (zh) 一种信息处理方法及电子设备
JP2016015578A (ja) 暗号情報コードを利用した復号システム、プログラム及び方法
CN106156571B (zh) 指纹加密工具、指纹加密工具加解密系统及加解密方法
CN103150520A (zh) 一种安全加密方法及电子设备
CN113347003A (zh) 一种输入式动态密码器装置及方法
CN1889420B (zh) 一种实现加密的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15885961

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/02/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15885961

Country of ref document: EP

Kind code of ref document: A1