WO2019085761A1 - 一种指纹识别的方法及终端设备 - Google Patents

一种指纹识别的方法及终端设备 Download PDF

Info

Publication number
WO2019085761A1
WO2019085761A1 PCT/CN2018/110723 CN2018110723W WO2019085761A1 WO 2019085761 A1 WO2019085761 A1 WO 2019085761A1 CN 2018110723 W CN2018110723 W CN 2018110723W WO 2019085761 A1 WO2019085761 A1 WO 2019085761A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
feature
virtual machine
module
information
Prior art date
Application number
PCT/CN2018/110723
Other languages
English (en)
French (fr)
Inventor
陈柳章
Original Assignee
深圳市文鼎创数据科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市文鼎创数据科技有限公司 filed Critical 深圳市文鼎创数据科技有限公司
Publication of WO2019085761A1 publication Critical patent/WO2019085761A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Definitions

  • the invention belongs to the field of biometrics, and particularly relates to a fingerprint identification method and a terminal device.
  • fingerprint recognition technology has become more and more widely used as a biometric-based identity authentication technology, such as fingerprint authentication technology for smart cards.
  • fingerprint storage and fingerprint authentication are processed by the fingerprint module.
  • the fingerprint module completes fingerprint collection and fingerprint comparison, and then returns the fingerprint comparison result to the smart card, which makes the smart card more vulnerable to attack, for example, replacing the illegal module with the fingerprint module, and then the fingerprint is compared by the illegal module. If the message is passed to the smart card, the smart card can be directly operated beyond the fingerprint authentication, resulting in low security of the smart card.
  • the embodiment of the invention provides a fingerprint identification method and a terminal device to improve the security of fingerprint recognition.
  • a first aspect of the embodiments of the present invention provides a method for fingerprint identification, the method comprising:
  • the fingerprint module collects fingerprint information, extracts fingerprint features in the fingerprint information, and sends the extracted fingerprint features to the virtual machine;
  • the virtual machine After receiving the fingerprint feature, the virtual machine determines whether the received fingerprint feature matches the pre-stored fingerprint feature, and if yes, determines that the fingerprint recognition is successful.
  • a second aspect of the embodiments of the present invention provides a terminal device, where the terminal device includes:
  • the virtual machine is configured to determine, after receiving the fingerprint feature from the fingerprint module, whether the received fingerprint feature matches the pre-stored fingerprint feature, and if yes, determine that the fingerprint recognition is successful.
  • a third aspect of the embodiments of the present invention provides a method for fingerprint identification, which is used for a smart card, and the method includes:
  • a fourth aspect of the embodiments of the present invention provides a terminal device including a memory, a processor, and a computer program stored in the memory and operable on the processor, wherein the processor executes the The steps of the method as described above are implemented when the computer program is described.
  • a fifth aspect of an embodiment of the present invention provides a computer readable storage medium storing a computer program, the computer program being executed by a processor to implement the steps of the method as described above.
  • the embodiment of the present invention has the beneficial effects that the fingerprint module collects fingerprint information, extracts fingerprint features in the fingerprint information, and sends the extracted fingerprint features to the After receiving the fingerprint feature, the virtual machine determines whether the received fingerprint feature matches the pre-stored fingerprint feature, and if yes, determines that the fingerprint recognition is successful.
  • the embodiment of the invention recognizes the fingerprint by the virtual machine, thereby avoiding the problem that the fingerprint storage and the fingerprint authentication are both caused by the fingerprint module processing, and the security of the fingerprint recognition is improved, and the utility model has the advantages of high ease of use and practicality. Sex.
  • FIG. 1 is a schematic flowchart of an implementation process of a fingerprint identification method according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of an implementation process of a fingerprint identification method according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic flowchart of an implementation process of a fingerprint identification method according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic flowchart of an implementation method of a fingerprint identification method according to Embodiment 4 of the present invention.
  • FIG. 5 is a schematic diagram of a terminal device according to Embodiment 5 of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal device when it is a smart card
  • FIG. 7 is a schematic diagram of a terminal device according to Embodiment 6 of the present invention.
  • FIG. 1 is a schematic flowchart of an implementation process of a fingerprint identification method according to Embodiment 1 of the present invention.
  • the method of fingerprint recognition is used for a smart card.
  • the method of fingerprint recognition is implemented by a virtual machine in a smart card.
  • the method includes the following steps:
  • step S110 the fingerprint feature is received from the fingerprint module, and the fingerprint feature is extracted by the fingerprint module from the collected fingerprint information.
  • step S120 it is determined whether the received fingerprint feature matches the pre-stored fingerprint feature, and if so, it is determined that the fingerprint recognition is successful.
  • Embodiment 1 the method for fingerprint identification provided in Embodiment 1 is applied to a terminal device, as shown in FIG. 2 .
  • FIG. 2 is a schematic flowchart of an implementation method of a fingerprint identification method according to Embodiment 2 of the present invention. As shown in the figure, the method may include the following steps:
  • step S101 the fingerprint module collects fingerprint information, extracts fingerprint features in the fingerprint information, and sends the extracted fingerprint features to the virtual machine.
  • the virtual machine refers to a complete computer system that runs through a software and has a complete hardware system function and runs in a completely isolated environment.
  • the virtual machine can be a JAVA virtual machine.
  • the fingerprinting module may further include the fingerprinting module after the virtual machine detects the fingerprint that has been registered after receiving the fingerprint authentication request information or after powering on.
  • the fingerprint authentication request information may be sent by a user or may be sent by a terminal device host.
  • the fingerprint authentication request information is sent to the virtual machine in an APDU command manner, that is, the fingerprint authentication request information may be an application protocol data unit (Application) Protocol Data Unit (APDU) sent to the virtual machine.
  • Application Application Protocol Data Unit
  • the command packets sent by the application layer and the response packets fed back to the application layer by terminal devices such as smart cards are collectively referred to as Application Protocol Data Units (APDUs).
  • the response is corresponding to the command and is commonly referred to as an APDU command-response pair.
  • the command message or response message can contain data.
  • the JAVA virtual machine After the JAVA virtual machine receives the application protocol data unit request fingerprint authentication, the JAVA virtual machine sends a fingerprint collection instruction to the fingerprint module to initiate fingerprint authentication.
  • step S102 after receiving the fingerprint feature, the virtual machine determines whether the received fingerprint feature matches the pre-stored fingerprint feature, and if so, determines that the fingerprint recognition is successful.
  • the pre-stored fingerprint feature may be a fingerprint feature stored in a virtual machine.
  • the fingerprint information may be collected by the fingerprint module, the fingerprint feature in the fingerprint information is extracted, and the extracted fingerprint feature is sent to the JAVA card virtual machine, and the JAVA card virtual machine will use the fingerprint module.
  • the collected fingerprint features are matched with the pre-stored fingerprint features. If the JAVA card virtual machine passes the fingerprint, the applet is allowed to use the APDU command or the APDU response, that is, the APDU is handed over to the applet (Applet), otherwise the return fails. .
  • the fingerprint module collects fingerprint information, extracts fingerprint features in the fingerprint information, and sends the extracted fingerprint features to the virtual machine; After receiving the fingerprint feature, the machine determines whether the received fingerprint feature matches the pre-stored fingerprint feature, and if yes, determines that the fingerprint identification is successful, and the fingerprint can be recognized by the virtual machine, thereby avoiding fingerprint storage and fingerprint Authentication is a problem of low security caused by fingerprint module processing, and it has high ease of use and practicability.
  • FIG. 3 is a schematic flowchart of an implementation process of a fingerprint identification method according to Embodiment 3 of the present invention. As shown, the method can include the following steps:
  • step S210 the first fingerprint collection instruction is sent to the fingerprint module, so that the fingerprint module acquires and feeds back the first fingerprint feature.
  • the second fingerprint collection instruction is sent to the fingerprint module, so that the fingerprint module acquires and feeds back the second fingerprint feature.
  • step S240 the fingerprint feature is received from the fingerprint module, and the fingerprint feature is extracted by the fingerprint module from the collected fingerprint information.
  • step S250 the fingerprint feature is received from the fingerprint module, and the fingerprint feature is extracted by the fingerprint module from the collected fingerprint information.
  • the method for fingerprint identification provided in Embodiment 3 is applied to a terminal device, as shown in FIG. 4 .
  • FIG. 4 is a schematic flowchart of an implementation of a fingerprint identification method according to Embodiment 4 of the present invention.
  • the method is applied to a terminal device.
  • the method may include the following steps:
  • step S201 the virtual machine sends a first fingerprint collection instruction to the fingerprint module to initiate fingerprint registration.
  • the sending, by the virtual machine, the first fingerprint collection instruction to the fingerprint module may be that the virtual machine determines whether the terminal device has registered fingerprint information, and if not, to the fingerprint module. Sending a first fingerprint collection instruction; wherein the virtual machine determining whether the terminal device has registered fingerprint information may be determining whether the terminal device has stored fingerprint information or user information.
  • the sending, by the virtual machine, the first fingerprint collection instruction to the fingerprint module may be: after receiving the fingerprint registration request information, the virtual machine sends a first fingerprint collection instruction to the fingerprint module.
  • the fingerprint registration request information may be sent by a user or may be sent by a terminal device host.
  • the fingerprint registration request information may be an application protocol data unit (Application The protocol data unit (APDU) is sent to the virtual machine, and after the JAVA virtual machine receives the application protocol data unit request fingerprint authentication, the JAVA virtual machine sends a fingerprint collection instruction to the fingerprint module to start fingerprint authentication.
  • APDU Application The protocol data unit
  • step S202 after receiving the first fingerprint collection instruction, the fingerprint module collects fingerprint information, extracts a fingerprint feature in the fingerprint information, and sends the extracted fingerprint feature as a first fingerprint feature to the virtual machine.
  • the fingerprint feature may be the texture information of the fingerprint. Since the fingerprint has lifetime invariance, uniqueness and convenience, the fingerprint characteristics of different users are different, thereby facilitating the differentiation of different users.
  • step S203 after receiving the first fingerprint feature, the virtual machine sends a second fingerprint collection instruction to the fingerprint module.
  • step S204 after receiving the second fingerprint collection instruction, the fingerprint module collects fingerprint information, extracts fingerprint features in the fingerprint information, and sends the extracted fingerprint feature as a second fingerprint feature to the virtual machine.
  • step S205 after receiving the second fingerprint feature, the virtual machine determines whether the second fingerprint feature matches the first fingerprint feature, and if so, saves the first fingerprint feature or Second fingerprint feature, and prompt fingerprint registration success.
  • the saving the first fingerprint feature or the second fingerprint feature may be saved in the virtual machine.
  • step S206 the fingerprint module collects fingerprint information, extracts fingerprint features in the fingerprint information, and sends the extracted fingerprint features to the virtual machine.
  • step S207 after receiving the fingerprint feature, the virtual machine determines whether the received fingerprint feature matches the pre-stored fingerprint feature, and if so, determines that the fingerprint recognition is successful.
  • the steps S206 and S207 in this embodiment are the same as the above-mentioned steps S101 and S102.
  • the first fingerprint collection instruction is sent to the fingerprint module by the virtual machine to start fingerprint registration; after the virtual machine receives the second fingerprint feature, Determining whether the second fingerprint feature matches the first fingerprint feature, and if yes, saving the first fingerprint feature or the second fingerprint feature, and prompting the fingerprint registration to be successful, so that the fingerprint registration can be implemented by using a virtual machine
  • the fingerprint information is matched, and the fingerprint is registered by the virtual machine and the fingerprint information can be saved, thereby avoiding the problem that the fingerprint storage and the fingerprint registration are caused by the fingerprint module being processed, which improves the security and has high practicability.
  • FIG. 5 is a schematic diagram of a terminal device according to Embodiment 5 of the present invention. For convenience of description, only parts related to the embodiment of the present invention are shown.
  • the terminal device includes:
  • the virtual machine 32 is configured to determine, after receiving the fingerprint feature from the fingerprint module 31, whether the received fingerprint feature matches the pre-stored fingerprint feature, and if yes, determine that the fingerprint recognition is successful.
  • the terminal device is a smart card 3, and the smart card 3 includes a smart card chip 30 on which the virtual machine 32 is mounted.
  • the terminal device further includes:
  • the fingerprint module 31 is configured to collect fingerprint information, extract fingerprint features in the fingerprint information, and send the extracted fingerprint features to the virtual machine.
  • the fingerprint authentication request information is sent to the virtual machine in an APDU command manner.
  • the virtual machine is further configured to: if it is determined that the fingerprint identification is successful, allow the applet to use the APDU command or the APDU response.
  • the virtual machine 32 is further configured to send a first fingerprint collection instruction to the fingerprint module 31 before determining whether the received fingerprint feature matches the pre-stored fingerprint feature. To start fingerprint registration.
  • the virtual machine 32 is further configured to: determine whether the terminal device has registered fingerprint information, and if not, send a first fingerprint collection instruction to the fingerprint module.
  • the virtual machine 32 is further configured to: after receiving the fingerprint registration request information, send the first fingerprint collection instruction to the fingerprint module.
  • the fingerprint module 31 is further configured to: after receiving the first fingerprint collection instruction, collect fingerprint information, extract a fingerprint feature in the fingerprint information, and send the extracted fingerprint feature as the first fingerprint feature to the Virtual machine 32;
  • the virtual machine 32 is further configured to send a second fingerprint collection instruction to the fingerprint module 31 after receiving the first fingerprint feature;
  • the fingerprint module 31 is further configured to: after receiving the second fingerprint collection instruction, collect fingerprint information, extract a fingerprint feature in the fingerprint information, and send the extracted fingerprint feature as a second fingerprint feature to the fingerprint feature Virtual machine 32;
  • the virtual machine 32 is further configured to: after receiving the second fingerprint feature, determine whether the second fingerprint feature matches the first fingerprint feature, and if yes, save the first fingerprint feature or Second fingerprint feature, and prompt fingerprint registration success.
  • FIG. 7 is a schematic diagram of a terminal device according to Embodiment 6 of the present invention.
  • the terminal device 4 of this embodiment includes a processor 40, a memory 41, and a computer program 42 stored in the memory 41 and operable on the processor 40.
  • the steps in the method embodiment of the above-mentioned respective fingerprint recognition when the processor 40 executes the computer program 42 such as steps S110 to S120 shown in FIG. 1 or steps S101 to S102 shown in FIG.
  • the processor 40 when executing the computer program 42, implements the functions of the various modules in the various apparatus embodiments described above, such as the functions of the modules 31, 32 shown in FIG.
  • the computer program 42 can be partitioned into one or more modules that are stored in the memory 41 and executed by the processor 40 to complete the present invention.
  • the one or more modules may be a series of computer program instructions that are capable of performing a particular function, the instruction segments being used to describe the execution of the computer program 42 in the terminal device 4.
  • the computer program 42 can be divided into a fingerprint module and a virtual machine, and the specific functions of each module are as follows:
  • the fingerprint module is configured to collect fingerprint information, extract fingerprint features in the fingerprint information, and send the extracted fingerprint features to the virtual machine;
  • the virtual machine is configured to determine, after receiving the fingerprint feature, whether the received fingerprint feature matches a pre-stored fingerprint feature, and if yes, determine that the fingerprint identification is successful.
  • the terminal device 4 may be a computing device such as a smart card, a U-Shield, a desktop computer, a notebook, a palmtop computer, and a cloud server.
  • the terminal device may include, but is not limited to, a processor 40 and a memory 41. It will be understood by those skilled in the art that FIG. 7 is only an example of the terminal device 4, does not constitute a limitation of the terminal device 4, may include more or less components than the illustrated, or combine some components, or different components.
  • the terminal device may further include an input/output device, a network access device, a bus, and the like.
  • the processor 40 can be a central processing unit (CPU), and can also be other general-purpose processors, digital signal processors (DSPs), and application specific integrated circuits (Application). Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 41 may be an internal storage unit of the terminal device 4, such as a hard disk or a memory of the terminal device 4.
  • the memory 41 may also be an external storage device of the terminal device 4, for example, a plug-in hard disk equipped on the terminal device 4, and a smart memory card (Smart Media Card, SMC), Secure Digital (Secure Digital, SD) card, flash card, etc.
  • the memory 41 may also include both an internal storage unit of the terminal device 4 and an external storage device.
  • the memory 41 is used to store the computer program and other programs and data required by the terminal device.
  • the memory 41 can also be used to temporarily store data that has been output or is about to be output.
  • each functional unit and module described above is exemplified. In practical applications, the above functions may be assigned to different functional units as needed.
  • the module is completed by dividing the internal structure of the device into different functional units or modules to perform all or part of the functions described above.
  • Each functional unit and module in the embodiment may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit, and the integrated unit may be hardware.
  • Formal implementation can also be implemented in the form of software functional units.
  • the specific names of the respective functional units and modules are only for the purpose of facilitating mutual differentiation, and are not intended to limit the scope of protection of the present application.
  • For the specific working process of the unit and the module in the foregoing system reference may be made to the corresponding process in the foregoing method embodiment, and details are not described herein again.
  • the disclosed terminal device and method may be implemented in other manners.
  • the terminal device embodiments described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated modules if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, the present invention implements all or part of the processes in the foregoing embodiments, and may also be completed by a computer program to instruct related hardware.
  • the computer program may be stored in a computer readable storage medium. The steps of the various method embodiments described above may be implemented when the program is executed by the processor.
  • the computer program comprises computer program code, which may be in the form of source code, object code form, executable file or some intermediate form.
  • the computer readable medium can include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard drive, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only) Memory), random access memory (RAM, Random) Access Memory), electrical carrier signals, telecommunications signals, and software distribution media.
  • ROM Read Only memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)

Abstract

本发明适用于生物识别技术领域,提供了一种指纹识别的方法及终端设备。所述方法包括:所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机;所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。本发明通过虚拟机识别指纹,从而避免了指纹存储和指纹认证都由指纹模块处理导致的安全性较低的问题。

Description

一种指纹识别的方法及终端设备 技术领域
本发明属于生物识别技术领域,尤其涉及一种指纹识别的方法及终端设备。
背景技术
近年来,指纹识别技术作为一种基于生物特征的身份认证技术得到越来越广泛的应用,例如智能卡的指纹认证技术。然而,申请人通过研究发现,在现有智能卡指纹认证技术中,指纹存储和指纹认证都是由指纹模块处理。指纹比对时,指纹模块完成指纹采集和指纹比对,再将指纹比对结果返回给智能卡,这使得智能卡较容易受到攻击,比如,将非法模块替换指纹模块,然后由非法模块反馈指纹比对通过的消息给智能卡,则可越过指纹认证直接操作智能卡,导致智能卡安全性较低。
技术问题
本发明实施例提供了一种指纹识别的方法及终端设备,以提高指纹识别的安全性。
技术解决方案
本发明实施例的第一方面提供了一种指纹识别的方法,所述方法包括:
所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机;
所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
本发明实施例的第二方面提供了一种终端设备,所述终端设备包括:
虚拟机,所述虚拟机用于在从指纹模块接收到指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
本发明实施例的第三方面提供了一种指纹识别的方法,用于智能卡,所述方法包括:
从指纹模块接收指纹特征,所述指纹特征是所述指纹模块从采集到的指纹信息中提取的;
判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
本发明实施例的第四方面提供了一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如上所述方法的步骤。
本发明实施例的第五方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如上所述方法的步骤。
有益效果
本发明实施例与现有技术相比存在的有益效果是:本发明实施例通过所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机;所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。本发明实施例通过虚拟机识别指纹,从而避免了指纹存储和指纹认证都是由指纹模块处理导致的安全性较低的问题,提高了指纹识别的安全性,具有较高的易用性和实用性。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例一提供的指纹识别的方法的实现流程示意图;
  图2是本发明实施例二提供的指纹识别的方法的实现流程示意图;
  图3是本发明实施例三提供的指纹识别的方法的实现流程示意图;
  图4是本发明实施例四提供的指纹识别的方法的实现流程示意图;
  图5是本发明实施例五提供的终端设备的示意图;
  图6为终端设备为智能卡时的结构示意图;
  图7是本发明实施例六提供的终端设备的示意图。
本发明的实施方式
  以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本发明实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本发明。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本发明的描述。
  为了说明本发明所述的技术方案,下面通过具体实施例来进行说明。
  图1是本发明实施例一提供的指纹识别的方法的实现流程示意图。
  指纹识别的方法用于智能卡,示例性的,指纹识别的方法由智能卡中的虚拟机实现。
  如图1所示该方法包括以下步骤:
  在步骤S110、从指纹模块接收指纹特征,所述指纹特征是所述指纹模块从采集到的指纹信息中提取的。
  在步骤S120、判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
  示例性的,实施例一提供的指纹识别的方法应用于终端设备,如图2所示。
  图2是本发明实施例二提供的指纹识别的方法的实现流程示意图,如图所示该方法可以包括以下步骤:
在步骤S101中,所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机。
在本发明实施例中,所述虚拟机指通过软件模拟的具有完整硬件系统功能的、运行在一个完全隔离环境中的完整计算机系统。所述虚拟机可以是JAVA虚拟机。
示例性的,本发明实施例中,所述指纹模块采集指纹信息之前,还可以包括所述虚拟机在接收到指纹认证请求信息后或上电后检测到已经注册指纹时,向所述指纹模块发送指纹采集指令,以启动指纹认证。所述指纹认证请求信息可以是用户发出的,也可以是终端设备主机发出的。例如,指纹认证请求信息是以APDU命令方式向所述虚拟机发送的,即指纹认证请求信息可以是应用协议数据单元(Application Protocol Data Unit,APDU)向所述虚拟机发送的。
应用层发出的命令报文和智能卡等终端设备反馈到应用层的响应报文统称为应用协议数据单元(APDU)。响应是和命令相对应的,通常被称为APDU命令-响应对。在一个APDU命令-响应对中,命令报文或响应报文都可包含数据。
在JAVA虚拟机接收到应用协议数据单元请求指纹认证后,所述JAVA虚拟机向所述指纹模块发送指纹采集指令,以启动指纹认证。
在步骤S102中,所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
本发明实施例中,所述预先存储的指纹特征可以是存储在虚拟机中的指纹特征。
以在智能卡指纹认证技术中的应用为例,说明本发明实施例的一个较佳实施方式。在智能卡指纹认证中,可以通过所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给JAVA卡虚拟机,所述JAVA卡虚拟机将指纹模块采集的指纹特征与预先存储的指纹特征相匹配,若JAVA卡虚拟机比对指纹通过,则允许小应用程序使用APDU命令或APDU响应,即将APDU交给小应用程序(Applet)处理,否则返回失败。
通过图2的实施例可知,本发明实施例中,所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机;所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功,可以通过虚拟机识别指纹,从而避免了指纹存储和指纹认证都是由指纹模块处理导致的安全性较低的问题,具有较高的易用性和实用性。
图3是本发明实施例三提供的指纹识别的方法的实现流程示意图。如图所示该方法可以包括以下步骤:
在步骤S210、向所述指纹模块发送第一指纹采集指令,以使所述指纹模块获取并反馈第一指纹特征。
在步骤S220、从所述指纹模块接收到所述第一指纹特征后,向所述指纹模块发送第二指纹采集指令,以使所述指纹模块获取并反馈第二指纹特征。
在步骤S230、从所述指纹模块接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功。
在步骤S240、从指纹模块接收指纹特征,所述指纹特征是所述指纹模块从采集到的指纹信息中提取的。
在步骤S250、从指纹模块接收指纹特征,所述指纹特征是所述指纹模块从采集到的指纹信息中提取的。
示例性的,实施例三提供的指纹识别的方法,应用于终端设备,如图4所示。
图4是本发明实施例四提供的指纹识别的方法的实现流程示意图,示例性的,本方法应用于终端设备,如图所示该方法可以包括以下步骤:
在步骤S201中,所述虚拟机向所述指纹模块发送第一指纹采集指令,以启动指纹注册。
示例性的,本发明实施例中,所述虚拟机向所述指纹模块发送第一指纹采集指令可以是所述虚拟机判断所述终端设备是否已注册指纹信息,若否,向所述指纹模块发送第一指纹采集指令;其中,所述虚拟机判断所述终端设备是否已注册指纹信息可以是判断所述终端设备是否已存储指纹信息或者用户信息。此外,所述虚拟机向所述指纹模块发送第一指纹采集指令也可以是在接收到指纹注册请求信息后,所述虚拟机向所述指纹模块发送第一指纹采集指令。所述指纹注册请求信息可以是用户发出的,也可以是终端设备主机发出的。例如,指纹注册请求信息可以是应用协议数据单元(Application Protocol Data Unit,APDU)向所述虚拟机发送的,在JAVA虚拟机接收到应用协议数据单元请求指纹认证后,所述JAVA虚拟机向所述指纹模块发送指纹采集指令,以启动指纹认证。
在步骤S202中,所述指纹模块在接收到所述第一指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第一指纹特征发送给所述虚拟机。
本发明实施例中,所述指纹特征可以是指纹的纹路信息。由于指纹具有终身不变性、唯一性和方便性,所以不同用户的指纹特征不同,从而方便的实现对不同用户的区分。
在步骤S203中,所述虚拟机在接收到所述第一指纹特征后,向所述指纹模块发送第二指纹采集指令。
在步骤S204中,所述指纹模块在接收到所述第二指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第二指纹特征发送给所述虚拟机。
在步骤S205中,所述虚拟机在接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功。
本发明实施例中,所述保存第一指纹特征或第二指纹特征可以保存在虚拟机中。
在步骤S206中,所述指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机。
在步骤S207中,所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
本实施例步骤S206、S207与上述步骤S101、S102相同,具体可参见步骤S101、S102相关描述,在此不再赘述。
通过图4的实施例可知,本发明实施例中,通过所述虚拟机向所述指纹模块发送第一指纹采集指令,以启动指纹注册;所述虚拟机在接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功,使得指纹注册时可以通过虚拟机实现指纹信息匹配,实现了通过虚拟机注册指纹并可以保存指纹信息,避免了指纹存储和指纹注册都是由指纹模块处理导致的安全性较低的问题,提高了安全性,且实用性较高。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
图5是本发明实施例五提供的终端设备的示意图,为了便于说明,仅示出了与本发明实施例相关的部分。
所述终端设备包括:
虚拟机32,所述虚拟机32用于在从指纹模块31接收到指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
示例性的,如图6所示,终端设备为智能卡3,智能卡3包括安装有虚拟机32的智能卡芯片30。
优选的,所述终端设备还包括:
指纹模块31,所述指纹模块31用于采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机。
优选的,本发明实施例中,所述指纹认证请求信息是以APDU命令方式向所述虚拟机发送的。
优选的,本发明实施例中,所述虚拟机,还用于:若确定指纹识别成功,则允许小应用程序使用APDU命令或APDU响应。
优选的,本发明实施例中,所述虚拟机32在判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配之前,还用于向所述指纹模块31发送第一指纹采集指令,以启动指纹注册。
优选的,本发明实施例中,虚拟机32,还具体用于:判断所述终端设备是否已注册指纹信息,若否,向所述指纹模块发送第一指纹采集指令。
优选的,本发明实施例中,虚拟机32,还具体用于:在接收到指纹注册请求信息后,向所述指纹模块发送第一指纹采集指令。
所述指纹模块31,还用于在接收到所述第一指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第一指纹特征发送给所述虚拟机32;
所述虚拟机32,还用于在接收到所述第一指纹特征后,向所述指纹模块31发送第二指纹采集指令;
所述指纹模块31,还用于在接收到所述第二指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第二指纹特征发送给所述虚拟机32;
所述虚拟机32,还用于在接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功。
图7是本发明实施例六提供的终端设备的示意图。
如图7所示,该实施例的终端设备4包括:处理器40、存储器41以及存储在所述存储器41中并可在所述处理器40上运行的计算机程序42。所述处理器40执行所述计算机程序42时实现上述各个指纹识别的方法实施例中的步骤,例如图1所示的步骤S110至S120,或图2所示的步骤S101至S102。或者,所述处理器40执行所述计算机程序42时实现上述各装置实施例中各模块的功能,例如图5所示模块31、32的功能。
示例性的,所述计算机程序42可以被分割成一个或多个模块,所述一个或者多个模块被存储在所述存储器41中,并由所述处理器40执行,以完成本发明。所述一个或多个模块可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序42在所述终端设备4中的执行过程。例如,所述计算机程序42可以被分割成指纹模块、虚拟机,各模块具体功能如下:
所述指纹模块用于采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机;
所述虚拟机用于在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
所述终端设备4可以是智能卡、U盾、桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述终端设备可包括,但不仅限于,处理器40、存储器41。本领域技术人员可以理解,图7仅仅是终端设备4的示例,并不构成对终端设备4的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述终端设备还可以包括输入输出设备、网络接入设备、总线等。
所称处理器40可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器41可以是所述终端设备4的内部存储单元,例如终端设备4的硬盘或内存。所述存储器41也可以是所述终端设备4的外部存储设备,例如所述终端设备4上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器41还可以既包括所述终端设备4的内部存储单元也包括外部存储设备。所述存储器41用于存储所述计算机程序以及所述终端设备所需的其他程序和数据。所述存储器41还可以用于暂时地存储已经输出或者将要输出的数据。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
在本发明所提供的实施例中,应该理解到,所揭露的终端设备和方法,可以通过其它的方式实现。例如,以上所描述的终端设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的模块如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
以上所述实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围,均应包含在本发明的保护范围之内。

Claims (22)

  1. 一种指纹识别的方法,其特征在于,所述方法包括:
    指纹模块采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给虚拟机;
    所述虚拟机在接收到所述指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
  2. 如权利要求1所述的方法,其特征在于,所述虚拟机在判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配之前,还包括:
    所述虚拟机向所述指纹模块发送第一指纹采集指令,以启动指纹注册;
    所述指纹模块在接收到所述第一指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第一指纹特征发送给所述虚拟机;
    所述虚拟机在接收到所述第一指纹特征后,向所述指纹模块发送第二指纹采集指令;
    所述指纹模块在接收到所述第二指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第二指纹特征发送给所述虚拟机;
    所述虚拟机在接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功。
  3. 如权利要求2所述的方法,其特征在于,所述虚拟机向所述指纹模块发送第一指纹采集指令包括:
    所述虚拟机判断终端设备是否已注册指纹信息,若否,向所述指纹模块发送第一指纹采集指令。
  4. 如权利要求2所述的方法,其特征在于,所述虚拟机向所述指纹模块发送第一指纹采集指令包括:
    在接收到指纹注册请求信息后,所述虚拟机向所述指纹模块发送第一指纹采集指令。
  5. 如权利要求1所述的方法,其特征在于,在所述指纹模块采集指纹信息之前,还包括:
    所述虚拟机在接收到指纹认证请求信息后或上电后检测到已经注册指纹时,向所述指纹模块发送指纹采集指令,以启动指纹认证。
  6. 如权利要求5所述的方法,其特征在于,所述指纹认证请求信息是以APDU命令方式向所述虚拟机发送的。
  7. 如权利要求6所述的方法,其特征在于,还包括:
    若所述虚拟机确定指纹识别成功,则允许小应用程序使用APDU命令或APDU响应。
  8. 一种终端设备,其特征在于,所述终端设备包括:
    虚拟机,所述虚拟机用于在从指纹模块接收到指纹特征后,判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
  9. 如权利要求8所述的终端设备,其特征在于,所述终端设备还包括:
    指纹模块,所述指纹模块用于采集指纹信息,提取所述指纹信息中的指纹特征,并将提取的所述指纹特征发送给所述虚拟机。
  10. 如权利要求9所述的终端设备,其特征在于,所述虚拟机在判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配之前,还用于向所述指纹模块发送第一指纹采集指令,以启动指纹注册;
    所述指纹模块,还用于在接收到所述第一指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第一指纹特征发送给所述虚拟机;
    所述虚拟机,还用于在接收到所述第一指纹特征后,向所述指纹模块发送第二指纹采集指令;
    所述指纹模块,还用于在接收到所述第二指纹采集指令之后,采集指纹信息,并提取该指纹信息中的指纹特征,将提取的该指纹特征作为第二指纹特征发送给所述虚拟机;
    所述虚拟机,还用于在接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功。
  11. 如权利要求10所述的终端设备,其特征在于,所述虚拟机具体用于:
    判断所述终端设备是否已注册指纹信息,若否,向所述指纹模块发送第一指纹采集指令。
  12. 如权利要求10所述的终端设备,其特征在于,所述虚拟机具体用于:
    在接收到指纹认证请求信息后或上电后检测到已经注册指纹时,向所述指纹模块发送指纹采集指令,以启动指纹认证。
  13. 如权利要求12所述的终端设备,其特征在于,所述指纹认证请求信息是以APDU命令方式向所述虚拟机发送的。
  14. 如权利要求13所述的终端设备,其特征在于,所述虚拟机,还用于:
    若确定指纹识别成功,则允许小应用程序使用APDU命令或APDU响应。
  15. 如权利要求8所述的终端设备,其特征在于:所述终端设备为智能卡,包括安装有虚拟机的智能卡芯片。
  16. 一种指纹识别的方法,其特征在于,用于智能卡,所述方法包括:
    从指纹模块接收指纹特征,所述指纹特征是所述指纹模块从采集到的指纹信息中提取的;
    判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配,若是,则确定指纹识别成功。
  17. 如权利要求16所述的方法,其特征在于,所述判断接收到的所述指纹特征是否与预先存储的指纹特征相匹配之前,还包括:
    向所述指纹模块发送第一指纹采集指令,以使所述指纹模块获取并反馈第一指纹特征;
    从所述指纹模块接收到所述第一指纹特征后,向所述指纹模块发送第二指纹采集指令,以使所述指纹模块获取并反馈第二指纹特征;
    从所述指纹模块接收到所述第二指纹特征后,判断所述第二指纹特征是否与所述第一指纹特征相匹配,若是,则保存所述第一指纹特征或第二指纹特征,并提示指纹注册成功。
  18. 如权利要求17所述的方法,其特征在于,所述向所述指纹模块发送第一指纹采集指令包括:
    判断是否已注册指纹信息,若否,向所述指纹模块发送第一指纹采集指令。
  19. 如权利要求17所述的方法,其特征在于,所述向所述指纹模块发送第一指纹采集指令包括:
    在接收到指纹注册请求信息后,向所述指纹模块发送第一指纹采集指令。
  20. 如权利要求16所述的方法,其特征在于,所述从指纹模块接收指纹特征之前,还包括:
    在接收到指纹认证请求信息后或上电后检测到已经注册指纹时,向所述指纹模块发送指纹采集指令,以启动指纹认证。
  21. 一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求16至20任一项所述方法的步骤。
  22. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求16至20任一项所述方法的步骤。
PCT/CN2018/110723 2017-11-06 2018-10-18 一种指纹识别的方法及终端设备 WO2019085761A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711078637.2 2017-11-06
CN201711078637.2A CN107908940B (zh) 2017-11-06 2017-11-06 一种指纹识别的方法及终端设备

Publications (1)

Publication Number Publication Date
WO2019085761A1 true WO2019085761A1 (zh) 2019-05-09

Family

ID=61842569

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/110723 WO2019085761A1 (zh) 2017-11-06 2018-10-18 一种指纹识别的方法及终端设备

Country Status (2)

Country Link
CN (1) CN107908940B (zh)
WO (1) WO2019085761A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908940B (zh) * 2017-11-06 2020-05-19 深圳市文鼎创数据科技有限公司 一种指纹识别的方法及终端设备
CN108830057A (zh) * 2018-05-04 2018-11-16 南京英安特科技实业有限公司 一种指纹模块在报警控制器中的安全实现方法
CN109324843B (zh) * 2018-09-11 2020-12-11 深圳市文鼎创数据科技有限公司 一种指纹处理系统、方法及指纹设备
CN110532749A (zh) * 2019-08-30 2019-12-03 捷德(中国)信息科技有限公司 指纹识别处理装置、方法和智能卡
CN113626787B (zh) * 2021-08-27 2024-01-30 京东方科技集团股份有限公司 设备指纹生成方法及相关设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014075231A1 (zh) * 2012-11-14 2014-05-22 华为技术有限公司 双因素认证方法及虚拟机设备
CN106651363A (zh) * 2016-12-28 2017-05-10 飞天诚信科技股份有限公司 一种硬件钱包及其持有者身份验证方法
CN107908940A (zh) * 2017-11-06 2018-04-13 深圳市文鼎创数据科技有限公司 一种指纹识别的方法及终端设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556713A (zh) * 2009-05-08 2009-10-14 抚顺金道科技有限公司 指纹识别技术在pos机、刷卡机、提款机上的应用方法
CN101867530B (zh) * 2010-05-31 2012-10-24 西安电子科技大学 基于虚拟机的物联网网关系统及数据交互方法
CN102202289B (zh) * 2011-04-13 2013-12-25 张�林 一种通过移动终端远程调用软硬件资源的方法和系统
CN104036267A (zh) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 指纹注册、指纹识别方法及具有指纹识别功能的终端设备
CN104468550B (zh) * 2014-11-28 2018-10-19 华为技术有限公司 一种Windows桌面的用户登录方法、设备及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014075231A1 (zh) * 2012-11-14 2014-05-22 华为技术有限公司 双因素认证方法及虚拟机设备
CN106651363A (zh) * 2016-12-28 2017-05-10 飞天诚信科技股份有限公司 一种硬件钱包及其持有者身份验证方法
CN107908940A (zh) * 2017-11-06 2018-04-13 深圳市文鼎创数据科技有限公司 一种指纹识别的方法及终端设备

Also Published As

Publication number Publication date
CN107908940A (zh) 2018-04-13
CN107908940B (zh) 2020-05-19

Similar Documents

Publication Publication Date Title
WO2019085761A1 (zh) 一种指纹识别的方法及终端设备
CN110851809B (zh) 一种指纹识别的方法、装置及触摸屏终端
TWI296787B (en) Storage device and method for protecting data stored therein
CN108337913B (zh) 指纹登录方法、微控制单元、指纹电源组件及电子终端
CN108830138A (zh) 牲畜识别方法、装置及存储介质
US10963715B2 (en) Device and method for biometric recognition and method for registering biometric template
US10389710B2 (en) Method and system for extracting characteristic information
WO2020181809A1 (zh) 基于接口校验的数据处理的方法、系统和计算机设备
JP2019508825A (ja) 生体特徴識別装置及び方法並びに生体特徴テンプレート登録方法
WO2018165942A1 (zh) 终端设备和识别指纹的方法
CN103856614A (zh) 一种避免移动终端误休眠方法及装置
CN100570592C (zh) 一种软计算机及实现方法
CN105913252A (zh) 一种指纹加密eid金融卡及实现方法
US11544414B2 (en) Secure wake-on of a computing device
CN105528559A (zh) 一种指纹安全芯片
CN107517298B (zh) 解锁方法及相关产品
CN116561737A (zh) 基于用户行为基线的密码有效性检测方法及其相关设备
CN107493368B (zh) 解锁方法及相关产品
CN108108196B (zh) 一种唤醒设备、唤醒系统、唤醒方法及装置
CN101646262A (zh) 一种无线数据卡及其身份认证方法
CN111221803B (zh) 一种特征库管理方法及协处理器
CN204028916U (zh) 移动设备
WO2020191547A1 (zh) 生物识别方法及装置
CN102663457A (zh) 一种基于射频识别与心音技术的身份认证方法及方法
CN202563514U (zh) 具有多媒体认证加密保护功能的移动电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18874072

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18874072

Country of ref document: EP

Kind code of ref document: A1