WO2020220212A1 - 生物特征识别方法以及电子设备 - Google Patents

生物特征识别方法以及电子设备 Download PDF

Info

Publication number
WO2020220212A1
WO2020220212A1 PCT/CN2019/085035 CN2019085035W WO2020220212A1 WO 2020220212 A1 WO2020220212 A1 WO 2020220212A1 CN 2019085035 W CN2019085035 W CN 2019085035W WO 2020220212 A1 WO2020220212 A1 WO 2020220212A1
Authority
WO
WIPO (PCT)
Prior art keywords
identified
biometric
environment
security environment
biological feature
Prior art date
Application number
PCT/CN2019/085035
Other languages
English (en)
French (fr)
Inventor
曾杰民
王兵
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2019/085035 priority Critical patent/WO2020220212A1/zh
Priority to CN201980000635.2A priority patent/CN110235140A/zh
Publication of WO2020220212A1 publication Critical patent/WO2020220212A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • G06V40/53Measures to keep reference information secret, e.g. cancellable biometrics

Definitions

  • the embodiments of the present application relate to the field of biometric identification technology, and in particular, to a biometric identification method and electronic equipment.
  • biometric recognition technology is being used more and more widely in embedded terminal equipment, such as mobile phone unlocking, access control system, mobile payment and various smart locks, which provide great convenience to people's work and life.
  • mobile phone unlocking access control system
  • mobile payment mobile payment and various smart locks
  • biometric identification method and electronic device provided by the embodiments of the present application are used to at least solve the above-mentioned problems in the prior art.
  • the embodiment of the application provides a biometric identification method, which includes:
  • the legality of the biometric template is verified, and if the biometric template is legal, the legality of the biometric to be identified is judged again in the second security environment based on the biometric template.
  • the embodiment of the present application provides an electronic device configured with a first safe environment and a second safe environment, and in the first safe environment, the legality of the biological feature to be identified is firstly determined according to the biometric template; The legality of the template is verified; if the biometric template is legal, the legality of the biometric to be identified is judged again in the second security environment based on the biometric template.
  • the amount of data calculation for the initial determination of the legality of the biological feature to be identified in the first security environment is greater than that of the biological feature to be identified in the second security environment. The amount of data calculation when judged again.
  • the security of the first secure environment is less than the security of the second secure environment.
  • the first security environment is a trusted execution environment or a rich execution environment
  • the second security environment is a chip-level security environment.
  • the method before the initial judgment on the legality of the biological feature to be identified based on the biometric template in the first secure environment, the method further includes: checking the biological feature in the second secure environment Sign the template, and store the signed biometric template in the first secure environment;
  • verifying the legitimacy of the biometric template includes: verifying the biometric template to verify the legitimacy of the biometric template.
  • the method further includes: analyzing the sample image to obtain the first biological feature to be identified, so as to make an initial judgment on the legality of the first biological feature to be identified in the first security environment .
  • the method further includes: analyzing the sample image to obtain the second biological feature to be identified, so as to check the legality of the second biological feature to be identified in the second security environment. Judge again.
  • the biometric template data corresponding to the same identification subject is stored in the first security environment and the second security environment; correspondingly,
  • Performing an initial judgment on the legality of the biological feature to be identified based on the biometric template in the first security environment includes: using the biometric template data stored locally in the first security environment to make an initial judgment on the legality of the biological feature to be identified;
  • Re-judging the legitimacy of the biological feature to be identified in the second security environment based on the biometric template includes: using the biometric template data stored locally in the second security environment to re-jud the legitimacy of the biological feature to be identified.
  • it further includes: if the biometric template is illegal, directly determining that the biometric to be identified is illegal.
  • the result of the initial judgment indicates for the first time that the biometric to be identified is legal, the legality of the biometric template is verified.
  • the result of the initial judgment indicates for the first time that the biometric to be identified is legal, and if the result of the second judgment again indicates that the biometric to be identified is legal, Then it is finally determined that the biological feature to be identified is legal.
  • it further includes: signing the final judgment that the biological feature to be identified is legal.
  • the legality of the biometrics to be identified is firstly determined according to the biometric template in the first security environment; the legality of the biometric template is verified, if the biometrics If the feature template is legal, then in the second security environment, the legality of the biometric feature to be identified is judged again based on the biometric template, thereby improving the security of biometric identification.
  • FIG. 1 is a schematic diagram of the application of the biometric identification scheme in the first embodiment of the application on electronic equipment
  • FIG. 2 is a schematic flowchart of the biometric identification method in Embodiment 2 of this application.
  • the legality of the biometrics to be identified is first determined according to the biometric template in the first security environment; the legality of the biometric template is verified, and if the biometric template is legal, Then in the second security environment, the legality of the biometrics to be identified is judged again according to the biometric template, thereby improving the security of biometric identification.
  • the application of the biometric identification scheme of the embodiments of the present application to an embedded terminal device is used as an example for description, and a first security environment and a second security environment are specifically configured on it.
  • the first The security environment is a Trusted Execution Environment (TEE) or a Rich Execution Environment (REE)
  • the second security environment is a chip-level security environment such as a secure element (SE).
  • the first security environment is a trusted execution environment TEE and the second security environment is a secure element SE as an example for description.
  • the first security environment and the second security environment are not limited to the specific environments exemplified here, as long as they can reduce the resources required for biometric identification. Requirements, and any environment that can improve the security of biometric identification.
  • the biological features to be identified in the following embodiments may be fingerprint features, palm print features, lip print features, iris features, and other biological features with identity attributes.
  • the biological feature to be identified is a fingerprint feature
  • the fingerprint feature may be fingerprint feature point data or fingerprint feature image extreme value data.
  • FIG 1 is a schematic diagram of the application of the biometric identification scheme in the first embodiment of the application on electronic equipment; as shown in Figure 1, the electronic equipment is equipped with rich execution environment REE, trusted execution environment TEE, secure element SE, rich execution
  • the environment REE can run various third-party identity authentication applications and third-party payment applications
  • the trusted execution environment TEE runs the biometric trusted application (Trusted Application, referred to as TA) corresponding to the third-party identity authentication application.
  • the trusted application (TA) corresponding to the third-party payment application program, the secure element SE may store a secret key, signature/verification management, and a biometric trusted application TA.
  • the trusted application TA of biometrics in the trusted execution environment TEE is used to control the initial judgment of the legality of the biometrics to be identified according to the biometric template in the first secure environment, and to enable the secure element if necessary
  • the biometric identification configuration on the SE is then used to judge the legitimacy of the biometrics to be identified based on the biometric template in the second security environment;
  • the trusted application TA is used to control the sensitive data of mobile payment in the secure element SE Perform signature verification processing; the private key is used to generate a signature according to the signature algorithm; the signature/verification management is used to sign/verify the biometric template, and sign/verify the sensitive data of the mobile payment.
  • the private key used to sign the biometric template and the private key used to sign the sensitive data of the mobile payment may be the same or different.
  • the private key used to sign the biometric template and the private key used to sign the sensitive data of the mobile payment are different.
  • the biometric template can also be encrypted in the second security environment.
  • an AES (128-bit or 256-bit) encryption algorithm can be used to encrypt the biometric template to generate a biometric encryption template.
  • the AES256 encryption algorithm is used, the AES256-CBC algorithm may be specifically used, and the AES128-CBC (encryption key is 128 bits) algorithm may also be used for encryption processing.
  • the overall application process of applying the biometric identification technical solution to the above-mentioned electronic device is divided into a biometric registration phase and a biometric identification phase.
  • Biometric registration The stage is mainly used to generate a biometric template, and the biometric recognition stage is mainly used to verify the legality of the collected biometrics to be identified based on the biometric template.
  • a brief overview of the process of generating a biometric template in the biometric registration phase is as follows: run the biometric trusted application TA in the trusted execution environment TEE to control the biometric acquisition module to collect the original biometric data such as fingerprint valley data or fingerprint image data. And generate a biometric template based on the original biometric data.
  • the biometric template is transferred from the running trusted execution environment TEE to the secure element SE, and the signature generated according to the private key stored in the secure element SE is used to sign the biometric template, and the signed
  • the biometric template is transmitted back to the biometric trusted application TA in the trusted execution environment TEE for storage.
  • biometric templates can be generated by collecting the original biometric data through the registration process, and each biometric template is sent back to the trusted execution environment TEE after the secure element SE is signed.
  • the letter should be stored in the TA until the registration of multiple biometric templates is completed, then the registration process is ended.
  • the fingerprint feature point extraction method can be used to extract the original fingerprint feature data to obtain multiple fingerprint feature data to generate a fingerprint feature template; for small-size fingerprint modules, due to their small size , The amount of original fingerprint feature data collected is relatively small, and the original fingerprint feature data contained is relatively incomplete. Therefore, the method based on fingerprint image feature extraction is usually used to extract multiple fingerprint feature image extreme data, and then obtain multiple fingerprints Characteristic data.
  • both the original fingerprint feature data and the original fingerprint image data are collected, and then the original fingerprint feature data are extracted by fingerprint feature point extraction and based on fingerprint image feature extraction
  • the method extracts the original fingerprint image data to obtain multiple fingerprint feature data.
  • the fingerprint feature template obtained on this basis can be a fingerprint feature template based on fingerprint valley data, a fingerprint feature template based on fingerprint image data, or both fingerprint valley data and fingerprint image data
  • the biometrics acquisition module can be a module separately set outside the display area of the electronic device, such as integrated into the HOME button of a mobile terminal, or it can be a module set in the display area based on in-screen technology. group.
  • the biometric module may be based on the principle of capacitance or optical principle.
  • data corresponding to the same biometric template can be scattered and stored in the first security environment and the second security environment.
  • the biometric template data that will generate a large amount of data calculations is stored in the trusted execution environment TEE, and the legality of the biometrics to be identified is determined.
  • the biometric template data that will generate a small amount of data calculation during the judgment is stored in the secure element SE, thereby effectively using the first security environment and the second security environment, and ensuring the timeliness of subsequent biometric identification, especially for embedding with limited resources Mobile terminal.
  • the secure element SE is a hardware-level security environment, compared to the trusted execution environment TEE, the possibility of being attacked is extremely low, and its security protection level for data is higher than that of the trusted execution environment TEE. Therefore, , It is more difficult for the biometric template data stored in the storage area of the chip-level security environment to be leaked, thereby ensuring the safety of biometric identification.
  • FIG 2 is a schematic flow chart of the biometric identification method in the second embodiment of this application; as shown in Figure 2, it includes:
  • step S201 Perform an initial judgment on the legitimacy of the biological feature to be identified in the first security environment according to the biological feature template, and if the result of the initial judgment indicates that the biological feature to be identified is legal for the first time, perform step S202, otherwise, perform step S205;
  • the biometric identification trusted application TA in the trusted execution environment TEE is activated and the biometrics to be identified are obtained by feature extraction on the collected biometric images in the trusted execution environment TEE.
  • the biological feature to be identified is a fingerprint feature
  • feature extraction can be performed on the fingerprint image collected based on the capacitive sensing principle to obtain the fingerprint feature.
  • the biometric feature to be identified is further compared with the biometric feature template stored locally in the first security environment, so as to make a legality judgment.
  • the biological feature to be recognized can participate in the recognition in step 201, and can participate in the recognition in step S203 when step S203 needs to be performed.
  • the result of the initial judgment indicates for the first time that the biometric to be identified is legal, which does not mean that the biometric to be identified is only recognized once in the first security environment.
  • a single press of the user on the biometrics acquisition module obtains multiple biometric sample images, feature extraction is performed on each biometric sample image to obtain the corresponding biological feature to be identified, and the multiple biometric sample images correspond to the The identification biometrics are matched with the biometric template respectively to perform multiple identifications of the biometrics to be identified. If the biometrics to be identified are identified as legal for at least once, then it is the first time that the biometrics to be identified are legal.
  • a single press of the user on the biometric collection module is collected to obtain a biometric sample image, and feature extraction is performed on the biometric sample image to obtain the biometric feature to be identified. If there are multiple biometric templates to be identified, the features to be identified are matched with multiple biometric templates to perform multiple identifications of the biometrics to be identified. If the biometrics to be identified are identified as legal at least once, then It is the first time that the biometric to be identified is legal.
  • step S202 Verify the legitimacy of the biometric template. If the biometric template is legitimate, perform step S203; otherwise, perform step S205.
  • the above step S201 is performed in the first security environment, and the security of the first security environment is lower than that of the second security environment, resulting in The biometric template participating in the above step S201 may be tampered with in the first security environment. In other words, the biometric template participating in the first judgment may itself be illegal. Therefore, for security considerations, the security level is greater than the first security environment
  • the second security environment executes the above-mentioned step S202. Specifically, if the second security environment is a secure element SE, the verification management trusted application TA in the first security environment is started to control the participation in step S201 in the second security environment.
  • step S201 If the biometric template involved in step S201 is legal, but for safety reasons, the following step S203 will be executed. Otherwise, the biometric template involved in step S201 can be considered
  • the feature template is illegal, and it is more likely to have been illegally tampered with, and the first legal result of the legality of the biometric to be identified is not reliable. Therefore, for security reasons, it can be directly determined that the biometric to be identified is illegal, that is, execute Step S205.
  • the biometric template since the biometric template was previously signed, in this embodiment, the biometric template may be specifically subjected to signature verification processing to verify the legality of the biometric template. verification.
  • the biometric template participating in step S203 may specifically be a biometric template that has passed the legality verification of step S202, that is, the biometric template participating in the initial judgment of step S201 is the same as that of step 203 again. Therefore, the biometric template and the biometric to be identified can be packaged and transferred to the second security environment.
  • the biometrics to be recognized in the first judgment in step S201 and the second judgment in step 203 are the same. Therefore, since the security in the second security environment is greater than that in the first security environment, that is, in the second security environment, The possibility of tampering with the biometric template is extremely small, and the possibility of tampering with the biometrics to be identified is also extremely small. Therefore, it is equivalent to performing step 203 above to realize the re-verification of the legality of the biometrics to be identified. The result of the initial judgment that the biological feature to be identified is legal is reviewed.
  • biometric to be recognized in order to increase the accuracy of recognition, when the result of the judgment again shows that the biometric to be recognized is legal, it does not mean that the biometric to be recognized is only recognized once in the second security environment. In fact, it is also possible to perform multiple identifications of the biometrics to be identified in the second security environment. If the biometrics to be identified are identified as legal at least once, then it again indicates that the biometrics to be identified are legal.
  • a single press of the user on the biometrics acquisition module obtains multiple biometric sample images, feature extraction is performed on each biometric sample image to obtain the corresponding biological feature to be identified, and the multiple biometric sample images correspond to the The identification biometrics are matched with the biometric template respectively to perform multiple identifications of the biometrics to be identified. If the biometrics to be identified are identified as legal at least once, then the biometrics to be identified are again indicated as legal.
  • one press of the user on the biometric collection module is collected to obtain a biometric sample image, and feature extraction is performed on the biometric sample image to obtain the biometric feature to be identified. If there are multiple biometric templates to be identified, the features to be identified are matched with multiple biometric templates to perform multiple identifications of the biometrics to be identified. If the biometrics to be identified are identified as legal at least once, then Again, the biometrics to be identified are legal.
  • the first judgment and the second judgment are respectively performed through steps S201 and S203 to realize double isolation recognition, thereby ensuring the safety of biometric recognition.
  • S204 Determine that the biological feature to be identified is legal, and send the final judgment that the biological feature to be identified is legal to a third-party identity authentication application in the rich execution environment REE;
  • S205 Determine that the biological feature to be identified is illegal, and send the judgment that the biological feature to be identified is illegal to a third-party identity authentication application in the rich execution environment REE.
  • the first security environment can feed back the judgment result to the third-party identity authentication application; in addition, if the biological feature template If it is illegal, the second security environment will feed back the result of this determination to the third-party identity authentication application.
  • the security level of the second security environment is greater than the level of the first security environment, and when the result of the re-judgment shows that the biological feature to be identified is legal, it can be considered that the result of the above-mentioned initial judgment indicates that the biological feature to be identified is legal.
  • the second security environment which is more secure than the first security environment, feed back the result of the re-judgment to the third-party identity authentication application, thereby ensuring the security of subsequent upper-level biometric applications.
  • step S201 the initial determination of the legality of the biometric to be identified in the first security environment is initiated in step S201.
  • the final determination that the biological feature to be identified is legal can also be signed to further improve the security.
  • step S202 is executed to verify the legality of the biometric template.
  • step S202 may be performed before step S201 to verify the legality of the biometric template.
  • the biological characteristics to be identified in steps S201 and S203 are the same.
  • the biometrics to be identified that participated in the initial judgment in S201 are obtained by extracting the characteristics of the sample image in real time (or also called the first biometrics to be identified), that is, the first biometrics to be identified in the first safe environment At the same time, it can also realize the large amount of data calculation when the legality of the biological feature to be identified in the first security environment is judged for the first time; in step S203, the biological feature to be identified in the second judgment is The biometric image is extracted by feature extraction again (or also called the second biometric feature to be recognized), that is, the legality of the second biometric feature to be recognized is judged again in the second security environment, and it can also be realized in In the second security environment, the amount of data calculation when re-judging the legality of the biometrics to be identified is small
  • the biometric template data corresponding to the same biometric template is scattered and stored in the first safe environment and the second safe environment; correspondingly, the first safe environment is used in step S201
  • the biometric template data stored locally in a secure environment is used to determine the legality of the biometrics to be identified for the first time; and in step S203, the biometric template data stored locally in the second secure environment is used to determine the legality of the biometrics to be identified. .
  • the multiple biometric templates may be scattered and stored in the first safe environment and the second safe environment; correspondingly, In step S201, the biometric template stored locally in the first secure environment is used to make an initial judgment on the legality of the biometric to be identified; and in step S203, the biometric template stored in the second secure environment is used to identify the biometric. The legitimacy is judged again.
  • the biometrics to be identified are globally matched with the biometric template, and the biometrics to be identified in the second security environment are matched globally.
  • the biometrics to be identified are locally matched with the biometric template, which results in that the amount of data calculation for the initial judgment of the legality of the biometrics to be identified in the first security environment is greater than that in the second security environment. The data calculation amount when the legality of the biological feature to be identified is judged again.
  • biometrics to be identified are first determined to be valid, then some biometrics to be identified will be selected from the biometrics to be identified participating in the initial judgment, and the selected biometrics will be selected in the second security environment.
  • the feature is matched with the biometric template to make another judgment.
  • the biometric to be recognized that successfully matches the biometric template can be selected as the second biometric to be recognized from the biometrics to be recognized in the first judgment to participate in the second judgment in the second safe environment.
  • successful matching does not mean that all biometrics to be identified participating in the initial judgment must be able to match the biometric template. In fact, those of ordinary skill in the art can flexibly set the configuration matching according to the needs of the application scenario. Conditions for successful judgment.
  • the biological feature to be recognized participating in the re-judgment is the second biological feature to be recognized obtained by re-feature extraction of the collected biometric image, it is determined that the biological feature to be recognized participating in the initial judgment matches the biological feature template
  • the successful biometric feature to be recognized is extracted from the biometric image again to obtain the biometric feature to be recognized that is successfully matched with the biometric template at the first judgment as the second biometric feature to be recognized to participate in the second judgment in the second safe environment , Thereby ensuring the safety of the biometric identification process.
  • the electronic devices in the embodiments of this application exist in various forms, including but not limited to:
  • Mobile communication equipment This type of equipment is characterized by mobile communication functions, and its main goal is to provide voice and data communications.
  • Such terminals include: smart phones (such as iPhone), multimedia phones, functional phones, and low-end phones.
  • Ultra-mobile personal computer equipment This type of equipment belongs to the category of personal computers, has calculation and processing functions, and generally also has mobile Internet features.
  • Such terminals include: PDA, MID and UMPC devices, such as iPad.
  • Portable entertainment equipment This type of equipment can display and play multimedia content.
  • Such devices include: audio, video players (such as iPod), handheld game consoles, e-books, as well as smart toys and portable car navigation devices.
  • Server A device that provides computing services.
  • the composition of a server includes a processor 810, hard disk, memory, system bus, etc.
  • the server is similar to a general computer architecture, but because it needs to provide highly reliable services, it has High requirements in terms of performance, reliability, security, scalability, and manageability.
  • a programmable logic device Programmable Logic Device, PLD
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller can be implemented in any suitable manner.
  • the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers.
  • controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as a part of the memory control logic.
  • controller in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers and embedded The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for implementing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • the embodiments of the present application can be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.
  • the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
  • processors CPU
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • This application may be described in the general context of computer-executable instructions executed by a computer, such as program modules.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific transactions or implement specific abstract data types.
  • This application can also be practiced in distributed computing environments. In these distributed computing environments, remote processing devices connected through a communication network execute transactions.
  • program modules can be located in local and remote computer storage media including storage devices.

Abstract

一种生物特征识别方法、电子设备,生物特征识别方法包括:在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断(S201);对所述生物特征模板的合法性进行验证(S202),若所述生物特征模板合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断(S203)。生物特征识别方法提高了生物特征识别的安全性。

Description

生物特征识别方法以及电子设备 技术领域
本申请实施例涉及生物识别技术领域,尤其涉及一种生物特征识别方法以及电子设备。
背景技术
由于人体的生物特征如指纹、掌纹、唇纹和虹膜等具有独一无二性,因此可用于身份验证等,以满足不同应用场景的安全、保密要求。如今生物特征识别技术在嵌入式终端设备中正在得到越来越广泛的应用,如手机解锁,门禁系统、移动支付和各种智能锁,给人们的工作和生活提供了极大的便利。然而在提供便利的同时,也面临着信息泄露,财产损失等安全隐患。
因此,提供一种具有较高安全性的生物特征识别方案,成为亟待解决的技术问题。
发明内容
有鉴于此,本申请实施例提供的生物特征识别方法以及电子设备,用以至少解决现有技术中存在的上述问题。
本申请实施例提供一种生物特征识别方法,其包括:
在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断;
对所述生物特征模板的合法性进行验证,若所述生物特征模板合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断。
本申请实施例提供一种电子设备,其上配置有第一安全环境以及第二安全环境,在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断;对所述生物特征模板的合法性进行验证;若所述生物特征模板合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的 合法性进行再次判断。
可选地,在本申请的任一实施例中,在第一安全环境中对待识别生物特征的合法性进行初次判断时的数据计算量大于在第二安全环境中对待识别生物特征的合法性进行再次判断时的数据计算量。
可选地,在本申请的任一实施例中,所述第一安全环境的安全性小于所述第二安全环境的安全性。
可选地,在本申请的任一实施例中,所述第一安全环境为可信执行环境或者富执行环境,所述第二安全环境为芯片级安全环境。
可选地,在本申请的任一实施例中,在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断之前,还包括:在第二安全环境中对所述生物特征模板进行签名,并将签名后的所述生物特征模板存储在所述第一安全环境中;
对应地,对所述生物特征模板的合法性进行验证,包括:对所述生物特征模板进行验签处理,以对所述生物特征模板的合法性进行验证。
可选地,在本申请的任一实施例中,还包括:对样本图像进行解析获得第一待识别生物特征,以在第一安全环境中对第一待识别生物特征的合法性进行初次判断。
可选地,在本申请的任一实施例中,还包括:对所述样本图像进行解析获得第二待识别生物特征,以在第二安全环境中对第二待识别生物特征的合法性进行再次判断。
可选地,在本申请的任一实施例中,对应于同一识别主体的生物特征模板数据分散存储在所述第一安全环境和第二安全环境中;对应地,
在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断包括:使用所述第一安全环境本地存储的生物特征模板数据对待识别生物特征的合法性进行初次判断;
在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断包括:使用所述第二安全环境本地存储的生物特征模板数据对待识别生物特征的合法性进行再次判断。
可选地,在本申请的任一实施例中,还包括:若所述生物特征模板非法,则直接判定所述待识别生物特征非法。
可选地,在本申请的任一实施例中,若所述初次判断的结果初次表明所述待识别生物特征合法,则对所述生物特征模板的合法性进行验证。
可选地,在本申请的任一实施例中,若所述初次判断的结果初次表明所述待识别生物特征合法,且,若所述再次判断的结果再次表明所述待识别生物特征合法,则最终判定所述待识别生物特征合法。
可选地,在本申请的任一实施例中,还包括:对所述待识别生物特征合法的最终判定进行签名。
由以上技术方案可见,本申请实施例中,由于在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断;对所述生物特征模板的合法性进行验证,若所述生物特征模板合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断,从而提高了生物特征识别的安全性。
附图说明
图1为本申请实施例一中应用生物特征识别的方案在电子设备上应用示意图;
图2为本申请实施例二中生物特征识别方法的流程示意图。
具体实施方式
为使本领域的普通技术人员更好地理解本申请实施例中的技术方案,下面结合附图对本申请实施例中的技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本申请的一部分实施例,而不是全部实施例。因此,本领域普通技术人员基于所描述的实施例而获得的其他实施例,都应当属于本申请实施例保护的范围。
本申请下述实施例中,由于在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断;对所述生物特征模板的合法性进行 验证,若所述生物特征模板合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断,从而提高了生物特征识别的安全性。
下述实施例,以将本申请实施例的生物特征识别方案应用到嵌入式终端设备上为例进行说明,其上具体配置有第一安全环境以及第二安全环境,进一步地,所述第一安全环境为可信执行环境(Trusted Execution Environment,简称TEE)或富执行环境(Rich Execution Environment,简称REE),所述第二安全环境为芯片级安全环境例如安全元件(Secure Element,SE)。下述实施例中,具体以所述第一安全环境为可信执行环境TEE,以及所述第二安全环境为安全元件SE为例进行说明。但是,此处需要说明的是,所述第一安全环境和所述第二安全环境并不局限为此处所举例的几种特定的环境中,实际上只要可以达到降低生物特征识别所需的资源要求,以及可提高生物特征识别安全性的任意环境即可。
另外,需要说明的是,下述实施例中的待识别生物特征可以是指纹特征、掌纹特征、唇纹特征和虹膜特征等任一具有身份属性的生物特征。当待识别生物特征为指纹特征时,则指纹特征可以为指纹特征点数据或者指纹特征图像极值数据。
图1为本申请实施例一中应用生物特征识别的方案在电子设备上应用示意图;如图1所示,电子设备上配置有富执行环境REE、可信执行环境TEE、安全元件SE,富执行环境REE中可运行各类第三方身份认证应用程序、第三方支付应用程序,可信执行环境TEE中运行与第三方身份认证应用程序对应的生物特征识别可信应用(Trusted Application,简称TA)、第三方支付应用程序对应的验签可信应用(Trusted Application,简称TA),安全元件SE中可存储有秘钥、签名/验签管理以及生物特征识别可信应用TA。其中,可信执行环境TEE中的生物特征识别可信应用TA用于控制在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断,以及在有必要的情况下启用安全元件SE上的生物特征识别配置从而在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断;验签可信 应用TA用于控制对移动支付的敏感数据在安全元件SE进行验签处理;所述私钥用于根据签名算法生成签名;所述签名/验签管理用于对生物特征模板进行签名/验签,对移动支付的敏感数据进行签名/验签。
此处,需要说明的是,对生物特征模板进行签名使用的私钥、对移动支付的敏感数据进行签名使用的私钥可以相同,也可以不同。优选地,为了提高安全性,对生物特征模板进行签名使用的私钥、对移动支付的敏感数据进行签名使用的私钥不同。
另外,由于第二安全环境的安全性大于第一安全环境,因此,除了在第二安全环境中对上生物特征模板进行签名处理,还可以在第二安全环境中对上述生物特征模板进行加密处理。在一具体应用场景中,对生物特征模板数据加密时,可以使用AES(128位或256位)加密算法对生物特征模板进行加密生成生物特征加密模板。示例性地,如果使用AES256加密算法的话,具体可采用AES256-CBC算法,还可采用AES128-CBC(加密密钥为128位)算法进行加密处理。
此处,需要说明的是,对生物特征模板进行加密和签名处理之间在执行顺序上并无特别限定,本领域普通技术人员可以根据应用场景进行灵活选择。
为了对本申请的技术方案作出清楚的说明,本申请下述实施例中,将生特征识别技术方案应用到上述电子设备上的整体应用过程区分为生物特征注册阶段以及生物特征识别阶段,生物特征注册阶段主要用于生成生物特征模板,生物特征识别阶段主要用于根据生物特征模板对采集的待识别生物特征进行合法性验证。
生物特征注册阶段生成生物特征模板的过程简要概述如下:运行可信执行环境TEE中生物特征识别可信应用TA以控制生物特征采集模组采集生物特征原始数据例如指纹谷脊数据或者指纹图像数据,并根据所述生物特征原始数据生成生物特征模板。将所述生物特征模板从运行可信执行环境TEE传入到安全元件SE,并使用根据安全元件SE中所存储的私钥生成的签名并对所述生物特征模板进行签名,并将签名后的生物特征模板传回到可信 执行环境TEE中的生物特征识别可信应用TA中进行存储。此处,需要说明的是,可以通过注册过程采集生物特征原始数据生成多个生物特征模板,每一个生物特征模板在安全元件SE被签名后回传到可信执行环境TEE中的生物特征识别可信应用TA中进行存储,直至完成多个生物特征模板的注册,则结束注册过程。
如果注册指纹特征模板的话,对于较大尺寸的指纹模组而言,由于较大尺寸的指纹模组采集到的指纹特征原始数据(如指纹谷脊数据)数量较大、包含的指纹特征原始数据也相对较为完整,因此可采用指纹特征点提取方式对指纹特征原始数据进行提取即可得到多个指纹特征数据以生成指纹特征模板;而对于小尺寸的指纹模组而言,由于其尺寸较小,采集到的指纹特征原始数据量相对较小、包含的指纹特征原始数据相对不够完整,因此通常采用基于指纹图像特征提取的方式来提取出多个指纹特征图像极值数据,进而得到多个指纹特征数据。或者也可以是,无论指纹模组的尺寸大小,既采集指纹特征原始数据,也采集指纹图像原始数据,而后分别以指纹特征点提取的方式对指纹特征原始数据进行提取并以基于指纹图像特征提取的方式对指纹图像原始数据进行提取,从而得到多个指纹特征数据。在此基础上得到的指纹特征模板可以是基于指纹谷脊数据所得到的指纹特征模板,可以是基于指纹图像数据所得到的指纹特征模板,还可以是基于指纹谷脊数据和指纹图像数据二者的结合所得到的指纹特征模板。
此处需要说明的是,生物特征采集模组可以是单独设置在电子设备显示区域外的一个模组比如集成到移动终端的HOME按键处,也可以是基于屏内技术设置在显示区域内的模组。另外,所述生物特征模组可以基于电容原理,也可以基于光学原理。
另外,在一些应用场景中,可以将对应于同一生物特征模板数据分散存储在所述第一安全环境和第二安全环境中,比如,如果第一安全环境相对于第二安全环境来说,可以支撑较大的数据计算量,则对待识别生物特征的合法性进行判断时会产生较大数据计算量的生物特征模板数据存储在可信执行环境TEE中,而将对待识别生物特征的合法性进行判断时会产生较小数 据计算量的生物特征模板数据存储在安全元件SE中,从而有效利用第一安全环境以及第二安全环境,可以保证后续生物特征识别的时效性,尤其对于资源有限的嵌入式移动终端来说。由于安全元件SE是一种硬件级别的安全环境,相对于可信执行环境TEE来说,被攻击成功的可能性极低,其对数据的安全防护等级较可信执行环境TEE都要高,因此,保存在该芯片级安全环境的储存区域中的生物特征模板数据被泄漏的难度较大,从而保证了生物特征识别的安全性。
图2为本申请实施例二中生物特征识别方法的流程示意图;如图2所示,其包括:
S201、在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断,若所述初次判断的结果初次表明所述待识别生物特征合法,则执行步骤S202,否则执行步骤S205;
本实施例中,通过启用所述可信执行环境TEE中的生物特征识别可信应用TA并在所述可信执行环境TEE中通过对采集到的生物特征图像进行特征提取得到所述待识别生物特征,比如,如果待识别生物特征为指纹特征的话,则可以对基于电容感应原理采集到的指纹图像进行特征提取,以得到指纹特征。进一步将所述待识别生物特征与第一安全环境本地存储的生物特征模板进行比对,从而进行合法性判断。此处,所述待识别生物特征即可参与步骤201中的识别,当需要执行步骤S203时又可参与步骤S203中的识别。
此处需要说明的是,在一应用场景中,为了增加识别的准确性,当初次判断的结果初次表明待识别生物特征合法,并非意味着在第一安全环境中对待识别生物特征只进行一次识别,实际上,也可以在第一安全环境中对待识别生物特征进行多次识别,如果所述待识别生物特征被识别为合法的次数至少为一次,则初次表明待识别生物特征合法。比如,对用户在生物特征采集模组上的一次按压采集得到多个生物特征样本图像,对每个生物特征样本图像进行特征提取得到对应的待识别生物特征,多个生物特征样本图像对应的待识别生物特征与生物特征模板分别进行匹配,以对待识别生物特征进行多次识别,如果所述待识别生物特征被识别为合法次数至少为一次,则初 次表明待识别生物特征合法。
可替代地,在另外一应用场景中,对用户在生物特征采集模组上的一次按压采集得到一个生物特征样本图像,对所述生物特征样本图像进行特征提取得到待识别生物特征,若参与初次判断的生物特征模板有多个,则待识别特征分别与多个生物特征模板进行匹配,以对待识别生物特征进行多次识别,如果所述待识别生物特征被识别为合法的至少为一次,则初次表明待识别生物特征合法。
S202、对所述生物特征模板的合法性进行验证,若所述生物特征模板合法,则执行步骤S203;否则,执行步骤S205。
本实施例中,考虑到在一些应用场景中,由于考虑到上述步骤S201是在第一安全环境中执行,而第一安全环境的安全性相对于第二安全环境来说较低,由此导致参与上述步骤S201的生物特征模板有可能在第一安全环境中被篡改,换言之,参与上述初次判断的生物特征模板本身有可能就是非法的,因此,处于安全考虑,在安全级别大于第一安全环境的第二安全环境执行上述步骤S202,具体地第二安全环境若为安全元件SE的话,则启动第一安全用环境中的验签管理可信应用TA控制在第二安全环境中对参与步骤S201的生物特征模板进行验签处理,判断其中包括的签名是否合法,若参与步骤S201的生物特征模板合法,但进一步为了安全考虑,才会执行下述步骤S203,否则,可认为参与步骤S201的生物特征模板非法,已经被非法篡改的可能较大,而所述待识别生物特征合法的初次合法的结果并不可靠,因此,出于安全考虑,可直接判定所述待识别生物特征非法,即执行步骤S205。
具体地,本实施例中,由于之前对生物特征模板进行了签名处理,因此,本实施例中,具体可以对所述生物特征模板进行验签处理,以对所述生物特征模板的合法性进行验证。
S203、在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断,若所述再次判断的结果再次表明所述待识别生物特征合法,则执行步骤S204;否则,执行步骤S205。
本实施例中,参与步骤S203的生物特征模板具体可为通过上述步 骤S202合法性验证的生物特征模板,即换言之,参与步骤S201初次判断和步骤203再次判断的生物特征模板相同。因此,可以将生物特征模板以及待识别生物特征打包传入给第二安全环境。
另外,本实施例中,参与步骤S201初次判断和步骤203再次判断的待识别生物特征相同,由此,由于在第二安全环境的安全性大于第一安全环境,即在第二安全环境中,生物特征模板被篡改的可能性极小,待识别生物特征被篡改的可能性也极小,因此,相当于通过执行上述步骤203从而实现了对待识别生物特征的合法性进行了再次验证,从而对所述待识别生物特征合法这一初次判断的结果进行复核。
此处需要说明的是,在一应用场景中,为了增加识别的准确性,当再次判断的结果再次表明待识别生物特征合法,并非意味着在第二安全环境中对待识别生物特征只进行一次识别,实际上,也可以在第二安全环境中对待识别生物特征进行多次识别,如果所述待识别生物特征被识别为合法的次数至少为一次,则再次表明待识别生物特征合法。比如,对用户在生物特征采集模组上的一次按压采集得到多个生物特征样本图像,对每个生物特征样本图像进行特征提取得到对应的待识别生物特征,多个生物特征样本图像对应的待识别生物特征与生物特征模板分别进行匹配,以对待识别生物特征进行多次识别,如果所述待识别生物特征被识别为合法次数至少为一次,则再次表明待识别生物特征合法。
可替代地,在另外一应用场景中,对用户在生物特征采集模组上的一次按压采集得到一个生物特征样本图像,对所述生物特征样本图像进行特征提取得到待识别生物特征,若参与再次判断的生物特征模板有多个,则待识别特征分别与多个生物特征模板进行匹配,以对待识别生物特征进行多次识别,如果所述待识别生物特征被识别为合法的至少为一次,则再次表明待识别生物特征合法。
本实施例中,通过步骤S201和S203分别进行初次判断以及再次判断,实现了双重隔离识别,从而保证生物特征识别的安全性。
S204、判定所述待识别生物特征合法,并将所述待识别生物特征合 法的最终判定发送给富执行环境REE中的第三方身份认证应用程序;
S205、判定所述待识别生物特征非法,并将所述待识别生物特征非法的判定发送给富执行环境REE中的第三方身份认证应用程序。
参见上述步骤S204、S205,如果初次判断的及结果表明所述待识别生物特征非法,则可以由第一安全环境向第三方身份认证应用程序反馈此判定的结果;另外,如果所述生物特征模板非法,则由第二安全环境向第三方身份认证应用程序反馈此判定的结果。但是,考虑到第二安全环境的安全级别大于第一安全环境的级别,且当再次判断的结果表明所述待识别生物特征合法,则可认为确认了上述初次判断的结果表明所述待识别生物特征合法这一结论,因此,优选由安全性大于第一安全环境的所述第二安全环境向第三方身份认证应用程序反馈给再次判断的结果,从而保证了后续上层生物特征应用的安全性。
此处,需要说明的是,与上述实施例一不同的是,根据第三方身份认证应用程序的身份验证请求,启动步骤S201中在第一安全环境中对待识别生物特征的合法性进行初次判断。
在上述步骤S204之后,还可以对所述待识别生物特征合法的最终判定进行签名,以进一步提高安全性。
需要说明的是,图2所示实施例中,若经过步骤S201的处理,初次表明所述待识别生物特征合法,则执行步骤S202以对所述生物特征模板的合法性进行验证。但是,为了进一步增加安全性,在其他一实施例中,也可以在步骤S201之前执行步骤S202以对所述生物特征模板的合法性进行验证的处理,当所述生物特征模板通过合法性验证,才会跳转到步骤S201以对待识别生物特征的合法性进行初次判断;否则,可直接判定所述生物特征模板非法,结束当前的生物特征识别处理流程。之后,由于在在骤S201之前执行了步骤S202,得到了表明所述生物特征模板合法的验证结论,因此,可认为所述生物特征模板未被篡改,可以直接参与所述步骤S203。
另外,在上述图2实施例中,参与步骤S201和S203的待识别生物特征相同,但是,可替代地,在其他一实施例中,进一步考虑到待识别生物 特征可能会被篡改,则在步骤S201中参与所述初次判断的待识别生物特征是实时对样本图像进行特征提取得到的(或者又称之为第一待识别生物特征),即在第一安全环境中对第一待识别生物特征的合法性进行初次判断;同时还可以实现在第一安全环境中对待识别生物特征的合法性进行初次判断时的数据计算量较大;在步骤S203中参与所述再次判断的待识别生物特征是再次对生物特征图像进行特征提取得到的(或者又称之为第二待识别生物特征),即在第二安全环境中对第二待识别生物特征的合法性进行再次判断,同时还可以实现在第二安全环境中对待识别生物特征的合法性进行再次判断时的数据计算量较小,换言之,相当于基于数据计算量大小将生物特征识别的过程拆分到第一安全环境和第二安全环境中进行。
可替代地,在其他一实施例中,对应于同一生物特征模板的生物特征模板数据分散存储在所述第一安全环境和第二安全环境中;对应地,则在步骤S201中使用所述第一安全环境本地存储的生物特征模板数据对待识别生物特征的合法性进行初次判断;而在步骤S203中使用所述第二安全环境本地存储的生物特征模板数据对待识别生物特征的合法性进行再次判断。
可替代地,在其他一实施例中,若对于同一对象存在多个生物特征模板,则可以将多个生物特征模板分散存储在所述第一安全环境和第二安全环境中;对应地,则在步骤S201中使用所述第一安全环境本地存储的生物特征模板对待识别生物特征的合法性进行初次判断;而在步骤S203中使用所述第二安全环境本地存储的生物特征模板对待识别生物特征的合法性进行再次判断。
在一具体应用场景中,比如在第一安全环境中对待识别生物特征的合法性进行初次判断时,待识别生物特征与生物特征模板进行全局匹配,而在第二安全环境中对待识别生物特征的合法性进行初次判断时,待识别生物特征与生物特征模板进行局部匹配,从而导致在第一安全环境中对待识别生物特征的合法性进行初次判断时的数据计算量大于在第二安全环境中对所述待识别生物特征的合法性进行再次判断时的数据计算量。
如果当初次判定所述待识别生物特征合法时再启动再次判断的话, 则从参与初次判断的待识别生物特征中选择部分待识别生物特征,在第二安全环境中将选择出的部分待识别生物特征与生物特征模板进行匹配以进行再次判断。此处,需要说明的是,可以从参与初次判断的待识别生物特征中选择与生物特征模板匹配成功的待识别生物特征作为第二待识别生物特征,以在第二安全环境中参与再次判断。此处,需要说明的是,匹配成功并非意味着参与初次判断的所有待识别生物特征都要能与生物特征模板匹配,实际上,本领域普通技术人员可以根据应用场景的需求,灵活设置配置匹配成功的判断的条件。
进一步地,如果参与再次判断的待识别生物特征是重新对采集到的生物特征图像进行特征提取得到的第二待识别生物特征,则确定出参与初次判断的待识别生物特征中与生物特征模板匹配成功的待识别生物特征,再重新从生物特征图像进行特征提取得到在初次判断时与生物特征模板匹配成功的待识别生物特征作为第二待识别生物特征,以在第二安全环境中参与再次判断,从而保证了生物特征识别处理的安全性。
上述产品可执行本申请实施例所提供的方法,具备执行方法相应的功能模块和有益效果。未在本实施例中详尽描述的技术细节,可参见本申请实施例所提供的方法。
本申请实施例的电子设备以多种形式存在,包括但不限于:
(1)移动通信设备:这类设备的特点是具备移动通信功能,并且以提供话音、数据通信为主要目标。这类终端包括:智能手机(例如iPhone)、多媒体手机、功能性手机,以及低端手机等。
(2)超移动个人计算机设备:这类设备属于个人计算机的范畴,有计算和处理功能,一般也具备移动上网特性。这类终端包括:PDA、MID和UMPC设备等,例如iPad。
(3)便携式娱乐设备:这类设备可以显示和播放多媒体内容。该类设备包括:音频、视频播放器(例如iPod),掌上游戏机,电子书,以及智能玩具和便携式车载导航设备。
(4)服务器:提供计算服务的设备,服务器的构成包括处理器810、硬 盘、内存、系统总线等,服务器和通用的计算机架构类似,但是由于需要提供高可靠的服务,因此在处理能力、稳定性、可靠性、安全性、可扩展性、可管理性等方面要求较高。
(5)其他具有数据交互功能的电子装置。
至此,已经对本主题的特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作可以按照不同的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序,以实现期望的结果。在某些实施方式中,多任务处理和并行处理可以是有利的。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit  Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个 其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、 其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定事务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行事务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的实施例而已,并不用于限制本申请。对 于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (17)

  1. 一种生物特征识别方法,其特征在于,包括:
    在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断;
    对所述生物特征模板的合法性进行验证,若所述生物特征模板合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断。
  2. 根据权利要求1所述的方法,其特征在于,在第一安全环境中对待识别生物特征的合法性进行初次判断时的数据计算量大于在第二安全环境中对待识别生物特征的合法性进行再次判断时的数据计算量。
  3. 根据权利要求1所述的方法,其特征在于,所述第一安全环境的安全性小于所述第二安全环境的安全性。
  4. 根据权利要求1所述的方法,其特征在于,所述第一安全环境为可信执行环境或者富执行环境,所述第二安全环境为芯片级安全环境。
  5. 根据权利要求1所述的方法,其特征在于,在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断之前,还包括:在第二安全环境中对所述生物特征模板进行签名,并将签名后的所述生物特征模板存储在所述第一安全环境中;
    对应地,对所述生物特征模板的合法性进行验证,包括:对所述生物特征模板进行验签处理,以对所述生物特征模板的合法性进行验证。
  6. 根据权利要求1所述的方法,其特征在于,还包括:对样本图像进行解析获得第一待识别生物特征,以在第一安全环境中根据生物特征模板对第一待识别生物特征的合法性进行初次判断。
  7. 根据权利要求6所述的方法,其特征在于,还包括:对所述样本图像进行解析获得第二待识别生物特征,以在第二安全环境中根据所述生物特征模板对第二待识别生物特征的合法性进行再次判断。
  8. 根据权利要求1所述的方法,其特征在于,对应于同一生物特征模板的生物特征模板数据分散存储在所述第一安全环境和第二安全环境中;对应 地,
    在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断包括:使用所述第一安全环境本地存储的生物特征模板数据对待识别生物特征的合法性进行初次判断;
    在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断包括:使用所述第二安全环境本地存储的生物特征模板数据对待识别生物特征的合法性进行再次判断。
  9. 根据权利要求1所述的方法,其特征在于,对应于同一识别对象的多个生物特征模板分散存储在所述第一安全环境和第二安全环境中;对应地,
    在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断包括:使用所述第一安全环境本地存储的生物特征模板对待识别生物特征的合法性进行初次判断;
    在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断包括:使用所述第二安全环境本地存储的生物特征模板对待识别生物特征的合法性进行再次判断。
  10. 根据权利要求1所述方法,其特征在于,还包括:若所述生物特征模板非法,则直接判定所述待识别生物特征非法。
  11. 根据权利要求1所述的方法,其特征在于,若所述初次判断的结果初次表明所述待识别生物特征合法,则对所述生物特征模板的合法性进行验证。
  12. 根据权利要求11所述的方法,其特征在于,若所述初次判断的结果初次表明所述待识别生物特征合法,且,若所述再次判断的结果再次表明所述待识别生物特征合法,则最终判定所述待识别生物特征合法。
  13. 根据权利要求12所述的方法,其特征在于,还包括:对所述待识别生物特征合法的最终判定进行签名。
  14. 一种电子设备,其特征在于,其上配置有第一安全环境以及第二安全环境,在第一安全环境中根据生物特征模板对待识别生物特征的合法性进行初次判断;对所述生物特征模板的合法性进行验证;若所述生物特征模板 合法,则在第二安全环境中根据所述生物特征模板对待识别生物特征的合法性进行再次判断。
  15. 根据权利要求14所述的电子设备,其特征在于,在第一安全环境中对待识别生物特征的合法性进行初次判断时的数据计算量大于在第二安全环境中对待识别生物特征的合法性进行再次判断时的数据计算量。
  16. 根据权利要求14所述的电子设备,其特征在于,所述第一安全环境的安全性小于所述第二安全环境的安全性。
  17. 根据权利要求14所述的电子设备,其特征在于,所述第一安全环境为可信执行环境或者富执行环境,所述第二安全环境为芯片级安全环境。
PCT/CN2019/085035 2019-04-29 2019-04-29 生物特征识别方法以及电子设备 WO2020220212A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/085035 WO2020220212A1 (zh) 2019-04-29 2019-04-29 生物特征识别方法以及电子设备
CN201980000635.2A CN110235140A (zh) 2019-04-29 2019-04-29 生物特征识别方法以及电子设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/085035 WO2020220212A1 (zh) 2019-04-29 2019-04-29 生物特征识别方法以及电子设备

Publications (1)

Publication Number Publication Date
WO2020220212A1 true WO2020220212A1 (zh) 2020-11-05

Family

ID=67855277

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/085035 WO2020220212A1 (zh) 2019-04-29 2019-04-29 生物特征识别方法以及电子设备

Country Status (2)

Country Link
CN (1) CN110235140A (zh)
WO (1) WO2020220212A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929266B (zh) * 2019-11-29 2021-09-03 广州小鹏汽车科技有限公司 基于安全加固架构的系统、加解密方法、车联网终端和车辆
CN111177687A (zh) * 2019-12-25 2020-05-19 北京迈格威科技有限公司 图像解锁方法、装置、设备和存储介质
CN111917799B (zh) * 2020-08-14 2022-07-22 支付宝(杭州)信息技术有限公司 基于验证信息、基于隐私数据的验证方法、装置及设备
TWI814494B (zh) * 2022-07-20 2023-09-01 大陸商北京集創北方科技股份有限公司 生物特徵識別軟體測試系統及方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077679A (zh) * 2017-02-16 2017-08-18 深圳市汇顶科技股份有限公司 基于指纹识别的校验方法、装置、以及交易系统
CN107113170A (zh) * 2017-03-13 2017-08-29 深圳市汇顶科技股份有限公司 生物特征模板保存、验证方法及生物特征识别装置、终端
US20180039990A1 (en) * 2016-08-05 2018-02-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107924516B (zh) * 2015-09-01 2021-02-02 华为技术有限公司 一种移动终端的支付认证方法、装置及移动终端
DE102016105936A1 (de) * 2015-12-14 2017-06-14 Lenovo (Beijing) Limited Electronic device and method for running applications in different security environments
CN107294943A (zh) * 2016-04-13 2017-10-24 天津工业大学 一种具有安全威胁监测能力的生物特征模板保护方法
CN105827625A (zh) * 2016-04-27 2016-08-03 乐视控股(北京)有限公司 基于生物识别信息的认证方法和认证系统、电子设备
JP6866803B2 (ja) * 2017-08-10 2021-04-28 富士通株式会社 認証システムおよび認証方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180039990A1 (en) * 2016-08-05 2018-02-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
CN107077679A (zh) * 2017-02-16 2017-08-18 深圳市汇顶科技股份有限公司 基于指纹识别的校验方法、装置、以及交易系统
CN107113170A (zh) * 2017-03-13 2017-08-29 深圳市汇顶科技股份有限公司 生物特征模板保存、验证方法及生物特征识别装置、终端

Also Published As

Publication number Publication date
CN110235140A (zh) 2019-09-13

Similar Documents

Publication Publication Date Title
WO2020220212A1 (zh) 生物特征识别方法以及电子设备
WO2021068636A1 (zh) 基于区块链的可验证声明的创建方法、装置、设备及系统
JP6887956B2 (ja) 安全なバイオメトリックデータのキャプチャ、処理及び管理
WO2019095864A1 (zh) 一种业务授权的方法、装置及设备
WO2020034760A1 (zh) 一种身份信息的识别方法及装置
US20160381003A1 (en) Universal enrollment using biometric pki
CN107196901B (zh) 一种身份注册及认证的方法及装置
CN105975839B (zh) 一种生物特征识别装置和方法以及生物特征模板注册方法
CN116340955A (zh) 一种基于区块链的数据处理方法、装置及设备
US9639839B2 (en) Fingerprint recognition control methods for payment and non-payment applications
CN110990820B (zh) 税盘授权方法、装置、电子设备及存储介质
CN113239853B (zh) 一种基于隐私保护的生物识别方法、装置及设备
CN110235141B (zh) 生物特征识别方法以及电子设备
US9536131B1 (en) Fingerprint recognition methods and electronic device
CN102456102A (zh) 用Usb key技术对信息系统特殊操作进行身份再认证的方法
Verma et al. A novel model to enhance the data security in cloud environment
CN106533685B (zh) 身份认证方法、装置及系统
WO2016155465A1 (zh) 一种数据处理方法、装置及终端
de Oliveira et al. A security API for multimodal multi-biometric continuous authentication
CN106301784B (zh) 一种数据获取方法和终端
WO2020191547A1 (zh) 生物识别方法及装置
WO2020181427A1 (zh) 一种基于安全多方计算的签名方法、装置及系统
JP2006323691A (ja) 認証装置、登録装置、登録方法及び認証方法
CN114900289B (zh) 一种数据安全处理方法、系统、设备及介质
Sanchez-Reillo et al. Smart cards to enhance security and privacy in biometrics

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19926868

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19926868

Country of ref document: EP

Kind code of ref document: A1