Fingerprint recognition method and mobile terminal

A fingerprint identification and mobile terminal technology, applied in the field of communication, can solve the problem of difficult to provide security strength fingerprint payment guarantee, and achieve the effect of avoiding malicious tampering, protecting fund security and improving security.

Active Publication Date: 2016-02-24
维沃移动通信(深圳)有限公司
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a fingerprint identification method and a mobile terminal to solve the problem that existing intelligent terminals perform fingerprint identification through pure software or build a hardware trusted environment inside the intelligent terminal, and it is difficult to provide fingerprints with high security strength. The question of payment protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint recognition method and mobile terminal
  • Fingerprint recognition method and mobile terminal
  • Fingerprint recognition method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] The first embodiment of the present invention provides a fingerprint identification method, which is applied to a mobile terminal provided with an embedded security chip and a trusted area module. Send to the trusted zone module, so that the trusted zone module digitally signs the result of the judgment and then sends it to the mobile terminal.

[0029] Specifically, see figure 1 , the first embodiment of the present invention provides a fingerprint identification method, the method comprising:

[0030] Step 101, when receiving an instruction for fingerprint identification, make the embedded security chip acquire the fingerprint image currently input by the user.

[0031] Among them, the acquisition of fingerprint images is carried out inside the embedded security chip, and remote attacks cannot invade the inside of the chip, and cannot obtain or tamper with fingerprint features.

[0032] Step 102, perform feature extraction on the fingerprint image to obtain fingerpr...

no. 2 example

[0051] Such as figure 2 As shown, the second embodiment of the present invention provides a fingerprint identification method applied to a mobile terminal provided with an embedded security chip and a trusted area module, the method comprising:

[0052] Step 201 , when receiving an instruction for fingerprint identification, acquire the fingerprint image input by the current user so that the embedded security chip acquires the fingerprint image input by the current user.

[0053] In this step, the acquisition of the fingerprint image is carried out inside the embedded security chip, and remote attacks cannot invade the inside of the chip, and cannot obtain or tamper with fingerprint features.

[0054] Step 202, perform feature extraction on the fingerprint image to obtain fingerprint features.

[0055] In the embodiment of the present invention, the fingerprint identification technology does not directly store the fingerprint image, but extracts the features of the fingerpri...

no. 3 example

[0071] The first to second embodiments of the present invention described above are the content of the fingerprint identification method provided by the present invention, and the mobile terminal provided by the fourth embodiment of the present invention is introduced below.

[0072] see image 3 , image 3 is a block diagram of the mobile terminal provided by the third embodiment of the present invention. image 3 The mobile terminal 300 shown includes: an acquisition module 301 , a feature extraction module 302 , an identification module 303 , a sending module 304 and a signature module 305 .

[0073] An acquisition module 301, configured to enable the embedded security chip to acquire the fingerprint image currently input by the user when receiving an instruction for fingerprint identification;

[0074] Among them, the acquisition of fingerprint images is carried out inside the embedded security chip, and remote attacks cannot invade the inside of the chip, and cannot obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fingerprint recognition method and a mobile terminal. The method is applied to the mobile terminal which is provided with an embedded security chip and a confidence region module. The method comprises the following steps of: enabling the embedded security chip to acquire a fingerprint image input by a current user when receiving a fingerprint recognition instruction; performing feature extraction on the fingerprint image so as to obtain fingerprint features; sending the fingerprint features to a microprocessor of the embedded security chip and enabling the microprocessor of the embedded security chip to perform data processing and fingerprint recognition on the fingerprint features, so as to obtain a fingerprint recognition result; enabling the embedded security chip to send the fingerprint recognition result to the confidence region module; and enabling the confidence region module to perform digital signature on the fingerprint recognition result, then sending the fingerprint recognition result subjected to digital signature to the mobile terminal, thereby finishing fingerprint recognition. According to the fingerprint recognition method and the mobile terminal, a fingerprint recognition process is maliciously tampered.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to a fingerprint identification method and a mobile terminal. Background technique [0002] With the rapid development of the mobile Internet, the trend of mobile payment as an important part of the payment field has become clear. Driven by the wave of mobile payment, the rapid rise of mobile payment not only brings convenience to consumers, but also leaves corresponding security risks. Among them, payment security has undoubtedly become one of the most concerned issues. [0003] As a way of identifying identity in mobile payment, fingerprint payment has been widely used in the field of mobile payment. The technical core of fingerprint payment is fingerprint identification technology, which belongs to biometric identification technology. Because it is not easy to copy, and there is no need to worry about being lost or forgotten, it has a higher security level than ordinar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/71
CPCG06F21/32G06F21/71
Inventor 廖兴保雷钊唐纯杰
Owner 维沃移动通信(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products