Unlock instant, AI-driven research and patent intelligence for your innovation.

Biological information verification method, biological information verification system and terminal

A technology of biological information and verification methods, applied in the terminal field, can solve the problem of stealing mobile phones, and achieve the effect of improving security

Inactive Publication Date: 2016-05-25
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when biometric technology is applied to mobile phones, malicious software or viruses developed by criminals may steal the biometric template data stored on the mobile phone, and then steal the information in the mobile phone after passing biometric authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological information verification method, biological information verification system and terminal
  • Biological information verification method, biological information verification system and terminal
  • Biological information verification method, biological information verification system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0036] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0037] figure 1 A flow chart of a biological information verification method according to an embodiment of the present invention is shown.

[0038] like figure 1 As shown, the biological informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a biological information authentication method, a biological information authentication system and a terminal. The biological information authentication method comprises the following steps: obtaining biological characteristic information according to a received biological information verification command; obtaining a plurality of stored biological characteristic composition information from a plurality of operation systems according to the biological information verification command; combining the multiple biological characteristic composition information through a preset restoration algorithm so as to obtain target biological characteristic information; judging whether the obtained biological characteristic information is consistent with the target biological characteristic information so as to determine whether the verification is successful according to the judging result. Through the technical scheme, the target biological characteristic information for verification is divided into multiple biological characteristic composition information so as to be stored in a plurality of operation systems, and different parts of biological characteristic composition information can be stored in different operation systems, so that the biological information verification security is furthermore enhanced.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a biological information verification method, a biological information verification system and a terminal. Background technique [0002] At present, biometric technology refers to a technology that uses human biological characteristics for identity authentication. Common biometric technology includes fingerprint recognition technology, face recognition technology, iris recognition technology, etc. Applying biometric technology to mobile phones and integrating biometric technology modules on mobile phones can effectively ensure the security of information on mobile phones. [0003] However, when biometric technology is applied to mobile phones, malicious software or viruses developed by criminals may steal the biometric template data stored on the mobile phone, and then steal the information in the mobile phone after passing biometric authentication. [0004] Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/45G06F21/62
CPCG06F21/32G06F21/45G06F21/6236
Inventor 钟焰涛傅文治谭中军
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD