Security chip, authentication method based on biological features and intelligent terminal

A security chip and biometric technology, applied in the field of information security, can solve problems such as the theft of fingerprint information by criminals, and achieve the effect of improving information security and reducing the possibility of theft

Pending Publication Date: 2016-11-23
NATIONZ TECH INC
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method improves the security of mobile payment, in the process of payment execution, the transmission, storage and authentication of fingerprints are all carried out in an ordinary software and hardware environment, which may be attacked by malicious software, Trojan horses and viruses. The possibility of fingerprint information may also be stolen by criminals, there is still a greater risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip, authentication method based on biological features and intelligent terminal
  • Security chip, authentication method based on biological features and intelligent terminal
  • Security chip, authentication method based on biological features and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] A biometric-based authentication method comprising:

[0040] Step 101. Obtain the biometric feature of the operator corresponding to the operation authority.

[0041] Step 102. Sending and storing the acquired information of the operator's biometric feature in the security chip, and establishing a correspondence between the operation authority and the biometric feature.

[0042] Step 103. Obtain the biometrics of the operator requesting the operation authority.

[0043] Step 104. Whether the biometrics of the operator acquired by the security chip authentication corresponds to the operation authority, if yes, go to step 105, if not, go to step 106.

[0044] Step 105. Obtain operation authorization through authentication.

[0045] Step 106. The authentication is not passed, and the operation authorization is not obtained.

[0046]The beneficial effects of the present invention are as follows: after the biometric feature is collected, it is directly sent to the securit...

Embodiment 2

[0057] A biometric-based authentication method comprising:

[0058] Step 201. Obtain the biometric feature of the operator corresponding to the operation authority.

[0059] Step 202. Send and store the obtained information of the operator's biometric feature in a third-party platform, and establish a correspondence between the operation authority and the biometric feature.

[0060] Step 203. Obtain the biometrics of the operator requesting the operation authority.

[0061] Step 204. The security chip acquires and decrypts the biometric information stored on the third-party platform.

[0062] Step 205. Whether the biometric feature of the operator acquired by the security chip authentication corresponds to the operation authority, if yes, go to step 206, if not, go to step 207.

[0063] Step 206. Obtain operation authorization through authentication.

[0064] Step 207. The authentication is not passed, and the operation authorization is not obtained.

[0065] The beneficia...

Embodiment 3

[0078] Embodiment 3 of an authentication method based on biometric features of the present invention is introduced.

[0079] In this embodiment, the smart terminal is a smart phone, and the biometric feature is a fingerprint feature. The smart terminal includes a fingerprint security authentication module, and the smart terminal completes the identity authentication of the operator through the fingerprint security authentication module.

[0080] In this embodiment, include:

[0081] Step 301: The mobile phone starts up and enters the operator registration module.

[0082] Step 302: The fingerprint security authentication module collects the fingerprint information of the operator through the fingerprint sensor.

[0083] Step 303. The fingerprint security authentication module or the fingerprint sensor itself extracts fingerprint feature data for the operator's fingerprint information collected by the fingerprint sensor.

[0084] Step 304. The fingerprint feature data is stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security chip which comprises a storage unit, a relation establishing unit and a judging unit. The storage unit is used for storing biological feature information of an operator with operation authority, the relation establishing unit is used for establishing the corresponding relation between the biological feature information and the operation authority of the operator, and the judging unit is used for judging whether the biological feature information for requesting for the operation authority corresponds to the operation authority or not. The security chip independently stores and verifies the corresponding relation between the biological feature information and the operation authority, an intelligent terminal process does not store the biological feature information, and the probability that the biological feature information is stolen by lawbreakers is greatly reduced; the security chip can independently carry out the authentication service of the biological features collected subsequently, the intelligent terminal process does not need to participate, the probability that an authentication system is damaged by malicious software, wooden horses and viruses is greatly reduced, and information security is greatly improved. The invention further provides an authentication method based on the biological features and an intelligent terminal capable of achieving authentication based on the biological features.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security chip, an authentication method based on biometric features and an intelligent terminal. Background technique [0002] With the development of science and technology, the penetration rate of electronic equipment is getting higher and higher, and smart terminal equipment has become an indispensable part of our daily work and life. Mobile smart terminals, vehicle-mounted smart terminals, smart TVs, smart wearable devices, etc. bring great convenience to our work and life, and greatly improve our work and living standards. [0003] However, as smart terminal devices are more and more deeply integrated into our work and life, from simple entertainment to complex information processing, from initial bank account information viewing to remote payment involving high confidentiality and high security, mobile Payment, whether the information security of smart termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/34
Inventor 赵磊
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products