Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint recognition system

A technology of fingerprint sensor and fingerprint algorithm, which is applied in the field of fingerprint identification, can solve problems such as embezzlement of fingerprint algorithm library, and achieve the effect of avoiding embezzlement and increasing security

Active Publication Date: 2021-12-21
SHENZHEN GOODIX TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most fingerprint sensor manufacturers will develop their own fingerprint algorithm library, and the fingerprint sensor and the fingerprint algorithm library will be sold together. Due to the difference in R&D strength, the performance of the algorithm and the fingerprint sensor will be different, so there will be some fingerprint sensor manufacturers speculatively. The output data of the sensor is imitated to be consistent with the sensor manufacturer's sensor with high algorithm performance, thereby embezzling the fingerprint algorithm library with high performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint recognition system
  • Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint recognition system
  • Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] see image 3 and Figure 4 ,in image 3 It is a schematic diagram of the first embodiment of a binding authentication method between a fingerprint algorithm library and a fingerprint sensor provided by the present invention, Figure 4 Yes image 3 A schematic flow chart of the binding authentication method shown. The binding authentication method of the fingerprint algorithm library and the fingerprint sensor comprises the following steps:

[0053] S11, the HOST side generates random data Random1 every time authentication is performed. The random data Random1 can be generated according to parameters such as time, which is not limited in this embodiment;

[0054] S12. The HOST uses the first encryption key KEY_En1 to encrypt the random data Random1 to obtain the first encrypted data Random_En1;

[0055] Specifically, the fingerprint algorithm library at the HOST side can perform the first encryption process on the random data Random1 generated in step S11 through i...

Embodiment 2

[0074] see Figure 5 and Image 6 ,in Figure 5 It is a schematic diagram of the second embodiment of a binding authentication method of a fingerprint algorithm library and a fingerprint sensor provided by the present invention, Image 6 Yes Figure 5 A schematic flow chart of the binding authentication method shown. Compared with Embodiment 1, the main difference of Embodiment 2 is that the HOST end directly provides the random data Random1 generated by it to the fingerprint sensor, without performing the first encryption process on the random data Random1 data, that is, the HOST end is connected with the fingerprint sensor The data written on the data interface between them is plain text. like Figure 7 and Figure 8 As shown, the binding authentication method of the fingerprint algorithm library and the fingerprint sensor provided in this embodiment includes the following steps:

[0075] S21. During each authentication, the HOST end generates random data Random1.

...

Embodiment 3

[0088] like Figure 7 As shown, this embodiment also provides a fingerprint identification system, the fingerprint identification system corresponds to Embodiment 1 of the binding authentication method between the fingerprint algorithm library and the fingerprint sensor, which includes a HOST terminal 710 and The fingerprint sensor 720, the HOST terminal 710 and the fingerprint sensor 720 are connected to each other through the data interface between them and perform data transmission. in,

[0089] The HOST terminal 710 includes:

[0090] Random number generation unit 711, which is used to generate random data Random1;

[0091] The first encryption unit 712 is used to encrypt the random data Random1 using the first encryption key KEY_En1 to obtain the first encrypted data Random_En1; wherein the first encryption unit 712 can use a preset first encryption function to The random data Random1 is encrypted.

[0092] The first communication unit 713 is configured to transmit th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A binding authentication method of a fingerprint algorithm library and a fingerprint sensor and a fingerprint identification system, the binding authentication method of the fingerprint algorithm library and a fingerprint sensor comprises the following steps: a host terminal generates random data; the fingerprint sensor obtains the random data, and The random data is encrypted to obtain encrypted data; the host terminal reads the encrypted data from the fingerprint sensor, and decrypts the encrypted data to obtain decrypted data; the host terminal compares the random data with the Whether the decrypted data is consistent, and when they are consistent, it is judged that the binding authentication between the fingerprint algorithm library and the fingerprint sensor is successful. The above-mentioned binding authentication method between the fingerprint algorithm library and the fingerprint sensor makes the fingerprint algorithm library of the same manufacturer must cooperate with its own fingerprint sensor to be used. Otherwise, the algorithm cannot work normally if you use your own algorithm with other manufacturers’ fingerprint sensors to avoid being stolen. .

Description

technical field [0001] The invention relates to the technical field of fingerprint identification, in particular to a binding authentication method of a fingerprint algorithm library and a fingerprint sensor and a fingerprint identification system. Background technique [0002] With the continuous development of fingerprint identification technology, fingerprint identification technology is more and more widely used in smart phones and other industries. The fingerprint identification system is basically composed of HOST terminal, fingerprint application unit, fingerprint algorithm library, and fingerprint sensor. Among them, the fingerprint sensor is responsible for collecting fingerprint data; the HOST end, such as a mobile phone and other hosts using fingerprint applications; the underlying driver of the HOST end is responsible for interacting with the fingerprint sensor through the interface driver and reading the fingerprint data collected by the fingerprint sensor; the f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/32
Inventor 胡荣英
Owner SHENZHEN GOODIX TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products