Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for implementing mobile terminal voice authentication by using trustzone technology

A mobile terminal and identity verification technology, applied in the field of mobile terminal voice identity verification, can solve the problems of increased design complexity, hidden information leakage, low processor efficiency, etc. Effect

Active Publication Date: 2022-05-17
SHANDONG UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current voice identity security authentication requires an external smart card or a dedicated security processor, which has low processor efficiency, increases the board area, increases design complexity, and reduces development efficiency
The security issues of identity verification of mobile terminals are the same as those of traditional computers. Viruses, malicious programs, Trojan horses, etc. infringe on terminals, resulting in crashes, hidden information leakage, and unknown cost increases.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing mobile terminal voice authentication by using trustzone technology
  • A method for implementing mobile terminal voice authentication by using trustzone technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] A kind of method that adopts TrustZone technology to realize mobile terminal voice authentication, such as figure 1 with figure 2 shown, including the following steps:

[0034] (1) When the user logs in to the system for the first time, the user accesses the identity authentication server to obtain the identity authentication credentials, and the result of no identity authentication credentials is obtained; the user logs in to the system and sends a request to the identity authentication server, which contains the user's unique Id, and expects the server to return Identity authentication credential, if there is no identity authentication credential corresponding to the user Id, the identity authentication credential of the user is initially encapsulated through steps (2)-(6).

[0035] (2) Obtain the dynamic voice template in the common domain, prompt the user to read the content of the dynamic voice template, and obtain the voice information of the user for the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for realizing mobile terminal voice authentication by using TrustZone technology. The method comprises the following steps: the user logs into the system for the first time, and completes the initial collection of the user's voice information; acquires the user's voice information for the second time, and encapsulates the user's voiceprint feature is the identity authentication credential, and the identity authentication credential and the user account are jointly reported to the identity authentication server. When the user logs in to the system again, the user's identity authentication credentials and the user's voice information are obtained, and the acquired user's voice information is encapsulated into temporary identity authentication credentials; the identity authentication credentials are compared with the temporary identity authentication credentials, and the identity authentication credentials are verified. The present invention encapsulates the voice information as an identity authentication credential in the trusted domain, avoids the leakage of the voiceprint features of the voice, and performs secondary security verification by using an encryption algorithm, and at the same time solves the problem of multiple voice acquisitions in the voice authentication process , which simplifies the voice acquisition process.

Description

technical field [0001] The invention relates to a method for realizing mobile terminal voice authentication by adopting TrustZone technology, which belongs to the field of mobile terminal identity authentication. Background technique [0002] TrustZone virtualizes each physical core into two cores in the architecture of the processor, namely the secure core (Secure Core) belonging to the secure execution environment Secure and the normal core (NormalCore) belonging to the non-secure execution environment Normal. In order to ensure the security of the system, the normal core (Normal Core) can only access non-secure system resources, while the secure core (Secure Core) can access all system resources, and the two virtual cores run in a time slice-based manner, according to Need to occupy the physical core in real time, and switch between the secure world and the non-secure world through the monitor mode (Monitor Mode), similar to the multi-application environment under the sam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/45G06F21/53G06F21/74
CPCG06F21/32G06F21/45G06F21/53G06F21/74G06F2221/2105
Inventor 戴鸿君王振东
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products