WO2016061899A1 - 指纹解密方法及装置 - Google Patents

指纹解密方法及装置 Download PDF

Info

Publication number
WO2016061899A1
WO2016061899A1 PCT/CN2014/096070 CN2014096070W WO2016061899A1 WO 2016061899 A1 WO2016061899 A1 WO 2016061899A1 CN 2014096070 W CN2014096070 W CN 2014096070W WO 2016061899 A1 WO2016061899 A1 WO 2016061899A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprints
received
fingerprint
preset
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2014/096070
Other languages
English (en)
French (fr)
Inventor
郝奇毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Goodix Technology Co Ltd
Original Assignee
Shenzhen Huiding Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huiding Technology Co Ltd filed Critical Shenzhen Huiding Technology Co Ltd
Priority to EP14904349.9A priority Critical patent/EP3211560A4/en
Priority to KR1020167035498A priority patent/KR20170009933A/ko
Publication of WO2016061899A1 publication Critical patent/WO2016061899A1/zh
Priority to US15/383,036 priority patent/US10146983B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • the invention belongs to the technical field of fingerprint recognition, and in particular relates to a fingerprint decryption method and device.
  • mobile terminals such as smart phones
  • mobile terminals have more and more financial functions such as mobile payment, mobile wallet, etc.
  • mobile terminals store a lot of personal privacy and important data, so the security of mobile terminals sexuality raises higher requirements.
  • the method for encrypting the data of the mobile terminal is usually inputting a graphic password or a text password on the keyboard. This encryption method cannot identify the authenticity of the user. When the user uses it in public, it is easy to leak and the security is insufficient.
  • An object of the present invention is to provide a method and device for decrypting a fingerprint, which aims to solve the problem of poor data security of the existing mobile terminal.
  • the embodiment of the present invention is implemented by the method for decrypting a fingerprint, and the method includes the following steps:
  • N being an integer greater than or equal to 2;
  • the object to be decrypted is decrypted according to the received N fingerprints, and the object to be decrypted is encrypted by N fingerprints set in advance.
  • the received N fingerprints are different or partially identical, and the preset N fingerprints are different or partially identical.
  • the total input time of the received N fingerprints is less than or equal to a first preset threshold.
  • the input time interval of the received N fingerprints is less than or equal to a second preset threshold.
  • the decryption of the object to be decrypted according to the received N fingerprints is specifically:
  • the object to be decrypted is decrypted.
  • comparing the received N fingerprints with the preset N fingerprints is specifically:
  • the received N fingerprints and the preset N fingerprints are respectively matched one by one:
  • the received N fingerprints and the preset N fingerprints are matched one by one and are in the same order.
  • the invention also provides a fingerprint decryption device, the device comprising:
  • the receiving module is configured to receive the input N fingerprints, where N is an integer greater than or equal to 2;
  • the decryption module is configured to decrypt the object to be decrypted according to the received N fingerprints, and the object to be decrypted is encrypted by the N fingerprints set in advance.
  • the received N fingerprints are different or partially identical, and the preset N fingerprints are different or partially identical.
  • the total input time of the received N fingerprints is less than or equal to a first preset threshold.
  • the input time interval of the received N fingerprints is less than or equal to a second preset threshold.
  • the decryption module comprises:
  • a comparison unit configured to compare the received N fingerprints with the preset N fingerprints
  • the decryption unit is configured to decrypt the object to be decrypted when the received N fingerprints and the preset N fingerprints are respectively matched one by one.
  • the comparing unit is specifically configured to sequentially compare the received N fingerprints and the preset N fingerprints one by one;
  • the received N fingerprints and the preset N fingerprints are respectively matched one by one:
  • the received N fingerprints and the preset N fingerprints are matched one by one and are in the same order.
  • the embodiment of the present invention decrypts the object to be decrypted by using a fingerprint combination including two or more fingerprints, thereby improving the security of the data or application of the mobile terminal. And because of the special nature of the fingerprint, the user does not have to worry about being peeked by the surrounding people when inputting the fingerprint, which is very convenient for the user.
  • the embodiments of the present invention can be applied to all mobile terminals that recommend fingerprint sensors. Since mobile terminals such as tablets and smart phones on the market are generally equipped with fingerprint sensors, it is not necessary to add additional equipment to increase the cost.
  • FIG. 1 is a flowchart of a fingerprint decryption method according to Embodiment 1 of the present invention.
  • FIG. 2 is a structural diagram of a fingerprint decryption apparatus according to Embodiment 2 of the present invention.
  • FIG. 3 is a structural diagram of a decryption module in a fingerprint decryption apparatus according to Embodiment 2 of the present invention.
  • Embodiment 1 of the present invention provides a fingerprint decryption method. As shown in FIG. 1, the method in the first embodiment of the present invention includes the following steps:
  • S1 Receive N input fingerprints, and N is an integer greater than or equal to 2.
  • the decrypted object is decrypted by fingerprint combination, and the fingerprint combination includes two or more fingerprints, and other non-fingerprint encrypted information, such as numbers, letters, and the like, may be included.
  • N fingerprint encryption objects are preset, and the object to be decrypted is obtained and stored.
  • the embodiments of the present invention can be applied to any occasions requiring encryption and decryption, such as unlocking of a mobile terminal, account login, payment and switching of a working mode of a mobile terminal, an operating system, a wallpaper, a theme, and the like.
  • Objects to be decrypted include, but are not limited to, documents, folders, and application apps.
  • the input N fingerprints are received when decryption is required.
  • the received N fingerprints may be different or partially identical or all the same.
  • the security level of the object to be decrypted is the highest.
  • the total input time and/or input time interval of the N fingerprints may also be set in advance.
  • the input time interval of the received N fingerprints is set to be less than or equal to a second preset threshold.
  • the time interval of the two adjacent fingerprint input is greater than the second preset threshold, it is determined that the input multiple fingerprints do not belong to the same input, or it is determined that the fingerprint combination input at the time of decryption is different from the fingerprint combination input at the time of encryption.
  • the fingerprint input at the time of decryption and the fingerprint at the time of encryption are compared, and the matching criteria of the fingerprint input at the time of decryption and the fingerprint at the time of encryption may be defined in advance.
  • Fingerprint matching is performed on the basis that the number of received fingerprints is the same as the number of fingerprints set in advance. The fingerprint matching can be performed by using a prior art algorithm, and details are not described herein again.
  • the received N fingerprints and the preset N fingerprints are respectively matched one by one, the object to be decrypted is decrypted.
  • the N fingerprints match (when other encrypted information is included, other encrypted information also needs to be compared), and it is determined that the fingerprint combination input at the time of decryption is consistent with the fingerprint combination set at the time of encryption. If some of the N fingerprints set in advance are the same or all of the fingerprints are the same, the same number of times of the fingerprint may be set, without repeatedly setting the fingerprint.
  • the order of fingerprint input may be agreed.
  • the received N fingerprints and the preset N fingerprints are sequentially compared one by one, and when the received N fingerprints and the preset N fingerprints are matched one by one and the order is the same Decrypt the object to be decrypted. If the order of fingerprint input is strictly limited, the fingerprint combinations that match the N fingerprints, but the input order is different, are still determined to be inconsistent.
  • the decrypted object is decrypted by using a fingerprint combination including two or more fingerprints, thereby improving the security of the data or application of the mobile terminal.
  • a fingerprint combination including two or more fingerprints, thereby improving the security of the data or application of the mobile terminal.
  • the user does not have to worry about being peeked by the surrounding people when inputting the fingerprint, which is very convenient for the user.
  • the total input time, input time interval, and input order of the fingerprint combination can be limited to improve data security.
  • the first embodiment of the present invention can be applied to all mobile terminals that recommend fingerprint sensors. Since mobile terminals such as tablets and smart phones on the market are generally equipped with fingerprint sensors, it is not necessary to add additional equipment to increase the cost.
  • a second embodiment of the present invention provides a fingerprint decryption device, which may be a mobile terminal itself, or a device built in or externally connected to the mobile terminal. As shown in Figure 2, it includes:
  • the receiving module 10 receives the input N fingerprints, where N is an integer greater than or equal to 2;
  • the decryption module 30 decrypts the object to be decrypted according to the received N fingerprints, and the object to be decrypted is encrypted by N fingerprints set in advance.
  • the decryption module 30 includes:
  • the comparing unit 31 compares the received N fingerprints with the preset N fingerprints
  • the decryption unit 32 decrypts the object to be decrypted when the received N fingerprints and the N fingerprints set in advance are matched one by one.
  • the comparing unit 31 is further configured to sequentially compare the received N fingerprints and the preset N fingerprints one by one.
  • the decrypting unit 32 decrypts the decrypted object.
  • N fingerprint encryption objects are preset, and the object to be decrypted is obtained and stored.
  • the embodiments of the present invention can be applied to any occasions requiring encryption and decryption, such as unlocking of a mobile terminal, account login, payment and switching of a working mode of a mobile terminal, an operating system, a wallpaper, a theme, and the like.
  • Objects to be decrypted include, but are not limited to, documents, folders, and application apps.
  • the input N fingerprints are received when decryption is required.
  • N fingerprints are different, the security level of the object to be decrypted is the highest.
  • the total input time and/or input time interval of the N fingerprints may also be set in advance.
  • the input time interval of the received N fingerprints is set to be less than or equal to a second preset threshold.
  • the time interval of the two adjacent fingerprint input is greater than the second preset threshold, it is determined that the input multiple fingerprints do not belong to the same input, or it is determined that the fingerprint combination input at the time of decryption is different from the fingerprint combination input at the time of encryption.
  • the decryption module 30 compares the fingerprint input at the time of decryption with the fingerprint at the time of encryption, and can pre-define the matching criteria of the fingerprint input at the time of decryption and the fingerprint at the time of encryption. Fingerprint matching is performed on the basis that the number of received fingerprints is the same as the number of fingerprints set in advance. The fingerprint matching can be performed by using a prior art algorithm, and details are not described herein again. When the received N fingerprints and the preset N fingerprints are respectively matched one by one, the object to be decrypted is decrypted.
  • the N fingerprints match (when other encrypted information is included, other encrypted information also needs to be compared), and it is determined that the fingerprint combination input at the time of decryption is consistent with the fingerprint combination set at the time of encryption. If some of the N fingerprints set in advance are the same or all of the fingerprints are the same, the same number of times of the fingerprint may be set, without repeatedly setting the fingerprint.
  • the order of fingerprint input may be agreed.
  • the comparing unit 31 sequentially compares the received N fingerprints and the preset N fingerprints one by one, when the received N fingerprints and the preset N
  • the decryption unit 32 decrypts the decrypted object when the fingerprints are matched one by one and the order is identical. If the order of fingerprint input is strictly limited, the fingerprint combinations that match the N fingerprints, but the input order is different, are still determined to be inconsistent.
  • the decrypted object is decrypted by using a fingerprint combination including two or more fingerprints, thereby greatly improving the security of the mobile terminal data or application.
  • a fingerprint combination including two or more fingerprints, thereby greatly improving the security of the mobile terminal data or application.
  • the user does not have to worry about being peeked by the surrounding people when inputting the fingerprint, which is very convenient for the user.
  • the total input time, input time interval, and input order of the fingerprint combination can be limited to improve data security.
  • the device of the second embodiment of the present invention can be applied to all mobile terminals that recommend fingerprint sensors. Since mobile terminals such as tablets and smart phones on the market are generally equipped with fingerprint sensors, it is not necessary to add additional equipment to increase the cost.
  • the embodiment of the present invention decrypts the object to be decrypted by using a fingerprint combination including two or more fingerprints, thereby improving the security of the data or application of the mobile terminal. And because of the special nature of the fingerprint, the user does not have to worry about being peeked by the surrounding people when inputting the fingerprint, which is very convenient for the user.
  • the embodiments of the present invention can be applied to all mobile terminals that recommend fingerprint sensors. Since mobile terminals such as tablets and smart phones on the market are generally equipped with fingerprint sensors, it is not necessary to add additional equipment to increase the cost.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Artificial Intelligence (AREA)
  • Medical Informatics (AREA)
  • Evolutionary Computation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

一种指纹解密方法及装置,所述方法包括如下步骤:接收输入的N个指纹,N为大于等于2的整数(S1);根据接收的N个指纹对待解密对象进行解密,所述待解密对象由预先设置的N个指纹加密(S2)。通过包括2个或2个以上指纹的指纹组合对待解密对象进行解密,提高了移动终端的数据安全性。

Description

指纹解密方法及装置 技术领域
本发明属于指纹识别技术领域,尤其涉及一种指纹解密方法及装置。
背景技术
近年,随着智能手机等移动终端的应用逐渐丰富,移动终端具有越来越多的金融功能如移动支付、手机钱包等,移动终端里存储有许多个人隐私和重要数据,因此对移动终端的安全性提出了更高的要求。
目前对移动终端的数据进行加密的方法通常是在键盘输入图文密码或文字密码,这种加密方法无法识别用户的真伪,当用户在公众场合使用时,极易泄密,安全性不足。
发明内容
本发明实施例的目的在于提供一种指纹解密方法及装置,旨在解决现有的移动终端数据安全性差的问题。
本发明实施例是这样实现的,一种指纹解密方法,所述方法包括如下步骤:
接收输入的N个指纹,N为大于等于2的整数;
根据接收的N个指纹对待解密对象进行解密,待解密对象由预先设置的N个指纹加密。
优选地,接收的N个指纹各不相同或者部分相同,预先设置的N个指纹各不相同或者部分相同。
优选地,接收的N个指纹的输入总时间小于等于第一预设阈值。
优选地,接收的N个指纹的输入时间间隔小于等于第二预设阈值。
优选地,根据接收的N个指纹对待解密对象进行解密具体为:
将接收的N个指纹和预先设置的N个指纹进行比较;
当接收的N个指纹和预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
优选地,将接收的N个指纹和预先设置的N个指纹进行比较具体为:
依次逐一比较接收的N个指纹和预先设置的N个指纹;
接收的N个指纹和预先设置的N个指纹分别一一匹配具体为:
接收的N个指纹和预先设置的N个指纹分别一一匹配并且顺序一致。
本发明还提出一种指纹解密装置,所述装置包括:
接收模块,设置为接收输入的N个指纹,N为大于等于2的整数;
解密模块,设置为根据接收的N个指纹对待解密对象进行解密,待解密对象由预先设置的N个指纹加密。
优选地,接收的N个指纹各不相同或者部分相同,预先设置的N个指纹各不相同或者部分相同。
优选地,接收的N个指纹的输入总时间小于等于第一预设阈值。
优选地,接收的N个指纹的输入时间间隔小于等于第二预设阈值。
优选地,解密模块包括:
比较单元,设置为将接收的N个指纹和预先设置的N个指纹进行比较;
解密单元,设置为当接收的N个指纹和预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
优选地,比较单元具体设置为依次逐一比较接收的N个指纹和预先设置的N个指纹;
接收的N个指纹和预先设置的N个指纹分别一一匹配具体为:
接收的N个指纹和预先设置的N个指纹分别一一匹配并且顺序一致。
本发明实施例通过包括2个或2个以上指纹的指纹组合对待解密对象进行解密,提高了移动终端数据或应用的安全性。且由于指纹的特殊性,用户在输入指纹时不必担心被周围的人偷窥,对于用户来说十分方便。本发明实施例可应用于所有推荐指纹传感器的移动终端,由于目前市场上的平板、智能手机等移动终端普通安装有指纹传感器,因此无需增加成本设置额外设备即可实现。
附图说明
图1是本发明实施例一提供的指纹解密方法的流程图;
图2是本发明实施例二提供的指纹解密装置的结构图;
图3是本发明实施例二提供的指纹解密装置中解密模块的结构图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅 仅用以解释本发明,并不用于限定本发明。
实施例一
本发明实施例一提出一种指纹解密方法。如图1所示,本发明实施例一的方法包括步骤:
S1、接收输入的N个指纹输入,N为大于等于2的整数。
本发明实施例一通过指纹组合对待解密对象进行解密,该指纹组合包括2个或2个以上的指纹,除此之外,还可以包括其它非指纹的加密信息,如数字、字母等。
S2、根据接收的N个指纹对待解密对象进行解密,所述待解密对象由预先设置的N个指纹加密。
在本发明实施例中,预先设置N个指纹加密对象,得到待解密对象并存储。本发明实施例可以应用于任何需要加密解密的场合,如移动终端解锁、账号登录、支付和切换移动终端的工作模式、操作系统,壁纸、主题等。待解密对象包括但不限于文档、文件夹和应用APP。
相应地,需解密时接收输入的N个指纹。接收的N个指纹可以各不相同或者部分相同或者全部相同,同样,预先设置的N个指纹可以各不相同或者部分相同或者全部相同。如在指纹传感器上输入两次右手小指指纹(N=2),也可以分别输入左手拇指指纹和右手食指指纹,甚至是分别输入两个人的指纹。当N个指纹各不相同时,待解密对象的安全级别最高。
进一步地,还可预先设置N个指纹的输入总时间和/或输入时间间隔。
设置接收的N个指纹的输入总时间小于等于第一预设阈值。当输入指纹组合的总时间大于第一预设阈值,判定为输入的指纹不属于同一次输入(如输入 超过10秒,认为10秒后输入的指纹不属于本次解密输入的指纹内容),
设置接收的N个指纹的输入时间间隔小于等于第二预设阈值。当相邻两次指纹输入的时间间隔大于第二预设阈值时,判定输入的多个指纹不属于同一次输入,或判定解密时输入的指纹组合与加密时输入的指纹组合不同。
在本发明实施例中,比较解密时的指纹输入与加密时的指纹,可预先定义解密时的指纹输入与加密时的指纹的匹配标准。在接收的指纹个数与预先设置的指纹个数相同的基础上,进行指纹匹配,指纹匹配可采用现有技术的算法,在此不再赘述。当接收的N个指纹和预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
在本发明实施例中,N个指纹均匹配时(当包含其它加密信息时,其它加密信息同样需要进行比较),判定解密时输入的指纹组合与加密时设置的指纹组合一致。若预先设置的N个指纹中有部分指纹相同或者全部指纹相同,也可以设置该指纹的相同次数,而不需要重复设置该指纹。
进一步地,可以约定指纹输入的顺序,解密时,依次逐一比较接收的N个指纹和预先设置的N个指纹,当接收的N个指纹和预先设置的N个指纹分别一一匹配并且顺序一致时,对待解密对象进行解密。如严格限定指纹输入的顺序,则对于N个指纹均匹配的指纹组合,但其输入顺序不同,仍判定为不一致。
本发明实施例一通过包括2个或2个以上指纹的指纹组合对待解密对象进行解密,提高了移动终端数据或应用的安全性。且由于指纹的特殊性,用户在输入指纹时不必担心被周围的人偷窥,对于用户来说十分方便。另外,可以对指纹组合的输入总时间、输入时间间隔和输入顺序加以限制,提高数据的安全性。
本发明实施例一可应用于所有推荐指纹传感器的移动终端,由于目前市场上的平板、智能手机等移动终端普通安装有指纹传感器,因此无需增加成本设置额外设备即可实现。
实施例二
本发明实施例二提出一种指纹解密装置,该装置可以是移动终端本身,也可以是移动终端内置或外接的一装置。如图2所示,包括:
接收模块10,接收输入的N个指纹,N为大于等于2的整数;
解密模块30,根据接收的N个指纹对待解密对象进行解密,待解密对象由预先设置的N个指纹加密。
进一步地,如图3所示,解密模块30包括:
比较单元31,将接收的N个指纹和预先设置的N个指纹进行比较;
解密单元32,当接收的N个指纹和预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
比较单元31还具体用于依次逐一比较接收的N个指纹和预先设置的N个指纹。
当接收的N个指纹和预先设置的N个指纹分别一一匹配并且顺序一致时,解密单元32对待解密对象进行解密。
在本发明实施例中,预先设置N个指纹加密对象,得到待解密对象并存储。本发明实施例可以应用于任何需要加密解密的场合,如移动终端解锁、账号登录、支付和切换移动终端的工作模式、操作系统,壁纸、主题等。待解密对象包括但不限于文档、文件夹和应用APP。
相应地,需解密时接收输入的N个指纹。接收的N个指纹可以各不相同或 者部分相同或者全部相同,同样,预先设置的N个指纹可以各不相同或者部分相同或者全部相同。如在指纹传感器上输入两次右手小指指纹(N=2),也可以分别输入左手拇指指纹和右手食指指纹,甚至是分别输入两个人的指纹。当N个指纹各不相同时,待解密对象的安全级别最高。
进一步地,还可预先设置N个指纹的输入总时间和/或输入时间间隔。
设置接收的N个指纹的输入总时间小于等于第一预设阈值。当输入指纹组合的总时间大于第一预设阈值,判定为输入的指纹不属于同一次输入(如输入超过10秒,认为10秒后输入的指纹不属于本次解密输入的指纹内容),
设置接收的N个指纹的输入时间间隔小于等于第二预设阈值。当相邻两次指纹输入的时间间隔大于第二预设阈值时,判定输入的多个指纹不属于同一次输入,或判定解密时输入的指纹组合与加密时输入的指纹组合不同。
在本发明实施例中,解密模块30比较解密时的指纹输入与加密时的指纹,可预先定义解密时的指纹输入与加密时的指纹的匹配标准。在接收的指纹个数与预先设置的指纹个数相同的基础上,进行指纹匹配,指纹匹配可采用现有技术的算法,在此不再赘述。当接收的N个指纹和预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
在本发明实施例中,N个指纹均匹配时(当包含其它加密信息时,其它加密信息同样需要进行比较),判定解密时输入的指纹组合与加密时设置的指纹组合一致。若预先设置的N个指纹中有部分指纹相同或者全部指纹相同,也可以设置该指纹的相同次数,而不需要重复设置该指纹。
进一步地,可以约定指纹输入的顺序,解密时,比较单元31依次逐一比较接收的N个指纹和预先设置的N个指纹,当接收的N个指纹和预先设置的N 个指纹分别一一匹配并且顺序一致时,解密单元32对待解密对象进行解密。如严格限定指纹输入的顺序,则对于N个指纹均匹配的指纹组合,但其输入顺序不同,仍判定为不一致。
本发明实施例二通过包括2个或2个以上指纹的指纹组合对待解密对象进行解密,极大地提高了移动终端数据或应用的安全性。且由于指纹的特殊性,用户在输入指纹时不必担心被周围的人偷窥,对于用户来说十分方便。另外,可以对指纹组合的输入总时间、输入时间间隔和输入顺序加以限制,提高数据的安全性。
本发明实施例二的装置可应用于所有推荐指纹传感器的移动终端,由于目前市场上的平板、智能手机等移动终端普通安装有指纹传感器,因此无需增加成本设置额外设备即可实现。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。
工业实用性
本发明实施例通过包括2个或2个以上指纹的指纹组合对待解密对象进行解密,提高了移动终端数据或应用的安全性。且由于指纹的特殊性,用户在输入指纹时不必担心被周围的人偷窥,对于用户来说十分方便。本发明实施例可应用于所有推荐指纹传感器的移动终端,由于目前市场上的平板、智能手机等移动终端普通安装有指纹传感器,因此无需增加成本设置额外设备即可实现。

Claims (12)

  1. 一种指纹解密方法,所述方法包括:
    接收输入的N个指纹,N为大于等于2的整数;
    根据接收的N个指纹对待解密对象进行解密,所述待解密对象由预先设置的N个指纹加密。
  2. 如权利要求1所述的方法,其中,接收的N个指纹各不相同或者部分相同,所述预先设置的N个指纹各不相同或者部分相同。
  3. 如权利要求1所述的方法,其中,接收的N个指纹的输入总时间小于等于第一预设阈值。
  4. 如权利要求1所述的方法,其中,接收的N个指纹的输入时间间隔小于等于第二预设阈值。
  5. 如权利要求1-4任一项所述的方法,其中,所述根据接收的N个指纹对待解密对象进行解密具体为:
    将接收的N个指纹和所述预先设置的N个指纹进行比较;
    当接收的N个指纹和所述预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
  6. 如权利要求5所述的方法,其中,
    所述将接收的N个指纹和所述预先设置的N个指纹进行比较具体为:
    依次逐一比较接收的N个指纹和所述预先设置的N个指纹;
    所述接收的N个指纹和所述预先设置的N个指纹分别一一匹配具体为:
    接收的N个指纹和所述预先设置的N个指纹分别一一匹配并且顺序一致。
  7. 一种指纹解密装置,所述装置包括:
    接收模块,设置为接收输入的N个指纹,N为大于等于2的整数;
    解密模块,设置为根据接收的N个指纹对待解密对象进行解密,所述待解密对象由预先设置的N个指纹加密。
  8. 如权利要求7所述的装置,其中,接收的N个指纹各不相同或者部分相同,所述预先设置的N个指纹各不相同或者部分相同。
  9. 如权利要求7所述的装置,其中,接收的N个指纹的输入总时间小于等于第一预设阈值。
  10. 如权利要求7所述的装置,其中,接收的N个指纹的输入时间间隔小于等于第二预设阈值。
  11. 如权利要求7-10任一项所述的装置,其中,所述解密模块包括:
    比较单元,设置为将接收的N个指纹和所述预先设置的N个指纹进行比较;
    解密单元,设置为当接收的N个指纹和所述预先设置的N个指纹分别一一匹配时,对待解密对象进行解密。
  12. 如权利要求11所述的装置,其中,
    所述比较单元具体设置为依次逐一比较接收的N个指纹和所述预先设置的N个指纹;
    所述接收的N个指纹和所述预先设置的N个指纹分别一一匹配具体为:
    接收的N个指纹和所述预先设置的N个指纹分别一一匹配并且顺序一致。
PCT/CN2014/096070 2014-10-20 2014-12-31 指纹解密方法及装置 Ceased WO2016061899A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP14904349.9A EP3211560A4 (en) 2014-10-20 2014-12-31 Fingerprint decryption method and device
KR1020167035498A KR20170009933A (ko) 2014-10-20 2014-12-31 지문을 이용한 암호 해제 방법 및 장치
US15/383,036 US10146983B2 (en) 2014-10-20 2016-12-19 Fingerprint decryption method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2014105597220 2014-10-20
CN201410559722.0A CN104331653A (zh) 2014-10-20 2014-10-20 指纹解密方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/383,036 Continuation US10146983B2 (en) 2014-10-20 2016-12-19 Fingerprint decryption method and device

Publications (1)

Publication Number Publication Date
WO2016061899A1 true WO2016061899A1 (zh) 2016-04-28

Family

ID=52406375

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/096070 Ceased WO2016061899A1 (zh) 2014-10-20 2014-12-31 指纹解密方法及装置

Country Status (5)

Country Link
US (1) US10146983B2 (zh)
EP (1) EP3211560A4 (zh)
KR (1) KR20170009933A (zh)
CN (1) CN104331653A (zh)
WO (1) WO2016061899A1 (zh)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9639687B2 (en) 2014-11-18 2017-05-02 Cloudfare, Inc. Multiply-encrypting data requiring multiple keys for decryption
CN105989257A (zh) * 2015-02-09 2016-10-05 深圳富泰宏精密工业有限公司 自动提交用户信息的系统及方法
CN105049405A (zh) * 2015-05-27 2015-11-11 北京交通大学 基于组合指纹的密钥生成单元及方法、认证系统和设备
CN104951687A (zh) * 2015-07-21 2015-09-30 上海斐讯数据通信技术有限公司 一种指纹解锁的方法及系统
CN106407829A (zh) * 2015-07-30 2017-02-15 宇龙计算机通信科技(深圳)有限公司 基于指纹识别对文件进行加密的方法、装置及移动终端
CN105631282A (zh) * 2015-07-31 2016-06-01 宇龙计算机通信科技(深圳)有限公司 电子设备的操作方法及装置
CN105095722A (zh) * 2015-08-25 2015-11-25 宇龙计算机通信科技(深圳)有限公司 一种移动终端的指纹验证方法及系统
CN105373737B (zh) * 2015-10-10 2018-09-04 广东欧珀移动通信有限公司 一种应用加密方法及移动终端
CN105260643A (zh) * 2015-10-30 2016-01-20 南昌欧菲生物识别技术有限公司 多指纹交叉解锁方法及系统
CN105426727B (zh) * 2015-12-17 2019-02-05 Oppo广东移动通信有限公司 指纹解密方法及移动终端
CN105630295B (zh) * 2015-12-30 2018-05-29 广东欧珀移动通信有限公司 桌面切换控制的方法和用户终端
CN106127004B (zh) * 2016-06-21 2019-04-05 Oppo广东移动通信有限公司 一种文件处理方法及终端设备
CN106326708A (zh) * 2016-08-26 2017-01-11 广东欧珀移动通信有限公司 移动终端的控制方法以及装置
CN108108626A (zh) * 2016-11-25 2018-06-01 深圳指芯智能科技有限公司 一种资料信息分级处理方法及装置
CN107438847A (zh) * 2017-06-16 2017-12-05 深圳市汇顶科技股份有限公司 指纹识别的方法、装置和设备
CN108109242B (zh) * 2017-12-21 2020-08-14 广东汇泰龙科技股份有限公司 一种基于指纹开锁的硬件加密方法、系统、智能云锁
CN107918729A (zh) * 2017-12-25 2018-04-17 仲杏英 防盗指纹解锁系统
CN108833106A (zh) * 2018-04-27 2018-11-16 上海市城市建设设计研究总院(集团)有限公司 指纹加密方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340285A (zh) * 2007-07-05 2009-01-07 杭州中正生物认证技术有限公司 利用指纹USBkey进行身份验证的方法及系统
CN102279923A (zh) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 一种提高加密级别的多指纹加密方法
CN103294963A (zh) * 2012-02-28 2013-09-11 富泰华工业(深圳)有限公司 电子装置及其基于指纹识别的资料保护系统和方法
US20140003681A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Zero Enrollment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5933515A (en) * 1996-07-25 1999-08-03 California Institute Of Technology User identification through sequential input of fingerprints
US8284025B2 (en) * 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US7303120B2 (en) * 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB
CA2901250A1 (en) * 2002-07-12 2004-01-22 Apple Inc. Personal authentication software and systems for travel privilege assignation and verification
US20100138667A1 (en) * 2008-12-01 2010-06-03 Neil Patrick Adams Authentication using stored biometric data
US20100246902A1 (en) * 2009-02-26 2010-09-30 Lumidigm, Inc. Method and apparatus to combine biometric sensing and other functionality
US8873814B2 (en) * 2011-11-18 2014-10-28 Ca, Inc. System and method for using fingerprint sequences for secured identity verification
CN111178332A (zh) * 2012-05-18 2020-05-19 苹果公司 用于操纵用户界面的设备、方法和图形用户界面
US20140189604A1 (en) * 2013-01-03 2014-07-03 International Business Machines Corporation Method and system for unlocking a touchscreen of an electronic device
US9223937B2 (en) * 2013-09-17 2015-12-29 Google Technology Holdings LLC Method and apparatus for extending an authentication timeout period

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340285A (zh) * 2007-07-05 2009-01-07 杭州中正生物认证技术有限公司 利用指纹USBkey进行身份验证的方法及系统
CN102279923A (zh) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 一种提高加密级别的多指纹加密方法
CN103294963A (zh) * 2012-02-28 2013-09-11 富泰华工业(深圳)有限公司 电子装置及其基于指纹识别的资料保护系统和方法
US20140003681A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Zero Enrollment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3211560A4 *

Also Published As

Publication number Publication date
EP3211560A1 (en) 2017-08-30
US20170103250A1 (en) 2017-04-13
CN104331653A (zh) 2015-02-04
KR20170009933A (ko) 2017-01-25
US10146983B2 (en) 2018-12-04
EP3211560A4 (en) 2018-05-23

Similar Documents

Publication Publication Date Title
WO2016061899A1 (zh) 指纹解密方法及装置
US9888382B2 (en) Mobile data communication using biometric encryption
EP3257194B1 (en) Systems and methods for securely managing biometric data
CN103955982A (zh) 一种随时间变化的动态二维码门禁识别方法及装置
CN104915584B (zh) 基于指纹特征的智能移动终端随机加解密系统
CN105760764A (zh) 一种嵌入式存储设备文件的加解密方法、装置及终端
WO2012097362A2 (en) Protecting codes, keys and user credentials with identity and patterns
CN103606047A (zh) 密码管理系统
CN105069335A (zh) 一种密码设置方法、验证方法和终端
CN102883050A (zh) 移动终端及其解锁方法
CN107395589A (zh) 指纹信息获取方法及终端
CN106487758B (zh) 一种数据安全签名方法、业务终端以及私钥备份服务器
KR101052294B1 (ko) 콘텐츠 보안 장치 및 콘텐츠 보안 방법
CN205788194U (zh) 一种云端和本地安全存储数据和文件的装置
CN104915583A (zh) 一种界面解密处理的方法及移动终端
CN105426727A (zh) 指纹解密方法及移动终端
KR102375973B1 (ko) 사례기반 추론엔진을 이용한 보안 서버 및 보안 기능의 설치를 위한 저장 매체
US10771970B2 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
US9432186B2 (en) Password-based key derivation without changing key
CN106557708B (zh) 一种安全保护方法和系统
CN105847261A (zh) 一种基于蓝牙无线加解密的电子签章方法
CN103945047A (zh) 安全手机的数据保密方法
CN103945381B (zh) 移动终端中基于外部安全模块实现身份验证的系统及方法
TW201612786A (en) Encrypted authentication method of mobile device with signature gesture verification
CN103619015A (zh) 一种利用移动终端进行信息验证的方法、装置和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14904349

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 20167035498

Country of ref document: KR

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2014904349

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE