With the development of mobile terminals, fingerprint, gesture and other input methods have gradually replaced some of the traditional password, Apple has added fingerprint technology to the iphone 5S, and according to the latest news, Apple's new generation of the ipad will also be implanted in this function.
Fingerprint identification is a simple application direction of pattern recognition, based on the machine vision Image acquisition device, the fingerprint feature is established from the fingerprint gray image to calculate the local direction of the line, and then the fingerprint feature information is obtained, then the matching of the characteristic information in the database can be realized.
In view of such characteristics, the combination of fingerprint identification technology and cryptography, the biometric encryption technology has become a new direction of mobile Internet Encryption Protection application field. In addition to HTC, Samsung, Apple in the mobile terminal application of this technology, Alipay, such as Internet services to keep up with this wave, fingerprint identification began to pay a step closer to the move.
Focus: Security
The traditional cryptography technology does not make the Electronic business platform safe enough, no matter how complex the password, or in the form of fingerprint, facial features, as long as they send these features through the network can be interception or replication, and the storage of these characteristics of the server is also the risk of theft. From 2011 CSDN User data leaked, to 2014 a manufacturer of the community was hacked, users commonly used user name and corresponding password information, often hung online or on the black market secretly trading.
For users, the mechanism and mechanism of different fingerprint identification is a black box, people do not understand how it works behind. Lenovo Cloud Services Group Internet certification business director Tri Zhongyong said, in fact, the fingerprint mechanism can not upload anything related to personal information, fingerprints of this information are stored in the user's own mobile phone, in the running fingerprint identification, the acquisition of fingerprints and their mobile phone in the fingerprint surface to compare, Acknowledging your identity will send the authentication information to the server of the service concerned, which is only a confirmation of authentication.
At the same time, the fingerprint identification system for authentication exists in another independent operating system outside the operating system, which is developed by the trustonic of RAM investment, under which a trust zone that can not be cracked can be established to hold the related identity information. This approach is similar to the U-Shield of net silver, which holds important identity information in a separate system space and only acts as a comparison when acquiring identity information.
Tri Zhongyong said that the reason for its basic will not be cracked, on the one hand because the system is indeed relatively high confidentiality, on the other hand, even if the advanced hacking system, for hackers can only access to a user's personal information, and the breach of a Web site, compared to the cost of this attack is very high.
At present, Lenovo Cloud Service group in this mode to apply fingerprint technology to the Alipay platform, on the Samsung Galaxy S5, Alipay users can experience a quick payment through the user fingerprint, transfer the new function.
Scenario: Paying
According to the China Network retail market data Monitoring report, 2013 China's online retail transactions amounted to 1.8 trillion yuan, and this figure is still climbing, 2014 can be basically reached 2.8 trillion yuan. The current payment industry in terms of speed or scale, are in a big rise. The problem of payment security is also getting more and more attention, also let fingerprint identification technology has a natural use of the scene.
PayPal President David Marcus has predicted that in the next two years, the vast majority of high-end smartphones will have biometric technology features, and basically with fingerprint login function. This will be an important entry point for mobile payment. However, on the Android platform, the openness of the system leads to many unknown problems in the security issue.
Tri Zhongyong said that in the original mobile phone network silver, security and convenience is like a two-dimensional coordinates across the two or four quadrant of the line, that is, the more secure the less easy to use. In the landing site to set the password, there is a small box on the edge, the hint password is weak, strong, safe, you set the more complex, such as 6 digits + symbol + case is considered strong, but the user is difficult to remember. "The mobile internet itself is a convenient access to life, so there must be a need to address security and ease of use in terms of payment," he said.
But he admits that allowing the market to accept this change in technology requires not only the process of educating the user, but also the process of an educational service provider. He believes Alipay, the user-level product, will serve as an example, and Fido (Fast identification online), such as Google, Microsoft, PayPal, ebay (55.5, 0.39,-0.7%), ARM, Lenovo, etc. The alliance can also improve the market's recognition of fingerprint recognition from the point of view of product or terminal.
He disclosed that the current Apple has opened a part of the TouchID authority to third parties, but because of its own Apple system closed, the current experience of fingerprint service is not good, is actively communicating with Apple hope to facilitate the further opening to TouchID.
Tri Zhongyong predicts that the application of fingerprint recognition will have a qualitative leap by 2016. Because the technology is not very difficult, the most important factor is that the consciousness is not able to keep up. Many of the password completely clear in the event of the server is exposed, people will slowly realize that the traditional password is not very safe, but it is the biological authentication information stored in the local is the safest and most worthy of promotion of the model.
(Responsible editor: Mengyishan)