CN101072100A - Authenticating system and method utilizing reliable platform module - Google Patents
Authenticating system and method utilizing reliable platform module Download PDFInfo
- Publication number
- CN101072100A CN101072100A CNA2006100802794A CN200610080279A CN101072100A CN 101072100 A CN101072100 A CN 101072100A CN A2006100802794 A CNA2006100802794 A CN A2006100802794A CN 200610080279 A CN200610080279 A CN 200610080279A CN 101072100 A CN101072100 A CN 101072100A
- Authority
- CN
- China
- Prior art keywords
- condition code
- biological condition
- user biological
- tpm
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The authentication system includes an application program module, a TSP module, a TCS module, a TPM driver module, and TPM. The system also includes a biological feature recognition device, which connected to TPM and TSP modules is in use for obtaining user's biological features. Moreover, based on user's biological features, the method forms user's biological feature code as well as based on user's biological features, the method also searches matched user's biological feature code. TPM is in use for obtaining user's biological feature code, and decides whether TPM operation is executed or not based on result of validating user's biological feature code. The invention introduces biological feature recognition into TPM. Since biological feature code possesses uniqueness, the invention possesses feature of high security. The method is convenient because users do not need to memorize owner and secret information of cipher key.
Description
Technical field
The present invention relates to the safe practice of computer system, particularly a kind of technology of the user of computer system being carried out safety certification.
Background technology
For the purpose of safety, existing computer system (for example notebook computer, desktop computer etc.) all authenticates the computer user when the user lands, only under the consistent situation of the authentication information of in authentication information that the user provides and computer system, storing, just allow the user to enter computer system and operate.
Yet, present authentication information all exists in the storage system of computer system (as the hard disk of computer system), authentication information on depositing in the storage system of computer like this may be stolen or unauthorized access by long-range, the user by authentication still might not obtain this authentication information, thereby realize landing this computer system, simultaneously, because the versatility and the opening of medium, the authentication information on depositing in the storage system of computer also is easy to be subjected to the attack of virus, wooden horse and other rogue programs.
Because the existence of the problems referred to above, more existing at present relevant solutions of being devoted to address this problem, as utilize TPM (Trusted Platform Module, the trusted console module) realizes, it is independent of operating system, is not subjected to operating system control and independent operating, and TPM chip internal program is solidified, can not change, these can both partly address the above problem.
Wherein, the structure of existing TPM authentication module as shown in Figure 1, comprise application program module 11, TSP (TSS Service Provider, TSS service provider) module 12, TCS (TSS Core Service, the TSS kernel service) module 15, TPM driver module 16 and TPM 17, TSS is the abbreviation of TPM Software Stack, it is TPM software heap, it is a kind of software specifications, this standard is provided for inserting the standard A PI (Application Programming Interface, API) of the function of TPM.
As shown in Figure 1, wherein:
Yet, TPM authentication at present adopts the mode of password to authenticate, and the user need remember a series of data such as user name, password, uses inconvenience, enter password simultaneously and also stolen password by keyboard monitoring software easily, system safety still can't be guaranteed fully.
The user is as a kind of biology, and the many physiological characteristics of itself all are unique, for example fingerprint, iris etc.
Summary of the invention
The object of the present invention is to provide a kind of Verification System and authentication method that utilizes reliable platform module, user's distinctive physiological characteristic itself is introduced existing TPM Verification System, safety, be easy to use, the safety certification that solves computer system under the prior art condition can't guarantee to use safely, simultaneously problems such as inconvenience fully.
To achieve these goals, the invention provides a kind of Verification System of utilizing reliable platform module, comprise an application program module, a TSP module, a TCS module, a TPM driver module and a TPM, also comprise:
One biological characteristic identificating equipment is connected with the TSP module with described TPM, is used to obtain the user biological feature, and forms the user biological condition code according to the user biological feature, also is used for seeking according to the user biological feature user biological condition code of coupling;
Described TPM is used for directly obtaining described user biological condition code from described living things feature recognition equipment, and is used for carrying out the TPM operation according to the instruction and the described user biological condition code of described TSP module.
Above-mentioned system, wherein, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment specifically was used to obtain the first user biological condition code and calculates first cryptographic Hash according to the described first user biological condition code; Described TPM specifically is used for carrying out the instruction that need obtain authentication information after described living things feature recognition equipment obtains the first user biological condition code and first cryptographic Hash.
Above-mentioned system, wherein, when execution needed the authentication verification information instruction, described living things feature recognition equipment specifically was used to obtain the second user biological condition code, compare with the tabulation of the user biological condition code of internal maintenance, calculate second cryptographic Hash after finding the biological condition code of coupling; Described TPM specifically is used to obtain described second cryptographic Hash, and is used for more described first cryptographic Hash and second cryptographic Hash, carries out the described authentication verification information instruction that needs when the two is consistent.
Above-mentioned system, wherein, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment specifically was used to obtain the first user biological condition code; Described TPM specifically is used for obtaining the first user biological condition code from described living things feature recognition equipment, and calculates according to the described first user biological condition code and to carry out the instruction that needs obtain authentication information after first cryptographic Hash.
Above-mentioned system, wherein, when execution needed the authentication verification information instruction, described living things feature recognition equipment specifically was used to obtain the second user biological condition code, compared with the user biological condition code tabulation of internal maintenance, found the biological condition code of coupling; Described TPM calculates second cryptographic Hash, more described first cryptographic Hash and second cryptographic Hash after specifically being used to obtain the biological condition code of coupling, and is used for carrying out when the two is consistent the described authentication verification information instruction that needs.
Above-mentioned system, wherein, described living things feature recognition equipment and described TPM carry out information interaction by general input/output signal.
Above-mentioned system, wherein, described living things feature recognition equipment utilization one random number is obtained described user biological condition code, and described random number is obtained by OIAP or OSAP by described TSP module, and sends to described living things feature recognition equipment.
Above-mentioned system, wherein, described user biological feature includes but not limited to fingerprint, iris, face type, palmmprint and sound.
Above-mentioned system, wherein, described living things feature recognition equipment is connected with described TSP module by a biological characteristic identificating equipment driver module, and obtains described user biological condition code according to the instruction of described TSP module.
In order better to realize above-mentioned purpose, the present invention also provides a kind of authentication method that utilizes reliable platform module, obtains the user biological feature by living things feature recognition equipment, and forms the user biological condition code according to the user biological feature; TPM directly obtains described user biological condition code from described living things feature recognition equipment, and carries out the TPM operation according to the instruction and the described user biological condition code of described TSP module.
Above-mentioned method, wherein, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment obtained the first user biological condition code and calculates first cryptographic Hash according to the described first user biological condition code; Described TPM carries out the instruction that need obtain authentication information after described living things feature recognition equipment obtains the first user biological condition code and first cryptographic Hash.
Above-mentioned method, wherein, when execution needed the authentication verification information instruction, described living things feature recognition equipment obtained the second user biological condition code, compare with the tabulation of the user biological condition code of internal maintenance, calculate second cryptographic Hash after finding the biological condition code of coupling; Described TPM obtains described second cryptographic Hash, and more described first cryptographic Hash and second cryptographic Hash, carries out the described authentication verification information instruction that needs when the two is consistent.
Above-mentioned method, wherein, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment obtained the first user biological condition code; Described TPM obtains the first user biological condition code from described living things feature recognition equipment, and calculates according to the described first user biological condition code and to carry out the instruction that needs obtain authentication information after first cryptographic Hash.
Above-mentioned method, wherein, when execution needed the authentication verification information instruction, described living things feature recognition equipment obtained the second user biological condition code, compared with the user biological condition code tabulation of internal maintenance, found the biological condition code of coupling; Described TPM calculates second cryptographic Hash, more described first cryptographic Hash and second cryptographic Hash after obtaining the biological condition code of coupling, and the two carries out the described authentication verification information instruction that needs when consistent
Verification System and the authentication method that utilizes reliable platform module of the present invention, introduced living things feature recognition to TPM, by utilizing a biological characteristic identificating equipment to obtain the user biological condition code, realize creating cipher key operation or encryption and decryption operation by TPM by this user biological condition code then, because the uniqueness of biological condition code, and have only the biological condition code checking to pass through, TPM just carries out corresponding operating, because TPM equipment and fingerprint equipment direct communication, the user biological condition code can not appear in the internal memory; Need not the user enter password simultaneously, keyboard is monitored software and also can't be stolen, and has safe characteristics, and simultaneously, the user need not to remember the secret information of the owner and key, and is easy to use.
Description of drawings
Fig. 1 is the structural representation of Verification System of the reliable platform module of prior art;
Fig. 2 is the structural representation that utilizes the Verification System of reliable platform module of the present invention;
Fig. 3 is the flow chart that Verification System of the present invention realizes the establishment key step in the method for authentication;
Fig. 4 is the flow chart that Verification System of the present invention realizes the use key step in the method for authentication.
Embodiment
First embodiment of the Verification System of utilizing reliable platform module of the present invention as shown in Figure 1, comprise application program module 11, TSP module 12, living things feature recognition device driver module 13, living things feature recognition equipment 14, TCS module 15, TPM driver module 16 and TPM 17, wherein:
Living things feature recognition equipment 14, be connected with TPM 17 with living things feature recognition device driver module 13, be used for obtaining the user biological feature according to the instruction of TSP module 12, and according to user biological feature formation user biological condition code, corresponding relation between maintenance customer's biological condition code and the PKI cryptographic Hash, need obtain the instruction of authentication information (as creating the owner in execution, create key, enciphered data, upgrade and authorize) time, described living things feature recognition equipment obtains the first user biological condition code and calculates first cryptographic Hash, when carrying out the encryption and decryption operation, described living things feature recognition equipment obtains the second user biological condition code, compares with the user biological condition code of internal maintenance, finds the biological condition code of coupling to calculate second cryptographic Hash; This living things feature recognition equipment is by GPIO (General-Purpose Input/Output, general I/O) signal and TPM 17 realize information interaction, this living things feature recognition equipment 14 obtains the user biological feature according to random number, this random number is obtained by OIAP (object have nothing to do authentication protocol) instruction or OSAP (object relevant authentication agreement) by TSP module 12, and sending to living things feature recognition equipment 14 with finger scan instruction, eucoen characteristic identificating equipment 14 obtains the user biological feature;
TPM 17, be connected with TPM driver module 16 with living things feature recognition equipment 14, be used for obtaining the user biological condition code, and carry out instruction and the needs authentication verification information instruction that needs obtain authentication information in conjunction with the user biological condition code according to the instruction of TSP module 12 from living things feature recognition equipment 14; When execution need be obtained the instruction of authentication information, according to the first user biological condition code and first cryptographic Hash obtained from living things feature recognition equipment 14, and after creating successfully, with first cryptographic Hash and key data (or first user biological condition code and key data) packaging ciphering, and to TSP module 12 return results; Need the authentication verification information instruction (to need the owner to authorize in execution as changing chip status and obtaining key message, create sub-key and encryption and decryption data and need key authorization, data decryption needs the enciphered data mandate) time, TPM 17 obtains second cryptographic Hash from living things feature recognition equipment 14, and comparison first cryptographic Hash and second cryptographic Hash, if the two unanimity then carry out encryption and decryption operation, and return execution result to the TSP module, do not need the authentication verification information instruction otherwise do not carry out;
Certainly, calculate the action of cryptographic Hash and also can finish by TPM, but volume of transmitted data big (general 256-1024 byte).
Be that example is further elaborated with secret key below.
The Verification System of reliable platform module of utilizing of the present invention realizes that the method for authentication comprises establishment key step and uses the key step.
As shown in Figure 3, the Verification System of utilizing reliable platform module of the present invention realizes that the establishment key step in the method for authentication specifically comprises the steps:
As shown in Figure 4, the Verification System of utilizing reliable platform module of the present invention realizes that the use key step in the method for authentication specifically comprises the steps:
Said in the above embodiments biological characteristic is the unique biological characteristic of user, as biological characteristics such as fingerprint, iris, face type, palmmprint and sound.
Simultaneously, be that example describes with the key in the embodiments of the invention, can certainly be the owner, the process basically identical of its process and key does not repeat them here.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (14)
1. a Verification System of utilizing reliable platform module comprises an application program module, a TSP module, a TCS module, a TPM driver module and a TPM, it is characterized in that, also comprises:
One biological characteristic identificating equipment is connected with the TSP module with described TPM, is used to obtain the user biological feature, and forms the user biological condition code according to the user biological feature, also is used for seeking according to the user biological feature user biological condition code of coupling;
Described TPM is used for directly obtaining described user biological condition code from described living things feature recognition equipment, and is used for whether carrying out the TPM operation according to described user biological condition code decision.
2. system according to claim 1, it is characterized in that, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment specifically was used to obtain the first user biological condition code, and calculates first cryptographic Hash according to the described first user biological condition code; Described TPM specifically is used for obtaining the first user biological condition code and first cryptographic Hash from described living things feature recognition equipment, and carries out the instruction that need obtain authentication information.
3. system according to claim 2, it is characterized in that, when execution needs the authentication verification information instruction, described living things feature recognition equipment specifically is used to obtain the second user biological condition code, compare with the tabulation of the user biological condition code of internal maintenance, calculate second cryptographic Hash after finding the biological condition code of coupling; Described TPM specifically is used to obtain described second cryptographic Hash, and is used for more described first cryptographic Hash and second cryptographic Hash, carries out the described authentication verification information instruction that needs when the two is consistent.
4. system according to claim 1 is characterized in that, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment specifically was used to obtain the first user biological condition code; Described TPM specifically is used for obtaining the first user biological condition code from described living things feature recognition equipment, and calculates according to the described first user biological condition code and to carry out the instruction that needs obtain authentication information after first cryptographic Hash.
5. system according to claim 2, it is characterized in that, when execution needs the authentication verification information instruction, described living things feature recognition equipment specifically is used to obtain the second user biological condition code, compare with the user biological condition code tabulation of internal maintenance, find the biological condition code of coupling; Described TPM calculates second cryptographic Hash, more described first cryptographic Hash and second cryptographic Hash after specifically being used to obtain the biological condition code of coupling, and is used for carrying out when the two is consistent the described authentication verification information instruction that needs.
6. according to claim 1,2,3,4 or 5 described systems, it is characterized in that described living things feature recognition equipment and described TPM carry out information interaction by general input/output signal.
7. according to claim 1,2,3,4 or 5 described systems, it is characterized in that, the corresponding relation of described living things feature recognition plant maintenance one random number and described user biological condition code, described random number is obtained by irrelevant authentication protocol of object or object relevant authentication agreement by described TSP module, and sends to described living things feature recognition equipment with the finger scan instruction; TPM sends same random number to living things feature recognition equipment and obtains corresponding with it biometric code.
8. according to claim 1,2,3,4 or 5 described systems, it is characterized in that described user biological feature includes but not limited to fingerprint, iris, face type, palmmprint and sound.
9. according to claim 1,2,3,4 or 5 described systems, it is characterized in that, described living things feature recognition equipment is connected with described TSP module by a biological characteristic identificating equipment driver module, and obtains described user biological condition code according to the instruction of described TSP module.
10. an authentication method that utilizes reliable platform module is characterized in that, living things feature recognition equipment obtains the user biological feature, and forms the user biological condition code according to the user biological feature; TPM directly obtains described user biological condition code from described living things feature recognition equipment, and whether carries out the TPM operation according to described user biological condition code decision.
11. method according to claim 10, it is characterized in that, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment obtained the first user biological condition code and calculates first cryptographic Hash according to the described first user biological condition code; Described TPM carries out the instruction that need obtain authentication information after described living things feature recognition equipment obtains the first user biological condition code and first cryptographic Hash.
12. method according to claim 11, it is characterized in that, when execution needs the authentication verification information instruction, described living things feature recognition equipment obtains the second user biological condition code, compare with the tabulation of the user biological condition code of internal maintenance, calculate second cryptographic Hash after finding the biological condition code of coupling; Described TPM obtains described second cryptographic Hash, and more described first cryptographic Hash and second cryptographic Hash, carries out the described authentication verification information instruction that needs when the two is consistent.
13. method according to claim 10 is characterized in that, when execution need be obtained the instruction of authentication information, described living things feature recognition equipment obtained the first user biological condition code; Described TPM obtains the first user biological condition code from described living things feature recognition equipment, and calculates according to the described first user biological condition code and to carry out the instruction that needs obtain authentication information after first cryptographic Hash.
14. method according to claim 13, it is characterized in that when execution needed the authentication verification information instruction, described living things feature recognition equipment obtained the second user biological condition code, compare with the user biological condition code tabulation of internal maintenance, find the biological condition code of coupling; Described TPM calculates second cryptographic Hash, more described first cryptographic Hash and second cryptographic Hash after obtaining the biological condition code of coupling, and the two carries out the described authentication verification information instruction that needs when consistent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100802794A CN101072100B (en) | 2006-05-12 | 2006-05-12 | Authenticating system and method utilizing reliable platform module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100802794A CN101072100B (en) | 2006-05-12 | 2006-05-12 | Authenticating system and method utilizing reliable platform module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101072100A true CN101072100A (en) | 2007-11-14 |
CN101072100B CN101072100B (en) | 2012-03-28 |
Family
ID=38899106
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006100802794A Active CN101072100B (en) | 2006-05-12 | 2006-05-12 | Authenticating system and method utilizing reliable platform module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101072100B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459518B (en) * | 2008-12-01 | 2011-04-20 | 清华大学 | Digital cipher extraction and protection method based on biological characteristic |
CN103412767A (en) * | 2013-06-09 | 2013-11-27 | 百度国际科技(深圳)有限公司 | Method and system for recognizing and upgrading application version |
CN103577738A (en) * | 2013-08-26 | 2014-02-12 | 浙江工业大学 | Genetic automatic fuzzy clustering analysis-based templateless biological secret key generating method |
CN105956858A (en) * | 2016-05-03 | 2016-09-21 | 联想(北京)有限公司 | Payment method and electronic device |
CN106682531A (en) * | 2017-01-23 | 2017-05-17 | 济南浪潮高新科技投资发展有限公司 | Method for confidential data encryption based on biological information authorization |
CN107580767A (en) * | 2015-03-12 | 2018-01-12 | 眼锁有限责任公司 | The method and system of network activity is managed using biological characteristic |
CN108667608A (en) * | 2017-03-28 | 2018-10-16 | 阿里巴巴集团控股有限公司 | The guard method of data key, device and system |
CN108809920A (en) * | 2017-05-04 | 2018-11-13 | 慧荣科技股份有限公司 | Data center adopting encryption technology and data center operation method |
CN111191217A (en) * | 2019-12-27 | 2020-05-22 | 华为技术有限公司 | Password management method and related device |
CN111385097A (en) * | 2018-12-29 | 2020-07-07 | 福建省天奕网络科技有限公司 | Method and storage medium for data signature authentication |
CN111600869A (en) * | 2020-05-13 | 2020-08-28 | 济南大学 | Verification code authentication method and system based on biological characteristics |
CN111917693A (en) * | 2019-05-10 | 2020-11-10 | 董云鹏 | Network identity authentication system for dynamically identifying digital identity |
CN112019532A (en) * | 2020-08-20 | 2020-12-01 | 王红根 | Information management method based on mobile internet and biological authentication and cloud service platform |
CN112199663A (en) * | 2020-12-03 | 2021-01-08 | 飞天诚信科技股份有限公司 | Authentication method and system for no user name |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6175923B1 (en) * | 1998-12-08 | 2001-01-16 | Senetas Corporation Limited | Secure system using images of only part of a body as the key where the part has continuously-changing features |
CN1144158C (en) * | 2000-09-25 | 2004-03-31 | 王介生 | Method for identifying human body biological characteristics |
CN100432890C (en) * | 2005-07-12 | 2008-11-12 | 中国长城计算机深圳股份有限公司 | Computer starting up identifying system and method |
-
2006
- 2006-05-12 CN CN2006100802794A patent/CN101072100B/en active Active
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459518B (en) * | 2008-12-01 | 2011-04-20 | 清华大学 | Digital cipher extraction and protection method based on biological characteristic |
CN103412767A (en) * | 2013-06-09 | 2013-11-27 | 百度国际科技(深圳)有限公司 | Method and system for recognizing and upgrading application version |
CN103577738A (en) * | 2013-08-26 | 2014-02-12 | 浙江工业大学 | Genetic automatic fuzzy clustering analysis-based templateless biological secret key generating method |
CN103577738B (en) * | 2013-08-26 | 2016-04-13 | 浙江工业大学 | Based on hereditary automatic mold clustering analysis without template biological key generation method |
CN107580767A (en) * | 2015-03-12 | 2018-01-12 | 眼锁有限责任公司 | The method and system of network activity is managed using biological characteristic |
CN107580767B (en) * | 2015-03-12 | 2020-12-29 | 眼锁有限责任公司 | Method and system for managing network activities using biometrics |
CN105956858B (en) * | 2016-05-03 | 2020-02-21 | 联想(北京)有限公司 | Payment method and electronic equipment |
CN105956858A (en) * | 2016-05-03 | 2016-09-21 | 联想(北京)有限公司 | Payment method and electronic device |
CN106682531A (en) * | 2017-01-23 | 2017-05-17 | 济南浪潮高新科技投资发展有限公司 | Method for confidential data encryption based on biological information authorization |
CN108667608A (en) * | 2017-03-28 | 2018-10-16 | 阿里巴巴集团控股有限公司 | The guard method of data key, device and system |
CN108809920A (en) * | 2017-05-04 | 2018-11-13 | 慧荣科技股份有限公司 | Data center adopting encryption technology and data center operation method |
CN111385097A (en) * | 2018-12-29 | 2020-07-07 | 福建省天奕网络科技有限公司 | Method and storage medium for data signature authentication |
CN111385097B (en) * | 2018-12-29 | 2023-04-21 | 福建省天奕网络科技有限公司 | Method for data signature authentication and storage medium |
CN111917693A (en) * | 2019-05-10 | 2020-11-10 | 董云鹏 | Network identity authentication system for dynamically identifying digital identity |
CN111191217A (en) * | 2019-12-27 | 2020-05-22 | 华为技术有限公司 | Password management method and related device |
CN111191217B (en) * | 2019-12-27 | 2022-12-13 | 华为技术有限公司 | Password management method and related device |
CN111600869A (en) * | 2020-05-13 | 2020-08-28 | 济南大学 | Verification code authentication method and system based on biological characteristics |
CN111600869B (en) * | 2020-05-13 | 2022-09-20 | 济南大学 | Verification code authentication method and system based on biological characteristics |
CN112019532A (en) * | 2020-08-20 | 2020-12-01 | 王红根 | Information management method based on mobile internet and biological authentication and cloud service platform |
CN112019532B (en) * | 2020-08-20 | 2021-05-07 | 中铁云网信息科技有限公司 | Information management method based on mobile internet and biological authentication and cloud service platform |
CN112199663A (en) * | 2020-12-03 | 2021-01-08 | 飞天诚信科技股份有限公司 | Authentication method and system for no user name |
Also Published As
Publication number | Publication date |
---|---|
CN101072100B (en) | 2012-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101072100B (en) | Authenticating system and method utilizing reliable platform module | |
CN106330850B (en) | Security verification method based on biological characteristics, client and server | |
EP1983466B1 (en) | Method and apparatus of secure authentication for system-on-chip (SoC) | |
US8707049B2 (en) | Authentication method and key device | |
US7861015B2 (en) | USB apparatus and control method therein | |
KR100876003B1 (en) | User Authentication Method Using Biological Information | |
EP2937805B1 (en) | Proximity authentication system | |
CA2554300C (en) | System and method for encrypted smart card pin entry | |
US8386795B2 (en) | Information security device of Universal Serial Bus Human Interface Device class and data transmission method for same | |
CN100533459C (en) | Data safety reading method and safety storage apparatus thereof | |
CN105827573B (en) | System, method and the relevant apparatus of internet of things equipment strong authentication | |
CN101494541B (en) | System and method for implementing security protection of PIN code | |
US20110314288A1 (en) | Circuit, system, device and method of authenticating a communication session and encrypting data thereof | |
US8566579B2 (en) | Obfuscated authentication systems, devices, and methods | |
WO2018119623A1 (en) | Method of unlocking electronic lock device, and client and electronic lock device thereof | |
US20070136604A1 (en) | Method and system for managing secure access to data in a network | |
CN100566253C (en) | A kind of method and system of using intelligent key apparatus safely | |
US20070180507A1 (en) | Information security device of universal serial bus human interface device class and data transmission method for same | |
CN108171830B (en) | Hardware encryption method and system based on induction card unlocking and intelligent cloud lock | |
CN101562523B (en) | Security certification method applied on mobile storage device | |
KR102081875B1 (en) | Methods for secure interaction between users and mobile devices and additional instances | |
CN201845340U (en) | Safety computer provided with user safety subsystem | |
CN114697113A (en) | Hardware accelerator card-based multi-party privacy calculation method, device and system | |
CN110969735B (en) | Intelligent lock master control system and method based on security chip architecture | |
Lee et al. | A study on a secure USB mechanism that prevents the exposure of authentication information for smart human care services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |