Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity control method based on credibility platform module and fingerprint identifying

A platform module, fingerprint recognition technology, applied in character and pattern recognition, instruments, digital data authentication, etc., can solve problems such as incompetence for large-scale complex computing tasks, and achieve a high reliability and security. Effect

Active Publication Date: 2009-04-22
SHENZHEN SINOSUN TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the popularization of TPM chips, low-cost and high-security designs are generally adopted in the world; because TPM does not need to perform a large number of data calculation functions, TPM chips currently produced at home and abroad are widely used as 8-bit or 16-bit CPUs. Central processing unit, and this kind of CPU is definitely not capable of performing large-scale and complex computing tasks like image pattern recognition algorithms
[0009] Mode 3: Only the fingerprint feature comparison algorithm with a small amount of calculation in the fingerprint recognition algorithm is embedded into the TPM chip. Although this mode solves the defect of TPM's computing power, there is a fatal weakness, that is, the TPM does not analyze the user's fingerprint feature information. After comparing with the fingerprint template, the result of matching or not can only be passed to the upper layer for further processing. In this way, if the upper layer system is attacked, the processing link of the TPM return result will be bypassed, which will make the entire TPM fingerprint identification system useless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity control method based on credibility platform module and fingerprint identifying
  • An identity control method based on credibility platform module and fingerprint identifying

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The preferred embodiments of the present invention will be described in detail below.

[0027] The present invention provides an identity control method based on a trusted platform module and fingerprint recognition, which is applied to a trusted computer system. The system includes: standard computer motherboard and chipset, CPU central processing unit chip, RAM memory, hard disk and other external memories , And TPM chip and fingerprint sensor. The system also needs to have a software operating environment, including: trusted basic input and output system BIOS, trusted operating system OS, TPM chip firmware (Firmware) program and TPM initialization application software, as well as fingerprint sensor related BIOS and OS drivers Application software such as programs and user fingerprint registration management.

[0028] The identity control method based on the trusted platform module and fingerprint recognition of the present invention is as follows figure 1 As shown, it i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity control method based on TPM and fingerprint identification that includes steps: A1, presetting the fingerprint characteristic information module, the module is protected by the TPM; A2, the fingerprint collecting module collects the image information of present user's fingerprint, and the information is transmitted to the fingerprint extracting module; A3, the fingerprint extracting module extracts and calculates the characteristic of fingerprint, and the results is sent to the TMP chip; A4, The fingerprint comparison module of the TMP chip compares with the fingerprint characteristic data extracted this time according to the fingerprint characteristic module to identify the user's identity; A5, the TPM chip judges that the user has the authority to operate the computer according to the comparing result and to execute the step A6, otherwise execute the step A7; A6, the TPM chip works normally and executes the operation of user's requirement; A7, the TPM chip is in inactive state and rejects the operation of user's requirement, and return the error information for upper layer.

Description

Technical field [0001] The invention relates to the field of computer information security, in particular to a method for using fingerprint biometric technology and trusted platform module chip technology for computer user identity authentication and authority control. Background technique [0002] With the advent of the Internet age, information security has become a general concern for computer users, and people’s requirements for computer security are getting higher and higher, and fingerprint recognition technology is increasingly used in computer user identification and operation access authorization confirmation. widely. [0003] Before the appearance of the Trusted Platform Module (TPM) chip, fingerprint recognition technology mainly adopted two implementation modes in the application of computer user identification: [0004] Mode 1: Realize fingerprint recognition and comparison algorithms completely through computer software. This mode cannot achieve user fingerprint rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06K9/00G06F21/32G06F21/71
Inventor 杨晶刘宏伟张璐
Owner SHENZHEN SINOSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products