Identity authentication method and device based on trusted computing

An identity authentication device and trusted computing technology, applied in the computer field, can solve problems such as the impact of computer information security

Active Publication Date: 2016-03-23
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, under the premise of ensuring the security and credibility of the computer system, when the user's login information is leaked by hackers or malware attacks, it may affect the security of computer information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on trusted computing
  • Identity authentication method and device based on trusted computing
  • Identity authentication method and device based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0052] Such as figure 1 As shown, the embodiment of the present invention provides an identity authentication method based on trusted computing, which may include the following steps:

[0053] Step 101: pre-binding the TCM (Trusted Cryptography Module) in the computer system to the USBKey, and storing the reference value of each component in the comput...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and device based on trusted computing. The method comprises the following steps: binding a TCM (Trusted Cryptography Module) in a computer system with a USBKey (Universal Serial Bus) in advance, and storing the reference value of each component in the computer system into the USBKey; when a login request of a target USBKey is obtained, judging whether the target USBKey is bound with the TCM in the computer system, and comparing the metric value of each component with a corresponding reference value stored in the USBKey to realize the first authentication of the target USBKey; and when the metric values of all components are the same with the reference value, authenticating the identity information of the target USBKey, and responding to the login request of the target USBKey according to an identity information authentication result to realize the secondary authentication of the target USBkey. Through the dual authentication of the target USBKey, data in the computer system can be guaranteed to be safe and trustable.

Description

technical field [0001] The invention relates to the field of computers, in particular to an identity authentication method and device based on trusted computing. Background technique [0002] Under the prospect of the country's strengthening of localization and substitution, domestic firmware and domestic operating systems have gradually developed and grown. Trusted computing technology, as a new type of computer information security technology, fully exerts its security and trustworthy functions under the localization platform, and provides basic support for the establishment of an information security support platform in terms of trusted authentication, trusted measurement, and trusted storage. . [0003] At present, trusted computing technology uses the internal algorithm of TCM (TrustedCryptographyModule, Trusted Cryptography Module) to measure the trustworthiness of each component in the computer system startup process step by step to determine whether the computer sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/44
CPCG06F21/34G06F21/44
Inventor 郭猛善冯磊
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products