Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for logging in using a fingerprint key

A fingerprint and fingerprint verification technology, applied in the field of information security, can solve the problems of fingerprint Key verification use, fingerprint Key cannot be used, and fingerprint verification is not supported.

Active Publication Date: 2019-08-30
FEITIAN TECHNOLOGIES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the fingerprint Key is safer to operate than the ordinary USB Key, but the fingerprint Key cannot be used for verification through the PIN code, but can only be used for verification through the fingerprint. The current Window function does not support fingerprint verification, resulting in fingerprint Key can not be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for logging in using a fingerprint key
  • A method and device for logging in using a fingerprint key
  • A method and device for logging in using a fingerprint key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Embodiment 1 of the present invention provides a method for logging in using a fingerprint key, including:

[0077] When the second function is called, the device obtains the login verification method, and returns the login verification method to the operating system;

[0078] Specifically, in this embodiment, when the second function is called by the operating system, it also includes: the operating system judges whether the acquisition of the login verification method is successful through the return value of the second function, and if the second function returns the login verification method, then the login verification method is obtained. The method is successful, otherwise, the login verification method fails to be obtained.

[0079] In this embodiment, the device obtains the login verification method specifically as follows: the device sets the external PIN code verification method in the second function parameter as the first preset value; preferably, the device...

Embodiment 2

[0114] Embodiment 2 of the present invention provides a method for logging in using a fingerprint key, such as figure 1 shown, including:

[0115] When the operating system receives the login trigger information, it prompts the user to insert the fingerprint key; if it detects that the fingerprint key is inserted, it obtains all user certificates in the fingerprint key and displays them, prompting the user to select the certificate used for login; when the operating system receives The first function is called when the user selects the certificate used for login;

[0116] Step 101: when the first function is called, the device returns the function address list to the operating system;

[0117] Specifically, in this embodiment, the first function is CardAcquireContext, wherein the parameters passed in include: the first data structure; the device returning the function address list to the operating system includes: initializing the first data structure, obtaining the second F...

Embodiment 3

[0161] Embodiment 3 of the present invention provides a device for logging in using a fingerprint key, such as image 3 As shown, it includes a second operating module 302, a third operating module 303, a fourth operating module 304 and a fifth operating module 305;

[0162] The second operation module 302 is configured to obtain a login verification method, and return the login verification method to the operating system;

[0163] In this embodiment, the second operation module 302 is specifically configured to set the external PIN code verification method in the second function parameter to the first preset value, and return the external PIN code verification method of the first preset value to the operation System; preferably, the second operation module 302 is specifically configured to set the external PIN code verification method in the third data structure in the second function parameter as the first preset value, and set the external PIN code of the first preset value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and apparatus for registration by use of a fingerprint key. The method comprises the following steps: an apparatus obtains a registration verification mode and returns the registration verification mode to an operating system; if the apparatus obtains that the registration verification mode in a third function parameter is an external verification mode, a registration interface window handle in the third function parameter is obtained and stored; the apparatus, according to the stored registration interface window handle, pops up a fingerprint verification prompt box to prompt a user to input fingerprints for verification on the fingerprint key; and the apparatus sends data to be signed to the fingerprint key, if the current state of the fingerprint key is fingerprint verification success, a signature secret key and a signature algorithm are positioned by use of parameters in a fifth function, credential information needed for registering the operating system is generated by performing computation on the data to be signed by use of the signature secret key according to the signature algorithm, and the credential information is returned to the operating system. According to the technical scheme, the fingerprint key is enabled to be directly normally used in a Windows system, and application by the user is facilitated.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for logging in using a fingerprint key. Background technique [0002] At present, when the application calls the Window function to use the USB Key, a PIN code input box will pop up, prompting the user to enter the PIN code for verification. After the PIN code verification is passed, the application can use the data stored in the USB Key to sign, encrypt and decrypt, and generate Key, import certificate and other operations. [0003] In the prior art, the fingerprint Key is safer to operate than the ordinary USB Key, but the fingerprint Key cannot be used for verification through the PIN code, but can only be used for verification through the fingerprint. The current Window function does not support fingerprint verification, resulting in fingerprint Key can not be used. Therefore, how to enable the Window function to support the use of the fingerprint key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES