Authentication method and authentication device
A technology for authentication equipment and authentication methods, which is applied in the field of information security and can solve problems such as authentication equipment not supporting multiple authentication methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0114] This embodiment provides an authentication method, such as figure 1 As shown, it specifically includes the following steps:
[0115] Step 101, the authentication device receives the command of the host computer;
[0116] Step 102, the authentication device parses the option parameters in the command of the host computer;
[0117] Step 103, the authentication device judges the value of the fingerprint authentication identifier in the option parameter, if it is the first preset value, then execute step 104; if it is the second preset value, then execute step 105;
[0118] Step 104, the authentication device prompts the user to input a fingerprint, and verifies the fingerprint input by the user to obtain a user operation verification result, and executes step 106;
[0119] Step 105, the authentication device prompts the user to press a button, and verifies the button pressed by the user to obtain a user operation verification result, and executes step 106;
[0120] Step...
Embodiment 2
[0155] This embodiment provides an authentication method, such as figure 2 As shown, it specifically includes the following steps:
[0156] Step 201, the authentication device is powered on and initialized;
[0157] Specifically, the authentication device may be an authentication device with a USB interface, or an authentication device with a BLE (Bluetooth Low Energy) interface.
[0158] Step 202, the authentication device receives the command of the host computer;
[0159] Specifically, the command of the host computer is a command to generate a credential or a command to acquire an assertion.
[0160] Specifically, the command to generate credentials includes the command header part 8010010000 00AD and the data domain part
[0161] 01A5015820687134968222EC17202E42505F8ED2B16AE22F16BB05B88C25DB9E602645F14102A2626964666368656E7169646E616D65666368656E716903A3626964582001B65EBF914724C5FC50BE4E9FF2E61787FE97F8F0B1544344316ECD24925F01646E616D656E6368656E7169403136332E636F6D6B...
Embodiment 3
[0204] This embodiment provides an authentication method, such as Figure 4 As shown, it specifically includes the following steps:
[0205] Step 301, the fingerprint management chip is powered on and initialized;
[0206] Specifically, the fingerprint management chip may be a fingerprint management chip with a USB interface, or may be a fingerprint management chip with a BLE (Bluetooth Low Energy) interface.
[0207] Step 302, the fingerprint management chip negotiates with the security environment chip to obtain a session key;
[0208] In this step, the session key can also be obtained in other ways, for example, the session key can also be pre-set in the fingerprint management chip and the security environment chip respectively.
[0209] In this embodiment, the fingerprint management chip and the security environment chip may be included in the authentication device.
[0210] Step 303, the fingerprint management chip waits to receive commands from the host computer;
[...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


