Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and authentication device

A technology for authentication equipment and authentication methods, which is applied in the field of information security and can solve problems such as authentication equipment not supporting multiple authentication methods

Active Publication Date: 2020-08-07
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, due to the hardware isolation feature of the security environment chip itself, the existing authentication equipment usually does not support multiple authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication device
  • Authentication method and authentication device
  • Authentication method and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0114] This embodiment provides an authentication method, such as figure 1 As shown, it specifically includes the following steps:

[0115] Step 101, the authentication device receives the command of the host computer;

[0116] Step 102, the authentication device parses the option parameters in the command of the host computer;

[0117] Step 103, the authentication device judges the value of the fingerprint authentication identifier in the option parameter, if it is the first preset value, then execute step 104; if it is the second preset value, then execute step 105;

[0118] Step 104, the authentication device prompts the user to input a fingerprint, and verifies the fingerprint input by the user to obtain a user operation verification result, and executes step 106;

[0119] Step 105, the authentication device prompts the user to press a button, and verifies the button pressed by the user to obtain a user operation verification result, and executes step 106;

[0120] Step...

Embodiment 2

[0155] This embodiment provides an authentication method, such as figure 2 As shown, it specifically includes the following steps:

[0156] Step 201, the authentication device is powered on and initialized;

[0157] Specifically, the authentication device may be an authentication device with a USB interface, or an authentication device with a BLE (Bluetooth Low Energy) interface.

[0158] Step 202, the authentication device receives the command of the host computer;

[0159] Specifically, the command of the host computer is a command to generate a credential or a command to acquire an assertion.

[0160] Specifically, the command to generate credentials includes the command header part 8010010000 00AD and the data domain part

[0161] 01A5015820687134968222EC17202E42505F8ED2B16AE22F16BB05B88C25DB9E602645F14102A2626964666368656E7169646E616D65666368656E716903A3626964582001B65EBF914724C5FC50BE4E9FF2E61787FE97F8F0B1544344316ECD24925F01646E616D656E6368656E7169403136332E636F6D6B...

Embodiment 3

[0204] This embodiment provides an authentication method, such as Figure 4 As shown, it specifically includes the following steps:

[0205] Step 301, the fingerprint management chip is powered on and initialized;

[0206] Specifically, the fingerprint management chip may be a fingerprint management chip with a USB interface, or may be a fingerprint management chip with a BLE (Bluetooth Low Energy) interface.

[0207] Step 302, the fingerprint management chip negotiates with the security environment chip to obtain a session key;

[0208] In this step, the session key can also be obtained in other ways, for example, the session key can also be pre-set in the fingerprint management chip and the security environment chip respectively.

[0209] In this embodiment, the fingerprint management chip and the security environment chip may be included in the authentication device.

[0210] Step 303, the fingerprint management chip waits to receive commands from the host computer;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, comprising: the authentication device receives the command of the host computer; the option parameter in the command of the host computer is analyzed; the value of the fingerprint authentication identification in the option parameter is judged, if it is the first preset value, then Prompt the user to enter the fingerprint, and verify the fingerprint entered by the user to obtain the user operation verification result; if it is the second preset value, prompt the user to press a button, and verify the button pressed by the user to obtain the user operation verification result; the authentication device Judging the user operation verification result, if the user operation verification result is successful, set the authentication method confirmation flag according to the value of the fingerprint authentication flag, obtain the client data from the command of the host computer, and confirm the logo and client data according to the authentication method Generate the data to be signed, execute the signature operation on the data to be signed, generate the signature result, and send the signature result to the host computer; if the user operation verification result fails, an error will be reported.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication method and authentication equipment. Background technique [0002] Security environment chips (SE, security environment), as an important part of authentication equipment, are widely used in computing and communication systems to improve the overall security of the system. In the prior art, due to the hardware isolation feature of the security environment chip itself, existing authentication devices generally do not support multiple authentication methods. Contents of the invention [0003] In order to solve the above technical problems, the present invention provides an authentication method, comprising the following steps: [0004] Step 101, the authentication device receives the command of the host computer; [0005] Step 102, the authentication device parses the option parameters in the command of the host computer; [0006] Step 103, the authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/46
CPCG06F21/32G06F21/46G06F21/45G06F21/602G06F21/606H04L9/3239H04L9/0869H04L9/3231
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES