Identity authentication method and device based on security chip, and medium

A security chip and identity authentication technology, applied in the field of identity authentication based on security chips, can solve problems in dangerous environments and achieve the effect of identity authentication

Pending Publication Date: 2020-02-07
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional Shiro security framework mainly relies on the encryption algorithm of the software for authentication, authorization, encryption and other functions, and the user name and password are mainly stored in the database. dangerous environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on security chip, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0030]According to some embodiments of the present invention, the security chip is a TCM trusted cryptographic module security chip. TCM (Trusted Cryptography Module, Trusted Cryptography Module) is a security chip built based on embedded chip technology and completely using the cryptographic algorithm and engine independently developed by my country. The TCM security chip provides basic security services for the system platform and software, and establishes a more secure and reliable system platform environment. Using the TCM security chip can solve the flaw of data insecurity in the shiro security framework. The TCM security chip replaces Shiro's original encryption and decryption algorithm to increase the rate of encryption and decryption. The security data source is inside the TCM security chip, ensuring data privacy.

[0031] It should be pointed out that each step in each embodiment of the security chip-based identity authentication method can intersect, replace, add, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method based on a security chip, which comprises the following steps: acquiring user password information, and calling an encryption and decryption algorithm of the security chip by a security manager to encrypt the user password information; storing the encrypted user password information into a security chip through a password storage interface;in response to the user login request, acquiring user permission information by the security manager, and comparing the user permission information with the user password information for judgment; and in response to matching of the user permission information and the user password information, confirming that identity authentication is passed. The invention further discloses a computer device anda readable storage medium. According to the identity authentication method and device based on the security chip and the medium, basic security services are provided for a system platform and software by using the security chip, a safer and more reliable system platform environment is established, and the functions of identity authentication, authorization, encryption, session management and thelike of an application program are further achieved.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, more specifically, to a security chip-based identity authentication method, device and readable medium. Background technique [0002] In deploying a trusted computing system, cryptography is the most important core technology. Shiro Security Framework is a powerful and easy-to-use Java security framework for authentication, authorization, encryption and session management, which can be used to protect any application, from command-line applications, mobile applications to large-scale web applications and enterprise applications . Due to its simplicity, flexibility, web support, and pluggability, the Shiro security framework has been increasingly used in application authentication, authorization, encryption, session management, and caching. [0003] The traditional Shiro security framework mainly relies on the encryption algorithm of the software for authentication, autho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/60
CPCG06F21/46G06F21/602
Inventor 李文通柴萍萍刘怀泉
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products