Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System login protection method and device based on TPM chip

A chip and device technology, applied in the field of system login protection based on TPM chips, can solve the problems of hidden dangers in HMAC message authentication, and achieve the effects of increasing competitiveness, preventing dictionary attacks, and high security

Inactive Publication Date: 2020-05-05
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, once the key is exposed or lost in the database or local disk, HMAC message authentication has security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System login protection method and device based on TPM chip
  • System login protection method and device based on TPM chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0038] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a system login protection method based on a TPM chip. figure 1 Shown is a schematic flow chart of the method.

[0039] Such as figure 1 As shown in , the method may include the following steps:

[0040] S1 generates a key handle in the TPM chip, which only exists inside the TPM chip hardware, ensuring the security of the key;

[0041] S2, in response to receiving the initial information for creating and logging in by the user, performs HMAC calculation according to the key handle, the initial information, and the digest algorithm to obtain the initial value;

[0042] S3 stores the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system login protection method and device based on a TPM chip. The method comprises the following steps of generating a secret key handle in the TPM chip; in response to the received initial information of login created by a user, performing HMAC calculation according to the key handle, the initial information and an abstract algorithm to obtain an initial value; storing the initial value into a database; responding to the received information input by the user during login, performing HMAC calculation according to the secret key handle, the input information and an abstract algorithm, and comparing a calculation result with an initial value; and in response to the fact that the calculation result is the same as the initial value, judging information security inputby the user during login. Dictionary attacks and rainbow table cracking of user login passwords can be prevented, the safety is very high, and the competitiveness of the product is improved.

Description

technical field [0001] This field relates to the computer field, and more specifically relates to a TPM chip-based system login protection method and device. Background technique [0002] In information systems, protecting user names and login passwords in the system is a very important security issue. In order to protect the user's login password from being illegally stolen, the hash value of the login password is usually saved. However, with the emergence of dictionary attacks and rainbow tables, the security technology of directly saving the login password hash value also has security risks. Using the login password plus salt value for hash storage (connecting a random number to the login password before it is hashed) is another improvement solution. With the advent of the era of cloud computing, computing speed has also been significantly improved. This solution has also become less secure. How to find a more secure, user name and login password method to protect the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/72
CPCG06F21/45G06F21/72
Inventor 刘海伟
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products