Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication data transmission method and system

A transmission method and a technology for authenticating data, applied in digital transmission systems, transmission systems, digital data authentication, etc., can solve problems such as design limitations of biometric authentication systems

Pending Publication Date: 2022-01-11
REALTEK SEMICON CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, according to the security device connection protocol proposed by Microsoft Corporation, a chip matching (Match on Chip, MOC) device is required to support the security device connection protocol, which makes the above-mentioned biometric authentication system subject to many restrictions in design.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication data transmission method and system
  • Authentication data transmission method and system
  • Authentication data transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention are described below through specific examples, and those skilled in the art can understand the advantages and effects of the present invention from the content disclosed in this specification. The present invention can be implemented or applied through other different specific embodiments, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the concept of the present invention. In addition, the drawings of the present invention are only for simple illustration, and are not drawn according to the actual size, which is stated in advance. The following embodiments will further describe the relevant technical content of the present invention in detail, but the disclosed content is not intended to limit the protection scope of the present invention.

[0022] It should be understood that although terms such as "first", "second", and "th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication data transmission method and system. The method runs in a computer system, and the computer system is connected with a biological recognition device. In the method, a secure channel is established between the computer system and the biological recognition device according to a security protocol; after an authentication request is received, biological characteristic data formed through encryption can be received from the biological recognition device; in a secure execution environment established by the computer system, the biological characteristic data is decrypted, biological characteristic information is extracted, and the biological characteristic information is compared with characteristic data in a database to generate a comparison result; the comparison result is returned to the biological recognition device, the biological recognition device can encrypt the comparison result according to the security protocol, and the comparison result is transmitted through the secure channel to the computer system in a manner conforming to the security protocol.

Description

technical field [0001] The invention proposes a method for transmitting authentication data, in particular, an authentication data transmission method and system running in a computer system and conforming to a secure transmission protocol. Background technique [0002] The purpose of setting up security login measures on the host computer is to provide a solution for secure login to the computer system. In addition to the traditional password account login method, the host computer also requires biometrics to provide information when logging into the system. A more secure login method can prevent non-computer users or malicious programs from illegally logging into the system, and biometric technology can ensure that the user himself logs into the system. [0003] In order to achieve the above goal of secure login, Microsoft Corporation (Microsoft TM Corp.) proposed a Secure Device Connection Protocol (Secure Device Connection Protocol, SDCP), so that the computer operating...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/60H04L9/40
CPCG06F21/32G06F21/602H04L63/0428H04L63/0861G06F21/606H04L63/166
Inventor 戴洪海李扬何东宇谭加源
Owner REALTEK SEMICON CORP