Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity control method based on credibility platform module and fingerprint identifying

A platform module and fingerprint recognition technology, applied in character and pattern recognition, instruments, digital data authentication, etc., can solve problems such as incompetence for large-scale and complex computing tasks, and achieve the goal of making up for insufficient computing power, high reliability and security Effect

Active Publication Date: 2007-05-30
SHENZHEN SINOSUN TECH
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the popularization of TPM chips, low-cost and high-security designs are generally adopted in the world; because TPM does not need to perform a large number of data calculation functions, TPM chips currently produced at home and abroad are widely used as 8-bit or 16-bit CPUs. Central processing unit, and this kind of CPU is definitely not capable of performing large-scale and complex computing tasks like image pattern recognition algorithms
[0009] Mode 3: Only the fingerprint feature comparison algorithm with a small amount of calculation in the fingerprint recognition algorithm is embedded into the TPM chip. Although this mode solves the defect of TPM's computing power, there is a fatal weakness, that is, the TPM does not analyze the user's fingerprint feature information. After comparing with the fingerprint template, the result of matching or not can only be passed to the upper layer for further processing. In this way, if the upper layer system is attacked, the processing link of the TPM return result will be bypassed, which will make the entire TPM fingerprint identification system useless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity control method based on credibility platform module and fingerprint identifying
  • An identity control method based on credibility platform module and fingerprint identifying

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Preferred embodiments of the present invention are described in detail below.

[0027] The invention provides an identity control method based on a trusted platform module and fingerprint identification, which is applied to a trusted computer system, and the system includes: a standard computer motherboard and chipset, a CPU central processing unit chip, RAM memory, and external storage such as a hard disk , as well as TPM chip and fingerprint sensor. The system also needs to have a software operating environment, including: trusted basic input and output system BIOS, trusted operating system OS, TPM chip firmware (Firmware) program and TPM initialization application software, and BIOS and OS drivers related to fingerprint sensors program, user fingerprint registration management and other application software.

[0028] The identity control method based on trusted platform module and fingerprint identification of the present invention is shown in Fig. 1, which includes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity control method based on TPM and fingerprint identification that includes steps: A1, presetting the fingerprint characteristic information module, the module is protected by the TPM; A2, the fingerprint collecting module collects the image information of present user's fingerprint, and the information is transmitted to the fingerprint extracting module; A3, the fingerprint extracting module extracts and calculates the characteristic of fingerprint, and the results is sent to the TMP chip; A4, The fingerprint comparison module of the TMP chip compares with the fingerprint characteristic data extracted this time according to the fingerprint characteristic module to identify the user's identity; A5, the TPM chip judges that the user has the authority to operate the computer according to the comparing result and to execute the step A6, otherwise execute the step A7; A6, the TPM chip works normally and executes the operation of user's requirement; A7, the TPM chip is in inactive state and rejects the operation of user's requirement, and return the error information for upper layer.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a method for computer user identification and authority control using fingerprint biometric technology and trusted platform module chip technology. Background technique [0002] With the advent of the Internet age, information security has become a common concern of computer users. People have higher and higher requirements for computer security. The application of fingerprint recognition technology in computer user identification and operation access authority confirmation is also increasing. widely. [0003] Before the Trusted Platform Module (TPM, Trusted Platform Module) chip appeared, fingerprint recognition technology mainly adopted two implementation modes in the application of computer user identity authentication: [0004] Mode 1: Fingerprint recognition and comparison algorithms are realized entirely through computer software. This mode cannot realize user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06K9/00G06F21/32G06F21/71
Inventor 杨晶刘宏伟张璐
Owner SHENZHEN SINOSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products