CN101436247B - Biological personal identification method and system based on UEFI - Google Patents
Biological personal identification method and system based on UEFI Download PDFInfo
- Publication number
- CN101436247B CN101436247B CN2007101245171A CN200710124517A CN101436247B CN 101436247 B CN101436247 B CN 101436247B CN 2007101245171 A CN2007101245171 A CN 2007101245171A CN 200710124517 A CN200710124517 A CN 200710124517A CN 101436247 B CN101436247 B CN 101436247B
- Authority
- CN
- China
- Prior art keywords
- user
- biological
- uefi
- identification data
- data message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000000605 extraction Methods 0.000 claims description 14
- 239000000284 extract Substances 0.000 claims description 12
- 230000000295 complement effect Effects 0.000 claims description 6
- 230000008676 import Effects 0.000 claims description 5
- 230000006698 induction Effects 0.000 claims description 3
- 210000001525 retina Anatomy 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 description 15
- 238000012795 verification Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000008140 language development Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000001483 mobilizing effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention is applied to the safety field of computers, and provides a method and a system for identifying biological identity based on UEFI. The method comprises the following steps: pre-storing a biological characteristic identifying code of a user; invoking an identity authentication interface of the user from a graph library; displaying the logged graph interface of the user, and prompting the user to input biological identity identifying data information; acquiring the biological identity identifying data information of the user; extracting a characteristic value, and acquiring a biological characteristic identifying code; invoking the biological characteristic identifying code to compare with the pre-stored biological characteristic identifying code; and judging whether the biological characteristic identifying code is matched with the pre-stored biological characteristic identifying code or not, if matched, the authentication for the user is successful. Through adopting biological identity identifying technique under a bottom layer UEFI of the computer, the method integrates a characteristic value extracting algorithm for biological characteristic information in a UEFI chip, supports graphic interface operation, further improves the safety of a computer system, and has easier operation and higher reliability for biological identity identification adopted by the user.
Description
Technical field
The invention belongs to computer safety field, relate in particular to a kind of biological personal identification method and system based on UEFI.
Background technology
The continuous development of Along with computer technology; Information security becomes the focus that people pay close attention to; Particularly on the airport, field such as bank, prison, respective government agencies, military establishment, enterprise computer infosystem, the identity identifying technology of safe ready seems extremely important.
At present; Computer system adopts the method for " ID+password " to carry out user's authentication and granted access control mostly; But password exists and is prone to the potential safety hazard forgeing, can steal, be prone to crack; In a single day password is stolen or is cracked, and loss can be very serious, can cause some important data not read and forget Password.
In order to address the above problem, people utilize the non-reproduction characteristics of physical trait, have imported the bio-identification identity validation technology.This biological secret key of characteristics of human body can't duplicate, and is stolen or pass into silence, and utilizes biological identification technology to carry out the identity identification, safety, reliable, accurately.Adopt biological " key ", you can carry the key of big string, also need not take a lot of trouble note or change password.And the system manager more needn't feel simply helpless because of forgetting Password.The biological identification technology product is easy to matching computer and safety, monitoring, management system integration all by means of modern computer technology, realizes automatic management.
This bio-identification identity validation technology is to utilize human body to carry out a kind of technology of authentication; Through to the biological characteristic sampling, extract unique characteristic and change into digital code by biological recognition system, and further these codes are formed template; When people's entity and biological recognition system carry out interactive authentication; Recognition system is obtained its characteristic and is compared with the feature templates in the database, and determining whether coupling, thereby decision is to accept or refusal.The biological characteristic of User Recognition mainly contains hand-type, fingerprint, shape of face, iris, retina, sound, keystroke dynamics or the like, and wherein, fingerprint is the outstanding person in these biological characteristics, has fixing and unique characteristics.Equivalent risk is usurped in the loss that fingerprint recognition has avoided password, smart card to take place.
Mostly (Operating System OS) realizes down existing fingerprint identity recognizing technology, promptly when the register system, adopts the user fingerprints authentication in operating system.The fingerprint identity recognizing technology brings great convenience to people; And security is greatly improved to a certain extent; But the storage of finger print data and the mode of storage also exist potential safety hazard; Fingerprint be with the stored in form of data, so the storage mode of the storage area of user fingerprints template and finger print information will be realized through reasonable security mechanism after collection converts template to.Under the OS of upper strata, realize the fingerprint identification, level of security is not high, is easy to suffer assault.
(Basic Input and Output System BIOS) as the bottom kernel software, is the bridge between computer system hardware and the upper layer software (applications) to basic input-output system.Develop rapidly along with computer hardware and integrated circuit technique does not but change a lot, so restricted development of computer to a great extent.Traditional BIOS does not have unified standard or standard, and brand is many, compatible bad with hardware; Run on 16 real patterns, host-initiated speed is slow, and hardware initialization after the startup and self check time are long; The assembly language code, exploitation and maintenance cost are high; BIOS will realize that to the service that OS provides the two coupling is high through limited 16 soft interruptions, and the exploitation cost is high.
In order to solve the problem that traditional B IOS faces, new BIOS standard and framework UEFI are suggested.The UEFI full name is Unified Extensible Firmware Interface; Unified Extensible Firmware Interface; Be a kind of opening be used to define the interface specification between platform firmware and the operating system, so-called opening is exactly not rely on specific BIOS and Platform Implementation; UEFI is for operating system and the running status before starting provides a standard environment; How the control of systematically having stipulated computer system passes to operating system from starting preceding environment; It is a kind of high safe BIOS, supports clean boot, drives signature and hash (Hash) technology.The UEFI compatibility is good; Run under 32 or 64 bit patterns, the toggle speed of computing machine is obviously accelerated, and modularization framework, C language development make the extensibility of software and reusability all very strong; And overcome the defective of traditional B IOS storage resources, support graphic interface.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of biological personal identification method and system based on UEFI, is intended to solve under the OS of upper strata to adopt that fingerprint identification technology causes the level of security of system low, the problem of user's inconvenient operation.
The embodiment of the invention is achieved in that a kind of biological personal identification method based on UEFI, and said method comprises the steps:
User's biometric code prestores; Wherein said biometric code is encrypted by the encryption storage unit of Trusted Computing chip; The generation key is right, and the private key of key pair is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the hard disk protection subregion;
In the user interface shape library, select the authenticating user identification interface;
UEFI calls shape library, explicit user login graphical interfaces,
The user of display graphicsization logins graphical interfaces, and the prompting user imports biological identification data message;
Gather user's biological identification data message;
Extract the eigenwert of said biological identification data message, obtain biometric code;
Calling said biometric code compares with the biometric code that prestores;
The biometric code that judges whether and prestore is complementary;
If the biological identification data message of user's input is complementary with the biological identification data message that prestores, then authentification of user success, otherwise explicit user authentification failure, and the meeting of prompting user how many more Times reader.
Another purpose of the embodiment of the invention is to provide a kind of biological identification system based on UEFI, and said system comprises:
The UEFI chip comprises:
Biological identification data information acquisition unit is used to gather user's biological identification data message;
Biological identification data message eigenwert extraction unit is used to extract biological identification data letter
The eigenwert of the user's that the breath collecting unit is gathered biological identification data message obtains biometric code;
The biometric code unit that prestores is used for the biometric code of stored user in advance;
The biometric code comparing unit is used for the user biological feature identification sign indicating number that extracts biological identification data message eigenwert extraction unit and compares with the biometric code that prestores; And UEFI figure supporter, be used for calling the embedded system graphical interfaces that is stored in external unit, the management system pattern manipulation interface of hard disk;
The Trusted Computing chip comprises:
Encrypt storage unit; Be used for the user biological feature identification sign indicating number that said biological identification data message eigenwert extraction unit extracts is encrypted; The generation key is right, and private key is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the protection subregion of hard disk; And
Obtain the biological information sensor of biological attribute data information through induction.
Another purpose of the embodiment of the invention is to provide a kind of computer equipment, and said equipment comprises above-mentioned biological identification system based on UEFI.
The embodiment of the invention is through adopting biological identity recognizing technology under the bottom UEFI of computing machine; Integrated bio characteristic information eigenwert extraction algorithm in the UEFI chip; The operation of support graphic interface; Further improved the security of computer system, made the user adopt that biological authentication is more easy to operate, reliability is higher.
Description of drawings
Fig. 1 is the building-block of logic of computer security system;
Fig. 2 is the realization flow figure of a kind of finger print information acquisition and storage method based on UEFI of providing of the embodiment of the invention;
Fig. 3 is the realization flow figure of a kind of biological personal identification method based on UEFI of providing of the embodiment of the invention;
Fig. 4 is the Organization Chart of a kind of biological identification system based on UEFI of providing of the embodiment of the invention.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
The embodiment of the invention is used the bottom safety certification that UEFI realizes computing machine on the basis of safety hard disk and two key subsystems of Trusted Computing chip, under the prerequisite that guarantees user identity and hard disc data security, support the graphical user interface operation.
Fig. 1 shows the building-block of logic of computer security system, for the ease of explanation, only shows the part relevant with the present invention.This system comprises computer motherboard, safe hard disk, and UEFI chip that computer motherboard carried and Trusted Computing chip, and operation has embedded micro-system (uOS) and protection hidden partition in the safe hard disk.(Universal Serial Bus, USB) interface is connected to mainboard to external units such as collecting biological feature information device, keyboard, the collection of realization user's biological information and the input of user profile through USB.
The Trusted Computing chip is the credible password module in the national Trusted Computing system; It is to be the computing module of core with the crypto-operation; Be the core security control and the arithmetic unit of credible calculating platform, be independent of OS and BIOS or UEFI, not computed memory, external memory resource; Inner realize the standardization with the miscellaneous part interface, and the crypto-operation in the inner safe operation of carrying out is provided through defining disclosed security password algorithm.The Trusted Computing chip is in safety hard disk and the mutual authentication process of UEFI, and the Trusted Computing chip generates and provide the random number key of Virtual User.
Safe hard disk is used for carrying out encrypted command with main frame UEFI, OS and communicates by letter, and carries out the encryption and decryption operation of data turnover; And access according to the encrypted instruction of UEFI and to be stored in that the Trusted Computing chip is the random number key that Virtual User produces in the secure data district.
UEFI is through system management of embedded micro-kernel execute file and hardware resource management; Execution is to the system resource management operation of Trusted Computing chip and safe hard disk; Management Trusted Computing resources of chip (mobilizing function also calls in good time); Realization is to the management of attached fail-safe software module; Like management to the eigenwert extraction algorithm of primeval life characteristic (such as the fingerprint) information of the gathering algorithm consistent with safe hard disk enciphering and deciphering algorithm; The data that are used for initial key according to the user identity fingerprint characteristic value are carried out the storage administration to the Trusted Computing chip, according to the identification strings of safety hard disk and UEFI verification process storage and management to the Trusted Computing chip, and in safety hard disk and the mutual authentication invocation of procedure of UEFI randomizer generation random number.
In the present invention, the key data eigenwert and the user login code that comprise the user profile that is used for verification, extract from the user biological characteristic information.The user profile that is used for verification, and as be kept at the UEFI Flash (flash memory) from the fingerprint characteristic value that user fingerprint image is extracted, the user login code data are kept in the nonvolatile memory of Trusted Computing chip, to guarantee data security.
As one embodiment of the present of invention, user's biological information comprises fingerprint, hand-type, shape of face, retina or the like.
The embodiment of the invention is example with the fingerprint; When the user logined, fingerprint capturer was gathered user fingerprint image, and embedded micro-kernel of UEFI and secure cryptographic algorithm are read in the fingerprint image that collects; Utilize the enciphering and deciphering algorithm fingerprint characteristic value in the image that takes the fingerprint again; With extract and be stored among the UEFI Flash (flash memory) with the fingerprint characteristic value of Trusted Computing chip keys encryption and the user profile of input, user password information directly deposits the Trusted Computing chip in, in being provided with based on the initial password of UEFI; The realization flow of finger print information acquisition and storage method is as shown in Figure 2, and details are as follows:
In step S201, the user selects USB fingerprint collecting equipment, gathers the user fingerprints data message through the finger touch fingerprint equipment;
Among the present invention; When gathering the user fingerprints data message; Not distinguishing selected finger, can be any among ten fingers, also can be the finger of different user; But can only store ten finger print datas at most, each finger print data message is successfully gathered three times finger print data just by record.
In step S202, call the Human biology fingerprint image data eigenwert extraction algorithm program that the UEFI chip is embedded in and extract the effective user fingerprints data message that is write down, obtain fingerprint characteristic value;
In step S203, the fingerprint characteristic value information that is extracted is encrypted by bottom hardware Trusted Computing chip;
In step S204, preserve key, it is right to generate key, and private key is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the protection subregion of hard disk;
In step S205, after single finger print data finishing collecting, can continue to gather other finger print data information of user, get into step S206; Also can withdraw from the finger print data information acquisition system, get into step S207;
In step S206, continue to gather other finger print data messages of user, get back among the step S202;
In step S207, withdraw from the finger print data information acquisition system, access the authenticating user identification interface, and select user biological authentication login;
In step S208, the user imports finger print data information, compares with the finger print data information that prestores in the fingerprint database, carries out authentification of user.
When the user is carried out authentication; Gather user's finger print data frame through fingerprint capturer; By embedded micro-kernel of UEFI and secure cryptographic algorithm the finger print information image that collects is read in; Take the fingerprint finger print information eigenwert in the frame, the finger print information eigenwert and the user profile in the Trusted Computing chip that then finger print information eigenwert of extracting and the deciphering of applied cryptography algorithm are stored among the UEFI Flash (flash memory) compare realization user's authentication.
A kind of biological personal identification method realization flow based on UEFI that the embodiment of the invention provides is as shown in Figure 3, and details are as follows:
In step S301, computer booting starts;
In step S302, hardware initialization is carried out in the UEFI self check, detects user interface (UI) shape library, accesses the authenticating user identification interface;
In step S303, the user selects the authenticating user identification interface in shape library;
In step S304, UEFI calling graph valut, explicit user login graphical interfaces, the prompting user imports biological identification data message (such as fingerprint) and logins;
In the embodiment of the invention, UEFI calling graph valut offers patterned operation interface of user, makes user's more convenient operation.
In step S305, the user imports biological identification data message;
In step S306, UEFI calls the user biological identification data message that collects, and sends out checking command, lets biological identification system that verification is carried out in interrogation and compares with the biological identification data message that prestores;
In step S307, judge whether comparison is successful, is then to get into step S308; , then do not get into step S309;
In step S308, the authenticating user identification success;
In step S309, UEFI calls shape library, explicit user input failure, and prompting user how many more Times chance;
In step S310, judge whether the comparison number of times reaches the number of times of restriction, be then to get into step S311; , then do not get into step S305;
In step S311, the prompting user authentication failure, machine is locked, please contact management person's release.
As one embodiment of the present of invention; When user biological identification data message of importing and the biological identification data message that prestores are not complementary, behind the user authentication failure, point out the user to also have reader meeting several times; When the authentication number of times authentification of user that surpasses setting does not pass through yet; UEFI judges that said authentification of user is attack, at this moment, triggers the Trusted Computing chip and sends a random number to Trusted Computing chip embedded system processor; Force to rewrite the program control register PCR value in the Trusted Computing chip, computing machine is hung up locking.
The Organization Chart of Fig. 4 shows that the embodiment of the invention provides a kind of biological identification system based on UEFI, it is existing that details are as follows:
This biology identification system comprises computer motherboard, the UEFI chip that is carried on the mainboard, Trusted Computing chip, and the biological information sensor that is connected with the Trusted Computing chip.
Wherein, the UEFI chip comprises biological identity identification information collecting unit, is used to gather user's biological identification data message; Biological identity identification information eigenwert extraction unit is used to extract the eigenwert of the user's who gathers biological identification data information acquisition unit biological identification data message, obtains biometric code; The biometric code unit that prestores is used for the biometric code of stored user in advance; The biometric code comparing unit is used for the user biological feature identification sign indicating number that extracts biological identity identification information eigenwert extraction unit and compares with the biometric code that prestores.
In the embodiment of the invention, the UEFI built-in chip type UEFI figure supporter, be used for calling the embedded system graphical interfaces that is stored in external unit, the management system pattern manipulation interface of hard disk.
The Trusted Computing chip comprises the encryption storage unit; Be used for the user biological feature identification sign indicating number that said biological identity identification information eigenwert extraction unit extracts is encrypted; The generation key is right; Private key is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the protection subregion of hard disk.
In the embodiment of the invention, the biological information sensor can be mainboard, keyboard, mouse or the casing surface that is flush-mounted in computing machine, also can be used as autonomous device and is connected with the UEFI chip through the data communication connecting line.The biological information sensor can be optical bio characteristic information sensor, semiconductor biological information sensor, ultrasound wave biological information sensor, comprises that also all can obtain the sensor of biological attribute data information through induction.
The embodiment of the invention not only can be used for computing machine, can also be used for any computer equipment that all have bottom UEFI, such as desktop computer, notebook computer, server, handheld device, touch screen computer and smart phone etc.
The embodiment of the invention is through adopting biological identity recognizing technology under the bottom UEFI of computing machine; Integrated fingerprint eigenwert extraction algorithm in the UEFI chip; The operation of support graphic interface; Further improved the security of computer system, made the user adopt that biological authentication is more easy to operate, reliability is higher.
The above is merely preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of within spirit of the present invention and principle, being done, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (9)
1. the biological personal identification method based on UEFI is characterized in that, said method comprises the steps:
User's biometric code prestores; Wherein said biometric code is encrypted by the encryption storage unit of Trusted Computing chip; The generation key is right, and the private key of key pair is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the hard disk protection subregion;
In the user interface shape library, select the authenticating user identification interface;
UEFI calls shape library, explicit user login graphical interfaces,
The user of display graphicsization logins graphical interfaces, and the prompting user imports biological identification data message;
Gather user's biological identification data message;
The biological identification data message that embedded micro-kernel of UEFI and secure cryptographic algorithm will collect reads in;
Utilize enciphering and deciphering algorithm to extract the eigenwert of said biological identification data message, obtain biometric code;
Calling said biometric code compares with the biometric code that prestores;
The biometric code that judges whether and prestore is complementary;
If the biological identification data message of user's input is complementary with the biological identification data message that prestores, then authentification of user success, otherwise explicit user authentification failure, and the meeting of prompting user how many more Times reader.
2. the method for claim 1 is characterized in that, the pre-storage method of said biometric code comprises the steps:
Biological information through biological information sensor acquisition user;
Call eigenwert extraction algorithm program that the UEFI chip is embedded in and extract the eigenwert of the user biological characteristic information that is collected, obtain biometric code;
By bottom hardware Trusted Computing chip said biometric code is encrypted; And
The generation key is right, and private key is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the protection subregion of hard disk.
3. the method for claim 1; It is characterized in that; When the biological identification data message of user input is not complementary with the biological identification data message that prestores, the explicit user authentification failure, the prompting user also has reader meeting several times; When the authentication number of times authentification of user that surpasses setting passed through yet, UEFI judged that said authentification of user is attack.
4. method as claimed in claim 3; It is characterized in that; When UEFI judges that said authentification of user is attack; Trigger the Trusted Computing chip and send a random number, force to rewrite the program control register PCR value in the Trusted Computing chip, computing machine is hung up locking to Trusted Computing chip embedded system processor.
5. like the arbitrary described method of claim 1-4, it is characterized in that said biological information comprises fingerprint, hand-type, shape of face, retina and other, and all can be used to the information of biological identification.
6. biological identification system based on UEFI is characterized in that said system comprises:
The UEFI chip comprises:
Biological identification data information acquisition unit is used to gather user's biological identification data message;
Read in the unit, be used for reading in through the biological identification data message that embedded micro-kernel of UEFI and secure cryptographic algorithm will collect;
Biological identification data message eigenwert extraction unit is used to utilize enciphering and deciphering algorithm to extract the eigenwert of the user's who gathers biological identification data information acquisition unit biological identification data message, obtains biometric code;
The biometric code unit that prestores is used for the biometric code of stored user in advance;
The biometric code comparing unit is used for the user biological feature identification sign indicating number that extracts biological identification data message eigenwert extraction unit and compares with the biometric code that prestores; And
UEFI figure supporter is used for calling the embedded system graphical interfaces that is stored in external unit, the management system pattern manipulation interface of hard disk;
The Trusted Computing chip comprises:
Encrypt storage unit; Be used for the user biological feature identification sign indicating number that said biological identification data message eigenwert extraction unit extracts is encrypted; The generation key is right, and private key is stored in the Trusted Computing chip, and PKI and data encrypted are stored in the protection subregion of hard disk; And
Obtain the biological information sensor of biological attribute data information through induction.
7. system as claimed in claim 6 is characterized in that, said biological information sensor is flush-mounted in mainboard, keyboard, mouse or the casing surface of computing machine, perhaps is connected with the UEFI chip through the data communication connecting line as autonomous device.
8. computer equipment that comprises the biological identification system based on UEFI as claimed in claim 6.
9. computer equipment as claimed in claim 8, said equipment are desktop computer, notebook computer, server, handheld device, touch screen computer or the smart phones that has bottom UEFI.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101245171A CN101436247B (en) | 2007-11-12 | 2007-11-12 | Biological personal identification method and system based on UEFI |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101245171A CN101436247B (en) | 2007-11-12 | 2007-11-12 | Biological personal identification method and system based on UEFI |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101436247A CN101436247A (en) | 2009-05-20 |
CN101436247B true CN101436247B (en) | 2012-04-11 |
Family
ID=40710681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007101245171A Expired - Fee Related CN101436247B (en) | 2007-11-12 | 2007-11-12 | Biological personal identification method and system based on UEFI |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101436247B (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101626296B (en) * | 2009-05-27 | 2012-04-18 | 飞天诚信科技股份有限公司 | Method for improving input information security and biological information acquisition equipment |
CN101986325A (en) * | 2010-11-01 | 2011-03-16 | 山东超越数控电子有限公司 | Computer security access control system and method |
CN102983969B (en) * | 2011-09-05 | 2015-06-24 | 国民技术股份有限公司 | Security login system and security login method for operating system |
CN102508611A (en) * | 2011-11-18 | 2012-06-20 | 广州广电运通金融电子股份有限公司 | Information verification method and information verification system based on touch screen |
CN103138927B (en) * | 2011-12-01 | 2015-12-16 | 航天信息股份有限公司 | A kind of for key controlling method in the encrypted memory device of finger print identifying |
CN102624699B (en) * | 2012-01-19 | 2015-07-08 | 歌尔声学股份有限公司 | Method and system for protecting data |
CN103838994B (en) * | 2012-02-29 | 2017-11-14 | 汪风珍 | Computer memory is locked |
CN104049833A (en) * | 2013-03-15 | 2014-09-17 | 中兴通讯股份有限公司 | Terminal screen image displaying method based on individual biological characteristics and terminal screen image displaying device based on individual biological characteristics |
FR3005175B1 (en) * | 2013-04-24 | 2018-07-27 | Myscript | PERMANENT SYNCHRONIZATION SYSTEM FOR MANUSCRITE INPUT |
CN104301295A (en) * | 2013-07-19 | 2015-01-21 | 中兴通讯股份有限公司 | Short-distance wireless communication transaction authentication method and system |
CN103971094A (en) * | 2014-04-27 | 2014-08-06 | 汪风珍 | Biological code lock |
CN105337739B (en) * | 2014-07-29 | 2019-01-18 | 阿里巴巴集团控股有限公司 | Safe login method, device, server and terminal |
CN104580136A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | UEFI-based long-distance identity authentication system and method |
CN104598793A (en) * | 2015-01-08 | 2015-05-06 | 百度在线网络技术(北京)有限公司 | Fingerprint authentication method and fingerprint authentication device |
CN105989273B (en) * | 2015-02-13 | 2019-06-25 | 联想(上海)信息技术有限公司 | Application program login method, device and electronic equipment |
CN105187412B (en) * | 2015-08-18 | 2018-05-29 | 广州密码科技有限公司 | A kind of login authentication method based on gesture identification, apparatus and system |
CN105117629A (en) * | 2015-08-21 | 2015-12-02 | 京东方科技集团股份有限公司 | Electronic device control method and apparatus, and electronic device |
CN105262731B (en) * | 2015-09-21 | 2018-06-15 | 苏州全帮全网络科技有限公司 | A kind of identity information verification system based on fingerprint |
CN105357667B (en) * | 2015-10-22 | 2019-04-30 | 东信和平科技股份有限公司 | A kind of novel electron identity identifies smart card and discrimination method |
CN113114700B (en) * | 2015-10-26 | 2024-01-09 | 创新先进技术有限公司 | Method and equipment for processing identity recognition, business processing and biological characteristic information |
CN107392002A (en) * | 2016-05-17 | 2017-11-24 | 中兴通讯股份有限公司 | A kind of method and device for the dummy machine system for logging in cloud desktop |
CN107451514B (en) * | 2016-05-31 | 2020-08-18 | 展讯通信(上海)有限公司 | Method and device for authenticating biological characteristic information |
CN107330836A (en) * | 2017-06-30 | 2017-11-07 | 上学啦(深圳)科技有限公司 | A kind of missing finding method and its device based on biological characteristic |
CN108064376A (en) * | 2017-11-20 | 2018-05-22 | 深圳市汇顶科技股份有限公司 | System starts method of calibration and system, electronic equipment and computer storage media |
CN107728739A (en) * | 2017-11-30 | 2018-02-23 | 湖南长城银河科技有限公司 | All-in-one based on Feiteng processor |
CN108133534A (en) * | 2018-01-16 | 2018-06-08 | 深圳市爱克信智能股份有限公司 | A kind of electric lock controller encryption method |
CN109067766A (en) * | 2018-08-30 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of identity identifying method, server end and client |
JP6871411B2 (en) | 2019-03-29 | 2021-05-12 | アドバンスド ニュー テクノロジーズ カンパニー リミテッド | Secure execution of cryptographic operations |
CN110431803B (en) * | 2019-03-29 | 2022-11-18 | 创新先进技术有限公司 | Managing encryption keys based on identity information |
EP3610607B1 (en) | 2019-03-29 | 2021-08-25 | Advanced New Technologies Co., Ltd. | Cryptographic key management based on identity information |
AU2019204724C1 (en) | 2019-03-29 | 2021-12-09 | Advanced New Technologies Co., Ltd. | Cryptography chip with identity verification |
CN109918887A (en) * | 2019-04-03 | 2019-06-21 | 中电科技(北京)有限公司 | Firmware layer fingerprint identification method and computer system based on UEFI |
CN110489956B (en) * | 2019-08-26 | 2022-11-22 | 顺德职业技术学院 | Computer data security protection method and system |
CN112418863B (en) * | 2020-08-03 | 2023-09-01 | 中国银联股份有限公司 | Client, cloud server, and identity recognition method, system and computer storage medium thereof |
CN112966276B (en) * | 2021-04-02 | 2022-08-16 | 杭州华澜微电子股份有限公司 | Method, device and medium for safely starting computer |
WO2022237550A1 (en) * | 2021-05-11 | 2022-11-17 | 天地融科技股份有限公司 | Access control authentication method, apparatus and system for preventing privacy leak |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936761A (en) * | 2005-09-23 | 2007-03-28 | 联想(北京)有限公司 | Computer system of bottom identity identification and method therefor |
-
2007
- 2007-11-12 CN CN2007101245171A patent/CN101436247B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936761A (en) * | 2005-09-23 | 2007-03-28 | 联想(北京)有限公司 | Computer system of bottom identity identification and method therefor |
Non-Patent Citations (2)
Title |
---|
倪越峰等.一种新的EAP协议及其应用.计算机工程30.2004,30188-190. * |
贺臻杰.基于EFI/Tiano体系的密码系统研究与应用.浙江大学论文.2006,全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN101436247A (en) | 2009-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101436247B (en) | Biological personal identification method and system based on UEFI | |
CN201126581Y (en) | Biological personal identification apparatus based on UEFI | |
US10992659B2 (en) | Multi-factor authentication devices | |
US10068076B1 (en) | Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior | |
JP6239788B2 (en) | Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium | |
US6741729B2 (en) | Fingerprint recognition system | |
JP5028194B2 (en) | Authentication server, client terminal, biometric authentication system, method and program | |
CN102254119B (en) | Safe mobile data storage method based on fingerprint U disk and virtual machine | |
WO2005071558A1 (en) | Remote access system, gateway, client device, program, and storage medium | |
Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
CN101739622A (en) | Trusted payment computer system | |
EP2713328B1 (en) | Validating a transaction with a secure input without requiring pin code entry | |
CN102024115B (en) | Computer with user security subsystem | |
CN108694310A (en) | Refer to vein identification computer lock system | |
US11875605B2 (en) | User authentication for an information handling system using a secured stylus | |
CN202217282U (en) | Safety data memory system based on finger print universal serial bus (USB) flash disk and virtual machine | |
Paul et al. | IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't | |
Avdić | Use of biometrics in mobile banking security: case study of Croatian banks | |
BR102020015872A2 (en) | SYSTEM AND METHOD FOR USER AUTHENTICATION AND / OR AUTHORIZATION | |
CN201845340U (en) | Safety computer provided with user safety subsystem | |
CN109784022A (en) | System authentication method and device based on bio-identification under a kind of Linux | |
Algarni | An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology | |
CN101739623A (en) | Trusted payment computer system | |
KR101601841B1 (en) | User authentication method using virtual keypad of user terminal | |
JP2007133658A (en) | Cardless authentication system, cardless authentication method to be used for same, and cardless authentication program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong Patentee after: CHINA GREAT WALL TECHNOLOGY GROUP Co.,Ltd. Address before: 518057 computer building of the Great Wall, Nanshan District science and Technology Park, Shenzhen, Guangdong Patentee before: CHINA GREATWALL COMPUTER SHENZHEN Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120411 |