Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (2): 66-76.doi: 10.11959/j.issn.2096-109x.2017.00143

• Academic paper • Previous Articles    

Trusted computing mobile terminal application research based on biometric trusted access protocol

Jun XU1,2()   

  1. 1 Safety Training Department of North China Institute of Science and Technology, Langfang 065201, China
    2 National Safety Training Center of Coal Mines, Langfang 065201, China
  • Revised:2017-01-18 Online:2017-02-01 Published:2017-02-10

Abstract:

The architecture of safety production monitoring platform was discussed based on the discussion of the TPM trusted platform, the hardware architecture based on trusted mobile platform of ARM + DSP dual core proces-sor was proposed, the user access to the process of biometric authentication and user terminal hardware authentica-tion properties of registration protocol were proposed, and its performance was analyzed. The experimental results show that the new protocol has a small increase in the time overhead, and the fingerprint template is updated in TPM, which effectively increases the recognition rate.

Key words: mobile communication, wireless sensor network, trusted computing

CLC Number: 

No Suggested Reading articles found!