JOURNAL ARTICLE

Research on gesture cryptographic platform based on trusted computing

Abstract

To solve the multi-user identification problems in multi-touch system, based on trusted computing theory, this paper presents the identity authentication platform which is realized with gesture passwords. It uses the collaboration of four cameras to locate touches and quantities gesture tracks, and then calculates the hash values as user passwords. It realizes identity authentication by comparing the passwords that users input with the ones stored in TPM. Identity authentication platform is regarded as a part of the trusted chain. And it builds the root of trust through trusted booting process to ensure the whole platform trusted.

Keywords:
Direct Anonymous Attestation Password Computer science Trusted Computing Authentication (law) Identity (music) Hash function Trusted Platform Module Computer security Cryptography Process (computing) Gesture Human–computer interaction Operating system Artificial intelligence

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
6
Refs
0.13
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cloud Computing and Remote Desktop Technologies
Physical Sciences →  Computer Science →  Hardware and Architecture
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Mobile Agent-Based Network Management
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.