CN102054140A - Universal password variable-lengthencryption authentication method - Google Patents

Universal password variable-lengthencryption authentication method Download PDF

Info

Publication number
CN102054140A
CN102054140A CN2010105563160A CN201010556316A CN102054140A CN 102054140 A CN102054140 A CN 102054140A CN 2010105563160 A CN2010105563160 A CN 2010105563160A CN 201010556316 A CN201010556316 A CN 201010556316A CN 102054140 A CN102054140 A CN 102054140A
Authority
CN
China
Prior art keywords
key
user
password
group
chip microcomputer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105563160A
Other languages
Chinese (zh)
Inventor
李茂奎
罗路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Original Assignee
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University filed Critical Shandong University
Priority to CN2010105563160A priority Critical patent/CN102054140A/en
Publication of CN102054140A publication Critical patent/CN102054140A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a universal password variable-length encryption authentication method, which belongs to the technical field of password encryption safety. Equipment comprises a singlechip, a keyboard, a liquid crystal displayer and an audible and visual alarm module, and is characterized in that: the singlechip is connected with the keyboard, the liquid crystal displayer and the audible and visual alarm respectively; the keys of the keyboard comprise random keys, an OK key and number keys; and the equipment is connected to a used password input terminal or a password authentication system. In the method, a self-defined algorithm is used to calculate random numbers and the result of the calculation is used for authentication. Thus, the authentication method uses an algorithm in place of a key, so the memorization of a complex key is avoided and the safety of the key and the algorithm can be improved effectively.

Description

The elongated enciphering authentication of a kind of universal code
Technical field
The elongated enciphering authentication of a kind of universal code belongs to password encryption safety technique field.
Background technology
At present, most of ATM, bank card, various encryption devices etc., in order to increase security and confidentiality, all be the mode that adopts record six bit digital passwords basically, promptly each user is by importing six numerals that have been saved in the computing machine and login or confirming identity.This cipher mode is simple, and this secret mode has a defective, be easy to exactly by some lawless persons by certain means stealing passwords, as camera is installed, paste the recording sheet of some specific functions, the security and the confidentiality of password are reduced greatly, brought very big hidden danger for user's personal information and privacy.The patent No. is 200720173857.9, denomination of invention promptly belongs to these row for the patented claim of " dial-type coded lock ".
Summary of the invention
For overcoming the defective of prior art, the invention provides the elongated enciphering authentication of a kind of universal code, employing is made algorithm by oneself random number is calculated, and the result is used for checking, the verification method that promptly replaces key with algorithm, the degree of safety that can avoid remembering complicated key and effectively improve key and algorithm.
Technical scheme of the present invention is as follows:
The elongated enciphering authentication of a kind of universal code is used for various password entry terminals, password authentification place, and step is as follows:
1) powers on;
2) single-chip microcomputer judges whether " random by key " is pressed, and is to change next step over to, six random numbers of liquid crystal display; Otherwise change step 2 over to), do not show;
3) " random by key " determined to press, and the user,, is input to one group of elongated data in the single-chip microcomputer by elongated cryptographic algorithm one group of random number of liquid crystal display according to the cryptographic algorithm of own setting, and presses " determining key ";
4) single-chip microcomputer can be judged one group of data of user's input, if correct judgment changes step 5) over to; Misjudgment then changes step 4) over to, and the user need import one group of data once more; The number of times that the user imports one group of data is that errors number can not surpass three times, otherwise monolithic opportunity driven sound and light alarm module is carried out sound and light alarm, and locking user's operation;
5) user carries out other operations, as the cryptographic algorithm of user's modification oneself or at bank's access money etc.
The employed equipment of a kind of above-mentioned verification method comprises single-chip microcomputer, keyboard, LCD and acousto-optic alarm module, it is characterized in that single-chip microcomputer is connected with keyboard, LCD and acousto-optic alarm module respectively; Wherein the button of keyboard comprises random by key, determines key and numerical key; This equipment is connected in employed password entry terminal or the password validation system.
When the user uses the equipment of this elongated password encryption at every turn among the present invention, equipment all can generate one group of random number A to the user automatically, and figure place of this group random number A can generate manufacturer oneself by different encryption devices and determines, also can by user oneself selection need the figure place of one group of random number.The user is converted into other one group of data B with this group random number A by algorithm, the one group of data B that converts is input in the encryption device goes, and equipment can mate you one group of data B of input.Encryption device is when producing one group of random number A, equipment can be converted into other one group of data C with this group random number A by the algorithm that user oneself sets automatically, and remain, mate with the password of user's input, if the C as a result that converts is the same with the A as a result of input, i.e. C=B, then the password input is correctly, otherwise, the password input error.Be that the password that the user uses is dynamic preservation like this, and no longer be static preservation.And what the algorithm that oneself is kept at the setting in the encryption device of just will knowing that the user needs is, the equipment that accesses to your password that just can be convenient and safe.
Key arrangement synoptic diagram on the device keyboard used herein as shown in Figure 2, wherein " 0 " shown in the figure is a numerical key to " 9 ", the lower left corner is random by key among the figure, its function is to click six random numbers that liquid crystal display shows can change; The lower right corner is to determine key among the figure.System powers at every turn, and liquid crystal display all can show " the novel cipher encryption system is landed in welcome "; When the user clicks " random by key ", liquid crystal display can produce six random number, whenever press once, random number can change, the user can be by repeatedly, up to selecting oneself one group of satisfied random number, if six random numbers that one group of single-chip microcomputer that we select produces are 123456, we suppose that algorithm that user oneself sets is that the random number of each generation all adds one (N+1) now, the password that need input of user is then should be 234567 (1+1=2,2+1=3,3+1=4 so, 4+1=5,5+1=6 6+1=7), is N square (NxN) if user's set algorithm is the random number of each generation, the random number of supposing six generations still is 123456, the password of user's input is 149162536 (1x1=1,2x2=4,3x3=9 so, 4x4=16,5x5=25,6x6=36). certainly, the user also can revise the algorithm of the inside, just needing increases button, expands its function and just can.
Cipher mode of the present invention, increased the security of password greatly, because the simple algorithm of being made up of the addition subtraction multiplication and division in the mathematics can be hundreds of millions of, and the user can to array at random any algorithm that design is different, improved the security of password greatly, simultaneously the user has not worried danger that password is taken on the sly by some lawless persons.With 6 bit digital passwords is example: password combination is 10 6, behind application the present invention, password combination only is subjected to concrete application limitations, is combined as infinite.The present invention can be applied to present various password entry terminal, password authentification place.
Description of drawings
Fig. 1 is the structural representation of equipment used in the present invention.
Wherein: 1, single-chip microcomputer, 2, keyboard, 3, LCD, 4, the sound and light alarm module.
Fig. 2 is the key arrangement synoptic diagram on the device keyboard used herein.
Fig. 3 is the FB(flow block) of the inventive method.Wherein: 1)-5) be its each step.
Embodiment
Below in conjunction with drawings and Examples the present invention is further specified, but be not limited thereto.
Embodiment 1:
The elongated enciphering authentication of a kind of universal code is used for various password entry terminals, password authentification place, and as shown in Figure 3, step is as follows:
1) powers on;
2) single-chip microcomputer judges whether " random by key " is pressed, and is to change next step over to, six random numbers of liquid crystal display; Otherwise change step 2 over to), do not show;
3) " random by key " determined to press, and the user,, is input to one group of elongated data in the single-chip microcomputer by elongated cryptographic algorithm one group of random number of liquid crystal display according to the cryptographic algorithm of own setting, and presses " determining key ";
4) single-chip microcomputer can be judged one group of data of user's input, if correct judgment changes step 5) over to; Misjudgment then changes step 4) over to, and the user need import one group of data once more; The number of times that the user imports one group of data is that errors number can not surpass three times, otherwise monolithic opportunity driven sound and light alarm module is carried out sound and light alarm, and locking user's operation;
5) user carries out other operations, as the cryptographic algorithm of user's modification oneself or at bank's access money etc.
Embodiment 2:
The employed equipment of a kind of above-mentioned verification method as shown in Figure 1, comprises single-chip microcomputer 1, keyboard 2, LCD 3 and acousto-optic alarm module 4, it is characterized in that single-chip microcomputer 1 is connected with keyboard 2, LCD 3 and acousto-optic alarm module 4 respectively; Wherein the button of keyboard 2 comprises random by key, determines key and numerical key; This equipment is connected in employed password entry terminal or the password validation system.

Claims (2)

1. the elongated enciphering authentication of universal code is used for various password entry terminals, password authentification place, and step is as follows:
1) powers on;
2) single-chip microcomputer judges whether " random by key " is pressed, and is to change next step over to, six random numbers of liquid crystal display; Otherwise change step 2 over to), do not show;
3) " random by key " determined to press, and the user,, is input to one group of elongated data in the single-chip microcomputer by elongated cryptographic algorithm one group of random number of liquid crystal display according to the cryptographic algorithm of own setting, and presses " determining key ";
4) single-chip microcomputer can be judged one group of data of user's input, if correct judgment changes step 5) over to; Misjudgment then changes step 4) over to, and the user need import one group of data once more; The number of times that the user imports one group of data is that errors number can not surpass three times, otherwise monolithic opportunity driven sound and light alarm module is carried out sound and light alarm, and locking user's operation;
5) user carries out other operations, as the cryptographic algorithm of user's modification oneself or at bank's access money etc.
2. the equipment that uses of verification method according to claim 1 comprises single-chip microcomputer, keyboard, LCD and acousto-optic alarm module, it is characterized in that single-chip microcomputer is connected with keyboard, LCD and acousto-optic alarm module respectively; Wherein the button of keyboard comprises random by key, determines key and numerical key; This equipment is connected in employed password entry terminal or the password validation system.
CN2010105563160A 2010-11-24 2010-11-24 Universal password variable-lengthencryption authentication method Pending CN102054140A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105563160A CN102054140A (en) 2010-11-24 2010-11-24 Universal password variable-lengthencryption authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105563160A CN102054140A (en) 2010-11-24 2010-11-24 Universal password variable-lengthencryption authentication method

Publications (1)

Publication Number Publication Date
CN102054140A true CN102054140A (en) 2011-05-11

Family

ID=43958447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105563160A Pending CN102054140A (en) 2010-11-24 2010-11-24 Universal password variable-lengthencryption authentication method

Country Status (1)

Country Link
CN (1) CN102054140A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411682A (en) * 2011-08-01 2012-04-11 吴成贵 Password setting and authentication method
CN103763104A (en) * 2014-01-02 2014-04-30 ***(深圳)有限公司 Method and system for dynamic verification
CN109214147A (en) * 2018-09-28 2019-01-15 内蒙古师范大学 A kind of encryption system of accounting software

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1851788A (en) * 2006-03-30 2006-10-25 周忠杰 Password setting metod
CN101216923A (en) * 2008-01-07 2008-07-09 中国工商银行股份有限公司 A system and method to enhance the data security of e-bank dealings
CN101603396A (en) * 2009-07-06 2009-12-16 芜湖欣兰德工业制品有限责任公司 A kind of intelligent coffer and control method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1851788A (en) * 2006-03-30 2006-10-25 周忠杰 Password setting metod
CN101216923A (en) * 2008-01-07 2008-07-09 中国工商银行股份有限公司 A system and method to enhance the data security of e-bank dealings
CN101603396A (en) * 2009-07-06 2009-12-16 芜湖欣兰德工业制品有限责任公司 A kind of intelligent coffer and control method thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411682A (en) * 2011-08-01 2012-04-11 吴成贵 Password setting and authentication method
CN102411682B (en) * 2011-08-01 2014-01-01 吴成贵 Password setting and authentication method
CN103763104A (en) * 2014-01-02 2014-04-30 ***(深圳)有限公司 Method and system for dynamic verification
CN103763104B (en) * 2014-01-02 2018-05-22 中移信息技术有限公司 A kind of method and system of dynamic authentication
CN109214147A (en) * 2018-09-28 2019-01-15 内蒙古师范大学 A kind of encryption system of accounting software

Similar Documents

Publication Publication Date Title
CN102422296B (en) Method for authenticating access to a secured chip by a test device
CN101106455B (en) Identity authentication method and intelligent secret key device
CN103793636B (en) A kind of method of equipment and protection equipment privacy
WO2015100475A1 (en) Secure storage of data among multiple devices
CN103929306A (en) Intelligent secret key device and information management method of intelligent secret key device
TWI617937B (en) Fingerprint encoding method, fingerprint authentication method and system
CN101923619A (en) Password key camouflage system and method
EP1922666A1 (en) Method and arrangement for user friendly device authentication
CN101789864A (en) On-line bank background identity identification method, device and system
CN101567055B (en) Testimony password interlock device, testimony verification device and system, testimony password interlock and testimony verification method
CN104408363A (en) Safe password system
CN101877636A (en) Equation password encryption method
Singhal et al. Software tokens based two factor authentication scheme
CN102054140A (en) Universal password variable-lengthencryption authentication method
CN103685216A (en) Information processing apparatus, information processing system, information processing method, program and client terminal
CN102693382B (en) A kind of anti-endoscope devices of password and the anti-method of peeping thereof
CN101510875B (en) Identification authentication method based on N-dimension sphere
CN116823271A (en) Secure payment method, apparatus, electronic device and medium
WO2011124267A1 (en) Authentication system and method thereof
CN115208676B (en) Data encryption method and system based on blockchain technology
CN115767552A (en) Vehicle unlocking method and device, computer equipment and storage medium
Vishnoi et al. Text encryption for lower bandwidth channels: Design and implementation
CN103701603A (en) Method, terminal, equipment and system of utilizing internet banking to draw lottery
CN101763473A (en) Variable cipher device and method
KR20130007226A (en) Finantial transaction information certification system and method using 2 dimensional barcode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110511