CN102054140A - Universal password variable-lengthencryption authentication method - Google Patents
Universal password variable-lengthencryption authentication method Download PDFInfo
- Publication number
- CN102054140A CN102054140A CN2010105563160A CN201010556316A CN102054140A CN 102054140 A CN102054140 A CN 102054140A CN 2010105563160 A CN2010105563160 A CN 2010105563160A CN 201010556316 A CN201010556316 A CN 201010556316A CN 102054140 A CN102054140 A CN 102054140A
- Authority
- CN
- China
- Prior art keywords
- key
- user
- password
- group
- chip microcomputer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a universal password variable-length encryption authentication method, which belongs to the technical field of password encryption safety. Equipment comprises a singlechip, a keyboard, a liquid crystal displayer and an audible and visual alarm module, and is characterized in that: the singlechip is connected with the keyboard, the liquid crystal displayer and the audible and visual alarm respectively; the keys of the keyboard comprise random keys, an OK key and number keys; and the equipment is connected to a used password input terminal or a password authentication system. In the method, a self-defined algorithm is used to calculate random numbers and the result of the calculation is used for authentication. Thus, the authentication method uses an algorithm in place of a key, so the memorization of a complex key is avoided and the safety of the key and the algorithm can be improved effectively.
Description
Technical field
The elongated enciphering authentication of a kind of universal code belongs to password encryption safety technique field.
Background technology
At present, most of ATM, bank card, various encryption devices etc., in order to increase security and confidentiality, all be the mode that adopts record six bit digital passwords basically, promptly each user is by importing six numerals that have been saved in the computing machine and login or confirming identity.This cipher mode is simple, and this secret mode has a defective, be easy to exactly by some lawless persons by certain means stealing passwords, as camera is installed, paste the recording sheet of some specific functions, the security and the confidentiality of password are reduced greatly, brought very big hidden danger for user's personal information and privacy.The patent No. is 200720173857.9, denomination of invention promptly belongs to these row for the patented claim of " dial-type coded lock ".
Summary of the invention
For overcoming the defective of prior art, the invention provides the elongated enciphering authentication of a kind of universal code, employing is made algorithm by oneself random number is calculated, and the result is used for checking, the verification method that promptly replaces key with algorithm, the degree of safety that can avoid remembering complicated key and effectively improve key and algorithm.
Technical scheme of the present invention is as follows:
The elongated enciphering authentication of a kind of universal code is used for various password entry terminals, password authentification place, and step is as follows:
1) powers on;
2) single-chip microcomputer judges whether " random by key " is pressed, and is to change next step over to, six random numbers of liquid crystal display; Otherwise change step 2 over to), do not show;
3) " random by key " determined to press, and the user,, is input to one group of elongated data in the single-chip microcomputer by elongated cryptographic algorithm one group of random number of liquid crystal display according to the cryptographic algorithm of own setting, and presses " determining key ";
4) single-chip microcomputer can be judged one group of data of user's input, if correct judgment changes step 5) over to; Misjudgment then changes step 4) over to, and the user need import one group of data once more; The number of times that the user imports one group of data is that errors number can not surpass three times, otherwise monolithic opportunity driven sound and light alarm module is carried out sound and light alarm, and locking user's operation;
5) user carries out other operations, as the cryptographic algorithm of user's modification oneself or at bank's access money etc.
The employed equipment of a kind of above-mentioned verification method comprises single-chip microcomputer, keyboard, LCD and acousto-optic alarm module, it is characterized in that single-chip microcomputer is connected with keyboard, LCD and acousto-optic alarm module respectively; Wherein the button of keyboard comprises random by key, determines key and numerical key; This equipment is connected in employed password entry terminal or the password validation system.
When the user uses the equipment of this elongated password encryption at every turn among the present invention, equipment all can generate one group of random number A to the user automatically, and figure place of this group random number A can generate manufacturer oneself by different encryption devices and determines, also can by user oneself selection need the figure place of one group of random number.The user is converted into other one group of data B with this group random number A by algorithm, the one group of data B that converts is input in the encryption device goes, and equipment can mate you one group of data B of input.Encryption device is when producing one group of random number A, equipment can be converted into other one group of data C with this group random number A by the algorithm that user oneself sets automatically, and remain, mate with the password of user's input, if the C as a result that converts is the same with the A as a result of input, i.e. C=B, then the password input is correctly, otherwise, the password input error.Be that the password that the user uses is dynamic preservation like this, and no longer be static preservation.And what the algorithm that oneself is kept at the setting in the encryption device of just will knowing that the user needs is, the equipment that accesses to your password that just can be convenient and safe.
Key arrangement synoptic diagram on the device keyboard used herein as shown in Figure 2, wherein " 0 " shown in the figure is a numerical key to " 9 ", the lower left corner is random by key among the figure, its function is to click six random numbers that liquid crystal display shows can change; The lower right corner is to determine key among the figure.System powers at every turn, and liquid crystal display all can show " the novel cipher encryption system is landed in welcome "; When the user clicks " random by key ", liquid crystal display can produce six random number, whenever press once, random number can change, the user can be by repeatedly, up to selecting oneself one group of satisfied random number, if six random numbers that one group of single-chip microcomputer that we select produces are 123456, we suppose that algorithm that user oneself sets is that the random number of each generation all adds one (N+1) now, the password that need input of user is then should be 234567 (1+1=2,2+1=3,3+1=4 so, 4+1=5,5+1=6 6+1=7), is N square (NxN) if user's set algorithm is the random number of each generation, the random number of supposing six generations still is 123456, the password of user's input is 149162536 (1x1=1,2x2=4,3x3=9 so, 4x4=16,5x5=25,6x6=36). certainly, the user also can revise the algorithm of the inside, just needing increases button, expands its function and just can.
Cipher mode of the present invention, increased the security of password greatly, because the simple algorithm of being made up of the addition subtraction multiplication and division in the mathematics can be hundreds of millions of, and the user can to array at random any algorithm that design is different, improved the security of password greatly, simultaneously the user has not worried danger that password is taken on the sly by some lawless persons.With 6 bit digital passwords is example: password combination is 10
6, behind application the present invention, password combination only is subjected to concrete application limitations, is combined as infinite.The present invention can be applied to present various password entry terminal, password authentification place.
Description of drawings
Fig. 1 is the structural representation of equipment used in the present invention.
Wherein: 1, single-chip microcomputer, 2, keyboard, 3, LCD, 4, the sound and light alarm module.
Fig. 2 is the key arrangement synoptic diagram on the device keyboard used herein.
Fig. 3 is the FB(flow block) of the inventive method.Wherein: 1)-5) be its each step.
Embodiment
Below in conjunction with drawings and Examples the present invention is further specified, but be not limited thereto.
Embodiment 1:
The elongated enciphering authentication of a kind of universal code is used for various password entry terminals, password authentification place, and as shown in Figure 3, step is as follows:
1) powers on;
2) single-chip microcomputer judges whether " random by key " is pressed, and is to change next step over to, six random numbers of liquid crystal display; Otherwise change step 2 over to), do not show;
3) " random by key " determined to press, and the user,, is input to one group of elongated data in the single-chip microcomputer by elongated cryptographic algorithm one group of random number of liquid crystal display according to the cryptographic algorithm of own setting, and presses " determining key ";
4) single-chip microcomputer can be judged one group of data of user's input, if correct judgment changes step 5) over to; Misjudgment then changes step 4) over to, and the user need import one group of data once more; The number of times that the user imports one group of data is that errors number can not surpass three times, otherwise monolithic opportunity driven sound and light alarm module is carried out sound and light alarm, and locking user's operation;
5) user carries out other operations, as the cryptographic algorithm of user's modification oneself or at bank's access money etc.
Embodiment 2:
The employed equipment of a kind of above-mentioned verification method as shown in Figure 1, comprises single-chip microcomputer 1, keyboard 2, LCD 3 and acousto-optic alarm module 4, it is characterized in that single-chip microcomputer 1 is connected with keyboard 2, LCD 3 and acousto-optic alarm module 4 respectively; Wherein the button of keyboard 2 comprises random by key, determines key and numerical key; This equipment is connected in employed password entry terminal or the password validation system.
Claims (2)
1. the elongated enciphering authentication of universal code is used for various password entry terminals, password authentification place, and step is as follows:
1) powers on;
2) single-chip microcomputer judges whether " random by key " is pressed, and is to change next step over to, six random numbers of liquid crystal display; Otherwise change step 2 over to), do not show;
3) " random by key " determined to press, and the user,, is input to one group of elongated data in the single-chip microcomputer by elongated cryptographic algorithm one group of random number of liquid crystal display according to the cryptographic algorithm of own setting, and presses " determining key ";
4) single-chip microcomputer can be judged one group of data of user's input, if correct judgment changes step 5) over to; Misjudgment then changes step 4) over to, and the user need import one group of data once more; The number of times that the user imports one group of data is that errors number can not surpass three times, otherwise monolithic opportunity driven sound and light alarm module is carried out sound and light alarm, and locking user's operation;
5) user carries out other operations, as the cryptographic algorithm of user's modification oneself or at bank's access money etc.
2. the equipment that uses of verification method according to claim 1 comprises single-chip microcomputer, keyboard, LCD and acousto-optic alarm module, it is characterized in that single-chip microcomputer is connected with keyboard, LCD and acousto-optic alarm module respectively; Wherein the button of keyboard comprises random by key, determines key and numerical key; This equipment is connected in employed password entry terminal or the password validation system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105563160A CN102054140A (en) | 2010-11-24 | 2010-11-24 | Universal password variable-lengthencryption authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105563160A CN102054140A (en) | 2010-11-24 | 2010-11-24 | Universal password variable-lengthencryption authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102054140A true CN102054140A (en) | 2011-05-11 |
Family
ID=43958447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105563160A Pending CN102054140A (en) | 2010-11-24 | 2010-11-24 | Universal password variable-lengthencryption authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102054140A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102411682A (en) * | 2011-08-01 | 2012-04-11 | 吴成贵 | Password setting and authentication method |
CN103763104A (en) * | 2014-01-02 | 2014-04-30 | ***(深圳)有限公司 | Method and system for dynamic verification |
CN109214147A (en) * | 2018-09-28 | 2019-01-15 | 内蒙古师范大学 | A kind of encryption system of accounting software |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1851788A (en) * | 2006-03-30 | 2006-10-25 | 周忠杰 | Password setting metod |
CN101216923A (en) * | 2008-01-07 | 2008-07-09 | 中国工商银行股份有限公司 | A system and method to enhance the data security of e-bank dealings |
CN101603396A (en) * | 2009-07-06 | 2009-12-16 | 芜湖欣兰德工业制品有限责任公司 | A kind of intelligent coffer and control method thereof |
-
2010
- 2010-11-24 CN CN2010105563160A patent/CN102054140A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1851788A (en) * | 2006-03-30 | 2006-10-25 | 周忠杰 | Password setting metod |
CN101216923A (en) * | 2008-01-07 | 2008-07-09 | 中国工商银行股份有限公司 | A system and method to enhance the data security of e-bank dealings |
CN101603396A (en) * | 2009-07-06 | 2009-12-16 | 芜湖欣兰德工业制品有限责任公司 | A kind of intelligent coffer and control method thereof |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102411682A (en) * | 2011-08-01 | 2012-04-11 | 吴成贵 | Password setting and authentication method |
CN102411682B (en) * | 2011-08-01 | 2014-01-01 | 吴成贵 | Password setting and authentication method |
CN103763104A (en) * | 2014-01-02 | 2014-04-30 | ***(深圳)有限公司 | Method and system for dynamic verification |
CN103763104B (en) * | 2014-01-02 | 2018-05-22 | 中移信息技术有限公司 | A kind of method and system of dynamic authentication |
CN109214147A (en) * | 2018-09-28 | 2019-01-15 | 内蒙古师范大学 | A kind of encryption system of accounting software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102422296B (en) | Method for authenticating access to a secured chip by a test device | |
CN101106455B (en) | Identity authentication method and intelligent secret key device | |
CN103793636B (en) | A kind of method of equipment and protection equipment privacy | |
WO2015100475A1 (en) | Secure storage of data among multiple devices | |
CN103929306A (en) | Intelligent secret key device and information management method of intelligent secret key device | |
TWI617937B (en) | Fingerprint encoding method, fingerprint authentication method and system | |
CN101923619A (en) | Password key camouflage system and method | |
EP1922666A1 (en) | Method and arrangement for user friendly device authentication | |
CN101789864A (en) | On-line bank background identity identification method, device and system | |
CN101567055B (en) | Testimony password interlock device, testimony verification device and system, testimony password interlock and testimony verification method | |
CN104408363A (en) | Safe password system | |
CN101877636A (en) | Equation password encryption method | |
Singhal et al. | Software tokens based two factor authentication scheme | |
CN102054140A (en) | Universal password variable-lengthencryption authentication method | |
CN103685216A (en) | Information processing apparatus, information processing system, information processing method, program and client terminal | |
CN102693382B (en) | A kind of anti-endoscope devices of password and the anti-method of peeping thereof | |
CN101510875B (en) | Identification authentication method based on N-dimension sphere | |
CN116823271A (en) | Secure payment method, apparatus, electronic device and medium | |
WO2011124267A1 (en) | Authentication system and method thereof | |
CN115208676B (en) | Data encryption method and system based on blockchain technology | |
CN115767552A (en) | Vehicle unlocking method and device, computer equipment and storage medium | |
Vishnoi et al. | Text encryption for lower bandwidth channels: Design and implementation | |
CN103701603A (en) | Method, terminal, equipment and system of utilizing internet banking to draw lottery | |
CN101763473A (en) | Variable cipher device and method | |
KR20130007226A (en) | Finantial transaction information certification system and method using 2 dimensional barcode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110511 |