CN110493778A - A kind of WiFi secure log Verification System - Google Patents

A kind of WiFi secure log Verification System Download PDF

Info

Publication number
CN110493778A
CN110493778A CN201910762379.2A CN201910762379A CN110493778A CN 110493778 A CN110493778 A CN 110493778A CN 201910762379 A CN201910762379 A CN 201910762379A CN 110493778 A CN110493778 A CN 110493778A
Authority
CN
China
Prior art keywords
module
password
user terminal
user
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910762379.2A
Other languages
Chinese (zh)
Other versions
CN110493778B (en
Inventor
范申民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shangluo University
Original Assignee
Shangluo University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shangluo University filed Critical Shangluo University
Priority to CN201910762379.2A priority Critical patent/CN110493778B/en
Publication of CN110493778A publication Critical patent/CN110493778A/en
Application granted granted Critical
Publication of CN110493778B publication Critical patent/CN110493778B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a kind of WiFi secure log Verification System, it is authenticated for solving existing WiFi certification by letter, numbers and symbols, safety is lower, it is easy to by the way that the existing programming that cracks carries out letter, numbers and symbols is ranked up verifying and is cracked;Lead to the problem that safety certification is low;Including user terminal and wireless router;The user terminal includes locating module, Password Input module and password conversion module;Wireless router includes location-authentication module, memory module, cipher authentication module, data acquisition module, computing module and statistical module;Password conversion module converts the password of input, obtains superposed graph;Cipher authentication module receives superposed graph and is matched with comparative pattern, when the two fits like a glove, then authenticates success;It is encrypted by Graphics overlay, improves the complexity of password, existing wireless network is avoided to crack, realized and cracked by wireless time.

Description

A kind of WiFi secure log Verification System
Technical field
The present invention relates to WiFi authentication techniques field more particularly to a kind of WiFi secure log Verification Systems.
Background technique
WiFi technology is a kind of short range wireless transmission technology, and since its transmission speed is very fast, and effective distance also compares It is longer, therefore, it is widely used in office space and family.After terminal access WiFi router with WiFi function, by WiFi router authenticates WiFi terminal, after certification passes through, WiFi terminal is allowed to access internet.It, which authenticates certification, has Three kinds of modes, one is shared password modes, such as WEP, WPA, WPA2 etc.;One is Web Portal certifications;One is 802.1X certification.
Existing WiFi certification is authenticated by letter, numbers and symbols, and safety is lower, it is easy to by existing The programming that cracks carries out letter, numbers and symbols is ranked up verifying and is cracked;Cause safety certification low.
Summary of the invention
The purpose of the present invention is to provide a kind of WiFi secure log Verification Systems;It is logical for solving existing WiFi certification It crosses alphabetical, numbers and symbols to be authenticated, safety is lower, it is easy to pass through the existing programming that cracks and carry out letter, number Word and symbol are ranked up verifying and are cracked;Lead to the problem that safety certification is low.
The purpose of the present invention can be achieved through the following technical solutions: a kind of WiFi secure log Verification System, including with Family terminal and wireless router;The user terminal includes locating module, Password Input module and password conversion module;Without route It include location-authentication module, memory module, cipher authentication module, data acquisition module, computing module and statistical module by device;
The locating module is for obtaining the position data of user terminal and the IP address of user terminal;Locating module will be used The position data of family terminal is sent to location-authentication module;The location-authentication module is for recognizing the position of user terminal Card, specific authenticating step are as follows:
Step 1;The position of setting user terminal is denoted as Ai, i=1 ..., n;
Step 2: location-authentication module obtains the specified online region of the user preset stored in memory module;
Step 3: in the range of the position Ai of user terminal is in specified online region, then location-authentication module to The password conversion module of family terminal sends acquisition instructions;Outside the position Ai of user, the range in specified online region, then not Carry out any operation;
The Password Input module is used for the password of user's input and is sent to password conversion module;The password modulus of conversion Block is used to receive the password that the input that Password Input module is sent is received after acquisition instructions;The password conversion module is by input Password is converted, and specific switch process is as follows:
Step 1: by user input pin marker be Mi, i=1 ..., n;The password of input is by letter, number and symbol Number sequence combination constitute;
Step 2: setting comparison password is denoted as Ci, i=1 ..., n;Comparing password is letter, number or symbol;Each Compare password Ci corresponding transform graphical a Di, i=1 ..., n;Transform graphical Di is different size of figure constitution, figure Including square, round and triangle and square, circle, triangle interior central point;
Step 3: the password Mi of input is subjected to the corresponding transform graphical Di of matching acquisition with comparison password Ci;
Step 4: it sorts according to the password of input and is overlapped transform graphical Di, obtain superposed graph;Specific manifestation To set the transform graphical of first password match of password of input as D1, the transform graphical of second password match is D2;The The transform graphical of three password matches is D3;Transform graphical D1 is placed in the bottom, then by the central point of transform graphical D2 with The central point of transform graphical D1 is overlapped, and is then overlapped the central point of transform graphical D3 with the central point of transform graphical D2;
Step 5: superposed graph is sent to cipher authentication module;
The cipher authentication module receives superposed graph and compares to figure, and specific comparison process is as follows:
A: cipher authentication module obtains the comparative pattern of the user preset stored in memory module;
B: superposed graph is matched with comparative pattern, when fitting like a glove, then authenticates success, while good authentication number Increase by one;It is no, authentification failure, meanwhile, failed validation number increases by one;
C: good authentication number and failed validation number and corresponding failed validation time are sent to and are deposited by cipher authentication module Store up module storage.
Preferably, the IP address of user terminal is sent to memory module by the locating module;The data acquisition module IP address, good authentication number and the failed validation number of user terminal for being stored in memory module;Data acquisition module IP address, good authentication number and the failed validation number for the user terminal that will acquire are sent to computing module;The calculating mould Block is used to calculate the validation value of user terminal, and steps are as follows for specific calculating:
S1: setting good authentication number is denoted as P1, and failed validation number is denoted as P2;
S2: formula is utilizedAcquire validation value YZ, wherein u1 and u2 is preset ratio system Number fixed value, λ is modifying factor, value 0.96231;
S3: when validation value YZ is greater than given threshold, computing module generates halt instruction and is sent to location-authentication module;Position Authentication module is set to receive halt instruction and stop sending acquisition instructions to password conversion module.
Preferably, the statistical module is for counting the successful current online user of wireless router certification and being sent to pre- If on the corresponding user terminal of IP address, for showing the current connection user of wireless router;
Beneficial effects of the present invention: the user terminal of user of the present invention sends position data to wireless router and user is whole The IP address at end, the location-authentication module inside wireless router carries out user location certification, when the position of user terminal is located at In the range of specified online region, then location-authentication module sends acquisition instructions to the password conversion module of user terminal;Password Conversion module is used to receive the password that the input that Password Input module is sent is received after acquisition instructions;Password conversion module will input Password converted, obtain superposed graph;Cipher authentication module receives superposed graph and is matched with comparative pattern, when two Person fits like a glove, then authenticates success;It is encrypted by Graphics overlay, improves the complexity of password, existing wireless network is avoided to crack Software is realized by wireless time and is cracked.
Detailed description of the invention
The present invention will be further described below with reference to the drawings.
Fig. 1 is a kind of functional block diagram of WiFi secure log Verification System of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is a kind of WiFi secure log Verification System, including user terminal and wireless routing Device;User terminal includes locating module, Password Input module and password conversion module;Wireless router includes location-authentication mould Block, memory module, cipher authentication module, data acquisition module, computing module and statistical module;
Locating module is for obtaining the position data of user terminal and the IP address of user terminal;Locating module is whole by user The position data at end is sent to location-authentication module;Location-authentication module is for authenticating the position of user terminal, specifically Authenticating step is as follows:
Step 1;The position of setting user terminal is denoted as Ai, i=1 ..., n;
Step 2: location-authentication module obtains the specified online region of the user preset stored in memory module;
Step 3: in the range of the position Ai of user terminal is in specified online region, then location-authentication module to The password conversion module of family terminal sends acquisition instructions;Outside the position Ai of user, the range in specified online region, then not Carry out any operation;
Password Input module is used for the password of user's input and is sent to password conversion module;Password conversion module is for connecing The password for the input that Password Input module is sent is received after receipts acquisition instructions;Password conversion module is turned the password of input It changes, specific switch process is as follows:
Step 1: by user input pin marker be Mi, i=1 ..., n;The password of input is by letter, number and symbol Number sequence combination constitute;
Step 2: setting comparison password is denoted as Ci, i=1 ..., n;Comparing password is letter, number or symbol;Each Compare password Ci corresponding transform graphical a Di, i=1 ..., n;Transform graphical Di is different size of figure constitution, figure Including square, round and triangle and square, circle, triangle interior central point;
Step 3: the password Mi of input is subjected to the corresponding transform graphical Di of matching acquisition with comparison password Ci;
Step 4: it sorts according to the password of input and is overlapped transform graphical Di, obtain superposed graph;Specific manifestation To set the transform graphical of first password match of password of input as D1, the transform graphical of second password match is D2;The The transform graphical of three password matches is D3;Transform graphical D1 is placed in the bottom, then by the central point of transform graphical D2 with The central point of transform graphical D1 is overlapped, and is then overlapped the central point of transform graphical D3 with the central point of transform graphical D2;Pass through Graphics overlay encryption, improves the complexity of password, existing wireless network is avoided to crack, and is realized and is carried out brokenly by wireless time Solution;
Step 5: superposed graph is sent to cipher authentication module;
Cipher authentication module receives superposed graph and compares to figure, and specific comparison process is as follows:
A: cipher authentication module obtains the comparative pattern of the user preset stored in memory module;
B: superposed graph is matched with comparative pattern, when fitting like a glove, then authenticates success, while good authentication number Increase by one;It is no, authentification failure, meanwhile, failed validation number increases by one;
C: good authentication number and failed validation number and corresponding failed validation time are sent to and are deposited by cipher authentication module Store up module storage;
The IP address of user terminal is sent to memory module by locating module;Data acquisition module is used for memory module memory IP address, good authentication number and the failed validation number of the user terminal of storage;The user terminal that data acquisition module will acquire IP address, good authentication number and failed validation number be sent to computing module;Computing module is for calculating user terminal Validation value, steps are as follows for specific calculating:
S1: setting good authentication number is denoted as P1, and failed validation number is denoted as P2;
S2: formula is utilizedAcquire validation value YZ, wherein u1 and u2 is preset ratio system Number fixed value, λ is modifying factor, value 0.96231;It can be obtained by formula, the number of good authentication is more, and validation value is got over It is small, indicate that user can be more with the number of authentication failed;
S3: when validation value YZ is greater than given threshold, computing module generates halt instruction and is sent to location-authentication module;Position Authentication module is set to receive halt instruction and stop sending acquisition instructions to password conversion module;The limit of the verifying of number of pass times System avoids existing crack from attempting to crack to wireless router progress wireless time;
Statistical module is for counting the successful current online user of wireless router certification and being sent to preset IP address pair On the user terminal answered, for showing the current connection user of wireless router.
The working principle of the invention: the user terminal of user sends the IP of position data and user terminal to wireless router Address, the location-authentication module inside wireless router carry out user location certification, when the position of user terminal is located on specified In the range of web area, then location-authentication module sends acquisition instructions to the password conversion module of user terminal;Password modulus of conversion Block is used to receive the password that the input that Password Input module is sent is received after acquisition instructions;Password conversion module is by the password of input It is converted, obtains superposed graph;Cipher authentication module receives superposed graph and is matched with comparative pattern, when the two is complete It coincide, then authenticates success;It is encrypted by Graphics overlay, improves the complexity of password, existing wireless network is avoided to crack, led to Wireless realization is crossed to be cracked.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.

Claims (3)

1. a kind of WiFi secure log Verification System, including user terminal and wireless router;It is characterized in that, the user is whole End includes locating module, Password Input module and password conversion module;Wireless router includes location-authentication module, storage mould Block, cipher authentication module, data acquisition module, computing module and statistical module;
The locating module is for obtaining the position data of user terminal and the IP address of user terminal;Locating module is whole by user The position data at end is sent to location-authentication module;The location-authentication module is used to authenticate the position of user terminal, Specific authenticating step is as follows:
Step 1;The position of setting user terminal is denoted as Ai, i=1 ..., n;
Step 2: location-authentication module obtains the specified online region of the user preset stored in memory module;
Step 3: in the range of the position Ai of user terminal is in specified online region, then location-authentication module is whole to user The password conversion module at end sends acquisition instructions;As the position Ai of user, outside the range in specified online region, then without Any operation;
The Password Input module is used for the password of user's input and is sent to password conversion module;The password conversion module is used The password for the input that Password Input module is sent is received after receiving acquisition instructions;The password conversion module is by the password of input It is converted, specific switch process is as follows:
Step 1: by user input pin marker be Mi, i=1 ..., n;The password of input is arranged by letter, numbers and symbols Sequence combination is constituted;
Step 2: setting comparison password is denoted as Ci, i=1 ..., n;Comparing password is letter, number or symbol;Each comparison Password Ci correspond to transform graphical a Di, i=1 ..., n;Transform graphical Di is different size of figure constitution, and figure includes Square, round and triangle and square, circle, triangle interior central point;
Step 3: the password Mi of input is subjected to the corresponding transform graphical Di of matching acquisition with comparison password Ci;
Step 4: it sorts according to the password of input and is overlapped transform graphical Di, obtain superposed graph;It is embodied in, if Surely the transform graphical of first password match of password inputted is D1, and the transform graphical of second password match is D2;Third The transform graphical of password match is D3;Transform graphical D1 is placed in the bottom, then by the central point of transform graphical D2 and conversion The central point of D graphics 1 is overlapped, and is then overlapped the central point of transform graphical D3 with the central point of transform graphical D2;
Step 5: superposed graph is sent to cipher authentication module;
The cipher authentication module receives superposed graph and compares to figure, and specific comparison process is as follows:
A: cipher authentication module obtains the comparative pattern of the user preset stored in memory module;
B: superposed graph is matched with comparative pattern, when fitting like a glove, then authenticates success, while good authentication number increases One;It is no, authentification failure, meanwhile, failed validation number increases by one;
C: good authentication number and failed validation number and corresponding failed validation time are sent to storage mould by cipher authentication module Block storage.
2. a kind of WiFi secure log Verification System according to claim 1, which is characterized in that the locating module will be used The IP address of family terminal is sent to memory module;The IP of user terminal of the data acquisition module for being stored in memory module Address, good authentication number and failed validation number;The IP address for the user terminal that data acquisition module will acquire, good authentication Number and failed validation number are sent to computing module;The computing module is used to calculate the validation value of user terminal, specific to count Steps are as follows for calculation:
S1: setting good authentication number is denoted as P1, and failed validation number is denoted as P2;
S2: formula is utilizedAcquire validation value YZ, wherein u1 and u2 is that preset ratio coefficient is solid Definite value, λ are modifying factor, value 0.96231;
S3: when validation value YZ is greater than given threshold, computing module generates halt instruction and is sent to location-authentication module;Position is recognized Card module receives halt instruction and stops sending acquisition instructions to password conversion module.
3. a kind of WiFi secure log Verification System according to claim 1, which is characterized in that the statistical module is used for Statistics wireless router authenticates successful current online user and is sent on the corresponding user terminal of preset IP address, for showing Show the current connection user of wireless router.
CN201910762379.2A 2019-08-19 2019-08-19 WiFi safety login authentication system Expired - Fee Related CN110493778B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910762379.2A CN110493778B (en) 2019-08-19 2019-08-19 WiFi safety login authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910762379.2A CN110493778B (en) 2019-08-19 2019-08-19 WiFi safety login authentication system

Publications (2)

Publication Number Publication Date
CN110493778A true CN110493778A (en) 2019-11-22
CN110493778B CN110493778B (en) 2022-03-22

Family

ID=68552061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910762379.2A Expired - Fee Related CN110493778B (en) 2019-08-19 2019-08-19 WiFi safety login authentication system

Country Status (1)

Country Link
CN (1) CN110493778B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865962A (en) * 2020-07-16 2020-10-30 国网山东省电力公司青岛供电公司 WiFi (Wireless Fidelity) secure login authentication system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450604A (en) * 2014-08-25 2016-03-30 苏宁云商集团股份有限公司 Safe verifying method and device based on graphic feature
CN105787323A (en) * 2016-02-16 2016-07-20 广东欧珀移动通信有限公司 Safety protection method for WiFi hotspot and mobile terminal
US20180075686A1 (en) * 2016-09-09 2018-03-15 Tyco Integrated Security, LLC Architecture for access management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450604A (en) * 2014-08-25 2016-03-30 苏宁云商集团股份有限公司 Safe verifying method and device based on graphic feature
CN105787323A (en) * 2016-02-16 2016-07-20 广东欧珀移动通信有限公司 Safety protection method for WiFi hotspot and mobile terminal
US20180075686A1 (en) * 2016-09-09 2018-03-15 Tyco Integrated Security, LLC Architecture for access management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谭悦平: "WiFi无线网络的安全与防范措施探讨", 《信息与电脑(理论版)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865962A (en) * 2020-07-16 2020-10-30 国网山东省电力公司青岛供电公司 WiFi (Wireless Fidelity) secure login authentication system and method
CN111865962B (en) * 2020-07-16 2022-04-08 国网山东省电力公司青岛供电公司 WiFi (Wireless Fidelity) secure login authentication system and method

Also Published As

Publication number Publication date
CN110493778B (en) 2022-03-22

Similar Documents

Publication Publication Date Title
US11399018B2 (en) Network device proximity-based authentication
CN105847247A (en) Authentication system and working method thereof
CN103401880B (en) The system and method that a kind of industrial control network logs in automatically
US20060172723A1 (en) Authentication vector generation device, subscriber identity module, wireless communication system, authentication vector generation method, calculation method, and subscriber authentication method
DK2924944T3 (en) Presence authentication
CN109150541A (en) A kind of Verification System and its working method
CN108965341A (en) The method, apparatus and system of login authentication
US20040073793A1 (en) Network system, information processing device, repeater, and method of building network system
US8413213B2 (en) System, method and device for secure wireless communication
CN104469736B (en) A kind of data processing method, server and terminal
CN103327487A (en) Remote certification authentication service system
KR101580291B1 (en) Method for providing mobile on time password service and authentication system
CN105515781A (en) Login system of application platform and login method thereof
CN104683357B (en) A kind of dynamic password authentication method and system based on software token
CN103020505A (en) Information management system and information management method based on fingerprint identification
CN104869121A (en) 802.1x-based authentication method and device
CN110493778A (en) A kind of WiFi secure log Verification System
CN102282826A (en) Method and system for authentication of network nodes of a peer-to-peer network
US7650139B2 (en) Method for ensuring security of subscriber card
CN106102066A (en) A kind of wireless network secure certification devices and methods therefor, a kind of router
CN105681044A (en) Verification code recognition system taking password or verification code as sequence number
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
US20160335636A1 (en) Dual-Channel Identity Authentication Selection Device, System and Method
CN205864753U (en) A kind of encryption guard system of terminal unit
CN108574657B (en) Server access method, device and system, computing equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220322