CN110493778A - A kind of WiFi secure log Verification System - Google Patents
A kind of WiFi secure log Verification System Download PDFInfo
- Publication number
- CN110493778A CN110493778A CN201910762379.2A CN201910762379A CN110493778A CN 110493778 A CN110493778 A CN 110493778A CN 201910762379 A CN201910762379 A CN 201910762379A CN 110493778 A CN110493778 A CN 110493778A
- Authority
- CN
- China
- Prior art keywords
- module
- password
- user terminal
- user
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 11
- 238000006243 chemical reaction Methods 0.000 claims abstract description 27
- 230000000052 comparative effect Effects 0.000 claims abstract description 9
- 238000010200 validation analysis Methods 0.000 claims description 28
- 238000000034 method Methods 0.000 claims description 8
- 239000003550 marker Substances 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims 1
- 239000007787 solid Substances 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention discloses a kind of WiFi secure log Verification System, it is authenticated for solving existing WiFi certification by letter, numbers and symbols, safety is lower, it is easy to by the way that the existing programming that cracks carries out letter, numbers and symbols is ranked up verifying and is cracked;Lead to the problem that safety certification is low;Including user terminal and wireless router;The user terminal includes locating module, Password Input module and password conversion module;Wireless router includes location-authentication module, memory module, cipher authentication module, data acquisition module, computing module and statistical module;Password conversion module converts the password of input, obtains superposed graph;Cipher authentication module receives superposed graph and is matched with comparative pattern, when the two fits like a glove, then authenticates success;It is encrypted by Graphics overlay, improves the complexity of password, existing wireless network is avoided to crack, realized and cracked by wireless time.
Description
Technical field
The present invention relates to WiFi authentication techniques field more particularly to a kind of WiFi secure log Verification Systems.
Background technique
WiFi technology is a kind of short range wireless transmission technology, and since its transmission speed is very fast, and effective distance also compares
It is longer, therefore, it is widely used in office space and family.After terminal access WiFi router with WiFi function, by
WiFi router authenticates WiFi terminal, after certification passes through, WiFi terminal is allowed to access internet.It, which authenticates certification, has
Three kinds of modes, one is shared password modes, such as WEP, WPA, WPA2 etc.;One is Web Portal certifications;One is
802.1X certification.
Existing WiFi certification is authenticated by letter, numbers and symbols, and safety is lower, it is easy to by existing
The programming that cracks carries out letter, numbers and symbols is ranked up verifying and is cracked;Cause safety certification low.
Summary of the invention
The purpose of the present invention is to provide a kind of WiFi secure log Verification Systems;It is logical for solving existing WiFi certification
It crosses alphabetical, numbers and symbols to be authenticated, safety is lower, it is easy to pass through the existing programming that cracks and carry out letter, number
Word and symbol are ranked up verifying and are cracked;Lead to the problem that safety certification is low.
The purpose of the present invention can be achieved through the following technical solutions: a kind of WiFi secure log Verification System, including with
Family terminal and wireless router;The user terminal includes locating module, Password Input module and password conversion module;Without route
It include location-authentication module, memory module, cipher authentication module, data acquisition module, computing module and statistical module by device;
The locating module is for obtaining the position data of user terminal and the IP address of user terminal;Locating module will be used
The position data of family terminal is sent to location-authentication module;The location-authentication module is for recognizing the position of user terminal
Card, specific authenticating step are as follows:
Step 1;The position of setting user terminal is denoted as Ai, i=1 ..., n;
Step 2: location-authentication module obtains the specified online region of the user preset stored in memory module;
Step 3: in the range of the position Ai of user terminal is in specified online region, then location-authentication module to
The password conversion module of family terminal sends acquisition instructions;Outside the position Ai of user, the range in specified online region, then not
Carry out any operation;
The Password Input module is used for the password of user's input and is sent to password conversion module;The password modulus of conversion
Block is used to receive the password that the input that Password Input module is sent is received after acquisition instructions;The password conversion module is by input
Password is converted, and specific switch process is as follows:
Step 1: by user input pin marker be Mi, i=1 ..., n;The password of input is by letter, number and symbol
Number sequence combination constitute;
Step 2: setting comparison password is denoted as Ci, i=1 ..., n;Comparing password is letter, number or symbol;Each
Compare password Ci corresponding transform graphical a Di, i=1 ..., n;Transform graphical Di is different size of figure constitution, figure
Including square, round and triangle and square, circle, triangle interior central point;
Step 3: the password Mi of input is subjected to the corresponding transform graphical Di of matching acquisition with comparison password Ci;
Step 4: it sorts according to the password of input and is overlapped transform graphical Di, obtain superposed graph;Specific manifestation
To set the transform graphical of first password match of password of input as D1, the transform graphical of second password match is D2;The
The transform graphical of three password matches is D3;Transform graphical D1 is placed in the bottom, then by the central point of transform graphical D2 with
The central point of transform graphical D1 is overlapped, and is then overlapped the central point of transform graphical D3 with the central point of transform graphical D2;
Step 5: superposed graph is sent to cipher authentication module;
The cipher authentication module receives superposed graph and compares to figure, and specific comparison process is as follows:
A: cipher authentication module obtains the comparative pattern of the user preset stored in memory module;
B: superposed graph is matched with comparative pattern, when fitting like a glove, then authenticates success, while good authentication number
Increase by one;It is no, authentification failure, meanwhile, failed validation number increases by one;
C: good authentication number and failed validation number and corresponding failed validation time are sent to and are deposited by cipher authentication module
Store up module storage.
Preferably, the IP address of user terminal is sent to memory module by the locating module;The data acquisition module
IP address, good authentication number and the failed validation number of user terminal for being stored in memory module;Data acquisition module
IP address, good authentication number and the failed validation number for the user terminal that will acquire are sent to computing module;The calculating mould
Block is used to calculate the validation value of user terminal, and steps are as follows for specific calculating:
S1: setting good authentication number is denoted as P1, and failed validation number is denoted as P2;
S2: formula is utilizedAcquire validation value YZ, wherein u1 and u2 is preset ratio system
Number fixed value, λ is modifying factor, value 0.96231;
S3: when validation value YZ is greater than given threshold, computing module generates halt instruction and is sent to location-authentication module;Position
Authentication module is set to receive halt instruction and stop sending acquisition instructions to password conversion module.
Preferably, the statistical module is for counting the successful current online user of wireless router certification and being sent to pre-
If on the corresponding user terminal of IP address, for showing the current connection user of wireless router;
Beneficial effects of the present invention: the user terminal of user of the present invention sends position data to wireless router and user is whole
The IP address at end, the location-authentication module inside wireless router carries out user location certification, when the position of user terminal is located at
In the range of specified online region, then location-authentication module sends acquisition instructions to the password conversion module of user terminal;Password
Conversion module is used to receive the password that the input that Password Input module is sent is received after acquisition instructions;Password conversion module will input
Password converted, obtain superposed graph;Cipher authentication module receives superposed graph and is matched with comparative pattern, when two
Person fits like a glove, then authenticates success;It is encrypted by Graphics overlay, improves the complexity of password, existing wireless network is avoided to crack
Software is realized by wireless time and is cracked.
Detailed description of the invention
The present invention will be further described below with reference to the drawings.
Fig. 1 is a kind of functional block diagram of WiFi secure log Verification System of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, the present invention is a kind of WiFi secure log Verification System, including user terminal and wireless routing
Device;User terminal includes locating module, Password Input module and password conversion module;Wireless router includes location-authentication mould
Block, memory module, cipher authentication module, data acquisition module, computing module and statistical module;
Locating module is for obtaining the position data of user terminal and the IP address of user terminal;Locating module is whole by user
The position data at end is sent to location-authentication module;Location-authentication module is for authenticating the position of user terminal, specifically
Authenticating step is as follows:
Step 1;The position of setting user terminal is denoted as Ai, i=1 ..., n;
Step 2: location-authentication module obtains the specified online region of the user preset stored in memory module;
Step 3: in the range of the position Ai of user terminal is in specified online region, then location-authentication module to
The password conversion module of family terminal sends acquisition instructions;Outside the position Ai of user, the range in specified online region, then not
Carry out any operation;
Password Input module is used for the password of user's input and is sent to password conversion module;Password conversion module is for connecing
The password for the input that Password Input module is sent is received after receipts acquisition instructions;Password conversion module is turned the password of input
It changes, specific switch process is as follows:
Step 1: by user input pin marker be Mi, i=1 ..., n;The password of input is by letter, number and symbol
Number sequence combination constitute;
Step 2: setting comparison password is denoted as Ci, i=1 ..., n;Comparing password is letter, number or symbol;Each
Compare password Ci corresponding transform graphical a Di, i=1 ..., n;Transform graphical Di is different size of figure constitution, figure
Including square, round and triangle and square, circle, triangle interior central point;
Step 3: the password Mi of input is subjected to the corresponding transform graphical Di of matching acquisition with comparison password Ci;
Step 4: it sorts according to the password of input and is overlapped transform graphical Di, obtain superposed graph;Specific manifestation
To set the transform graphical of first password match of password of input as D1, the transform graphical of second password match is D2;The
The transform graphical of three password matches is D3;Transform graphical D1 is placed in the bottom, then by the central point of transform graphical D2 with
The central point of transform graphical D1 is overlapped, and is then overlapped the central point of transform graphical D3 with the central point of transform graphical D2;Pass through
Graphics overlay encryption, improves the complexity of password, existing wireless network is avoided to crack, and is realized and is carried out brokenly by wireless time
Solution;
Step 5: superposed graph is sent to cipher authentication module;
Cipher authentication module receives superposed graph and compares to figure, and specific comparison process is as follows:
A: cipher authentication module obtains the comparative pattern of the user preset stored in memory module;
B: superposed graph is matched with comparative pattern, when fitting like a glove, then authenticates success, while good authentication number
Increase by one;It is no, authentification failure, meanwhile, failed validation number increases by one;
C: good authentication number and failed validation number and corresponding failed validation time are sent to and are deposited by cipher authentication module
Store up module storage;
The IP address of user terminal is sent to memory module by locating module;Data acquisition module is used for memory module memory
IP address, good authentication number and the failed validation number of the user terminal of storage;The user terminal that data acquisition module will acquire
IP address, good authentication number and failed validation number be sent to computing module;Computing module is for calculating user terminal
Validation value, steps are as follows for specific calculating:
S1: setting good authentication number is denoted as P1, and failed validation number is denoted as P2;
S2: formula is utilizedAcquire validation value YZ, wherein u1 and u2 is preset ratio system
Number fixed value, λ is modifying factor, value 0.96231;It can be obtained by formula, the number of good authentication is more, and validation value is got over
It is small, indicate that user can be more with the number of authentication failed;
S3: when validation value YZ is greater than given threshold, computing module generates halt instruction and is sent to location-authentication module;Position
Authentication module is set to receive halt instruction and stop sending acquisition instructions to password conversion module;The limit of the verifying of number of pass times
System avoids existing crack from attempting to crack to wireless router progress wireless time;
Statistical module is for counting the successful current online user of wireless router certification and being sent to preset IP address pair
On the user terminal answered, for showing the current connection user of wireless router.
The working principle of the invention: the user terminal of user sends the IP of position data and user terminal to wireless router
Address, the location-authentication module inside wireless router carry out user location certification, when the position of user terminal is located on specified
In the range of web area, then location-authentication module sends acquisition instructions to the password conversion module of user terminal;Password modulus of conversion
Block is used to receive the password that the input that Password Input module is sent is received after acquisition instructions;Password conversion module is by the password of input
It is converted, obtains superposed graph;Cipher authentication module receives superposed graph and is matched with comparative pattern, when the two is complete
It coincide, then authenticates success;It is encrypted by Graphics overlay, improves the complexity of password, existing wireless network is avoided to crack, led to
Wireless realization is crossed to be cracked.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple
Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention
Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.
Claims (3)
1. a kind of WiFi secure log Verification System, including user terminal and wireless router;It is characterized in that, the user is whole
End includes locating module, Password Input module and password conversion module;Wireless router includes location-authentication module, storage mould
Block, cipher authentication module, data acquisition module, computing module and statistical module;
The locating module is for obtaining the position data of user terminal and the IP address of user terminal;Locating module is whole by user
The position data at end is sent to location-authentication module;The location-authentication module is used to authenticate the position of user terminal,
Specific authenticating step is as follows:
Step 1;The position of setting user terminal is denoted as Ai, i=1 ..., n;
Step 2: location-authentication module obtains the specified online region of the user preset stored in memory module;
Step 3: in the range of the position Ai of user terminal is in specified online region, then location-authentication module is whole to user
The password conversion module at end sends acquisition instructions;As the position Ai of user, outside the range in specified online region, then without
Any operation;
The Password Input module is used for the password of user's input and is sent to password conversion module;The password conversion module is used
The password for the input that Password Input module is sent is received after receiving acquisition instructions;The password conversion module is by the password of input
It is converted, specific switch process is as follows:
Step 1: by user input pin marker be Mi, i=1 ..., n;The password of input is arranged by letter, numbers and symbols
Sequence combination is constituted;
Step 2: setting comparison password is denoted as Ci, i=1 ..., n;Comparing password is letter, number or symbol;Each comparison
Password Ci correspond to transform graphical a Di, i=1 ..., n;Transform graphical Di is different size of figure constitution, and figure includes
Square, round and triangle and square, circle, triangle interior central point;
Step 3: the password Mi of input is subjected to the corresponding transform graphical Di of matching acquisition with comparison password Ci;
Step 4: it sorts according to the password of input and is overlapped transform graphical Di, obtain superposed graph;It is embodied in, if
Surely the transform graphical of first password match of password inputted is D1, and the transform graphical of second password match is D2;Third
The transform graphical of password match is D3;Transform graphical D1 is placed in the bottom, then by the central point of transform graphical D2 and conversion
The central point of D graphics 1 is overlapped, and is then overlapped the central point of transform graphical D3 with the central point of transform graphical D2;
Step 5: superposed graph is sent to cipher authentication module;
The cipher authentication module receives superposed graph and compares to figure, and specific comparison process is as follows:
A: cipher authentication module obtains the comparative pattern of the user preset stored in memory module;
B: superposed graph is matched with comparative pattern, when fitting like a glove, then authenticates success, while good authentication number increases
One;It is no, authentification failure, meanwhile, failed validation number increases by one;
C: good authentication number and failed validation number and corresponding failed validation time are sent to storage mould by cipher authentication module
Block storage.
2. a kind of WiFi secure log Verification System according to claim 1, which is characterized in that the locating module will be used
The IP address of family terminal is sent to memory module;The IP of user terminal of the data acquisition module for being stored in memory module
Address, good authentication number and failed validation number;The IP address for the user terminal that data acquisition module will acquire, good authentication
Number and failed validation number are sent to computing module;The computing module is used to calculate the validation value of user terminal, specific to count
Steps are as follows for calculation:
S1: setting good authentication number is denoted as P1, and failed validation number is denoted as P2;
S2: formula is utilizedAcquire validation value YZ, wherein u1 and u2 is that preset ratio coefficient is solid
Definite value, λ are modifying factor, value 0.96231;
S3: when validation value YZ is greater than given threshold, computing module generates halt instruction and is sent to location-authentication module;Position is recognized
Card module receives halt instruction and stops sending acquisition instructions to password conversion module.
3. a kind of WiFi secure log Verification System according to claim 1, which is characterized in that the statistical module is used for
Statistics wireless router authenticates successful current online user and is sent on the corresponding user terminal of preset IP address, for showing
Show the current connection user of wireless router.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762379.2A CN110493778B (en) | 2019-08-19 | 2019-08-19 | WiFi safety login authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762379.2A CN110493778B (en) | 2019-08-19 | 2019-08-19 | WiFi safety login authentication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110493778A true CN110493778A (en) | 2019-11-22 |
CN110493778B CN110493778B (en) | 2022-03-22 |
Family
ID=68552061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910762379.2A Expired - Fee Related CN110493778B (en) | 2019-08-19 | 2019-08-19 | WiFi safety login authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110493778B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865962A (en) * | 2020-07-16 | 2020-10-30 | 国网山东省电力公司青岛供电公司 | WiFi (Wireless Fidelity) secure login authentication system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450604A (en) * | 2014-08-25 | 2016-03-30 | 苏宁云商集团股份有限公司 | Safe verifying method and device based on graphic feature |
CN105787323A (en) * | 2016-02-16 | 2016-07-20 | 广东欧珀移动通信有限公司 | Safety protection method for WiFi hotspot and mobile terminal |
US20180075686A1 (en) * | 2016-09-09 | 2018-03-15 | Tyco Integrated Security, LLC | Architecture for access management |
-
2019
- 2019-08-19 CN CN201910762379.2A patent/CN110493778B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450604A (en) * | 2014-08-25 | 2016-03-30 | 苏宁云商集团股份有限公司 | Safe verifying method and device based on graphic feature |
CN105787323A (en) * | 2016-02-16 | 2016-07-20 | 广东欧珀移动通信有限公司 | Safety protection method for WiFi hotspot and mobile terminal |
US20180075686A1 (en) * | 2016-09-09 | 2018-03-15 | Tyco Integrated Security, LLC | Architecture for access management |
Non-Patent Citations (1)
Title |
---|
谭悦平: "WiFi无线网络的安全与防范措施探讨", 《信息与电脑(理论版)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865962A (en) * | 2020-07-16 | 2020-10-30 | 国网山东省电力公司青岛供电公司 | WiFi (Wireless Fidelity) secure login authentication system and method |
CN111865962B (en) * | 2020-07-16 | 2022-04-08 | 国网山东省电力公司青岛供电公司 | WiFi (Wireless Fidelity) secure login authentication system and method |
Also Published As
Publication number | Publication date |
---|---|
CN110493778B (en) | 2022-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11399018B2 (en) | Network device proximity-based authentication | |
CN105847247A (en) | Authentication system and working method thereof | |
CN103401880B (en) | The system and method that a kind of industrial control network logs in automatically | |
US20060172723A1 (en) | Authentication vector generation device, subscriber identity module, wireless communication system, authentication vector generation method, calculation method, and subscriber authentication method | |
DK2924944T3 (en) | Presence authentication | |
CN109150541A (en) | A kind of Verification System and its working method | |
CN108965341A (en) | The method, apparatus and system of login authentication | |
US20040073793A1 (en) | Network system, information processing device, repeater, and method of building network system | |
US8413213B2 (en) | System, method and device for secure wireless communication | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
CN103327487A (en) | Remote certification authentication service system | |
KR101580291B1 (en) | Method for providing mobile on time password service and authentication system | |
CN105515781A (en) | Login system of application platform and login method thereof | |
CN104683357B (en) | A kind of dynamic password authentication method and system based on software token | |
CN103020505A (en) | Information management system and information management method based on fingerprint identification | |
CN104869121A (en) | 802.1x-based authentication method and device | |
CN110493778A (en) | A kind of WiFi secure log Verification System | |
CN102282826A (en) | Method and system for authentication of network nodes of a peer-to-peer network | |
US7650139B2 (en) | Method for ensuring security of subscriber card | |
CN106102066A (en) | A kind of wireless network secure certification devices and methods therefor, a kind of router | |
CN105681044A (en) | Verification code recognition system taking password or verification code as sequence number | |
KR101133167B1 (en) | Method and apparatus for user verifing process with enhanced security | |
US20160335636A1 (en) | Dual-Channel Identity Authentication Selection Device, System and Method | |
CN205864753U (en) | A kind of encryption guard system of terminal unit | |
CN108574657B (en) | Server access method, device and system, computing equipment and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220322 |