CN112528254A - Password security detection method - Google Patents

Password security detection method Download PDF

Info

Publication number
CN112528254A
CN112528254A CN202011289832.1A CN202011289832A CN112528254A CN 112528254 A CN112528254 A CN 112528254A CN 202011289832 A CN202011289832 A CN 202011289832A CN 112528254 A CN112528254 A CN 112528254A
Authority
CN
China
Prior art keywords
fingerprint
character strings
database
password
translated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011289832.1A
Other languages
Chinese (zh)
Inventor
高静峰
王秒郎
唐鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yitongling Information Technology Co ltd
Original Assignee
Xiamen Yitongling Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yitongling Information Technology Co ltd filed Critical Xiamen Yitongling Information Technology Co ltd
Priority to CN202011289832.1A priority Critical patent/CN112528254A/en
Publication of CN112528254A publication Critical patent/CN112528254A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a password security detection method, comprising the following steps of S1: when the fingerprint identification device is used by an individual for the first time, the fingerprint of the individual needs to be input through the fingerprint identification sensor; s2, encryption of the password: encrypting the input fingerprints through Base64, dividing the input fingerprints into 64 groups of character strings according to different characteristics, mixing 3-bit letters and numbers in each group of character strings, and then disordering the sequence of the 64 groups of character strings and storing the character strings in a database; the invention relates to the technical field of password detection. According to the password security detection method, a fingerprint is decomposed into 64 groups of character strings formed by mixing 3-bit letters and numbers by a Base64 tool, the 64 groups of character strings are disorganized and stored in a database, the fingerprint identified this time is translated into 64 groups of character strings through Base64, the 64 groups of character strings are compared with the database, the fingerprint cannot be directly stored through the mode, even if the database is obtained, the password is difficult to restore, and therefore the security of the detection can be improved.

Description

Password security detection method
Technical Field
The invention relates to the technical field of password detection, in particular to a password security detection method.
Background
The password is a technology for confusion, a user wants to convert normal information into unidentified information, but the unidentified information part can be reprocessed, recovered and cracked, the password is a general name of a password in Chinese, the password comprises a character string password and a biological password, the most common biological password at present is basically a fingerprint, the fingerprint authentication has the characteristics of convenience, rapidness, accuracy and the like along with the development of science and technology and the improvement of life quality, more and more people begin to select fingerprint locks along with the popularization of the science and technology and the development of smart homes, and the fingerprint password door lock in a private home is gradually popularized.
The existing fingerprint password door lock basically stores the password in a database, when the fingerprint password door lock is not used, the database in the fingerprint password door lock cannot be damaged under the general condition, and if a lawless person obtains the database, the personal password in the database can be easily obtained, so that personal information is leaked, and property safety is affected.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a password security detection method, which solves the problem that after a lawbreaker obtains a fingerprint identification lock, the lawbreaker can obtain a fingerprint password in a database from a circuit board, so that personal information is unsafe.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: a password security detection method specifically comprises the following steps:
s1, entering a password: when the fingerprint identification device is used by an individual for the first time, the fingerprint of the individual needs to be input through the fingerprint identification sensor;
s2, encryption of the password: encrypting the input fingerprints through Base64, dividing the input fingerprints into 64 groups of character strings according to different characteristics, mixing 3-bit letters and numbers in each group of character strings, and then disordering the sequence of the 64 groups of character strings and storing the character strings in a database;
s3, inputting a password: the method comprises the following steps that an input fingerprint is placed on a fingerprint identification sensor by an input individual user, and the fingerprint is identified by the sensor;
s4, password translation: the fingerprint identified on the fingerprint identification sensor is translated through Base64, and the fingerprint identified this time is translated into 64 groups of character strings formed by mixing 3-bit letters and numbers according to different characteristics;
s5, data comparison system: and comparing the 64 groups of translated character strings with character strings in the database for judgment, and prompting the judgment result through a display.
Preferably, in step S1, a plurality of fingerprints are entered into the database by the fingerprint sensor, and each fingerprint requires a plurality of fingerprint data acquisitions by the fingerprint sensor.
Preferably, in the step S2, the fingerprint input is divided into 64 different pictures through Base64, and the pictures are encrypted into a group of character strings according to the characteristics of each picture.
Preferably, in the step S4, the fingerprint recognized by the fingerprint recognition sensor is translated according to the characteristics through Base64, and then the fingerprint is translated into a 64-bit string and then transmitted to the database.
Preferably, in step S5, the 64-bit string translated this time is compared with a plurality of groups of strings in the database, and when the 64-bit string translated this time exists in the plurality of groups of strings in the database, the display may prompt that the string passes the verification.
Preferably, in step S5, the 64-bit string translated this time is compared with a plurality of groups of strings in the database, and when the 64-bit string translated this time does not exist in the plurality of groups of strings in the database, the 64-bit string can be prompted to be re-input through the display.
Preferably, in the step S5, after the identified fingerprint is translated into 64 character strings through Base64, the database can be used to prompt that the identification is passed through the display as long as 90% of the characters in the 64 character strings are contained in the database.
Preferably, in step S5, after the identified fingerprint is translated into 64 character strings through Base64, if only 10% of the characters in the 64 character strings are the same as the identified fingerprint in the database, the identified fingerprint is prompted to be re-input through the display.
(III) advantageous effects
The invention provides a password security detection method. Compared with the prior art, the method has the following beneficial effects: in the password security detection method, a password is entered at S1: when the fingerprint identification device is used by an individual for the first time, the fingerprint of the individual needs to be input through the fingerprint identification sensor; s2, encryption of the password: encrypting the input fingerprints through Base64, dividing the input fingerprints into 64 groups of character strings according to different characteristics, mixing 3-bit letters and numbers in each group of character strings, and then disordering the sequence of the 64 groups of character strings and storing the character strings in a database; s3, inputting a password: the method comprises the following steps that an input fingerprint is placed on a fingerprint identification sensor by an input individual user, and the fingerprint is identified by the sensor; s4, password translation: the fingerprint identified on the fingerprint identification sensor is translated through Base64, and the fingerprint identified this time is translated into 64 groups of character strings formed by mixing 3-bit letters and numbers according to different characteristics; s5, data comparison system: the translated 64 groups of character strings are compared with character strings in a database, the judgment result is prompted through a display, the fingerprint is decomposed into 64 groups of character strings formed by mixing 3-bit letters and numbers through a Base64 tool, the 64 groups of character strings are stored in the database in a disorganized mode, when identification detection is carried out, the fingerprint identified at this time is translated into the 64 groups of character strings to be compared with the database through the Base64, the fingerprint cannot be directly stored through the mode, even if the database is obtained, the password is difficult to restore, the correctness of the detection mode can be guaranteed, and meanwhile, the safety of the password can be improved.
Drawings
FIG. 1 is a flow chart of a password security detection method of the present invention;
FIG. 2 is a logic diagram of the data comparison system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, an embodiment of the present invention provides a technical solution: a password security detection method specifically comprises the following steps:
s1, entering a password: when the fingerprint identification device is used by an individual for the first time, the fingerprint of the individual needs to be input through the fingerprint identification sensor;
s2, encryption of the password: encrypting the input fingerprints through Base64, dividing the input fingerprints into 64 groups of character strings according to different characteristics, mixing 3-bit letters and numbers in each group of character strings, and then disordering the sequence of the 64 groups of character strings and storing the character strings in a database;
s3, inputting a password: the method comprises the following steps that an input fingerprint is placed on a fingerprint identification sensor by an input individual user, and the fingerprint is identified by the sensor;
s4, password translation: the fingerprint identified on the fingerprint identification sensor is translated through Base64, and the fingerprint identified this time is translated into 64 groups of character strings formed by mixing 3-bit letters and numbers according to different characteristics;
s5, data comparison system: and comparing the 64 groups of translated character strings with character strings in the database for judgment, and prompting the judgment result through a display.
In the present invention, in step S1, a plurality of fingerprints are entered into the database by the fingerprint identification sensor, and each fingerprint requires a plurality of times of fingerprint data collection by the fingerprint identification sensor.
In the invention, in step S2, the input fingerprint is divided into 64 different pictures through Base64, and the pictures are encrypted into a group of character strings according to the characteristics of each picture.
In the invention, in step S4, the fingerprint identified on the fingerprint identification sensor is translated according to the characteristics through Base64, translated into 64-bit character strings and transmitted to the database.
In the invention, in step S5, the 64-bit string translated this time is compared with a plurality of groups of strings in the database, and when the 64-bit string translated this time exists in the plurality of groups of strings in the database, the passing verification can be prompted by the display.
In the invention, in step S5, the 64-bit string translated this time is compared with a plurality of groups of strings in the database, and when the 64-bit string translated this time does not exist in the plurality of groups of strings in the database, the re-input can be prompted through the display.
In the present invention, in step S5, after the present recognized fingerprint is translated into 64 character strings through Base64, the verification can be passed through the display as long as 90% of the characters in the 64 character strings are contained in the database.
In the present invention, in step S5, after the present recognized fingerprint is translated into 64 character strings by Base64, if only 10% of the characters in the 64 character strings are the same as the present recognized fingerprint in the database, the present recognized fingerprint is re-input by the display prompt.
And those not described in detail in this specification are well within the skill of those in the art.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A password security detection method is characterized in that: the method specifically comprises the following steps:
s1, entering a password: when the fingerprint identification device is used by an individual for the first time, the fingerprint of the individual needs to be input through the fingerprint identification sensor;
s2, encryption of the password: encrypting the input fingerprints through Base64, dividing the input fingerprints into 64 groups of character strings according to different characteristics, mixing 3-bit letters and numbers in each group of character strings, and then disordering the sequence of the 64 groups of character strings and storing the character strings in a database;
s3, inputting a password: the method comprises the following steps that an input fingerprint is placed on a fingerprint identification sensor by an input individual user, and the fingerprint is identified by the sensor;
s4, password translation: the fingerprint identified on the fingerprint identification sensor is translated through Base64, and the fingerprint identified this time is translated into 64 groups of character strings formed by mixing 3-bit letters and numbers according to different characteristics;
s5, data comparison system: and comparing the 64 groups of translated character strings with character strings in the database for judgment, and prompting the judgment result through a display.
2. The method of claim 1, wherein the password security detection method comprises: in step S1, a plurality of fingerprints are entered into the database through the fingerprint recognition sensor, and each fingerprint requires a plurality of fingerprint data acquisitions through the fingerprint recognition sensor.
3. The method of claim 1, wherein the password security detection method comprises: in the step S2, the fingerprint is divided into 64 different pictures by Base64, and the pictures are encrypted into a group of character strings according to the characteristics of each picture.
4. The method of claim 1, wherein the password security detection method comprises: in step S4, the fingerprint recognized by the fingerprint recognition sensor is translated according to the features by Base64, and then translated into 64-bit strings and transmitted to the database.
5. The method of claim 1, wherein the password security detection method comprises: in step S5, the 64-bit string translated this time is compared with the multiple groups of strings in the database, and when the 64-bit string translated this time exists in the multiple groups of strings in the database, the display may prompt that the string passes the verification.
6. The method of claim 1, wherein the password security detection method comprises: in step S5, the 64-bit string translated this time is compared with the multiple groups of strings in the database, and when the 64-bit string translated this time does not exist in the multiple groups of strings in the database, the re-input can be prompted by the display.
7. The method of claim 1, wherein the password security detection method comprises: in step S5, after the fingerprint identification is translated into 64 character strings through Base64, the database can be verified through the display as long as 90% of the 64 character strings are contained in the database.
8. The method of claim 1, wherein the password security detection method comprises: in step S5, after the fingerprint identifier is translated into 64 character strings through Base64, if only 10% of the characters in the 64 character strings are the same as the character strings in the database, the user prompts the user to re-input the fingerprint identifier through the display.
CN202011289832.1A 2020-11-17 2020-11-17 Password security detection method Pending CN112528254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011289832.1A CN112528254A (en) 2020-11-17 2020-11-17 Password security detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011289832.1A CN112528254A (en) 2020-11-17 2020-11-17 Password security detection method

Publications (1)

Publication Number Publication Date
CN112528254A true CN112528254A (en) 2021-03-19

Family

ID=74981810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011289832.1A Pending CN112528254A (en) 2020-11-17 2020-11-17 Password security detection method

Country Status (1)

Country Link
CN (1) CN112528254A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113315629A (en) * 2021-04-28 2021-08-27 四川万信数字科技有限公司 Cloud storage and verification system for commercial passwords

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182673A (en) * 2014-08-12 2014-12-03 赵守中 Identity identification method, system and equipment based on fingerprints
CN106600759A (en) * 2016-10-27 2017-04-26 厦门中控生物识别信息技术有限公司 Fingerprint verifying method, server and system
CN109241719A (en) * 2018-08-31 2019-01-18 张军强 Login validation method, device, storage medium and the intelligent terminal of fingerprint recognition based on multiple fingers
US20190260739A1 (en) * 2016-10-19 2019-08-22 Politecnico Di Torino Device and Methods for Authenticating a User Equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182673A (en) * 2014-08-12 2014-12-03 赵守中 Identity identification method, system and equipment based on fingerprints
US20190260739A1 (en) * 2016-10-19 2019-08-22 Politecnico Di Torino Device and Methods for Authenticating a User Equipment
CN106600759A (en) * 2016-10-27 2017-04-26 厦门中控生物识别信息技术有限公司 Fingerprint verifying method, server and system
CN109241719A (en) * 2018-08-31 2019-01-18 张军强 Login validation method, device, storage medium and the intelligent terminal of fingerprint recognition based on multiple fingers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨柳: "产业链协同SaaS平台中的用户安全性研究", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113315629A (en) * 2021-04-28 2021-08-27 四川万信数字科技有限公司 Cloud storage and verification system for commercial passwords
CN113315629B (en) * 2021-04-28 2023-07-11 四川万信数字科技有限公司 Cloud storage and verification system for business passwords

Similar Documents

Publication Publication Date Title
US7506171B2 (en) Method and systems for securely supporting password change
US8224293B1 (en) Encoded colorgram for mobile device security
US20100174914A1 (en) System and method for traceless biometric identification with user selection
US20030037262A1 (en) Method for supporting dynamic password
CN104683114B (en) Based on the identity identifying method of finger print information
US20150143483A1 (en) Device and Method for Identity Authentication Management
WO2008001373A1 (en) System and method for traceless biometric identification
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
US20210099304A1 (en) Composite identity authentication method and composite identity authentication system using same
US20170147806A1 (en) Personal familiarity authentication
CN102223233A (en) Biological code authentication system and biological code authentication method
CN111131202A (en) Identity authentication method and system based on multiple information authentication
US9286454B2 (en) Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method
CN101877636A (en) Equation password encryption method
Li et al. The influence of Close Non‐Match fingerprints similar in delta regions of whorls on fingerprint identification
JP2009175815A (en) Biometrics authentication system
CN112528254A (en) Password security detection method
JP2010072688A (en) Personal identification system using optical reading code
CN107464091B (en) Intelligent case entrusting management method for judicial appraisal/court scientific organization
JP2011076289A (en) Biometric authentication device
JP2010079823A (en) Individual identification system
Garg et al. User authentication using keystroke recognition
US8577090B2 (en) Biometric authentication method, authentication system, corresponding program and terminal
JP2014134986A (en) Biological authentication method
JP2010079515A (en) Authentication system, key for use in the same, authentication method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210319