CN102055581A - Password protection system and method, and password generating device - Google Patents
Password protection system and method, and password generating device Download PDFInfo
- Publication number
- CN102055581A CN102055581A CN2009103093952A CN200910309395A CN102055581A CN 102055581 A CN102055581 A CN 102055581A CN 2009103093952 A CN2009103093952 A CN 2009103093952A CN 200910309395 A CN200910309395 A CN 200910309395A CN 102055581 A CN102055581 A CN 102055581A
- Authority
- CN
- China
- Prior art keywords
- binary code
- password
- group
- biological information
- generation device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a password generating device connected with a biological information acquiring device and used for providing a plurality of sub passwords for a password verifying end. The password generating device comprises a biological information describing unit and a grouping unit, wherein the biological information describing unit is used for converting biological information of a user, acquired by the biological information acquiring device, into one group of binary codes; and the grouping unit is used for dividing the group of binary codes into a plurality of sub groups of binary codes according to a preset digital value and issuing the plurality of sub groups of binary codes as the plurality of sub passwords to the password verifying end. The invention also provides password protection system and method.
Description
Technical field
The present invention relates to information security field, particularly a kind of cipher protection system and cipher code protection method and password generation device.
Background technology
The progress of computer science and technology and Internet technology, the digital information service is provided convenience for people's life, and after for example utilizing PC and bank server to set up network to be connected, the user can realize the personal account management, transfer accounts and operate on the net.
Meanwhile, information security also more and more is subject to people's attention.Under the usual condition, the user can be provided with password for the account of oneself and prevent that the disabled user from stealing the information of oneself.Yet when utilizing the combination of numeral and character to be used as password, the disabled user can utilize wooden horse software to obtain the password of user's input, thereby makes the information of validated user can not get effective protection.
Summary of the invention
Given this, be necessary the cipher protection system that provides a kind of security performance higher.
The cipher code protection method that provides a kind of security performance higher also is provided.
The password generation device that provides a kind of security performance higher also is provided.
A kind of cipher protection system, it comprises client.This client is connected with a service end by network.This client comprises biomedical information acquisition device, password generation device and communicator.The biomedical information acquisition device is used to gather user biological information, and biological information is offered password generation device.This password generation device is used for producing one group of binary code according to this biological information, and this password generation device also responds transfer operation, should organize binary code according to predetermined digital value and be divided into a plurality of son groups.This password generation device should be a plurality of son group binary codes be distributed to service end as a plurality of subciphers so that service end will this a plurality of subciphers and the benchmark encrypted message group that prestores in password mate.Communicator is used for receiving service end provides corresponding information on services for client when the password of all subciphers and benchmark encrypted message group is complementary.
A kind of cipher code protection method comprises the steps:
Gather user biological information, and generate the one group of binary code that is used to describe this biological information;
The response transfer operation should be organized binary code according to predetermined digital value and be divided into a plurality of son groups;
These a plurality of son group binary codes are distributed to service end as a plurality of subciphers so that service end will this a plurality of subciphers and the benchmark encrypted message group that prestores in password mate;
When being complementary, the password of reception service end in all subciphers and benchmark encrypted message group provide corresponding service for client.
A kind of password generation device is connected with the biomedical information acquisition device, and this password generation device is used to the password authentification end that a plurality of subciphers are provided.This password generation device comprises biological information description unit and grouped element.This biological information description unit is used for the user biological information that the biomedical information acquisition device collects is converted to one group of binary code.This grouped element is used for should organizing binary code according to predetermined digital value and is divided into a plurality of son groups, and should be distributed to the password authentification end as a plurality of subciphers by a plurality of son group binary codes.
By above-mentioned cipher protection system and method and password generation device; after client is gathered user biological information; biological information is converted to one group of binary code; in client when service end is submitted information to; client should be organized binary code and be divided into a plurality of son groups; and should be distributed to service end as a plurality of subciphers by a plurality of son group binary codes, service end is carried out matching operation by the password in a plurality of subciphers that will receive and the benchmark encrypted message group that prestores and is finished password verification operation.Dynamically produce when service end is submitted information to because password is a client, the disabled user can only steal the biological information that collects, and it can not steal the password of the dynamic generation when sending, thereby makes user's information be effectively protected.
Description of drawings
Fig. 1 is the application schematic diagram of the cipher protection system of a better embodiment.
Fig. 2 is the functional block diagram of password generation device among Fig. 1.
Fig. 3 is the functional block diagram of service end among Fig. 1.
Fig. 4 is the cipher code protection method flow chart of a better embodiment.
Embodiment
As shown in Figure 1, it is the application schematic diagram of the cipher protection system 100 of a better embodiment.This cipher protection system 100 comprises client 20 and service end 40.Client 20 is connected with service end 40 by network 10.Client 20 can be PC, smart mobile phone etc.The internetwork connection mode that client 20 and service end 40 are set up can be wireless mode or wired mode.
Biomedical information acquisition device 21 is used to gather user biological information, and biological information is offered password generation device 22.Wherein, this biological information can be user's finger print information, iris information etc.
Please be simultaneously referring to Fig. 2, it is the functional block diagram of password generation device 22 among Fig. 1.Password generation device 22 comprises biological information description unit 222, chooses unit 223, converting unit 224 and grouped element 225.
The user biological information that biological information description unit 222 is used for collecting is converted to one group of binary code.
Choose unit 223 and be used to respond transfer operation, from this group binary code, select the fixedly binary code of figure place according to pre-defined rule.
Converting unit 224 is used for choosing the binary code of selecting unit 223 according to this and produces corresponding digital value.
Grouped element 225 is used for will being divided into a plurality of son groups by this group binary code of these biological information description unit 222 conversions according to the digital value that produces, and should be distributed to the password authentification end as subcipher by a plurality of son group binary codes.
Please be simultaneously referring to Fig. 3, it is the functional block diagram of service end 40 among Fig. 1.Service end 40 comprises communication module 41, memory module 42 and password authentication module 43.
For ease of understanding, below be that example is illustrated with the user by access to netwoks bank: client 20 is user's a PC, service end 40 is the server of bank, after PC is gathered user's finger print information, finger print information is converted to one group of binary code of 240, when the user carries out submit operation, PC is obtained last three code of this group binary code, for example this last three code is 110, PC is transformed into the decimal system to obtain digital value 6 with this last three code 110, PC should be organized binary code according to digital value 6 and be divided into six son groups, and PC is distributed to these six son group binary codes the server of bank as subcipher; Stored set when the user registers a benchmark encrypted message group in the server of bank, six passwords have been comprised in this benchmark encrypted message group, the server of bank is when judging all corresponding with six passwords in the benchmark encrypted message group coupling of six son group binary codes, for the user provides service.
As shown in Figure 4, it is the flow chart of the cipher code protection method of a better embodiment.This cipher code protection method is applied to cipher protection system.This cipher protection system comprises client and sets up the service end that network is connected with client.Wherein, client can be PC, smart mobile phone etc.; The internetwork connection mode that client and service end are set up can be wireless mode or wired mode.This method comprises the steps:
Step S300 gathers user biological information, and generates the one group of binary code that is used to describe this biological information.Wherein, this biological information can be user's finger print information, iris information etc.
Step S302, the response transfer operation is selected the fixedly binary code of figure place according to pre-defined rule from this group binary code.
Step S304 produces corresponding digital value according to the binary code of selecting.
Step S306 should organize binary code according to predetermined digital value and be divided into a plurality of son groups.
Step S308 should be distributed to service end as password by a plurality of son group binary codes.
Step S310, service end receives a plurality of son group binary codes of client distribution.
Step S312 carries out matching operation with child group binary code that receives and the benchmark encrypted message group that prestores.For example, choose every group of son group binary code one by one, and search corresponding password from the benchmark encrypted message group that prestores according to the child group binary code of choosing.
Step S314 is when the password in all the son group binary codes determining to receive and benchmark encrypted message group is complementary, for client provides corresponding service.
By above-mentioned cipher protection system 100 and method and password generation device 22; after client 20 is gathered user biological information; biological information is converted to one group of binary code; in client 20 when service end 40 is submitted information to; client 20 should be organized binary code and be divided into a plurality of son groups; and should be distributed to service end 40 as a plurality of subciphers by a plurality of son group binary codes, service end 40 is carried out matching operation by the password in a plurality of subciphers that will receive and the benchmark encrypted message group that prestores and is finished password verification operation.Dynamically produce when service end 40 is submitted information to because password is a client 20, the disabled user can only steal the biological information that collects, and it can not steal the password of dynamic generation, thereby makes user's information be effectively protected.
Claims (10)
1. cipher protection system, it comprises client, this client is connected with a service end by network, it is characterized in that: this client comprises biomedical information acquisition device, password generation device and communicator, this biomedical information acquisition device is used to gather user biological information, and biological information is offered password generation device; This password generation device is used for producing one group of binary code according to this biological information, and this password generation device also responds transfer operation, should organize binary code according to predetermined digital value and be divided into a plurality of son groups; This password generation device should be a plurality of son group binary codes be distributed to service end as a plurality of subciphers so that service end will this a plurality of subciphers and the benchmark encrypted message group that prestores in password mate; This communicator is used for receiving service end provides corresponding information on services for client when the password of all subciphers and benchmark encrypted message group is complementary.
2. cipher protection system as claimed in claim 1 is characterized in that: this predetermined digital value obtains in the following manner:
This password generation device is selected the fixedly binary code of figure place according to pre-defined rule from this group binary code, produce this digital value according to the binary code of selecting.
3. cipher protection system as claimed in claim 2 is characterized in that: this password generation device comprises the biological information description unit, chooses the unit, converting unit and grouped element;
The user biological information that this biological information description unit is used for collecting is converted to one group of binary code;
This is chosen the unit and is used to respond transfer operation, selects the fixedly binary code of figure place according to pre-defined rule from this group binary code;
The binary code that this converting unit is used for selecting according to this unit, constituency produces corresponding digital value;
This grouped element is used for will being divided into a plurality of son groups by this group binary code of this biological information description unit conversion according to the digital value that produces, and should be distributed to the password authentification end as subcipher by a plurality of son group binary codes.
4. cipher protection system as claimed in claim 1 is characterized in that: the benchmark encrypted message group that this service end prestores comprises a plurality of passwords corresponding with these a plurality of subciphers.
5. a cipher code protection method comprises the steps:
Gather user biological information, and generate the one group of binary code that is used to describe this biological information;
The response transfer operation should be organized binary code according to predetermined digital value and be divided into a plurality of son groups;
These a plurality of son group binary codes are distributed to service end as a plurality of subciphers so that service end will this a plurality of subciphers and the benchmark encrypted message group that prestores in password mate;
When being complementary, the password of reception service end in all subciphers and benchmark encrypted message group provide corresponding service for client.
6. cipher code protection method as claimed in claim 5 is characterized in that: this predetermined digital value obtains by following steps:
From this group binary code, select the fixedly binary code of figure place according to pre-defined rule;
Produce corresponding digital value according to the binary code of selecting.
7. cipher code protection method as claimed in claim 5 is characterized in that: the benchmark encrypted message group that prestores comprises a plurality of passwords corresponding with these a plurality of subciphers.
8. a password generation device is connected with the biomedical information acquisition device, and this password generation device is used to the password authentification end that a plurality of subciphers are provided, and it is characterized in that: this password generation device comprises biological information description unit and grouped element;
This biological information description unit is used for the user biological information that the biomedical information acquisition device collects is converted to one group of binary code;
This grouped element is used for should organizing binary code according to predetermined digital value and is divided into a plurality of son groups, and should be distributed to the password authentification end as a plurality of subciphers by a plurality of son group binary codes.
9. password generation device as claimed in claim 8 is characterized in that: this password generation device also comprises chooses unit and converting unit;
This is chosen the unit and is used to respond transfer operation, selects the fixedly binary code of figure place according to pre-defined rule from this group binary code;
The binary code that this converting unit is used for selecting according to this unit, constituency produces this corresponding digital value.
10. password generation device as claimed in claim 9 is characterized in that: this biological information is a finger print information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009103093952A CN102055581A (en) | 2009-11-06 | 2009-11-06 | Password protection system and method, and password generating device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009103093952A CN102055581A (en) | 2009-11-06 | 2009-11-06 | Password protection system and method, and password generating device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102055581A true CN102055581A (en) | 2011-05-11 |
Family
ID=43959543
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009103093952A Pending CN102055581A (en) | 2009-11-06 | 2009-11-06 | Password protection system and method, and password generating device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102055581A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702291A (en) * | 2015-12-18 | 2018-10-23 | 株式会社 Kt | Authentication device based on biological information and its operating method |
CN115567320A (en) * | 2022-11-10 | 2023-01-03 | 深圳高新区信息网有限公司 | Internet of things platform data management method based on micro-service architecture |
-
2009
- 2009-11-06 CN CN2009103093952A patent/CN102055581A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702291A (en) * | 2015-12-18 | 2018-10-23 | 株式会社 Kt | Authentication device based on biological information and its operating method |
CN115567320A (en) * | 2022-11-10 | 2023-01-03 | 深圳高新区信息网有限公司 | Internet of things platform data management method based on micro-service architecture |
CN115567320B (en) * | 2022-11-10 | 2023-03-24 | 深圳高新区信息网有限公司 | Internet of things platform data management method based on micro-service architecture |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4741629B2 (en) | Authentication method using icon encryption | |
CN102804201B (en) | Off-line two-factor user Verification System, its method and program thereof | |
CN101868800B (en) | Apparatus, and an associated methodology, for facilitating authentication using a digital music authentication token | |
CN101699892B (en) | Method and device for generating dynamic passwords and network system | |
US20090055541A1 (en) | Connection parameter setting system, method thereof, access point, server, wireless terminal, and parameter setting apparatus | |
CN103023933B (en) | A kind of log-on message Integrated Processing System and method | |
CN1514635A (en) | Method of realizing mobile electronic business using finger print intelligence terminal and intelligent hand set | |
CN102523213A (en) | Server and terminal authenticating method and server and terminal | |
CN101340283A (en) | Multisystem biometric token | |
CN102710420A (en) | Method, system and device for setting password | |
CN101010903A (en) | Method for generating and verifying an electronic signature | |
CN104780044A (en) | Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method | |
CN1849774A (en) | Message security | |
CN112347188A (en) | Authorization and access auditing system and method based on private chain | |
CN103152324A (en) | User authentication method based on behavior features | |
CN101727550A (en) | Cipher safety system identified on basis of biological characteristics and method | |
TW201118641A (en) | Identity authentication method, device and system | |
CN102055581A (en) | Password protection system and method, and password generating device | |
CN105306200A (en) | Method and device for encrypting network account password | |
CN111539713B (en) | Mobile payment account end user certificate generation and conversion method, system and storage medium | |
CN108616543A (en) | A kind of short haul connection based on Quick Response Code, transmission method, apparatus | |
CN101226671B (en) | Adversaria prompting method and apparatus | |
CN101303755A (en) | Electronic mobile apparatus and electronic transaction method | |
JP7402928B2 (en) | Method and system for activating a portable contactless payment object | |
CN202904766U (en) | Mobile card swiping unit and mobile payment system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110511 |