CN103678975B - Identity authentication simulation system based on chaos system - Google Patents
Identity authentication simulation system based on chaos system Download PDFInfo
- Publication number
- CN103678975B CN103678975B CN201310720278.1A CN201310720278A CN103678975B CN 103678975 B CN103678975 B CN 103678975B CN 201310720278 A CN201310720278 A CN 201310720278A CN 103678975 B CN103678975 B CN 103678975B
- Authority
- CN
- China
- Prior art keywords
- information
- usbkey
- chaos
- key
- sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004088 simulation Methods 0.000 title claims abstract description 13
- 238000000034 method Methods 0.000 claims abstract description 24
- 238000010586 diagram Methods 0.000 claims abstract description 12
- 238000011156 evaluation Methods 0.000 claims abstract description 11
- 230000015572 biosynthetic process Effects 0.000 claims abstract description 3
- 239000011159 matrix material Substances 0.000 claims description 36
- 229910002056 binary alloy Inorganic materials 0.000 claims description 4
- 230000000739 chaotic effect Effects 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 3
- 230000009182 swimming Effects 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 238000012795 verification Methods 0.000 claims description 2
- 238000013475 authorization Methods 0.000 description 4
- 241001269238 Data Species 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses identity authentication simulation system based on chaos system, including: chaos system emulation module, it is used for utilizing chaos system, chaos initial value and iteration time are configured;Sequence performance evaluation module, is used for selecting Sequence Generation Algorithm, formation sequence, and according to the sequence generated, carries out performance evaluation;Key value binding module, for selecting key value to be bound, inputs personal information, and substep realizes binding;Login module, for selecting the key value bound, inputs correct identification code and logs in, and login process substep realizes;Unlocked state, for being unlocked the key value of locking;Display module, is used for showing analogous diagram and modules data and information.Achieve authentication.
Description
Technical field
The present invention relates to electricity field, particularly relate to identity authentication simulation system based on chaos system.
Background technology
At present, the authentication of identity authentication simulation system is the most incorrect, brings difficulty to authentication.
Summary of the invention
The present invention is directed to the proposition of problem above, and the identity authentication simulation system based on chaos system proposed, solve the inaccurate of identity authorization system.
Identity authentication simulation system based on chaos system, it is characterised in that including: chaos system emulation module, is used for utilizing chaos system, is configured chaos initial value and iteration time.
Sequence performance evaluation module, is used for selecting Sequence Generation Algorithm, formation sequence, and according to the sequence generated, carries out performance evaluation;
Key value binding module, for selecting key value to be bound, inputs personal information, and substep realizes binding;
Login module, for selecting the key value bound, inputs correct identification code and logs in, and login process substep realizes;
Unlocked state, for being unlocked the key value of locking;
Display module, is used for showing analogous diagram and modules data and information.
Above-mentioned chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially binary system XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
Above-mentioned key value binding module, specifically for binding user profile with key value, after user binds key value, sets the identification code of user oneself, and user relies on identification code game server, accesses server.
The effect of the present invention: by the system of the present invention, it is achieved that authentication.
Accompanying drawing explanation
For clearer explanation embodiments of the invention or the technical scheme of prior art, introduce the accompanying drawing used required in embodiment or description of the prior art is done one simply below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
A kind of Chaos Simulation that Fig. 1 provides for the embodiment of the present invention and the structure chart of identity authorization system;
The interface schematic diagram of a kind of chaos system emulation module that Fig. 2 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of sequence performance evaluation module that Fig. 3 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of key value binding module that Fig. 4 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of login module that Fig. 5 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of unlocked state that Fig. 6 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of display module that Fig. 7 provides for the embodiment of the present invention.
Detailed description of the invention
For making the purpose of embodiments of the invention, technical scheme and advantage clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out the most complete description:
As it is shown in figure 1, the embodiment of the present invention provides Chaos Simulation and identity authorization system, including:
Chaos system emulation module 1, for being configured chaos initial value and iteration time, and selects x-axis and the y-axis carrying out emulating.
Sequence performance evaluation module 2, for selecting the algorithm of the sequence generated, carries out performance evaluation.
Key value binding module 3, for selecting USbkey to be bound, inputs personal information, and substep realizes binding.
Login module 4, for selecting the USbkey bound, inputs correct PIN code and logs in, and login process substep realizes.
Unlocked state 5, for being unlocked the USbkey of locking.
Display module 6, for showing some key datas in analogous diagram and each step of modules and information.
Wherein, when simulated implementation identity authorization system, 5 USbkey can be preset in system, hyperchaotic system initial condition to be preset in these 5 USbkey, these initial condition are by userspersonal information's encryption and realize the Back ground Information of " one-time pad " ID authentication mechanism, are can not be disclosed.
Above-mentioned modules is discussed in detail separately below,
In chaos system emulation module 1, the chaos initial value of input can reset, and after certain limit, cannot propagate into chaos system.Iteration time can be arranged with oneself, and iteration time is the biggest, it is thus achieved that discrete count the most, it is thus achieved that the point of chaos sequence analogous diagram will be the most intensive.
This chaos system emulation module 1, as in figure 2 it is shown, can select plane to be emulated by the drop-down menu that x-axis is corresponding with y-axis.Clicking on " emulation " button, system can determine sequential value to be shown according to the selective value of two drop-down menus, then show simulation result in display module.
It is illustrated in figure 3 chaos sequence performance evaluation module, chaos sequence performance evaluation module mainly carries out statistical analysis to a sequence, need sequence carries out Frequency statistics and distance of swimming statistics, and draw autocorrelator trace according to sequence, result is shown in the middle of display module.
Being illustrated in figure 4 USbkey binding system module, this module is used for realizing userspersonal information and binds with USbkey, and inserts initial master key and seed key in USbkey, stores corresponding user profile, and seed key information in the server simultaneously.
The process of USB key value binding is as follows:
1, information is changed, it is first determined whether insert USbkey, if it is determined that after inserting USbkey, the personal user information of input is converted to binary matrix.
Read the selective value v of USBkey key value, judge that whether selective value v is equal to 6, if greater than 6, then read input data, these data are character type, character type is converted into the binary code of correspondence, and character type binary code is converted into double type binary code, then by this double type binary code.
2, random sequence, randomly generate the binary matrix for encrypting userspersonal information, the initial value of hyperchaotic system used is provided by USbkey is internal.
Reading chaos system initial condition, iteration obtains original chaotic sequence, according to binary system XOR algorithm and original chaotic sequence, generates Hyperchaotic Sequence.Then read information matrix size, and intercept the scrambled matrix of correspondence.
3, encryption, with the scrambled matrix produced in previous step, the information changed is encrypted, only carries out XOR.
4, server is deciphered, and server is generating a matrix according to the method generating scrambled matrix, carries out an XOR deciphering with the information matrix after encryption, and the information of checking information input is the most correct, if correct, carries out next step binding.
5, binding, USbkey records userspersonal information's scrambled matrix, server record userspersonal information's original matrix, and produces the master key logged in for the first time.Implement flow chart as shown in Figure 7.
Read chaos initial condition, obtain chaos initiation sequence, obtain distance of swimming statistical series, obtain the random starting point intercepted, it is converted into binary code sequence, obtains PIN code matrix size, intercept the matrix for generating key, XOR generates seed key, then data is deposited in USBkey and server.
Except being deposited in the middle of USbkey by user profile, master key and seed key, in addition it is also necessary to arrange a k, this k value is used for recording the number of times that PIN code is inputed by mistake, and when inputing three times by mistake when, USbkey wants locking, so the initial value of k is 3.
As it is shown in figure 5, the interface of login system module, for analog subscriber login system.Login process includes: identify that PIN, random sequence, computing, checking and key information reset.
1, identify PIN, the USbkey information selected by reading and PIN code, carry out PIN code checking, if PIN is correct, then carries out next step, if mistake, cannot be carried out next step.Needing USbkey locking when PIN input error three times when, after locking, this USbkey cannot complete to log in.
2, random sequence, server reads USbkey and is used for generating the seed key of chaos sequence, and the method for employing produces the identical of the chaos sequence of master key with binding generation in button in binding module.But this button is after generating ciphering sequence, last class value of chaos iteration result be recorded, the initial condition logged in as next time.Meanwhile, last value of the Run-Length Coding obtained in secondary coding algorithm to be utilized, it is calculated the chaos iteration time of next time.
3, computing, the chaos sequence generated in previous step and PIN code homography carry out XOR and produce the master key for authentication.
4, checking, master key is verified, if correctly, produces new chaos initial condition and generate the master key of authentication next time.Except obtaining new master key, also iteration time is encrypted, constitute encryption times matrix.
5, key information resets, and updates the seed key information in server and USbkey and master key information.
As shown in Figure 6, unlocked state, unlocked state is the USbkey process to locking, by verifying userspersonal information, completes to unlock.This process is: information conversion, extraction information, deciphers and verifies four step process.
1, information is changed, and changes the userspersonal information of input, is converted into the binary matrix of correspondence, prepares for ensuing unblock, and its flow process is basically identical with " the information conversion " in binding module.Except for the difference that before unlocking, this USbkey the most locking is determined according to the k value of storage in USbkey by this button.
2, extract information, according to the selective value in USBkey drop-down menu, extract the userspersonal information's scrambled matrix preserved in USbkey.
3, deciphering, the userspersonal information's scrambled matrix extracted in previous step is decrypted.The process of deciphering is consistent with the deciphering flow process in binding procedure.
4, checking, the information matrix obtained in the 1st step of unlocked state is carried out contrast verification with the deciphering matrix obtained in the 2nd step, if unanimously, then unlocks successfully, if inconsistent, then unlock failure.
Display module as shown in Figure 7, this module has two the display parts in left and right, and the left side is analogous diagram viewing area, the region of video data change in the realization of each process of the right modules.
Claims (3)
1. identity authentication simulation system based on chaos system, it is characterised in that including: chaos system emulation module, be used for utilizing chaos system, chaos initial value and iteration time are configured;
Sequence performance evaluation module, is used for selecting Sequence Generation Algorithm, formation sequence, and according to the sequence generated, carries out performance evaluation;
Key value binding module, for selecting key value to be bound, inputs personal information, and substep realizes binding, and inserts initial master key and seed key in USbkey, stores corresponding user profile, and seed key information in the server simultaneously;
Login module, for selecting the key value bound, inputs correct identification code and logs in, and login process substep realizes;
Unlocked state, for being unlocked the key value of locking;
Display module, is used for showing analogous diagram and modules data and information
;
Wherein: the process of USB key value binding is as follows:
Information is changed, and inserts USbkey, the personal user information of input is converted to binary matrix;
Reading the selective value v of USBkey key value, it is determined that selective value v, read input data, these data are character type, character type is converted into the binary code of correspondence, and character type binary code is converted into double type binary code;
Random sequence, randomly generates the binary matrix for encrypting userspersonal information, and the initial value of hyperchaotic system used is provided by USbkey is internal;
Reading chaos system initial condition, iteration obtains original chaotic sequence, according to binary system XOR algorithm and original chaotic sequence, generates Hyperchaotic Sequence, then reads information matrix size, and intercept the scrambled matrix of correspondence;
Encryption, with the scrambled matrix produced in previous step, is encrypted the information changed;
Server is deciphered, and server generates a matrix according to the method generating scrambled matrix, carries out an XOR deciphering with the information matrix after encryption, and the information of checking information input is the most correct, if correct, carries out next step binding;
Binding, USbkey records userspersonal information's scrambled matrix, server record userspersonal information's original matrix, and produces the master key logged in for the first time;
Read chaos initial condition, obtain chaos initiation sequence, obtain distance of swimming statistical series, obtain the random starting point intercepted, it is converted into binary code sequence, obtains PIN code matrix size, intercept the matrix for generating key, XOR generates seed key, then data is deposited in USBkey and server;
User profile, master key and seed key are deposited in the middle of USbkey, also set up one, this value be used for record the number of times that PIN code is inputed by mistake, when inputing three times by mistake when, USbkey wants locking, initial value be 3
。
2. identity authentication simulation system based on chaos system as claimed in claim 1, it is characterised in that described chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially binary system XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
3. identity authentication simulation system based on chaos system as claimed in claim 1, it is characterized in that, described key value binding module, specifically for user profile is bound with key value, after user binds key value, setting the identification code of user oneself, user relies on identification code game server, accesses server;
The login process of login module includes: identify that PIN, random sequence, computing, checking and key information reset;
Identifying PIN, the USbkey information selected by reading and PIN code, carry out PIN code checking, if PIN is correct, then carry out next step, needing USbkey locking when PIN input error three times when, after locking, this USbkey cannot complete to log in;
Random sequence, server reads USbkey and is used for generating the seed key of chaos sequence, and last class value of chaos iteration result is recorded, the initial condition logged in as next time, simultaneously, last value of the Run-Length Coding obtained in secondary coding algorithm to be utilized, is calculated the chaos iteration time of next time;
Computing, the chaos sequence generated in previous step and PIN code homography carry out XOR and produce the master key for authentication;
Checking, verifies master key, if correctly, produces new chaos initial condition and generates the master key of authentication next time, except obtaining new master key, to be also encrypted iteration time, constituting encryption times matrix;
Key information resets, and updates the seed key information in server and USbkey and master key information;
Unlocked state releasing process is: information conversion, extraction information, deciphers and verifies;
Information is changed, and changes the userspersonal information of input, is converted into the binary matrix of correspondence, and its flow process is changed consistent with the described information in binding module, and to determine this USbkey the most locking according to the value of storage in USbkey before unlocking;
Extraction information, according to the selective value in USBkey drop-down menu, extracts the userspersonal information's scrambled matrix preserved in USbkey;
Deciphering, is decrypted the described userspersonal information's scrambled matrix extracted, and the process of deciphering is consistent with the deciphering flow process in binding procedure;
Checking, the information matrix obtaining unlocked state carries out contrast verification with the deciphering matrix obtained, if unanimously, then unlocks successfully, if inconsistent, then unlock failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310720278.1A CN103678975B (en) | 2013-12-20 | 2013-12-20 | Identity authentication simulation system based on chaos system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310720278.1A CN103678975B (en) | 2013-12-20 | 2013-12-20 | Identity authentication simulation system based on chaos system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103678975A CN103678975A (en) | 2014-03-26 |
CN103678975B true CN103678975B (en) | 2017-01-04 |
Family
ID=50316498
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310720278.1A Active CN103678975B (en) | 2013-12-20 | 2013-12-20 | Identity authentication simulation system based on chaos system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103678975B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015166701A1 (en) * | 2014-04-28 | 2015-11-05 | 一郎 加沢 | Encryption method, program, and system |
CN106953875A (en) * | 2017-04-26 | 2017-07-14 | 吉林大学珠海学院 | Ordered encryption method based on multi-key cipher stream cipher |
CN109829333B (en) * | 2019-01-14 | 2021-01-19 | 中国科学院信息工程研究所 | OpenID-based key information protection method and system |
CN116894261B (en) * | 2023-09-11 | 2023-12-19 | 山东卓汇智能科技有限公司 | Digital hospital electronic medical record intelligent encryption method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101179375B (en) * | 2006-11-12 | 2012-04-04 | 黑龙江大学 | Chaos algorithm based network data encryption card |
CN102571327B (en) * | 2010-12-31 | 2015-04-01 | 上海格尔软件股份有限公司 | Method for managing USBKey unlocking secret key intensively and safely |
CN103413109B (en) * | 2013-08-13 | 2016-04-06 | 江西理工大学 | A kind of mutual authentication method of radio frequency identification system |
-
2013
- 2013-12-20 CN CN201310720278.1A patent/CN103678975B/en active Active
Non-Patent Citations (2)
Title |
---|
一种基于超混沌系统的身份认证方案;卢辉斌等;《计算机安全》;20100731(第7期);第18页第3节,图5 * |
融入混沌理论的一种OTP方案研究;梁喆等;《计算机工程》;20070415;第33卷(第7期);第160-162页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103678975A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10396985B1 (en) | Federated identity management based on biometric data | |
US11599624B2 (en) | Graphic pattern-based passcode generation and authentication | |
CN103778374B (en) | The method of trusted terminal, double-channel card, anti-clone's chip, chip finger print and anti-channel attack | |
CN103200011B (en) | A kind of cipher authentication method and device | |
CN111314069B (en) | Block chain-based shaking system and method, electronic device and storage medium | |
CN103678975B (en) | Identity authentication simulation system based on chaos system | |
CN102567233B (en) | Data protection method of USB storage device based on magnetic disc virtual technology | |
CN104408356B (en) | A kind of fingerprint verification method and system, fingerprint template encryption device | |
US11604867B2 (en) | Graphic pattern-based authentication with adjustable challenge level | |
CN101923619A (en) | Password key camouflage system and method | |
CN105359153A (en) | Gesture-based authentication without retained credentialing gestures | |
WO2014188210A1 (en) | User authentication system and method | |
CN108868367B (en) | Intelligent lock device | |
CN106027461B (en) | A kind of method that authentication ids system medium cloud authentication platform uses key | |
CN104134141B (en) | E-wallet system payment method based on time synchronization | |
CN105897417A (en) | Encrypted data input method and encrypted data input device | |
CN103297391A (en) | Graphical dynamic password inputting and verifying method | |
CN102957688A (en) | Password input and verification method and device | |
CN104881595B (en) | The self-help remote unlocking method managed based on PIN code | |
CN106027252A (en) | Cloud authentication platform in identity card authentication system | |
CN103297237A (en) | Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server | |
CN102902903B (en) | A kind of ecommerce intelligent code key with button and its implementation | |
CN102685121A (en) | Digital signature method and digital signature device | |
WO2017059696A1 (en) | Touch screen unlocking method and system, storage medium | |
CN105989481B (en) | Data interaction method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |