CN102185697B - Solution of two-factor authentication security system - Google Patents

Solution of two-factor authentication security system Download PDF

Info

Publication number
CN102185697B
CN102185697B CN201110143842.9A CN201110143842A CN102185697B CN 102185697 B CN102185697 B CN 102185697B CN 201110143842 A CN201110143842 A CN 201110143842A CN 102185697 B CN102185697 B CN 102185697B
Authority
CN
China
Prior art keywords
information
static password
transmission
password
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110143842.9A
Other languages
Chinese (zh)
Other versions
CN102185697A (en
Inventor
贾松仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hualang Intelligent Technology Co.,Ltd.
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201110143842.9A priority Critical patent/CN102185697B/en
Publication of CN102185697A publication Critical patent/CN102185697A/en
Application granted granted Critical
Publication of CN102185697B publication Critical patent/CN102185697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to the field of radio transmission, in particular to the solution of a two-factor authentication security system. The solution is realized by a transmission system and a receiving system, and is characterized in that: a method comprises that: after power-on, frame hopping information and a static password obtained by the encryption of a keyboard are transmitted to a transmission circuit for transmission; after being powered on, a receiving module receives the transmitted information and transmits the received information to a micro control unit (MCU) memory; the MCU memory decrypts the received information, verifies the legality of a transmission module, verifies whether the static password is consistent with password information stored in an MCU if the transmission module is verified to be legal, enables a path if the static password is consistent with the password information stored in the MCU, otherwise gives an alarm or does not make any response; and when detecting a key-pressing operation, the system triggers a frame hopping chip to encrypt the input static password and generate a random number, and transmits coded information in a data transmission process to a receiver, and the receiver determines whether detected key-pressing information is accurate or not according to guidance codes, and performs decryption if the detected key-pressing information is determined to be accurate. By the solution, the shortcomings of the system for realizing identity authentication by the static password are effectively overcome; and the solution can be widely applied to various identity authentication systems.

Description

Solution of two-factor authentication security system
[technical field]
The present invention relates to the wireless radio transmission field, specifically solution of two-factor authentication security system.
[background technology]
At present, the password product on the market generally adopts the static password mode to realize authentication, and so-called static password mainly refers to the basic fixing numerical ciphers such as user's account password, password for inquiry.Use static password in use usually to have following potential safety hazard:
(1) for the ease of memory, user's more options birthday, telephone number etc. are as password, and the lawless person can constantly attempt and be easy to breaking a code by the robot program;
(2) passwords repeatedly use, and are adopted easily the mode of intercepting/playback by the lawless person, to differentiating through the authentication information that transmits after the simple encryption, extrapolate user's password, cause to be not intended to reveal;
(3) because current authentication information majority by Internet Transmission is the plaintext of not encrypted, and the lawless person can eavesdrop network data flow, tells authentication information, from network or intercept and capture password on the telephone wire, obtain easily user's key message;
(4) lawless person usually utilize spy upon, password that the means such as trick are obtained the user.
[summary of the invention]
Purpose of the present invention is being not change the product appearance structure, do not changing under the condition of pin mode, realizes the fail safe transmission of user cipher.
To achieve these goals, design a kind of detection method of antenna transmission double authentication, comprise emission system and receiving system, it is characterized in that the static password after the method is with frame hopping information and encrypting keyboard sends by being radiating circuit after powering on, after powering on, receives receiver module that the information of transmission gives the MCU memory, decipher first, then verify the legitimacy of transmitter module, whether the legal static password of then verifying again is consistent with the encrypted message of the upper storage of MCU, if unanimously then open, otherwise produce warning or do not do response; When system has detected button, trigger the frame hopping chip static password information of inputting is encrypted rear generation random number, system sends to receiving terminal with the coded message in the data transmission procedure, whether receiving terminal determines to detect key information according to pilot codes correct, if correctly the deciphering, judge the legitimacy of transmitting terminal hardware device according to the frame hopping information after the deciphering, and determine the legitimacy of transmitting terminal identity according to the random number that obtains after the deciphering.When if both all satisfy, corresponding response can be opened or make in system, otherwise produce warning or do not do response.
Form below the coding in data transmission procedure:
First: pilot codes, be used for recognition user information, the pilot codes number is determined by the EEPROM configuration words;
Second portion: frame hopping information, for the legitimacy of checking transmitting terminal hardware device.
Third part: the random number behind frame hopping and the static password XOR, guarantee fail safe, the uniqueness of static password, the number of described random number is determined by the number of static password.
Data transmission method may further comprise the steps:
A, static password input, sampling, static encryption, transmission, acceptance, deciphering;
Judge legitimacy behind b, the deciphering static password; Judge legitimacy behind the deciphering ECC frame hopping;
C, data judge when legal that system opens or response; Data are judged and are logged off or report to the police when illegal.
The present invention compared with prior art efficiently solves the defective that static password realizes that identity authorization system exists, and can be widely used in various identity authorization systems, and cost is low.
[description of drawings]
Fig. 1 is the implementation framework figure of system of the present invention;
Fig. 2 is the coding step figure in the data transmission procedure of the present invention;
Fig. 3 is transfer of data flow process figure of the present invention.
[embodiment]
Below in conjunction with accompanying drawing the invention is described in further details, this manufacturing technology is clearly to this professional personage.
The present invention is used for the static password authentication, with reference to Fig. 1, static password after frame hopping information and the encryption is sent by radiating circuit, after receiver module is received the information of transmission, decipher first, then verify the legitimacy of transmitter module, whether the legal static password of then verifying again is consistent with the encrypted message of the upper storage of MCU, if unanimously then open, otherwise produce warning or do not do response.
When system has detected button, trigger the frame hopping chip static password information of inputting is encrypted rear generation random number, system sends to receiving terminal with pilot codes, random number, frame hopping information, whether receiving terminal determines to detect key information according to pilot codes correct, if correctly the deciphering, judge the legitimacy of transmitting terminal hardware device according to the frame hopping information after the deciphering, and determine the legitimacy of transmitting terminal identity according to the random number that obtains after the deciphering.When if both all satisfy, corresponding response can be opened or make in system, otherwise produce warning or do not do response.
With reference to Fig. 2, the coding of the double authentication in the wireless transmission in data transmission procedure comprises:
First: pilot codes, be used for recognition user information, the pilot codes number is determined by the EEPROM configuration words;
Second portion: frame hopping information, for the legitimacy of checking transmitting terminal hardware device.
Third part: the random number behind frame hopping and the static password XOR, guarantee fail safe, the uniqueness of static password.The number of this random number is determined by the number of static password.
The data transfer process:
The mode that adopts frame hopping to add static password improves the fail safe of information in transmission course.Wherein first is that pilot codes is used for recognition user information, reduces erroneous judgement.The key information of second portion transmission adopts the encoding by code hopping algorithm to be encrypted, and adopts this kind cryptographic algorithm can realize that the coded word of launching never repeats, and improves the fail safe in transmission course.Transmit behind frame hopping information after third part will be encrypted and the static password XOR, the protection static password is avoided in transmission course by the danger of intercepting and capturing and cracking in transmission course safety again.Receiving terminal receives this information, decipher first and verify again legitimacy, decoded second portion is used for the legitimacy of the product of checking emission, as identical with the product of receiving terminal storage after the empirical tests, receiving terminal just can be verified the static password after the deciphering, after empirical tests was legal, receiving terminal just can be made corresponding response.
With reference to Fig. 3, transfer of data may further comprise the steps:
A, static password input, sampling, static encryption, transmission, acceptance, deciphering;
Judge legitimacy behind b, the deciphering static password; Judge legitimacy behind the deciphering ECC frame hopping;
C, data judge when legal that system opens or response; Data are judged and are logged off or report to the police when illegal.
Double authentication solution in the wireless transmission has effectively solved the safety issue of static password in transmission course.In the process of transmission static password, adopt the frame hopping technology that static password is encoded, so that the static password in the transmission course converts forever unduplicated random number to, effectively protected the fail safe of static password.Even in transmission course, intercepted and captured or be tampered the static password that also all can't crack the user.Utilize simultaneously coding techniques that the fail safe of hardware device is judged, can effectively identify pirate user.This system can be widely used in all kinds of identification systems.

Claims (3)

1. the detection method of an antenna transmission double authentication, comprise emission system and receiving system, it is characterized in that the static password after the method is with frame hopping information and encrypting keyboard sends by being radiating circuit after powering on, after powering on, receives receiver module that the information of transmission gives the MCU memory, decipher first, then verify the legitimacy of transmitter module, whether the legal static password of then verifying again is consistent with the encrypted message of the upper storage of MCU, if unanimously then open, otherwise produce warning or do not do response; When system has detected button, trigger the frame hopping chip static password information of inputting is encrypted rear generation random number, system sends to receiving terminal with the coded message in the data transmission procedure, whether receiving terminal determines to detect key information according to pilot codes correct, if correctly the deciphering, judge the legitimacy of transmitting terminal hardware device according to the frame hopping information after the deciphering, and determine the legitimacy of transmitting terminal identity according to the static password after the deciphering, when if both all satisfy, corresponding response can be opened or make in system, otherwise produce warning or do not do response.
2. the detection method of a kind of antenna transmission double authentication as claimed in claim 1 is characterized in that forming below the coding in data transmission procedure:
First: pilot codes, be used for recognition user information, the pilot codes number is determined by the EEPROM configuration words;
Second portion: frame hopping information, for the legitimacy of checking transmitting terminal hardware device;
Third part: the random number behind frame hopping and the static password XOR, guarantee fail safe, the uniqueness of static password, the number of described random number is determined by the number of static password.
3. the detection method of a kind of antenna transmission double authentication as claimed in claim 1 is characterized in that data transmission method may further comprise the steps:
A, static password input, sampling, static encryption, transmission, acceptance, deciphering;
Judge legitimacy behind b, the deciphering static password; Judge legitimacy behind the deciphering ECC frame hopping;
C, data judge when legal that system opens or response; Data are judged and are logged off or report to the police when illegal.
CN201110143842.9A 2011-05-31 2011-05-31 Solution of two-factor authentication security system Active CN102185697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110143842.9A CN102185697B (en) 2011-05-31 2011-05-31 Solution of two-factor authentication security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110143842.9A CN102185697B (en) 2011-05-31 2011-05-31 Solution of two-factor authentication security system

Publications (2)

Publication Number Publication Date
CN102185697A CN102185697A (en) 2011-09-14
CN102185697B true CN102185697B (en) 2013-05-29

Family

ID=44571770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110143842.9A Active CN102185697B (en) 2011-05-31 2011-05-31 Solution of two-factor authentication security system

Country Status (1)

Country Link
CN (1) CN102185697B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970139B (en) * 2012-11-09 2016-08-10 中兴通讯股份有限公司 Data security validation method and device
CN109765825B (en) * 2019-01-30 2023-09-29 山西天科信息安全科技有限公司 Internet of things multilink safety control terminal and safety control method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0902549A2 (en) * 1997-09-13 1999-03-17 Samsung Electronics Co., Ltd. Device and method for bi-orthogonal code hopping multiple access communication
CN2616619Y (en) * 2003-02-10 2004-05-19 刘合安 Electric controlled antitheft lock
CN201266414Y (en) * 2008-09-19 2009-07-01 洪鹏远 Anti-theft capturing controller with voice prompting function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0902549A2 (en) * 1997-09-13 1999-03-17 Samsung Electronics Co., Ltd. Device and method for bi-orthogonal code hopping multiple access communication
CN2616619Y (en) * 2003-02-10 2004-05-19 刘合安 Electric controlled antitheft lock
CN201266414Y (en) * 2008-09-19 2009-07-01 洪鹏远 Anti-theft capturing controller with voice prompting function

Also Published As

Publication number Publication date
CN102185697A (en) 2011-09-14

Similar Documents

Publication Publication Date Title
US11335144B2 (en) Method for unlocking intelligent lock, mobile terminal, intelligent lock and server
CN110493197B (en) Login processing method and related equipment
CN106656510B (en) A kind of encryption key acquisition methods and system
CN101005361B (en) Server and software protection method and system
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
CN104112307A (en) Electronic lock by using sound waves for unlocking and unlocking method thereof
CN101917270A (en) Weak authentication and key agreement method based on symmetrical password
JP2012244629A (en) Method and device for access verification or verification of start
CN102480713A (en) Method, system and device for communication between sink node and mobile communication network
CN106027457B (en) A kind of ID card information transmission method and system
CN103781064A (en) Short message verification system and verification method
CN101582896A (en) Third-party network authentication system and authentication method thereof
CN109618334A (en) Control method and relevant device
CN108401494B (en) Method and system for transmitting data
CN102857503A (en) Secure wireless transmission method for fingerprint data
CN109922022A (en) Internet of Things communication means, platform, terminal and system
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN102185697B (en) Solution of two-factor authentication security system
US10687214B2 (en) Secure key fob
CN104796266A (en) Authentication method, device and system
CN107749795A (en) A kind of vehicle remote control method of the secondary encryption based on rolling code
CN108352990B (en) Method and system for transmitting data
CN105184116A (en) Intelligent equipment software encryption and personal authentication device and method
CN111161450A (en) Electric power intelligence tool to lock device based on ESAM encrypts authentication
CN108322439B (en) Registration method and registration system by using security equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220830

Address after: Room 501, 5th Floor, No. 700, Liyuan Road, Huangpu District, Shanghai, 200023 (centralized registration place)

Patentee after: Shanghai Hualang Intelligent Technology Co.,Ltd.

Address before: No. 100, Ruijin 1st Road, Luwan District, Shanghai, 200020

Patentee before: Jia Songren