CN102185697B - Solution of two-factor authentication security system - Google Patents
Solution of two-factor authentication security system Download PDFInfo
- Publication number
- CN102185697B CN102185697B CN201110143842.9A CN201110143842A CN102185697B CN 102185697 B CN102185697 B CN 102185697B CN 201110143842 A CN201110143842 A CN 201110143842A CN 102185697 B CN102185697 B CN 102185697B
- Authority
- CN
- China
- Prior art keywords
- information
- static password
- transmission
- password
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention relates to the field of radio transmission, in particular to the solution of a two-factor authentication security system. The solution is realized by a transmission system and a receiving system, and is characterized in that: a method comprises that: after power-on, frame hopping information and a static password obtained by the encryption of a keyboard are transmitted to a transmission circuit for transmission; after being powered on, a receiving module receives the transmitted information and transmits the received information to a micro control unit (MCU) memory; the MCU memory decrypts the received information, verifies the legality of a transmission module, verifies whether the static password is consistent with password information stored in an MCU if the transmission module is verified to be legal, enables a path if the static password is consistent with the password information stored in the MCU, otherwise gives an alarm or does not make any response; and when detecting a key-pressing operation, the system triggers a frame hopping chip to encrypt the input static password and generate a random number, and transmits coded information in a data transmission process to a receiver, and the receiver determines whether detected key-pressing information is accurate or not according to guidance codes, and performs decryption if the detected key-pressing information is determined to be accurate. By the solution, the shortcomings of the system for realizing identity authentication by the static password are effectively overcome; and the solution can be widely applied to various identity authentication systems.
Description
[technical field]
The present invention relates to the wireless radio transmission field, specifically solution of two-factor authentication security system.
[background technology]
At present, the password product on the market generally adopts the static password mode to realize authentication, and so-called static password mainly refers to the basic fixing numerical ciphers such as user's account password, password for inquiry.Use static password in use usually to have following potential safety hazard:
(1) for the ease of memory, user's more options birthday, telephone number etc. are as password, and the lawless person can constantly attempt and be easy to breaking a code by the robot program;
(2) passwords repeatedly use, and are adopted easily the mode of intercepting/playback by the lawless person, to differentiating through the authentication information that transmits after the simple encryption, extrapolate user's password, cause to be not intended to reveal;
(3) because current authentication information majority by Internet Transmission is the plaintext of not encrypted, and the lawless person can eavesdrop network data flow, tells authentication information, from network or intercept and capture password on the telephone wire, obtain easily user's key message;
(4) lawless person usually utilize spy upon, password that the means such as trick are obtained the user.
[summary of the invention]
Purpose of the present invention is being not change the product appearance structure, do not changing under the condition of pin mode, realizes the fail safe transmission of user cipher.
To achieve these goals, design a kind of detection method of antenna transmission double authentication, comprise emission system and receiving system, it is characterized in that the static password after the method is with frame hopping information and encrypting keyboard sends by being radiating circuit after powering on, after powering on, receives receiver module that the information of transmission gives the MCU memory, decipher first, then verify the legitimacy of transmitter module, whether the legal static password of then verifying again is consistent with the encrypted message of the upper storage of MCU, if unanimously then open, otherwise produce warning or do not do response; When system has detected button, trigger the frame hopping chip static password information of inputting is encrypted rear generation random number, system sends to receiving terminal with the coded message in the data transmission procedure, whether receiving terminal determines to detect key information according to pilot codes correct, if correctly the deciphering, judge the legitimacy of transmitting terminal hardware device according to the frame hopping information after the deciphering, and determine the legitimacy of transmitting terminal identity according to the random number that obtains after the deciphering.When if both all satisfy, corresponding response can be opened or make in system, otherwise produce warning or do not do response.
Form below the coding in data transmission procedure:
First: pilot codes, be used for recognition user information, the pilot codes number is determined by the EEPROM configuration words;
Second portion: frame hopping information, for the legitimacy of checking transmitting terminal hardware device.
Third part: the random number behind frame hopping and the static password XOR, guarantee fail safe, the uniqueness of static password, the number of described random number is determined by the number of static password.
Data transmission method may further comprise the steps:
A, static password input, sampling, static encryption, transmission, acceptance, deciphering;
Judge legitimacy behind b, the deciphering static password; Judge legitimacy behind the deciphering ECC frame hopping;
C, data judge when legal that system opens or response; Data are judged and are logged off or report to the police when illegal.
The present invention compared with prior art efficiently solves the defective that static password realizes that identity authorization system exists, and can be widely used in various identity authorization systems, and cost is low.
[description of drawings]
Fig. 1 is the implementation framework figure of system of the present invention;
Fig. 2 is the coding step figure in the data transmission procedure of the present invention;
Fig. 3 is transfer of data flow process figure of the present invention.
[embodiment]
Below in conjunction with accompanying drawing the invention is described in further details, this manufacturing technology is clearly to this professional personage.
The present invention is used for the static password authentication, with reference to Fig. 1, static password after frame hopping information and the encryption is sent by radiating circuit, after receiver module is received the information of transmission, decipher first, then verify the legitimacy of transmitter module, whether the legal static password of then verifying again is consistent with the encrypted message of the upper storage of MCU, if unanimously then open, otherwise produce warning or do not do response.
When system has detected button, trigger the frame hopping chip static password information of inputting is encrypted rear generation random number, system sends to receiving terminal with pilot codes, random number, frame hopping information, whether receiving terminal determines to detect key information according to pilot codes correct, if correctly the deciphering, judge the legitimacy of transmitting terminal hardware device according to the frame hopping information after the deciphering, and determine the legitimacy of transmitting terminal identity according to the random number that obtains after the deciphering.When if both all satisfy, corresponding response can be opened or make in system, otherwise produce warning or do not do response.
With reference to Fig. 2, the coding of the double authentication in the wireless transmission in data transmission procedure comprises:
First: pilot codes, be used for recognition user information, the pilot codes number is determined by the EEPROM configuration words;
Second portion: frame hopping information, for the legitimacy of checking transmitting terminal hardware device.
Third part: the random number behind frame hopping and the static password XOR, guarantee fail safe, the uniqueness of static password.The number of this random number is determined by the number of static password.
The data transfer process:
The mode that adopts frame hopping to add static password improves the fail safe of information in transmission course.Wherein first is that pilot codes is used for recognition user information, reduces erroneous judgement.The key information of second portion transmission adopts the encoding by code hopping algorithm to be encrypted, and adopts this kind cryptographic algorithm can realize that the coded word of launching never repeats, and improves the fail safe in transmission course.Transmit behind frame hopping information after third part will be encrypted and the static password XOR, the protection static password is avoided in transmission course by the danger of intercepting and capturing and cracking in transmission course safety again.Receiving terminal receives this information, decipher first and verify again legitimacy, decoded second portion is used for the legitimacy of the product of checking emission, as identical with the product of receiving terminal storage after the empirical tests, receiving terminal just can be verified the static password after the deciphering, after empirical tests was legal, receiving terminal just can be made corresponding response.
With reference to Fig. 3, transfer of data may further comprise the steps:
A, static password input, sampling, static encryption, transmission, acceptance, deciphering;
Judge legitimacy behind b, the deciphering static password; Judge legitimacy behind the deciphering ECC frame hopping;
C, data judge when legal that system opens or response; Data are judged and are logged off or report to the police when illegal.
Double authentication solution in the wireless transmission has effectively solved the safety issue of static password in transmission course.In the process of transmission static password, adopt the frame hopping technology that static password is encoded, so that the static password in the transmission course converts forever unduplicated random number to, effectively protected the fail safe of static password.Even in transmission course, intercepted and captured or be tampered the static password that also all can't crack the user.Utilize simultaneously coding techniques that the fail safe of hardware device is judged, can effectively identify pirate user.This system can be widely used in all kinds of identification systems.
Claims (3)
1. the detection method of an antenna transmission double authentication, comprise emission system and receiving system, it is characterized in that the static password after the method is with frame hopping information and encrypting keyboard sends by being radiating circuit after powering on, after powering on, receives receiver module that the information of transmission gives the MCU memory, decipher first, then verify the legitimacy of transmitter module, whether the legal static password of then verifying again is consistent with the encrypted message of the upper storage of MCU, if unanimously then open, otherwise produce warning or do not do response; When system has detected button, trigger the frame hopping chip static password information of inputting is encrypted rear generation random number, system sends to receiving terminal with the coded message in the data transmission procedure, whether receiving terminal determines to detect key information according to pilot codes correct, if correctly the deciphering, judge the legitimacy of transmitting terminal hardware device according to the frame hopping information after the deciphering, and determine the legitimacy of transmitting terminal identity according to the static password after the deciphering, when if both all satisfy, corresponding response can be opened or make in system, otherwise produce warning or do not do response.
2. the detection method of a kind of antenna transmission double authentication as claimed in claim 1 is characterized in that forming below the coding in data transmission procedure:
First: pilot codes, be used for recognition user information, the pilot codes number is determined by the EEPROM configuration words;
Second portion: frame hopping information, for the legitimacy of checking transmitting terminal hardware device;
Third part: the random number behind frame hopping and the static password XOR, guarantee fail safe, the uniqueness of static password, the number of described random number is determined by the number of static password.
3. the detection method of a kind of antenna transmission double authentication as claimed in claim 1 is characterized in that data transmission method may further comprise the steps:
A, static password input, sampling, static encryption, transmission, acceptance, deciphering;
Judge legitimacy behind b, the deciphering static password; Judge legitimacy behind the deciphering ECC frame hopping;
C, data judge when legal that system opens or response; Data are judged and are logged off or report to the police when illegal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110143842.9A CN102185697B (en) | 2011-05-31 | 2011-05-31 | Solution of two-factor authentication security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110143842.9A CN102185697B (en) | 2011-05-31 | 2011-05-31 | Solution of two-factor authentication security system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102185697A CN102185697A (en) | 2011-09-14 |
CN102185697B true CN102185697B (en) | 2013-05-29 |
Family
ID=44571770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110143842.9A Active CN102185697B (en) | 2011-05-31 | 2011-05-31 | Solution of two-factor authentication security system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102185697B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970139B (en) * | 2012-11-09 | 2016-08-10 | 中兴通讯股份有限公司 | Data security validation method and device |
CN109765825B (en) * | 2019-01-30 | 2023-09-29 | 山西天科信息安全科技有限公司 | Internet of things multilink safety control terminal and safety control method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0902549A2 (en) * | 1997-09-13 | 1999-03-17 | Samsung Electronics Co., Ltd. | Device and method for bi-orthogonal code hopping multiple access communication |
CN2616619Y (en) * | 2003-02-10 | 2004-05-19 | 刘合安 | Electric controlled antitheft lock |
CN201266414Y (en) * | 2008-09-19 | 2009-07-01 | 洪鹏远 | Anti-theft capturing controller with voice prompting function |
-
2011
- 2011-05-31 CN CN201110143842.9A patent/CN102185697B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0902549A2 (en) * | 1997-09-13 | 1999-03-17 | Samsung Electronics Co., Ltd. | Device and method for bi-orthogonal code hopping multiple access communication |
CN2616619Y (en) * | 2003-02-10 | 2004-05-19 | 刘合安 | Electric controlled antitheft lock |
CN201266414Y (en) * | 2008-09-19 | 2009-07-01 | 洪鹏远 | Anti-theft capturing controller with voice prompting function |
Also Published As
Publication number | Publication date |
---|---|
CN102185697A (en) | 2011-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11335144B2 (en) | Method for unlocking intelligent lock, mobile terminal, intelligent lock and server | |
CN110493197B (en) | Login processing method and related equipment | |
CN106656510B (en) | A kind of encryption key acquisition methods and system | |
CN101005361B (en) | Server and software protection method and system | |
CN102945526B (en) | A kind of device and method for improving mobile equipment on-line safety of payment | |
CN104112307A (en) | Electronic lock by using sound waves for unlocking and unlocking method thereof | |
CN101917270A (en) | Weak authentication and key agreement method based on symmetrical password | |
JP2012244629A (en) | Method and device for access verification or verification of start | |
CN102480713A (en) | Method, system and device for communication between sink node and mobile communication network | |
CN106027457B (en) | A kind of ID card information transmission method and system | |
CN103781064A (en) | Short message verification system and verification method | |
CN101582896A (en) | Third-party network authentication system and authentication method thereof | |
CN109618334A (en) | Control method and relevant device | |
CN108401494B (en) | Method and system for transmitting data | |
CN102857503A (en) | Secure wireless transmission method for fingerprint data | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN102185697B (en) | Solution of two-factor authentication security system | |
US10687214B2 (en) | Secure key fob | |
CN104796266A (en) | Authentication method, device and system | |
CN107749795A (en) | A kind of vehicle remote control method of the secondary encryption based on rolling code | |
CN108352990B (en) | Method and system for transmitting data | |
CN105184116A (en) | Intelligent equipment software encryption and personal authentication device and method | |
CN111161450A (en) | Electric power intelligence tool to lock device based on ESAM encrypts authentication | |
CN108322439B (en) | Registration method and registration system by using security equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220830 Address after: Room 501, 5th Floor, No. 700, Liyuan Road, Huangpu District, Shanghai, 200023 (centralized registration place) Patentee after: Shanghai Hualang Intelligent Technology Co.,Ltd. Address before: No. 100, Ruijin 1st Road, Luwan District, Shanghai, 200020 Patentee before: Jia Songren |