CN103678975A - Identity authentication simulation system based on chaotic system - Google Patents
Identity authentication simulation system based on chaotic system Download PDFInfo
- Publication number
- CN103678975A CN103678975A CN201310720278.1A CN201310720278A CN103678975A CN 103678975 A CN103678975 A CN 103678975A CN 201310720278 A CN201310720278 A CN 201310720278A CN 103678975 A CN103678975 A CN 103678975A
- Authority
- CN
- China
- Prior art keywords
- module
- key value
- sequence
- chaos
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004088 simulation Methods 0.000 title abstract description 10
- 230000000739 chaotic effect Effects 0.000 title abstract 6
- 238000000034 method Methods 0.000 claims abstract description 16
- 238000010586 diagram Methods 0.000 claims description 12
- 238000011156 evaluation Methods 0.000 claims description 5
- 230000015572 biosynthetic process Effects 0.000 claims description 2
- 239000011159 matrix material Substances 0.000 description 18
- 238000013475 authorization Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000000605 extraction Methods 0.000 description 2
- 230000009182 swimming Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an identity authentication simulation system based on a chaotic system. The identity authentication simulation system comprises a chaotic system simulation module, a sequence performance analyzing module, a key value binding module, a logging-in module, an unlocking module and a display module, wherein the chaotic system simulation module is used for utilizing the chaotic system to set a chaotic original value and iteration time, the sequence performance analyzing module is used for selecting a sequence generating algorithm to generate a sequence and carrying out the performance analysis according to the generated sequence, the key value binding module is used for selecting a key value to be bound and inputting personal information to achieve binding step by step, the logging-in module is used for selecting the bound key value, inputting a correct recognition code for logging-in and achieving the logging-in process step by step, the unlocking module is used for unlocking locked key values, and the display module is used for displaying a simulation image and data and information of modules. The identity authentication is achieved.
Description
Technical field
The present invention relates to electricity field, relate in particular to the authentication analogue system based on chaos system.
Background technology
At present, the authentication of authentication analogue system is often incorrect, to authentication, has brought difficulty.
Summary of the invention
The present invention is directed to the proposition of above problem, and the authentication analogue system based on chaos system proposing has solved the inaccurate of identity authorization system.
Authentication analogue system based on chaos system, is characterized in that, comprising: chaos system emulation module, for utilizing chaos system, arranges chaos initial value and iteration time.
Sequence performance analysis module, for Selective sequence generating algorithm, formation sequence, and according to the sequence generating, carry out performance evaluation;
Key value binding module, for the key value of selecting to bind, input personal information, substep is realized binding;
Login module, for the key value of selecting to have bound, inputs correct identification code and logins, and login process realizes step by step;
Separate lock module, for the key value of locking is carried out to release;
Display module, for showing analogous diagram and modules data and information.
Above-mentioned chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially scale-of-two XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
Above-mentioned key value binding module, specifically for user profile and key value are bound, user binds after key value, sets user's oneself identification code, and user relies on identification code game server, access services device.
Effect of the present invention: by system of the present invention, realized authentication.
Accompanying drawing explanation
Technical scheme for clearer explanation embodiments of the invention or prior art, by the accompanying drawing of required use in embodiment or description of the Prior Art being done to one, introduce simply below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
A kind of Chaos Simulation that Fig. 1 provides for the embodiment of the present invention and the structural drawing of identity authorization system;
The interface schematic diagram of a kind of chaos system emulation module that Fig. 2 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of sequence performance analysis module that Fig. 3 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of key value binding module that Fig. 4 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of login module that Fig. 5 provides for the embodiment of the present invention;
A kind of interface schematic diagram of separating lock module that Fig. 6 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of display module that Fig. 7 provides for the embodiment of the present invention.
Embodiment
For making object, technical scheme and the advantage of embodiments of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is known to complete description:
As shown in Figure 1, the embodiment of the present invention provides Chaos Simulation and identity authorization system, comprising:
Chaos system emulation module 1, for chaos initial value and iteration time are arranged, and selects x axle and the y axle will carry out emulation.
Sequence performance analysis module 2, for selecting the algorithm of the sequence of generation, carries out performance evaluation.
Key value binding module 3, for the USbkey that selects to bind, input personal information, substep is realized binding.
Login module 4, for the USbkey that selects to have bound, inputs correct PIN code and logins, and login process realizes step by step.
Separate lock module 5, for the USbkey of locking is carried out to release.
Wherein, when simulation realizes identity authorization system, in system, can preset 5 USbkey, in these 5 USbkey, to preset hyperchaotic system starting condition, these starting condition are the Back ground Informations that carry out userspersonal information's encryption and realization " one-time pad " ID authentication mechanism, are can not be disclosed.
Introduce in detail respectively above-mentioned modules below,
In chaos system emulation module 1, the chaos initial value of input can reset, and exceeds after certain limit, just cannot enter chaos system.Iteration time can oneself arrange, and iteration time is larger, and it is more that acquisition discrete counted, and the point of the chaos sequence analogous diagram of acquisition will be more intensive.
This chaos system emulation module 1, as shown in Figure 2, can select to want the plane of emulation by x axle and drop-down menu corresponding to y axle.Click " carrying out emulation " button, system can be determined the sequential value that will show according to the selective value of two drop-down menus, then in display module, shows simulation result.
Be illustrated in figure 3 chaos sequence performance evaluation module, chaos sequence performance evaluation module is mainly that a sequence is carried out to statistical study, need to carry out Frequency statistics and distance of swimming statistics to sequence, and draw autocorrelator trace according to sequence, result is presented in the middle of display module.
Be illustrated in figure 4 USbkey binding system module, this module is used for realizing userspersonal information binds with USbkey, and in USbkey, inserts initial master key and seed key, stores corresponding user profile in server simultaneously, and seed key information.
The process of USB key value binding is as follows:
1, information conversion, first determines whether to have inserted USbkey, if after determining insertion USbkey, the personal user information of input is converted to binary matrix.
Read the selective value v of USBkey key value, judge whether selective value v equals 6, if be greater than 6, read input data, these data are character type, character type is converted into corresponding binary code, and character type binary code is converted into double type binary code, then by this double type binary code.
2, random series, random generation is used for the binary matrix of encrypting user personal information, and the initial value of hyperchaotic system used is provided by USbkey inside.
Read chaos system starting condition, iteration is obtained initial chaos sequence, according to scale-of-two XOR algorithm and initial chaos sequence, generates Hyperchaotic Sequence.Then reading information matrix size, and intercept corresponding scrambled matrix.
3, to encrypt, the secret matrix with producing in previous step, is encrypted the information of changing, and only carries out XOR.
4, server deciphering, server is generating a matrix according to the method that generates scrambled matrix, carries out an XOR deciphering with the information matrix after encrypting, and whether the information of authorization information input is correct, if correctly carry out next step binding.
5, binding, USbkey recording user personal information scrambled matrix, server record userspersonal information original matrix, and produce the master key logging in for the first time.Specific implementation process flow diagram as shown in Figure 7.
Read chaos starting condition, obtain chaos initiation sequence, obtain distance of swimming statistical series, obtain the random starting point of intercepting, convert binary code sequence to, obtain PIN code matrix size, intercepting is for generating the matrix of key, XOR generates seed key, then data is deposited in USBkey and server.
Except user profile, master key and seed key being deposited in the middle of USbkey, also need to arrange a k, this k value is used for recording the number of times that PIN code is inputed by mistake, and when inputing three times by mistake, USbkey wants locking, so the initial value of k is 3.
As shown in Figure 5, the interface of login system module, for analog subscriber login system.Login process comprises: identification PIN, random series, computing, checking and key information are reset.
1, identification PIN, reads selected USbkey information and PIN code, carries out PIN code checking, if PIN is correct, carries out next step, if mistake cannot be carried out next step.Need to be by USbkey locking in the time of PIN input error three times, after locking, this USbkey cannot complete login.
2, random series, server reads the seed key that USbkey is used for generating chaos sequence, and the method for employing generates chaos sequence identical that produces master key with binding in binding module in button.But this button, after generating ciphering sequence, be recorded last class value of chaos iteration result, as the starting condition of login next time.Meanwhile, also to utilize last value of the Run-Length Coding obtaining in secondary coding algorithm, calculate the next chaos iteration time.
3, computing, the chaos sequence generating in previous step and PIN code homography carry out XOR generation for the master key of authentication.
4, checking, verifies master key, if correct, produce new chaos starting condition and generates the master key of next authentication.Except obtaining new master key, also to be encrypted iteration time, form and encrypt time matrix.
5, key information is reset, seed key information and master key information in update server and USbkey.
As shown in Figure 6, separate lock module, separate lock module and be the USbkey of locking is processed, by userspersonal information is verified, complete release.This process is: information conversion, information extraction, deciphering and four step process of checking.
1, information conversion, changes the userspersonal information of input, converts corresponding binary matrix to, and for ensuing release is prepared, " the information conversion " in its flow process and binding module is basically identical.Whether different is will will determine this USbkey locking according to the k value of storing in USbkey by this button before release.
2, information extraction, according to the selective value in USBkey drop-down menu, extracts userspersonal information's scrambled matrix of preserving in USbkey.
3, deciphering, is decrypted the userspersonal information's scrambled matrix extracting in previous step.The process of deciphering is consistent with the deciphering flow process in binding procedure.
4, checking, carries out contrast verification to separating the information matrix obtaining in the 1st step of lock module with the deciphering matrix obtaining in the 2nd step, if consistent, release success, if inconsistent, release failure.
Display module as shown in Figure 7, this module has two display sections, left and right, and the left side is analogous diagram viewing area, shows the region of data variation in each process implementation of the right modules.
Claims (3)
1. the authentication analogue system based on chaos system, is characterized in that, comprising: chaos system emulation module, for utilizing chaos system, arranges chaos initial value and iteration time;
Sequence performance analysis module, for Selective sequence generating algorithm, formation sequence, and according to the sequence generating, carry out performance evaluation;
Key value binding module, for the key value of selecting to bind, input personal information, substep is realized binding;
Login module, for the key value of selecting to have bound, inputs correct identification code and logins, and login process realizes step by step;
Separate lock module, for the key value of locking is carried out to release;
Display module, for showing analogous diagram and modules data and information.
2. the authentication analogue system based on chaos system as claimed in claim 1, is characterized in that, described chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially scale-of-two XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
3. the authentication analogue system based on chaos system as claimed in claim 1, it is characterized in that, described key value binding module, specifically for user profile and key value are bound, user binds after key value, set user's oneself identification code, user relies on identification code game server, access services device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310720278.1A CN103678975B (en) | 2013-12-20 | 2013-12-20 | Identity authentication simulation system based on chaos system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310720278.1A CN103678975B (en) | 2013-12-20 | 2013-12-20 | Identity authentication simulation system based on chaos system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103678975A true CN103678975A (en) | 2014-03-26 |
CN103678975B CN103678975B (en) | 2017-01-04 |
Family
ID=50316498
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310720278.1A Active CN103678975B (en) | 2013-12-20 | 2013-12-20 | Identity authentication simulation system based on chaos system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103678975B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106165340A (en) * | 2014-04-28 | 2016-11-23 | 加泽郎 | encryption method, program and system |
WO2018196634A1 (en) * | 2017-04-26 | 2018-11-01 | 吉林大学珠海学院 | Sequential encryption method based on multiple key stream passwords |
CN109829333A (en) * | 2019-01-14 | 2019-05-31 | 中国科学院信息工程研究所 | A kind of key message guard method and system based on OpenID |
CN116894261A (en) * | 2023-09-11 | 2023-10-17 | 山东卓汇智能科技有限公司 | Digital hospital electronic medical record intelligent encryption method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101179375A (en) * | 2006-11-12 | 2008-05-14 | 黑龙江大学 | Chaos algorithm based network data encryption card |
CN102571327A (en) * | 2010-12-31 | 2012-07-11 | 上海格尔软件股份有限公司 | Method for managing USBKey unlocking secret key intensively and safely |
CN103413109A (en) * | 2013-08-13 | 2013-11-27 | 江西理工大学 | Bidirectional authentication method of radio frequency identification system |
-
2013
- 2013-12-20 CN CN201310720278.1A patent/CN103678975B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101179375A (en) * | 2006-11-12 | 2008-05-14 | 黑龙江大学 | Chaos algorithm based network data encryption card |
CN102571327A (en) * | 2010-12-31 | 2012-07-11 | 上海格尔软件股份有限公司 | Method for managing USBKey unlocking secret key intensively and safely |
CN103413109A (en) * | 2013-08-13 | 2013-11-27 | 江西理工大学 | Bidirectional authentication method of radio frequency identification system |
Non-Patent Citations (3)
Title |
---|
卢辉斌等: "一种基于超混沌系统的身份认证方案", 《计算机安全》, no. 7, 31 July 2010 (2010-07-31), pages 16 - 19 * |
周福才等: "基于混沌理论身份认证的研究", 《东北大学学报(自然科学版)》, vol. 23, no. 8, 31 August 2002 (2002-08-31), pages 730 - 732 * |
梁喆等: "融入混沌理论的一种OTP方案研究", 《计算机工程》, vol. 33, no. 7, 15 April 2007 (2007-04-15), pages 160 - 162 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106165340A (en) * | 2014-04-28 | 2016-11-23 | 加泽郎 | encryption method, program and system |
CN106165340B (en) * | 2014-04-28 | 2020-06-16 | 加泽一郎 | Encryption method, program, and system |
WO2018196634A1 (en) * | 2017-04-26 | 2018-11-01 | 吉林大学珠海学院 | Sequential encryption method based on multiple key stream passwords |
CN109829333A (en) * | 2019-01-14 | 2019-05-31 | 中国科学院信息工程研究所 | A kind of key message guard method and system based on OpenID |
CN116894261A (en) * | 2023-09-11 | 2023-10-17 | 山东卓汇智能科技有限公司 | Digital hospital electronic medical record intelligent encryption method |
CN116894261B (en) * | 2023-09-11 | 2023-12-19 | 山东卓汇智能科技有限公司 | Digital hospital electronic medical record intelligent encryption method |
Also Published As
Publication number | Publication date |
---|---|
CN103678975B (en) | 2017-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200387594A1 (en) | Graphic Pattern-Based Passcode Generation and Authentication | |
CN105099712B (en) | A kind of data ciphering method based on Dicode verification | |
CN104408356B (en) | A kind of fingerprint verification method and system, fingerprint template encryption device | |
US20160034682A1 (en) | Visual image authentication | |
CN111314069B (en) | Block chain-based shaking system and method, electronic device and storage medium | |
CN109756500A (en) | Anti- quantum calculation https traffic method and system based on multiple unsymmetrical key ponds | |
CN104200363B (en) | A kind of method of payment of the electronic purse system based on encrypting fingerprint | |
CN108868367B (en) | Intelligent lock device | |
CN103929425B (en) | A kind of identity registration, identity authentication method, equipment and system | |
CN103678975A (en) | Identity authentication simulation system based on chaotic system | |
US11693944B2 (en) | Visual image authentication | |
CN107819571A (en) | The generation method and device of private key | |
CN107111967A (en) | Using the visual cryptography of augmented reality with obscuring | |
US11128453B2 (en) | Visual image authentication | |
CN104134141B (en) | E-wallet system payment method based on time synchronization | |
CN103345703A (en) | Banking transaction authentication method and system based on image authentication | |
CN106817346A (en) | Data transmission method and device and electronic equipment | |
CN110084599A (en) | Cipher key processing method, device, equipment and storage medium | |
CN105897417A (en) | Encrypted data input method and encrypted data input device | |
CN103297391A (en) | Graphical dynamic password inputting and verifying method | |
CN106027461A (en) | Secret key use method for cloud authentication platform in identity card authentication system | |
CN105337742B (en) | LFSR file encryption and decryption method based on facial image feature and GPS information | |
CN106027252A (en) | Cloud authentication platform in identity card authentication system | |
CN103297237A (en) | Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server | |
CN105872305B (en) | A kind of completely separable encryption area image reversible data concealing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |