CN109523658B - Method and device for safely checking virtual password and intelligent lockset - Google Patents

Method and device for safely checking virtual password and intelligent lockset Download PDF

Info

Publication number
CN109523658B
CN109523658B CN201811147308.3A CN201811147308A CN109523658B CN 109523658 B CN109523658 B CN 109523658B CN 201811147308 A CN201811147308 A CN 201811147308A CN 109523658 B CN109523658 B CN 109523658B
Authority
CN
China
Prior art keywords
password
user
time delay
verification
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811147308.3A
Other languages
Chinese (zh)
Other versions
CN109523658A (en
Inventor
余小龙
王宇
张腾龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Smdt Technology Co ltd
Original Assignee
Shenzhen Smdt Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Smdt Technology Co ltd filed Critical Shenzhen Smdt Technology Co ltd
Priority to CN201811147308.3A priority Critical patent/CN109523658B/en
Publication of CN109523658A publication Critical patent/CN109523658A/en
Application granted granted Critical
Publication of CN109523658B publication Critical patent/CN109523658B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a method for safely checking a virtual password, which comprises the following steps: acquiring the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers; determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation; estimating the required verification time tn for verifying the user password number n according to the selected terminal platform; when the virtual password input by the user is obtained and verified according to the preset time delay, the verification is determined to be completed after the preset time delay is reached, the follow-up operation is executed according to the verification result, and the safety of the use of the virtual password is improved in a mode of increasing the verification time delay under the condition of not influencing the user experience.

Description

Method and device for safely checking virtual password and intelligent lockset
Technical Field
The invention relates to the technical field of information security, in particular to a method and a device for safely checking a virtual password and an intelligent lockset.
Background
At present, with the development of science and technology, passwords in daily life are more and more widely applied, and a password lock from a computer to a mobile phone to a home is ubiquitous. For the coded lock, the code of the coded lock is fixed and unchangeable, if someone peeps and secretly records the pressing sequence of the code, or when the code is input on a code keyboard, a large number of fingerprints or traces on the fixed number cause the leakage of the related number of the code. In order to prevent the password from leaking, a dummy password technology is generated, namely, before or after the registered password, the numbers outside any password sequence are input as the dummy password to confuse the seeing and hearing, the registered password can be effectively prevented from being remembered by people who are not good, and meanwhile, the door lock can be normally opened.
Compared with a fixed password, the virtual password has higher security level, is more difficult to snoop, has smaller password leakage risk, randomly increases the length, changes every password input, and can greatly increase the use security of a user. However, the virtual bit password technology can reduce the security of the user password, and according to mathematical analysis, through password collision of a brute force cracking method, even a small enough number of virtual password bits can greatly improve the cracking probability, so that the security of the virtual bit password is also relative.
Disclosure of Invention
The embodiment of the invention provides a method and a device for safely checking a virtual password and an intelligent lockset, and a method for increasing the checking time delay ensures that the virtual password function is safely used under the condition of not influencing the user experience.
In a first aspect, the present invention provides a method for securely checking a dummy bit password, the method comprising:
acquiring the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers;
determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation;
estimating the required verification time tn for verifying the user password number n according to the selected terminal platform;
and when the virtual password input by the user is obtained and verified according to the preset time delay, the verification is determined to be completed after the preset time delay is reached, and the follow-up operation is executed according to the verification result.
Optionally, the preset relationship is:
Figure GDA0002763924660000021
the [ 2 ]]For getting an integer to the right, the time delay multiple z is determined by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the dummy password bits and a preset relationship, and the method comprises the following steps:
and obtaining a right integer value by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the time delay multiple z is greater than the right integer value.
Optionally, when the remainder q is greater than 0, the method further includes:
and repeating the check input of the n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password, and determining the last check result as an approval result.
Optionally, when the remainder q is equal to 0, the method further includes:
and repeatedly checking and inputting the n-bit dummy password [ z/p ] -1 time after the terminal checks the n-bit dummy password every time, and determining the last checking result as an approval result.
Optionally, when the virtual-digit password input by the user is obtained and verified according to a preset time delay, after the preset time delay is reached, it is determined that the verification is completed, and a subsequent operation is performed according to a verification result, where the method includes:
and after the virtual password is input each time, finishing verification after the time delay is z times tn duration, prompting that the password is correct if the verification is finished, and prompting that the password is wrong and re-input if the verification is wrong.
In a second aspect, the present invention provides a device for securely checking a dummy bit password, the device comprising:
the password key comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring the maximum number b of password keys, the number n of user password codes and the number m of virtual password codes input by a user, the number m of the virtual password codes is np + q, p is an integer of dividing m by n, q is a remainder, and p and q are positive integers;
the processing unit is used for determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation;
the processing unit is also used for estimating the required verification time tn for verifying the user password number n according to the selected terminal platform;
the processing unit is also used for verifying the acquired virtual password input by the user according to a preset time delay, determining that the verification is finished after the preset time delay is reached, and executing subsequent operation according to a verification result.
Optionally, the preset relationship is:
Figure GDA0002763924660000031
the [ 2 ]]To fetch an integer to the right, the processing unit is specifically configured to:
and obtaining a right integer value by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the time delay multiple z is greater than the right integer value.
Optionally, the processing unit is further configured to, when the remainder q is greater than 0, repeatedly check the input n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password, and determine a last check result as an approval result.
Optionally, the processing unit is further configured to, when the remainder q is equal to 0, repeatedly check the input n-bit dummy password [ z/p ] -1 time after checking each n-bit dummy password for the terminal, and determine a last check result as an approval result.
In a third aspect, the present invention provides an intelligent lock device, which has a processor and a memory, wherein the processor is used for executing the program stored in the memory, and the memory is used for storing the program used for executing the method.
According to the technical scheme, the embodiment of the invention has the following advantages:
the invention provides a method for safely checking a virtual password, which comprises the following steps: acquiring the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers; determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation; estimating the required verification time tn for verifying the user password number n according to the selected terminal platform; when the virtual password input by the user is obtained and verified according to the preset time delay, the verification is determined to be completed after the preset time delay is reached, the follow-up operation is executed according to the verification result, the safety of the use of the virtual password is improved under the condition that the user experience is not influenced by a mode of increasing the verification time delay.
Drawings
FIG. 1 is a flow chart of an embodiment of a method for securely checking a dummy password according to the present invention;
FIG. 2 is a schematic diagram illustrating a simulation of a probability curve in an embodiment of a method for securely verifying a dummy password according to the present invention;
fig. 3 is a block diagram illustrating an embodiment of a security check dummy password apparatus according to the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Referring to fig. 1, an embodiment of the present invention provides a method for securely checking a dummy bit password, where the method includes:
s101, obtaining the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers.
The virtual password is that before or after the registered password, the number outside any password sequence can be input as the virtual password to confuse audio and video, so that the registered password can be effectively prevented from being remembered by people who are not good, and meanwhile, the door lock can be normally opened, which is commonly used on electronic locks and mobile phones which adopt the password as an unlocking verification way, the method provided by the invention can be applied to intelligent door locks or intelligent terminals to improve the information security, the maximum number b of the password keys is the space number for users to input the password on the equipment, for example, the number keyboard is 10, the letter is 26, the maximum number b of the password keys is 36, and the number n of the password keys is the length of the user password which is actually verified; the number m of the dummy secret code bits input by the user is the length of the dummy secret code that is allowed to be input, and as can be known from the dummy secret code, m > is n, and m is np + q, p is an integer of m divided by n, and q is a remainder.
S102, determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation.
Specifically, the preset relationship is as follows:
Figure GDA0002763924660000051
the [ 2 ]]For getting the integer right, utilize password button maximum quantity b user secret code number n false bit secret code number m and preset the relation and obtain getting the integer value right, delay multiple z is greater than get the integer value right.
S103, estimating the required verification time tn for verifying the user password number n according to the selected terminal platform.
And when the remainder q is larger than 0, repeatedly checking and inputting the n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password every time, and determining the last checking result as an approval result. And when the remainder q is equal to 0, repeatedly checking and inputting the n-bit dummy code [ z/p ] -1 time after checking the n-bit dummy code for each time by the terminal, and determining the last checking result as an approval result.
And S104, when the virtual password input by the user is obtained, verifying according to a preset time delay, determining that the verification is finished after the preset time delay is reached, and executing subsequent operation according to a verification result.
And after the virtual password is input each time, finishing verification after the time delay is z times tn duration, prompting that the password is correct if the verification is finished, and prompting that the password is wrong and re-input if the verification is wrong.
The invention provides a method for safely checking a virtual password, which comprises the following steps: acquiring the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers; determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation; estimating the required verification time tn for verifying the user password number n according to the selected terminal platform; when the virtual password input by the user is obtained and verified according to the preset time delay, the verification is determined to be completed after the preset time delay is reached, the follow-up operation is executed according to the verification result, and the safety of the virtual password is improved by increasing the verification time delay under the condition of not influencing the user experience.
The method for verifying the dummy bit password safely provided by the invention is proved by performing a safety test.
For a random fixed-bit password input by a user, the probability of an attacker cracking through brute force depends on the fixed bit. For example, for numeric keyboards 0-9, if a user sets 6 bits of an unlocking password, the probability of successful cracking through enumeration is 10^ (-6), and the expectation is 10^6, which is a larger trial and error frequency for an attacker.
In the GA374-2001 electronic anti-theft lock standard, the key quantity is defined, and the A-level key quantity and the B-level key quantity of the electronic anti-theft lock adopting electronic coding are required to be not less than 10^5 and not less than 10^ 6. However, the introduction of the dummy password will make the input length larger, so as to improve the collision probability and further reduce the actual effective key amount.
B is defined as the number of digits of a password input space, and n is the length of the actual verified user password; m is the length of the dummy password which is allowed to be input, and as known from the dummy password, m > is n, m is np + q, p is an integer of m divided by n, and q is a remainder;
defining that the probability of n user passwords in the m-bit virtual password is P(b,m,n)Equation (1)
Figure GDA0002763924660000061
As shown in connection with fig. 2, the function is relatively similar to the shape of the curve, because the term is small enough when n is large. The probability curve (3< n <11,7< m <21) under the numeric keyboard, where m is a coordinate, is drawn by matlab, and the safety of the dummy password is poor when n and m are small in the probability curve, which is a typical application scenario at present, wherein the larger 1 and m are, the greater the probability of being collided is, but the probability increasing speed is slower than that until the collision probability approaches to 1. 2. The smaller n is, the more insecure, and the smaller the number of m bits required under the same probability. Considering the reality, mainly using n-digit numbers of 5 or 6 digits and numeric keyboard, we list the collision probability under typical m numbers:
when m is smaller, as in Table 1.
Figure GDA0002763924660000062
Figure GDA0002763924660000071
TABLE 1
When m is larger, it is shown in Table 2.
Figure GDA0002763924660000072
TABLE 2
When the typical value m is 20 and n is 5, the probability of being collided is increased by 16 times.
When the typical value m is 260 and n is 5, the probability of being collided is increased 276 times.
Violence cracking unlocking expected time
Setting the password length n of a user to be fixed, setting the number b of key input space bits to be fixed, and setting the length of a virtual bit password input by the ith user to be as follows:
Figure GDA0002763924660000073
wherein
Figure GDA0002763924660000076
Is a formula (1)
Defining the unlocking time input by the ith user as follows, and expecting the unlocking time Y of violent cracking as follows:
Figure GDA0002763924660000074
to simplify the processing, each unlocking input m is seti,tiIs completely the same, then
Figure GDA0002763924660000077
ti=tjWhen t, the expected time is:
Figure GDA0002763924660000075
for the common keyboard unlocking which does not support the dummy code, P ═ b-nI.e. the expected time for unlocking is b-n×t。
From a security perspective, dummy bitsThe expected unlocking time of the password is not lower than that of a common password keyboard, namely:
Figure GDA0002763924660000084
note the book
Figure GDA0002763924660000081
When m is smaller, the values of Z are shown in Table 3:
Figure GDA0002763924660000082
TABLE 3
When m is larger, the value of Z is shown in Table 4.
Figure GDA0002763924660000083
TABLE 4
Through comparison, the security of the classical 5-bit user key supporting 20-bit dummy bit passwords is equivalent when the verification comparison time is 16 times longer than that of the common verification 6-bit password.
Referring to fig. 3, correspondingly, the present invention provides a device for securely checking a dummy bit password, the device comprising:
an obtaining unit 301, configured to obtain a maximum number b of password buttons, a number n of user secret code bits, and a number m of virtual secret code bits input by a user, where m is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers;
the processing unit 302 is configured to determine a time delay multiple z by using the maximum number b of the password keys, the number n of the user password bits, the number m of the dummy password bits, and a preset relationship;
the processing unit 302 is further configured to estimate, according to the selected terminal platform, a required verification time tn for performing verification on the user password number n;
the processing unit 302 is further configured to, when the virtual-digit password input by the user is obtained and verified according to a preset time delay, determine that the verification is completed after the preset time delay is reached, and execute subsequent operations according to a verification result.
Optionally, the preset relationship is:
Figure GDA0002763924660000091
the [ 2 ]]To fetch integers to the right, the processing unit 302 is specifically configured to:
and obtaining a right integer value by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the time delay multiple z is greater than the right integer value.
Optionally, the processing unit 302 is further configured to, when the remainder q is greater than 0, repeatedly check the input n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password, and determine a last check result as an approval result.
Optionally, the processing unit 302 is further configured to, when the remainder q is equal to 0, repeatedly check the input n-bit dummy password [ z/p ] -1 time after checking each n-bit dummy password for the terminal, and determine the last check result as an approval result.
The invention provides a security check virtual bit password device, which comprises: the method comprises the steps that an obtaining unit obtains the maximum number b of password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers; the processing unit utilizes the maximum number b of the password keys, the number n of the user password code, the number m of the virtual password code and a preset relation to determine a time delay multiple z, estimates the required verification time tn for verifying the number n of the user password code according to a selected terminal platform, verifies the virtual password input by the user according to the preset time delay when obtaining the virtual password, determines that the verification is completed after the preset time delay is reached, executes subsequent operation according to a verification result, and improves the use safety of the virtual password under the condition of not influencing user experience by increasing the verification time delay.
Correspondingly, the embodiment of the invention also provides an intelligent lock, which is provided with a processor and a memory, wherein the processor is used for executing the program stored in the memory, the memory is stored with the program used for executing the method, and the specific method is as follows:
acquiring the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers;
determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the virtual password bits and a preset relation;
estimating the required verification time tn for verifying the user password number n according to the selected terminal platform;
and when the virtual password input by the user is obtained and verified according to the preset time delay, the verification is determined to be completed after the preset time delay is reached, and the follow-up operation is executed according to the verification result.
Optionally, the preset relationship is:
Figure GDA0002763924660000101
the [ 2 ]]For getting an integer to the right, the time delay multiple z is determined by utilizing the maximum number b of the password keys, the number n of the user password bits, the number m of the dummy password bits and a preset relationship, and the method comprises the following steps:
and obtaining a right integer value by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the time delay multiple z is greater than the right integer value.
Optionally, when the remainder q is greater than 0, the method further includes:
and repeating the check input of the n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password, and determining the last check result as an approval result.
Optionally, when the remainder q is equal to 0, the method further includes:
and repeatedly checking and inputting the n-bit dummy password [ z/p ] -1 time after the terminal checks the n-bit dummy password every time, and determining the last checking result as an approval result.
Optionally, when the virtual-digit password input by the user is obtained and verified according to a preset time delay, after the preset time delay is reached, it is determined that the verification is completed, and a subsequent operation is performed according to a verification result, where the method includes:
and after the virtual password is input each time, finishing verification after the time delay is z times tn duration, prompting that the password is correct if the verification is finished, and prompting that the password is wrong and re-input if the verification is wrong.
The intelligent lockset can be an intelligent door lock, an intelligent terminal and the like, and the intelligent lockset is not limited to the intelligent door lock, the intelligent terminal and the like.
According to the intelligent lockset provided by the invention, the use safety of the virtual password is improved in a mode of increasing the verification time delay under the condition of not influencing the user experience.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The method, the apparatus and the intelligent lock for verifying a virtual password in a secure manner provided by the present invention are described in detail above, and for those skilled in the art, according to the idea of the embodiment of the present invention, there may be changes in the specific implementation manner and the application scope.

Claims (10)

1. A method for securely checking a dummy bit password, the method comprising:
acquiring the maximum number b of the password keys, the number n of user password codes and the number m of virtual password codes input by a user, wherein the number m of the virtual password codes is np + q, p is an integer obtained by dividing m by n, q is a remainder, and p and q are positive integers;
determining a time delay multiple z by using the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the preset relation is as follows:
Figure FDA0002763924650000011
the [ 2 ]]Is an integer to the right;
estimating the required verification time tn for verifying the user password number n according to the selected terminal platform;
and when the virtual password input by the user is obtained, verifying according to a preset time delay, determining that the verification is finished after the preset time delay is reached, and executing subsequent operation according to a verification result, wherein the preset time delay is tn time which is z times of the verification time delay.
2. The method of claim 1, wherein determining the time delay multiple z using the maximum number of key buttons b, the number of user password bits n, the number of dummy password bits m, and a predetermined relationship comprises:
and obtaining a right integer value by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the time delay multiple z is greater than the right integer value.
3. The method of securely checking a dummy bit password of claim 1, wherein when the remainder q is greater than 0, the method further comprises:
and repeating the check input of the n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password, and determining the last check result as an approval result.
4. The method of security checking a dummy bit password of claim 1, wherein when the remainder q is equal to 0, the method further comprises:
and repeatedly checking and inputting the n-bit dummy password [ z/p ] -1 time after the terminal checks the n-bit dummy password every time, and determining the last checking result as an approval result.
5. The method for securely checking a dummy password according to claim 1, wherein when the dummy password input by the user is obtained and verified according to a preset time delay, the verification is determined to be completed after the preset time delay is reached, and subsequent operations are performed according to a verification result, including:
and after the virtual password is input each time, finishing verification after the time delay is z times tn duration, prompting that the password is correct if the verification is finished, and prompting that the password is wrong and re-input if the verification is wrong.
6. A security-verifying dummy digit password device, said device comprising:
the password key comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring the maximum number b of password keys, the number n of user password codes and the number m of virtual password codes input by a user, the number m of the virtual password codes is np + q, p is an integer of dividing m by n, q is a remainder, and p and q are positive integers;
the processing unit is used for determining a time delay multiple z by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the preset relation is as follows:
Figure FDA0002763924650000021
the [ 2 ]]Is an integer to the right;
the processing unit is also used for estimating the required verification time tn for verifying the user password number n according to the selected terminal platform;
the processing unit is further configured to verify the acquired dummy password input by the user according to a preset time delay, determine that the verification is completed after the preset time delay is reached, and execute subsequent operations according to a verification result, where the preset time delay is t n times of the verification time delay by z.
7. The security-verified dummy digit password device of claim 6, wherein the processing unit is specifically configured to:
and obtaining a right integer value by utilizing the maximum number b of the password keys, the number n of the user password codes, the number m of the virtual password codes and a preset relation, wherein the time delay multiple z is greater than the right integer value.
8. The apparatus of claim 6, wherein the processing unit is further configured to repeat checking the input n-bit dummy password [ z/(p +1) ] -1 time after checking the n-bit dummy password when the remainder q is greater than 0, and determine the last check result as the approval result.
9. The apparatus of claim 6, wherein the processing unit is further configured to repeat checking the input n-bit secret password [ z/p ] -1 time after checking the n-bit secret password for each time the terminal determines the last check result as the approval result when the remainder q is equal to 0.
10. An intelligent lock having a processor for executing a program stored in a memory and a memory in which a program for performing the method of any one of claims 1 to 5 is stored.
CN201811147308.3A 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset Active CN109523658B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811147308.3A CN109523658B (en) 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811147308.3A CN109523658B (en) 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset

Publications (2)

Publication Number Publication Date
CN109523658A CN109523658A (en) 2019-03-26
CN109523658B true CN109523658B (en) 2021-01-26

Family

ID=65772408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811147308.3A Active CN109523658B (en) 2018-09-29 2018-09-29 Method and device for safely checking virtual password and intelligent lockset

Country Status (1)

Country Link
CN (1) CN109523658B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773414A (en) * 2004-11-12 2006-05-17 上海电气集团股份有限公司 Cipher safe protecting method for preventing intelligent device input cipher from being decrypted
CN101227275A (en) * 2008-02-13 2008-07-23 刘海云 Enciphering method for combining accidental enciphering and exhaust algorithm decipher
CN101610154A (en) * 2009-07-17 2009-12-23 王聪 Novel cipher encrypting method
CN105959948A (en) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 Wireless private brute force cracking prevention method and wireless private brute force cracking prevention device
DE102016201198A1 (en) * 2016-01-27 2017-07-27 Gerd Reime Safety and / or locking system and associated method
CN107195039A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
RU2015108618A (en) * 2015-03-11 2016-09-27 Евгений Пантелеевич Сухоносов Authenticated Password Authentication Method
CN107092839A (en) * 2016-02-17 2017-08-25 深圳市维申斯科技有限公司 The antitheft input method of code keypad based on random diastema password

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773414A (en) * 2004-11-12 2006-05-17 上海电气集团股份有限公司 Cipher safe protecting method for preventing intelligent device input cipher from being decrypted
CN101227275A (en) * 2008-02-13 2008-07-23 刘海云 Enciphering method for combining accidental enciphering and exhaust algorithm decipher
CN101610154A (en) * 2009-07-17 2009-12-23 王聪 Novel cipher encrypting method
DE102016201198A1 (en) * 2016-01-27 2017-07-27 Gerd Reime Safety and / or locking system and associated method
CN105959948A (en) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 Wireless private brute force cracking prevention method and wireless private brute force cracking prevention device
CN107195039A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 It is a kind of to prevent the intelligent cloud lock system and unlocking method of peep of cipher

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于单片机的电子密码锁设计;魏雅;《电子设计工程》;20160831;第24卷(第15期);第165-167页 *

Also Published As

Publication number Publication date
CN109523658A (en) 2019-03-26

Similar Documents

Publication Publication Date Title
US5940511A (en) Method and apparatus for secure PIN entry
US6954862B2 (en) System and method for user authentication with enhanced passwords
US6980081B2 (en) System and method for user authentication
US8561174B2 (en) Authorization method with hints to the authorization code
Krombholz et al. Use the force: Evaluating {Force-Sensitive} authentication for mobile devices
EP1338940A1 (en) Universal password generator
WO2003104951A2 (en) Method for private personal identification number management
CN106022077B (en) A kind of unlocking screen method and terminal
JP2005149388A (en) Password authentication apparatus, program for the same, and recording medium
CN110990811A (en) Identity authentication method and device
CN104112096B (en) Multi-point touch method and device
KR101330113B1 (en) Authentication apparatus and method based on position value
CN104318144A (en) Mobile terminal and unlocking method thereof
CN113961904A (en) Screen unlocking method and device, electronic equipment and readable medium
CN109523658B (en) Method and device for safely checking virtual password and intelligent lockset
CN108898035A (en) Mobile terminal unlocking method, device and calculating equipment
CN105590044A (en) Information authentication method and apparatus
US20060179471A1 (en) System and method for providing secure disclosure of a secret
CN106470106B (en) Terminal information display method and device
CN105897429A (en) Authentication method, authentication device and terminal
Shen et al. The enhanced graphic pattern authentication scheme via handwriting identification
KR101039010B1 (en) Apparatus and method for user authentication using random keypad
CN110766840A (en) Access control password setting method and device
Choi et al. Secure Password-based Authentication Method for Mobile Banking Services
KR100617540B1 (en) Password inputting method with enhanced safety

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant