CN110460994B - WiFi security encryption system - Google Patents
WiFi security encryption system Download PDFInfo
- Publication number
- CN110460994B CN110460994B CN201910762376.9A CN201910762376A CN110460994B CN 110460994 B CN110460994 B CN 110460994B CN 201910762376 A CN201910762376 A CN 201910762376A CN 110460994 B CN110460994 B CN 110460994B
- Authority
- CN
- China
- Prior art keywords
- password
- module
- idle
- user
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000006243 chemical reaction Methods 0.000 claims abstract description 48
- 238000000034 method Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000007405 data analysis Methods 0.000 claims description 11
- 102000003712 Complement factor B Human genes 0.000 claims description 3
- 108090000056 Complement factor B Proteins 0.000 claims description 3
- 239000013307 optical fiber Substances 0.000 claims description 3
- 230000009466 transformation Effects 0.000 claims description 3
- 230000001131 transforming effect Effects 0.000 claims description 3
- 238000013480 data collection Methods 0.000 claims 1
- 239000002699 waste material Substances 0.000 abstract description 2
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a WiFi (wireless fidelity) safety encryption system which is used for solving the problems that the existing WiFi is easy to crack due to the fact that digital letters and symbols are used for encryption, the safety of the WiFi is low, and the router always works due to the fact that whether a person uses the router can not be automatically identified, so that the resource waste is caused; the router comprises a user terminal and a router terminal, wherein the user terminal comprises a password input module, a password conversion module and a formula input module; the password input module is used for inputting password information by a user, and the password input module and the formula input module send the password information and the password conversion formula input by the user to the password conversion module; the invention converts the password conversion formula input by the user into the password graph and carries out password authentication on the router terminal by sending the password graph, thereby avoiding the problem that the existing WiFi is easy to crack because of adopting alphanumeric and symbolic components.
Description
Technical Field
The invention relates to the field of WiFi (wireless fidelity) security encryption, in particular to a WiFi security encryption system.
Background
Wi-Fi is a technology that allows an electronic device to connect to a wireless local area network, typically using the 2.4G UHF or 5G SHF ISM radio frequency bands. Connecting to a wireless local area network is typically password protected; but may be open, allowing any device within range of the WLAN to connect. Wi-Fi is a brand of wireless networking technology held by the Wi-Fi alliance. The object is to improve the interoperability between wireless network products based on the IEEE 802.11 standard.
The existing WiFi adopts digital letters and symbols for encryption, so that the existing WiFi is easy to crack and has low WiFi safety; meanwhile, the router cannot automatically identify whether people use the router or not, so that the router always works to cause resource waste.
Disclosure of Invention
The invention aims to provide a WiFi security encryption system; the method is used for solving the problems that the existing WiFi is easy to crack due to the fact that digital letters and symbols are used for encryption, the WiFi safety is low, and the router cannot automatically identify whether people use the router, so that the router always works and resources are wasted.
The purpose of the invention can be realized by the following technical scheme: a WiFi security encryption system comprises a user terminal and a router terminal, wherein the user terminal comprises a password input module, a password conversion module and a formula input module; the password input module is used for inputting password information by a user, wherein the password information comprises letters, symbols, numbers and corresponding virtual numbers; the formula input module is used for inputting a password conversion formula by a user; the password input module and the formula input module send password information and a password conversion formula input by a user to the password conversion module;
the password conversion module receives password information and a password conversion formula sent by the password input module and the formula input module and performs password conversion, and the specific password conversion steps are as follows:
the method comprises the following steps: setting password information to comprise letters, symbols and numbers to be Mi, wherein i is 1, … … and n; setting corresponding virtual number as G Mi (ii) a Mi and G Mi One-to-one correspondence is realized;
step two: setting a password input by a user as ZM, ZM ═ Mi, … …, Mi }; converting the password Mi input by the user into a corresponding virtual password XM, where XM ═ G Mi ,……,G Mi };
Step three: adding an interference factor K to the virtual password XM to obtain a virtual interference password WM, wherein the value of K is any positive integer; WM ═ W Mi ,……,W Mi };W Mi =G Mi +K;
Step four: converting the virtual interference password WM into an arc line segment through a password conversion formula; the cipher is converted into W Mi =L Mi *u1+r Mi *u2;L Mi Is the arc length r Mi Is the radius; u1 and u2 are fixed values of preset proportionality coefficients; transforming W by a cryptographic transformation formula Mi Converted into arc line segment H Mi (ii) a Arc line segment H Mi Has an arc length of L Mi (ii) a Radius r Mi ;
Step five: an arc line segment H Mi Sequentially connecting according to the password input sequence to form a password graph TM; the password conversion module sends the obtained password graph TM and the IP address of the user terminal to the authentication module;
the router terminal comprises an authentication module, a wireless network transmitting module, a storage module, a network interface module, a data acquisition module, a data analysis module and a wireless control module; the authentication module is used for authenticating the received password graph TM and the IP address of the user terminal, and the specific authentication process is as follows:
a: identifying the received password pattern TM, and obtaining a corresponding virtual interference password WM by using a password conversion formula; adding a correction factor B to the virtual interference code WM to obtain a virtual correction code YM, wherein YM is { W } Mi +B,……,W Mi +B};
b: then, the code conversion formula is used for converting the code into a secondary arc line segment H2 Mi (ii) a Sequentially connecting the secondary arc line segments according to the password input sequence to form a secondary password graph DM;
c: comparing the secondary password pattern DM with a preset comparison password pattern stored in the storage module; when the secondary password pattern DM is completely overlapped with the preset contrast password pattern, the password is correct, the authentication is successful, and if not, the password is wrong, and the authentication is failed;
d: when the password is correct, the authentication module controls the network interface module to be communicated with the wireless network transmitting module;
the wireless network transmitting module is used for transmitting a wireless network and is in information connection with the user terminal through a wireless network signal; the network interface module is used for connecting the Internet through an optical fiber.
The data acquisition module is used for acquiring the network transmission rate and the corresponding time of the network interface module; the data acquisition module sends the acquired IP address of the user terminal and the network transmission rate to the data analysis module; the data analysis module is used for analyzing the service time of the router terminal, and comprises the following specific steps:
the method comprises the following steps: setting a network transmission rate as Hj, wherein j is 1, … … and n; the corresponding time is marked as T H j;
Step two: when Hj is less than the set network speed threshold value, the corresponding time T H j is the starting time and starts timing; when Hn is larger than the set threshold, stopping timing, and determining the corresponding time T Hn For the stop time, T is counted H j and T Hn The duration KT; when the duration KT is greater than the set threshold, the time period T is set Hj ,T Hn ]Marking as an idle time period;
step three: counting the number of days of the idle time period in the working day; counting the number of days; setting the frequency of occurrence of one day as P1, the frequency of continuous occurrence of two days as P2, and the frequency of continuous occurrence of j days as Pj; setting idle coefficients corresponding to one day as c1, idle coefficients corresponding to two days as c2, and idle coefficients occurring for j days continuously as cj; and c1< c2< … … cj; j is 1, … …, n;
step four: using formulasObtaining an idle closing value C; when the idle closing value C is larger than the set threshold, generating a closing instruction and a corresponding idle time period and sending the closing instruction and the corresponding idle time period to the wireless control module;
the wireless control module is used for controlling the opening or closing of the wireless network transmitting module; when the wireless control module receives the closing instruction and the corresponding idle time period, the wireless control module controls the wireless network transmitting module to be at the time T H j is closed; controlling wireless network transmitting module at time T Hn And (4) opening.
The invention has the beneficial effects that:
(1) the method comprises the steps of converting a password input by a user into a virtual password, adding an interference factor into the virtual password to obtain a virtual interference password, converting the virtual interference password into a password graph through a password conversion formula input by the user, and sending the password graph to authenticate the password of the router terminal, so that the problem that the existing WiFi is easy to crack due to the fact that the existing WiFi is composed of alphanumerics and symbols is solved;
(2) the router terminal identifies the password pattern, then obtains a corresponding virtual interference password by using a password conversion formula, and adds a correction factor to the virtual interference password to obtain a virtual correction password; then, converting the data into a secondary arc line segment by using a password conversion formula; sequentially connecting the secondary arc line segments according to the password input sequence to form a secondary password graph; comparing the secondary password pattern with a preset comparison password pattern stored in the storage module; the security encryption authentication of the router is improved, and the security encryption of WiFi is guaranteed;
(3) the data analysis module is used for analyzing the service time of the router terminal; when the wireless transmission rate is smaller than a set network speed threshold value, timing is started; when the wireless transmission rate is greater than a set threshold, stopping timing, and counting the duration of the time period; when the time length is larger than a set threshold value, marking the time period as an idle time period; counting the number of days of the idle time period in the working day; obtaining an idle closing value by using a formula; when the idle closing value is larger than the set threshold, generating a closing instruction and a corresponding idle time period and sending the closing instruction and the corresponding idle time period to the wireless control module; the wireless control module is used for controlling the opening or closing of the wireless network transmitting module; the router terminal is controlled to be opened and closed reasonably, and the router terminal is closed when the router terminal is not used by people, so that resources are saved.
Drawings
The invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of a WiFi security encryption system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention is a WiFi security encryption system, including a user terminal and a router terminal, where the user terminal includes a password input module, a password conversion module and a formula input module; the password input module is used for inputting password information by a user, wherein the password information comprises letters, symbols, numbers and corresponding virtual numbers; the formula input module is used for inputting a password conversion formula by a user; the password input module and the formula input module send password information and a password conversion formula input by a user to the password conversion module;
the password conversion module receives password information and a password conversion formula sent by the password input module and the formula input module and performs password conversion, and the specific password conversion steps are as follows:
the method comprises the following steps: setting password information to comprise letters, symbols and numbers as Mi, wherein i is 1, … … and n; setting corresponding virtual number as G Mi (ii) a Mi and G Mi One-to-one correspondence is realized;
step two: setting a password input by a user as ZM, ZM ═ Mi, … …, Mi }; converting the password Mi input by the user into a corresponding virtual password XM, where XM ═ G Mi ,……,G Mi };
Step three: adding an interference factor K to the virtual password XM to obtain a virtual interference password WM, wherein the value of K is any positive integer; WM ═ W Mi ,……,W Mi };W Mi =G Mi +K;
Step four: converting the virtual interference password WM into an arc line segment through a password conversion formula; the cipher conversion formula is W Mi =L Mi *u1+r Mi *u2;L Mi Is the arc length r Mi Is the radius; u1 and u2 are fixed values of preset proportionality coefficients; transforming W by a cryptographic transformation formula Mi Converted into arc line segment H Mi (ii) a Arc line segment H Mi Arc length of L Mi (ii) a Radius r Mi ;
Step five: an arc line segment H Mi Sequentially connecting according to the password input sequence to form a password graph TM; the password conversion module sends the obtained password graph TM and the IP address of the user terminal to the authentication module;
the router terminal comprises an authentication module, a wireless network transmitting module, a storage module, a network interface module, a data acquisition module, a data analysis module and a wireless control module; the authentication module is used for authenticating the received password graph TM and the IP address of the user terminal, and the specific authentication process is as follows:
a: identifying the received password pattern TM, and obtaining a corresponding virtual interference password WM by using a password conversion formula; adding a correction factor B to the virtual interference code WM to obtain a virtual correction code YM, wherein YM is { W } Mi +B,……,W Mi +B};
b: then, the code conversion formula is used for converting the code into a secondary arc line segment H2 Mi (ii) a Sequentially connecting the secondary arc line segments according to the password input sequence to form a secondary password graph DM;
c: comparing the secondary password pattern DM with a preset comparison password pattern stored in the storage module; when the secondary password pattern DM is completely overlapped with the preset contrast password pattern, the password is correct, the authentication is successful, and if not, the password is wrong, and the authentication is failed;
d: when the password is correct, the authentication module controls the network interface module to be communicated with the wireless network transmitting module;
the wireless network transmitting module is used for transmitting a wireless network and connecting with the user terminal information through a wireless network signal; the network interface module is used for connecting the Internet through an optical fiber.
The data acquisition module is used for acquiring the network transmission rate and the corresponding time of the network interface module; the data acquisition module sends the acquired IP address of the user terminal and the network transmission rate to the data analysis module; the data analysis module is used for analyzing the service time of the router terminal, and comprises the following specific steps:
the method comprises the following steps: setting a network transmission rate as Hj, wherein j is 1, … … and n; the corresponding time is recorded as T H j;
Step two: when Hj is less than the set network speed threshold value, the corresponding time T H j is the starting time and starts timing; when Hn is larger than the set threshold value, stopping timing, and determining the corresponding time T Hn For the stop time, T is counted H j and T Hn The duration KT; when the duration KT is greater than the set threshold, the time period T is set Hj ,T Hn ]Marking as an idle time period;
step three: counting the number of days of the idle time period in the working day; counting the number of days; setting the frequency of occurrence of one day as P1, the frequency of continuous occurrence of two days as P2, and the frequency of continuous occurrence of j days as Pj; setting idle coefficients corresponding to one day as c1, idle coefficients corresponding to two days as c2, and idle coefficients occurring for j days continuously as cj; and c1< c2< … … cj; j is 1, … …, n;
step four: using formulasObtaining an idle closing value C; when the idle closing value C is larger than the set threshold, generating a closing instruction and a corresponding idle time period and sending the closing instruction and the corresponding idle time period to the wireless control module;
the wireless control module is used for controlling the opening or closing of the wireless network transmitting module; when the wireless control module receives a closing instruction and a corresponding idle time period, the wireless control module controls the wireless network transmitting module to transmit the closing instruction at the time T H j is closed; controlling wireless network transmitting module at time T Hn And (4) opening.
The working principle of the invention is as follows: the method comprises the steps of converting a password input by a user into a virtual password, adding an interference factor into the virtual password to obtain a virtual interference password, converting the virtual interference password into a password graph through a password conversion formula input by the user, and sending the password graph to authenticate the password of the router terminal, so that the problem that the existing WiFi is easy to crack due to the fact that the existing WiFi is composed of alphanumerics and symbols is solved; meanwhile, the router terminal identifies the password pattern, then obtains a corresponding virtual interference password by using a password conversion formula, and adds a correction factor to the virtual interference password to obtain a virtual correction password; then, converting the data into a secondary arc line segment by using a password conversion formula; sequentially connecting the secondary arc line segments according to the password input sequence to form a secondary password graph; comparing the secondary password pattern DM with a preset comparison password pattern stored in the storage module; the security encryption authentication of the router is improved, and the security encryption of WiFi is guaranteed; the data analysis module is used for analyzing the service time of the router terminal; when Hj is less than the set network speed threshold value, the corresponding time T Hj Starting timing for the starting time; when Hn is larger than the set threshold, stopping timing, and determining the corresponding time T Hn For the stop time, T is counted Hj And T Hn The duration KT; when the duration KT is greater than the set threshold, the time period T is set Hj ,T Hn ]Marking as an idle time period; counting the number of days of the idle time period in the working day; using formulasObtaining an idle closing value C; when the idle closing value C is larger than the set threshold, generating a closing instruction and a corresponding idle time period and sending the closing instruction and the corresponding idle time period to the wireless control module; the wireless control module is used for controlling the wireless networkOpening or closing the shooting module; when the wireless control module receives the closing instruction and the corresponding idle time period, the wireless control module controls the wireless network transmitting module to be at the time T H j is closed; controlling wireless network transmitting module at time T Hn Opening; the router terminal is controlled to be opened and closed reasonably, and the router terminal is closed when the router terminal is not used by people, so that resources are saved.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (3)
1. A WiFi security encryption system comprises a user terminal and a router terminal, and is characterized in that the user terminal comprises a password input module, a password conversion module and a formula input module; the password input module is used for inputting password information by a user, wherein the password information comprises letters, symbols, numbers and corresponding virtual numbers; the formula input module is used for inputting a password conversion formula by a user; the password input module and the formula input module send password information and a password conversion formula input by a user to the password conversion module;
the password conversion module receives password information and a password conversion formula sent by the password input module and the formula input module and performs password conversion, and the specific password conversion steps are as follows:
the method comprises the following steps: setting password information to comprise letters, symbols and numbers to be Mi, wherein i is 1, … … and n; setting corresponding virtual number as G Mi (ii) a Mi and G Mi One-to-one correspondence is realized;
step two: setting a password input by a user as ZM, ZM ═ M1, … …, Mi }; converting a password ZM input by a user into a corresponding virtual password XM, XM ═ G M1 ,……,G Mi };
Step three: adding an interference factor K to the virtual password XM to obtain a virtual interference password WM, wherein the value of K is anyAn intentional positive integer; WM ═ W M1 ,……,W Mi };W Mi =G Mi +K;
Step four: converting the virtual interference password WM into an arc line segment through a password conversion formula; the cipher conversion formula is W Mi =L Mi *u1+r Mi *u2;L Mi Is the arc length r Mi Is the radius; u1 and u2 are fixed values of preset proportionality coefficients; transforming W by a cryptographic transformation formula Mi Converted into arc line segment H Mi (ii) a Arc line segment H Mi Arc length of L Mi (ii) a Radius r Mi ;
Step five: an arc line segment H Mi Sequentially connecting according to the password input sequence to form a password graph TM; the password conversion module sends the obtained password graph TM and the IP address of the user terminal to the authentication module;
the router terminal comprises an authentication module, a wireless network transmitting module, a storage module, a network interface module, a data acquisition module, a data analysis module and a wireless control module; the authentication module is used for authenticating the received password graph TM and the IP address of the user terminal, and the specific authentication process is as follows:
a: identifying the received password pattern TM, and obtaining a corresponding virtual interference password WM by using a password conversion formula; adding a correction factor B to the virtual interference code WM to obtain a virtual correction code YM, wherein YM is { W } M1 +B,……,W Mi +B};
b: then, the code conversion formula is used for converting the code into a secondary arc line segment H2 Mi (ii) a Sequentially connecting the secondary arc line segments according to the password input sequence to form a secondary password graph DM;
c: comparing the secondary password pattern DM with a preset comparison password pattern stored in the storage module; when the secondary password pattern DM is completely overlapped with the preset contrast password pattern, the password is correct, the authentication is successful, and if not, the password is wrong, and the authentication is failed;
d: when the password is correct, the authentication module controls the network interface module to be communicated with the wireless network transmitting module.
2. The WiFi security encryption system of claim 1, wherein the wireless network transmitting module is configured to transmit a wireless network and to connect with a user terminal via a wireless network signal; the network interface module is used for connecting the Internet through an optical fiber.
3. The WiFi security encryption system of claim 1, wherein the data collection module is configured to collect a network transmission rate and a corresponding time of the network interface module; the data acquisition module sends the acquired IP address of the user terminal and the network transmission rate to the data analysis module; the data analysis module is used for analyzing the service time of the router terminal, and comprises the following specific steps:
the method comprises the following steps: setting a network transmission rate as Hj, wherein j is 1, … … and n; the corresponding time is recorded as T Hj ;
Step two: when Hj is less than the set network speed threshold value, the corresponding time T Hj Starting timing for the starting time; when Hn is greater than the set threshold, stopping timing, and determining the corresponding time T Hn For the stop time, T is counted Hj And T Hn The duration KT; when the duration KT is greater than the set threshold, the time period T is set Hj ,T Hn ]Marking as an idle time period;
step three: counting the number of days of the idle time period in the working day; counting the number of days; setting the frequency of occurrence of one day as P1, the frequency of continuous occurrence of two days as P2, and the frequency of continuous occurrence of j days as Pj; setting idle coefficients corresponding to one day as c1, idle coefficients corresponding to two days as c2, and idle coefficients occurring for j days continuously as cj; and c1< c2< … … cj; j is 1, … …, n;
step four: using a formulaObtaining an idle closing value C; when the idle closing value C is larger than the set threshold, generating a closing instruction and a corresponding idle time period and sending the closing instruction and the corresponding idle time period to the wireless control module;
the wireless control module is used for controlling the opening or closing of the wireless network transmitting module; when the wireless control module receives the closing instruction and the corresponding idle time period, the wireless control module controls the wireless network transmitting module to be at the time T Hj Closing; controlling wireless network transmitting module at time T Hn And (4) opening.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762376.9A CN110460994B (en) | 2019-08-19 | 2019-08-19 | WiFi security encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762376.9A CN110460994B (en) | 2019-08-19 | 2019-08-19 | WiFi security encryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110460994A CN110460994A (en) | 2019-11-15 |
CN110460994B true CN110460994B (en) | 2022-08-16 |
Family
ID=68487406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910762376.9A Expired - Fee Related CN110460994B (en) | 2019-08-19 | 2019-08-19 | WiFi security encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110460994B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108009419A (en) * | 2017-11-24 | 2018-05-08 | 咪咕文化科技有限公司 | Authentication method and device of graphic password and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8536978B2 (en) * | 2010-11-19 | 2013-09-17 | Blackberry Limited | Detection of duress condition at a communication device |
-
2019
- 2019-08-19 CN CN201910762376.9A patent/CN110460994B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108009419A (en) * | 2017-11-24 | 2018-05-08 | 咪咕文化科技有限公司 | Authentication method and device of graphic password and storage medium |
Non-Patent Citations (1)
Title |
---|
移动终端掌纹辅助分割和定位算法研究;张情;《CNKI中国硕士学位论文全文数据库信息科技辑》;20180115;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110460994A (en) | 2019-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110267270B (en) | Identity authentication method for sensor terminal access edge gateway in transformer substation | |
CN108737104A (en) | Electronic device for Verification System | |
CN103685323A (en) | Method for realizing intelligent home security networking based on intelligent cloud television gateway | |
CN104916022A (en) | Intelligent lock control method, mobile terminal and intelligent lock system | |
CN104023352B (en) | A kind of instant communication software side channel testing system towards mobile communication platform | |
CN110366175B (en) | Security negotiation method, terminal equipment and network equipment | |
CN109460646A (en) | Method for identifying ID, device, system, electronic equipment and readable medium | |
CN109286460A (en) | A kind of method for synchronizing time and system based on wireless communication | |
CN109302540A (en) | A kind of acceptance method, device and the equipment of convergence communication business | |
CN100479376C (en) | Method of distinguishing playback management message | |
CN111404886A (en) | Electric power metering terminal and electric power metering platform | |
CN110351316A (en) | A kind of remote software upgrade method and device | |
CN107148017B (en) | Method based on physical layer key agreement enhancing wlan security | |
CN109606151A (en) | A kind of automatic recharging method and system based on cloud Optimized Operation | |
CN110460994B (en) | WiFi security encryption system | |
CN101605130A (en) | Heartbeat handshake method and system | |
CN109889532A (en) | Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context | |
CN113987525A (en) | System data protection method based on block cipher algorithm | |
CN102299924A (en) | Information interaction and authentication methods between RADIUS server and 8.2.1x client and RADIUS system | |
Samano-Robles et al. | Wireless networks with retransmission diversity and carrier-sense multiple access | |
CN104410153B (en) | IEC62351 intelligent substation process layer intelligent electronic device communication method and communication system | |
CN102882854A (en) | Power grid data access method | |
CN108924117B (en) | Power quality monitoring and inquiring method | |
Ma et al. | Physical Layer Assist Mutual Authentication scheme for smart meter system | |
CN202679395U (en) | Intelligent household system controlled by human body characteristic information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220816 |