CN112437088B - Internet terminal login double-factor security authentication system - Google Patents

Internet terminal login double-factor security authentication system Download PDF

Info

Publication number
CN112437088B
CN112437088B CN202011338379.9A CN202011338379A CN112437088B CN 112437088 B CN112437088 B CN 112437088B CN 202011338379 A CN202011338379 A CN 202011338379A CN 112437088 B CN112437088 B CN 112437088B
Authority
CN
China
Prior art keywords
login
data
module
local server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011338379.9A
Other languages
Chinese (zh)
Other versions
CN112437088A (en
Inventor
邱宝山
孙振伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Teddy Information Technology Co ltd
Original Assignee
Anhui Teddy Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Teddy Information Technology Co ltd filed Critical Anhui Teddy Information Technology Co ltd
Priority to CN202011338379.9A priority Critical patent/CN112437088B/en
Publication of CN112437088A publication Critical patent/CN112437088A/en
Application granted granted Critical
Publication of CN112437088B publication Critical patent/CN112437088B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Abstract

The invention relates to a security authentication system, in particular to an internet terminal login double-factor security authentication system, which comprises a local server, a cloud server and a login data acquisition module, wherein the local server and the login data acquisition module are communicated with each other, the login data acquisition module is used for acquiring login data, the local server is connected with the login request acquisition module used for receiving a login request, the cloud server is connected with a data storage module used for storing relevant login data, the cloud server calls corresponding relevant login data according to a login password in the login data and sends the relevant login data to the local server, the local server is connected with a data decryption module used for decrypting the relevant login data according to the login password in the login data, and the local server is connected with an information generation module used for generating authentication information according to the decrypted relevant login data; the technical scheme provided by the invention can effectively overcome the defects of single authentication mode, low safety coefficient and complex authentication process when the authentication is combined with third party authentication in the prior art.

Description

Internet terminal login double-factor security authentication system
Technical Field
The invention relates to a security authentication system, in particular to an internet terminal login double-factor security authentication system.
Background
Before accessing the security system, a user firstly needs to identify the identity through the identity authentication system, then accesses the monitoring module, and the system determines whether the user can access a certain resource of the system according to the identity and the authorization condition of the user. Therefore, the system security login and the identity authentication are the first level of security in the security system, are also the basis for implementing access control, and have very important functions in the field of system security.
The 'double-factor' identity authentication is an identity authentication system which can only play a role through the combination of a first level of gate and a second authentication element. For example, a bank card drawing from an ATM is an example of a "two-factor" authentication mechanism, which requires a combination of two authentication elements, namely, knowing the drawing password and using the corresponding bank card. The third party authentication is a third party authentication mechanism except the own party, and is used for verifying the real identity of the communication applicant, so that false information is avoided to the greatest extent, and the communication benefit is ensured.
However, the existing terminal login security authentication system usually adopts a single authentication mode, the security coefficient is low, and when the authentication is combined with third party authentication, the authentication process is complex, and the wide use is not facilitated.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides the internet terminal login double-factor security authentication system which can effectively overcome the defects of single authentication mode, low security coefficient and complex authentication process when third-party authentication is combined in the prior art.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme:
a login double-factor security authentication system for an Internet terminal comprises a local server, a cloud server and a login data acquisition module, wherein the local server and the cloud server are communicated with each other, the login data acquisition module is used for acquiring login data, the local server is connected with the login request acquisition module used for receiving a login request, and the cloud server is connected with a data storage module used for storing relevant login data;
the cloud server calls corresponding relevant login data according to a login password in the login data and sends the login data to the local server, the local server is connected with a data decryption module used for decrypting the relevant login data according to the login password in the login data, the local server is connected with an information generation module used for generating authentication information according to the decrypted relevant login data, the cloud server is connected with a data calling module used for calling confirmation information according to the login password in the login data, and the cloud server is connected with a comparison authentication module used for comparing and authenticating the authentication information and the confirmation information;
the system comprises a local server, a data storage module, a verification mode selection module, a biological characteristic acquisition module, a data matching module and a strategy execution module, wherein the local server is connected with the data judgment module used for judging whether login data contain biological characteristics or not, the local server is connected with the acquisition request transmission module used for transmitting a biological characteristic acquisition request according to a judgment result, the local server is connected with the verification mode selection module used for selecting a biological characteristic acquisition mode, the local server is connected with the biological information acquisition module used for acquiring the biological characteristics, the cloud server is connected with the data matching module used for matching the acquired biological characteristics in the data storage module, and the local server is connected with the strategy execution module used for executing a strategy according to detection results of the comparison authentication module and the data matching module.
Preferably, the cloud server calls the encrypted verification random number and the encrypted calibration random number according to a login password in the login data and sends the verification random number and the calibration random number to the local server, and the verification random number and the calibration random number are generated by different encryption methods according to the login password.
Preferably, the data decryption module decrypts the verification random number and the calibration random number sent by the cloud server according to a login password in the login data.
Preferably, the information generating module generates authentication information including:
generating a calibration length and a calibration initial position according to the decrypted calibration random number;
deleting data corresponding to the calibration initial position and the calibration length in the decrypted verification random number;
moving the previous bit of data which deletes one bit of data at first to the front of the data of the length calibration bit;
and combining the decrypted verification random numbers of the two parts according to the sequence.
Preferably, the data retrieving module retrieves corresponding confirmation information from the data storage module according to a login password in the login data, and the comparison and authentication module sends a comparison and authentication result to the local server.
Preferably, when the data judgment module judges that the login data contains the biological characteristics, the local server sends the biological characteristics to the cloud server, and the cloud server performs matching through the data matching module and sends a matching result to the local server.
Preferably, when the data judgment module judges that the login data does not contain the biometric feature, the acquisition request sending module sends a biometric feature acquisition request to the user, and the local server starts the verification mode selection module and the prompt tone.
Preferably, the local server starts the corresponding biological information acquisition module according to the biological characteristic acquisition mode selected by the user.
Preferably, when the comparison authentication result of the comparison authentication module is consistent and the matching result of the data matching module is successful, the policy execution module executes the login permission policy;
when the comparison authentication result of the comparison authentication module is inconsistent, the cloud server is disconnected with the local server;
and when the comparison authentication result of the comparison authentication module is consistent and the matching result of the data matching module is unsuccessful, the strategy execution module executes the login impermissible strategy.
(III) advantageous effects
Compared with the prior art, the internet terminal login double-factor security authentication system provided by the invention can effectively improve the security coefficient of login authentication by combining a password and a biological characteristic double-factor authentication mode, and meanwhile, the third party authentication is added in the password authentication process, so that the real identity of a local communication applicant can be effectively verified, communication with a local communication person with unknown identity is prevented from being established, and the security level of communication in a region is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of the system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
A login double-factor security authentication system for an Internet terminal is shown in figure 1 and comprises a local server, a cloud server and a login data acquisition module, wherein the local server and the cloud server are communicated with each other, the login data acquisition module is used for acquiring login data, the local server is connected with the login request acquisition module used for receiving login requests, and the cloud server is connected with a data storage module used for storing relevant login data.
The cloud server calls corresponding relevant login data according to a login password in the login data and sends the login data to the local server, the local server is connected with a data decryption module used for decrypting the relevant login data according to the login password in the login data, the local server is connected with an information generation module used for generating authentication information according to the decrypted relevant login data, the cloud server is connected with a data calling module used for calling confirmation information according to the login password in the login data, and the cloud server is connected with a comparison authentication module used for comparing and authenticating the authentication information and the confirmation information.
The cloud server calls the encrypted verification random number and the encrypted calibration random number according to the login password in the login data and sends the verification random number and the calibration random number to the local server, and the verification random number and the calibration random number are generated through different encryption methods according to the login password.
And the data decryption module decrypts the verification random number and the calibration random number sent by the cloud server according to the login password in the login data.
The information generation module generates authentication information, including:
generating a calibration length and a calibration initial position according to the decrypted calibration random number;
deleting data corresponding to the calibration initial position and the calibration length in the decrypted verification random number;
moving the previous bit data of the first deleted bit data forward to the position before the data of the length-calibrated bit;
and combining the decrypted verification random numbers of the two parts according to the sequence.
The data calling module calls corresponding confirmation information from the data storage module according to the login password in the login data, the comparison authentication module compares and authenticates the authentication information and the confirmation information, and sends a comparison authentication result to the local server.
In the technical scheme of the application, the encryption method for verifying the random number and calibrating the random number and the algorithm for generating the authentication information by the information generation module are broadcast in a local area which is safely connected with the cloud server. Therefore, the encryption method and algorithm can be used by the local server only by establishing a secure connection with the cloud server.
The local server is connected with a data judgment module used for judging whether the login data contains biological characteristics, the local server is connected with an acquisition request sending module used for sending a biological characteristic acquisition request according to a judgment result, the local server is connected with a verification mode selection module used for selecting a biological characteristic acquisition mode, the local server is connected with a biological information acquisition module used for acquiring the biological characteristics, the cloud server is connected with a data matching module used for matching the acquired biological characteristics in the data storage module, and the local server is connected with a strategy execution module used for executing a strategy according to a detection result of the comparison authentication module and the data matching module.
When the data judgment module judges that the login data contain the biological characteristics, the local server sends the biological characteristics to the cloud server, and the cloud server performs matching through the data matching module and sends a matching result to the local server.
When the data judgment module judges that the login data does not contain the biological characteristics, the acquisition request sending module sends a biological characteristic acquisition request to the user, and the local server starts the verification mode selection module and the prompt tone. The biological characteristic collection mode comprises iris, fingerprint, finger vein, palm print and palm vein.
And the local server starts the corresponding biological information acquisition module according to the biological characteristic acquisition mode selected by the user. The biological information acquisition module can be biological characteristic acquisition equipment carried by a local server, and can also be a mobile terminal which is carried by a user and can acquire biological characteristics, and the user can remotely acquire the biological characteristics through the mobile terminal and transmit data to the local server.
When the comparison authentication result of the comparison authentication module is consistent and the matching result of the data matching module is successful, the strategy execution module executes the login permission strategy;
when the comparison authentication result of the comparison authentication module is inconsistent, the cloud server is disconnected from the local server;
and when the comparison authentication result of the comparison authentication module is consistent and the matching result of the data matching module is unsuccessful, the strategy execution module executes the login-impermissible strategy.
In the technical scheme of the application, when the comparison authentication result of the comparison authentication module is inconsistent, two possible reasons exist: firstly, a user inputs an error password, and secondly, the local server does not establish a secure connection with the cloud server, and a threat of attacking the cloud server may exist. At this time, the cloud server performs the most secure action, i.e., disconnects from the local server, regardless of the situation.
And when the user inputs a correct password on the local server and the comparison and authentication results of the comparison and authentication module are consistent, the cloud server reestablishes the secure connection with the local server. The third party authentication is added in the password authentication process, so that the real identity of a local communication applicant can be effectively verified, communication with a local communication applicant with unknown identity is prevented from being established, and the safety level of communication in an area is effectively improved.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A dual-factor security authentication system for logging in an Internet terminal is characterized in that: the system comprises a local server, a cloud server and a login data acquisition module, wherein the local server and the cloud server are communicated with each other, the login data acquisition module is used for acquiring login data, the local server is connected with a login request acquisition module used for receiving a login request, and the cloud server is connected with a data storage module used for storing relevant login data;
the cloud server calls corresponding relevant login data according to a login password in the login data and sends the login data to the local server, the local server is connected with a data decryption module used for decrypting the relevant login data according to the login password in the login data, the local server is connected with an information generation module used for generating authentication information according to the decrypted relevant login data, the cloud server is connected with a data calling module used for calling confirmation information according to the login password in the login data, and the cloud server is connected with a comparison authentication module used for comparing and authenticating the authentication information and the confirmation information;
the system comprises a local server, a data storage module, a verification mode selection module, a biological characteristic acquisition module, a data matching module, a strategy execution module and a comparison authentication module, wherein the local server is connected with the data judgment module for judging whether login data contain biological characteristics or not, the local server is connected with the acquisition request transmission module for transmitting a biological characteristic acquisition request according to a judgment result, the local server is connected with the verification mode selection module for selecting a biological characteristic acquisition mode, the local server is connected with the biological information acquisition module for acquiring the biological characteristics, the cloud server is connected with the data matching module for matching the acquired biological characteristics in the data storage module, and the local server is connected with the strategy execution module for executing a strategy according to detection results of the comparison authentication module and the data matching module;
when the comparison authentication result of the comparison authentication module is consistent and the matching result of the data matching module is successful, the strategy execution module executes the login permission strategy;
when the comparison authentication result of the comparison authentication module is inconsistent, the cloud server is disconnected with the local server;
and when the comparison authentication result of the comparison authentication module is consistent and the matching result of the data matching module is unsuccessful, the strategy execution module executes the login impermissible strategy.
2. The internet terminal login two-factor security authentication system according to claim 1, wherein: the cloud server calls the encrypted verification random number and the encrypted calibration random number according to the login password in the login data and sends the verification random number and the encrypted calibration random number to the local server, and the verification random number and the calibration random number are generated by different encryption methods according to the login password.
3. The internet terminal login two-factor security authentication system of claim 2, wherein: and the data decryption module decrypts the verification random number and the calibration random number sent by the cloud server according to the login password in the login data.
4. The internet terminal login two-factor security authentication system according to claim 3, wherein: the information generation module generates authentication information, including:
generating a calibration length and a calibration initial position according to the decrypted calibration random number;
deleting data corresponding to the calibration initial position and the calibration length in the decrypted verification random number;
moving the previous bit of data which deletes one bit of data at first to the front of the data of the length calibration bit;
and combining the decrypted verification random numbers of the two parts according to the sequence.
5. The internet terminal login two-factor security authentication system according to claim 4, wherein: the data calling module calls corresponding confirmation information from the data storage module according to the login password in the login data, and the comparison authentication module sends a comparison authentication result to the local server.
6. The internet terminal login two-factor security authentication system according to claim 1, wherein: when the data judgment module judges that the login data contains the biological characteristics, the local server sends the biological characteristics to the cloud server, and the cloud server performs matching through the data matching module and sends a matching result to the local server.
7. The internet terminal login two-factor security authentication system of claim 6, wherein: when the data judgment module judges that the login data does not contain the biological characteristics, the acquisition request sending module sends a biological characteristic acquisition request to the user, and the local server starts the verification mode selection module and a prompt tone.
8. The internet terminal login two-factor security authentication system of claim 7, wherein: and the local server starts the corresponding biological information acquisition module according to the biological characteristic acquisition mode selected by the user.
CN202011338379.9A 2020-11-25 2020-11-25 Internet terminal login double-factor security authentication system Active CN112437088B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011338379.9A CN112437088B (en) 2020-11-25 2020-11-25 Internet terminal login double-factor security authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011338379.9A CN112437088B (en) 2020-11-25 2020-11-25 Internet terminal login double-factor security authentication system

Publications (2)

Publication Number Publication Date
CN112437088A CN112437088A (en) 2021-03-02
CN112437088B true CN112437088B (en) 2022-07-12

Family

ID=74698940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011338379.9A Active CN112437088B (en) 2020-11-25 2020-11-25 Internet terminal login double-factor security authentication system

Country Status (1)

Country Link
CN (1) CN112437088B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026818A (en) * 2016-01-29 2017-08-08 中兴通讯股份有限公司 A kind of method of cipher authentication, equipment and application server
CN109587123A (en) * 2018-11-21 2019-04-05 许继集团有限公司 Double factor verification method and certificate server, biometric authentication service device
CN110012018A (en) * 2019-04-11 2019-07-12 国网山东省电力公司 A kind of industrial network security system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1811813A (en) * 2006-03-02 2006-08-02 韩林 Two-factor dynamic cipher verification method and system
US20070300077A1 (en) * 2006-06-26 2007-12-27 Seshadri Mani Method and apparatus for biometric verification of secondary authentications
CN102223233A (en) * 2011-06-15 2011-10-19 刘洪利 Biological code authentication system and biological code authentication method
CN109961291A (en) * 2017-12-14 2019-07-02 红石生物特征科技有限公司 A kind of biological characteristic authentication system and method
CN108809983A (en) * 2018-06-12 2018-11-13 北京智明星通科技股份有限公司 A kind of method, apparatus and system for ensureing account safety and logging in

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026818A (en) * 2016-01-29 2017-08-08 中兴通讯股份有限公司 A kind of method of cipher authentication, equipment and application server
CN109587123A (en) * 2018-11-21 2019-04-05 许继集团有限公司 Double factor verification method and certificate server, biometric authentication service device
CN110012018A (en) * 2019-04-11 2019-07-12 国网山东省电力公司 A kind of industrial network security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
新型双因子认证系统;王振铎等;《计算机系统应用》;20160115(第01期);全文 *

Also Published As

Publication number Publication date
CN112437088A (en) 2021-03-02

Similar Documents

Publication Publication Date Title
CN109005155B (en) Identity authentication method and device
US7409543B1 (en) Method and apparatus for using a third party authentication server
US8683562B2 (en) Secure authentication using one-time passwords
US20080313707A1 (en) Token-based system and method for secure authentication to a service provider
CN106559408B (en) SDN authentication method based on trust management
US20070113090A1 (en) Access control system based on a hardware and software signature of a requesting device
US9860248B2 (en) Computer implemented method, communications system and computer programs products for securing operations in authentication and authorization systems using biometric information
KR101451359B1 (en) User account recovery
CN110990827A (en) Identity information verification method, server and storage medium
US20130061310A1 (en) Security server for cloud computing
CN107948204A (en) One key login method and system, relevant device and computer-readable recording medium
US20160182491A1 (en) Methods, systems and apparatus to manage an authentication sequence
CN104426659B (en) Dynamic password formation method, authentication method and system, relevant device
CN109347887B (en) Identity authentication method and device
CN107733636A (en) Authentication method and Verification System
CN112613020A (en) Identity verification method and device
US9154958B2 (en) Security system for cloud computing
CN113572773A (en) Access equipment and terminal access control method
EP2082518A2 (en) Access control system based on a hardware and software signature of a requesting device
CN113872989A (en) Authentication method and device based on SSL protocol, computer equipment and storage medium
US9413533B1 (en) System and method for authorizing a new authenticator
CN111131140B (en) Method and system for enhancing login security of Windows operating system based on message pushing
CN112437088B (en) Internet terminal login double-factor security authentication system
Alemu et al. Fingerprint based authentication architecture for accessing multiple cloud computing services using single user credential in IOT environments
US8584201B2 (en) Method and apparatus for session validation to access from uncontrolled devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant