CN110493778B - WiFi safety login authentication system - Google Patents
WiFi safety login authentication system Download PDFInfo
- Publication number
- CN110493778B CN110493778B CN201910762379.2A CN201910762379A CN110493778B CN 110493778 B CN110493778 B CN 110493778B CN 201910762379 A CN201910762379 A CN 201910762379A CN 110493778 B CN110493778 B CN 110493778B
- Authority
- CN
- China
- Prior art keywords
- module
- password
- graph
- user terminal
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000006243 chemical reaction Methods 0.000 claims abstract description 47
- 238000012795 verification Methods 0.000 claims description 45
- 238000000034 method Methods 0.000 claims description 8
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000005336 cracking Methods 0.000 abstract description 5
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a WiFi (wireless fidelity) safe login authentication system, which is used for solving the problems that the existing WiFi authentication is authenticated through letters, numbers and symbols, the safety is low, and the letters, the numbers and the symbols are easily sequenced and verified through the existing cracking software programming to be cracked; leading to a problem of low security authentication; the system comprises a user terminal and a wireless router; the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module; the password conversion module converts the input password to obtain a superposed graph; the password authentication module receives the superposed graph and the comparison graph to be matched, and when the superposed graph and the comparison graph are completely matched, the authentication is successful; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times.
Description
Technical Field
The invention relates to the technical field of WiFi authentication, in particular to a WiFi safe login authentication system.
Background
The WiFi technology is a short-distance wireless transmission technology, and is widely used in office spaces and homes because of its high transmission speed and long effective distance. After the terminal with the WiFi function is accessed to the WiFi router, the WiFi router authenticates the WiFi terminal, and after the authentication is passed, the WiFi terminal is allowed to access the Internet. The authentication method includes three ways, one is a password sharing way, such as WEP, WPA2 and the like; one is Web Portal authentication; one is 802.1X authentication.
The existing WiFi authentication is authenticated through letters, numbers and symbols, the safety is low, and the letters, the numbers and the symbols can be easily sequenced and verified through the existing cracking software programming for cracking; resulting in low security authentication.
Disclosure of Invention
The invention aims to provide a WiFi safe login authentication system; the method is used for solving the problems that the existing WiFi authentication is authenticated through letters, numbers and symbols, the safety is low, and the letters, numbers and symbols are easily sequenced and verified through the existing cracking software programming to be cracked; resulting in a problem of low security authentication.
The purpose of the invention can be realized by the following technical scheme: a WiFi safe login authentication system comprises a user terminal and a wireless router; the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module;
the positioning module is used for acquiring the position data of the user terminal and the IP address of the user terminal; the positioning module sends the position data of the user terminal to the position authentication module; the position authentication module is used for authenticating the position of the user terminal, and the specific authentication steps are as follows:
step one; setting the position of the user terminal as Ai, wherein i is 1, … … and n;
step two: the position authentication module acquires a designated internet surfing area preset by a user and stored in the storage module;
step three: when the position Ai of the user terminal is in the range of the designated internet access area, the position authentication module sends an acquisition instruction to a password conversion module of the user terminal; when the position Ai of the user is outside the range of the designated internet access area, no operation is performed;
the password input module is used for inputting a password by a user and sending the password to the password conversion module; the password conversion module is used for receiving an input password sent by the password input module after receiving an acquisition instruction; the password conversion module converts the input password, and the specific conversion steps are as follows:
the method comprises the following steps: marking the password input by the user as Mi, i-1, … …, n; the input password is formed by sequencing and combining letters, numbers and symbols;
step two: setting a comparison password Ci, i being 1, … … and n; the comparison passwords are letters, numbers or symbols; each comparison password Ci corresponds to a conversion graph Di, i is 1, … … and n; converting the graphs Di into graphs with different sizes, wherein the graphs comprise squares, circles and triangles and central points inside the squares, the circles and the triangles;
step three: matching the input password Mi with the comparison password Ci to obtain a corresponding conversion graph Di;
step four: superposing the conversion graph Di according to the input password sequence to obtain a superposed graph; specifically, the input password is set to be D1 as a first password matching conversion graph and D2 as a second password matching conversion graph; the third password-matched conversion pattern is D3; placing the converted graph D1 at the bottom layer, then coinciding the center point of the converted graph D2 with the center point of the converted graph D1, and then coinciding the center point of the converted graph D3 with the center point of the converted graph D2;
step five: sending the superposed graph to a password authentication module;
the password authentication module receives the superposed graphs and compares the graphs, and the specific comparison process is as follows:
a: the password authentication module acquires a contrast graph preset by a user and stored in the storage module;
b: matching the superposed graph with the comparison graph, and when the superposed graph is completely matched with the comparison graph, successfully authenticating, and increasing the successful verification times by one; if not, the authentication fails, and meanwhile, the number of times of failure verification is increased by one;
c: and the password authentication module sends the successful verification times, the failed verification times and the corresponding failed verification times to the storage module for storage.
Preferably, the positioning module sends the IP address of the user terminal to the storage module; the data acquisition module is used for storing the IP address, successful verification times and failed verification times of the user terminal stored in the module; the data acquisition module sends the acquired IP address of the user terminal, the successful verification times and the failed verification times to the calculation module; the calculation module is used for calculating the verification value of the user terminal, and the specific calculation steps are as follows:
s1: setting the successful verification times as P1 and the failed verification times as P2;
s2: using formulasObtaining a verification value YZ, wherein u1 and u2 are fixed values of preset proportionality coefficients, and lambda is a correction factor and takes the value of 0.96231;
s3: when the verification value YZ is larger than a set threshold value, the calculation module generates a stop instruction and sends the stop instruction to the position authentication module; and the position authentication module receives the stop instruction and stops sending the acquisition instruction to the password conversion module.
Preferably, the statistical module is used for counting the current online users successfully authenticated by the wireless router, sending the current online users to the user terminal corresponding to the preset IP address, and displaying the current connected users of the wireless router;
the invention has the beneficial effects that: the user terminal of the user sends position data and the IP address of the user terminal to the wireless router, the position authentication module in the wireless router carries out user position authentication, and when the position of the user terminal is located in the range of the specified internet access area, the position authentication module sends an acquisition instruction to the password conversion module of the user terminal; the password conversion module is used for receiving an input password sent by the password input module after receiving the acquisition instruction; the password conversion module converts the input password to obtain a superposed graph; the password authentication module receives the superposed graph and the comparison graph to be matched, and when the superposed graph and the comparison graph are completely matched, the authentication is successful; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times.
Drawings
The invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of a WiFi secure login authentication system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention is a WiFi secure login authentication system, which includes a user terminal and a wireless router; the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module;
the positioning module is used for acquiring the position data of the user terminal and the IP address of the user terminal; the positioning module sends the position data of the user terminal to the position authentication module; the location authentication module is used for authenticating the location of the user terminal, and the specific authentication steps are as follows:
step one; setting the position of the user terminal as Ai, wherein i is 1, … … and n;
step two: the position authentication module acquires a designated internet surfing area preset by a user and stored in the storage module;
step three: when the position Ai of the user terminal is in the range of the designated internet access area, the position authentication module sends an acquisition instruction to a password conversion module of the user terminal; when the position Ai of the user is outside the range of the designated internet access area, no operation is performed;
the password input module is used for inputting a password by a user and sending the password to the password conversion module; the password conversion module is used for receiving an input password sent by the password input module after receiving the acquisition instruction; the password conversion module converts the input password, and the specific conversion steps are as follows:
the method comprises the following steps: marking the password input by the user as Mi, i-1, … …, n; the input password is formed by sequencing and combining letters, numbers and symbols;
step two: setting a comparison password Ci, i being 1, … … and n; the comparison passwords are letters, numbers or symbols; each comparison password Ci corresponds to a conversion graph Di, i is 1, … … and n; converting the graphs Di into graphs with different sizes, wherein the graphs comprise squares, circles and triangles and central points inside the squares, the circles and the triangles;
step three: matching the input password Mi with the comparison password Ci to obtain a corresponding conversion graph Di;
step four: superposing the conversion graph Di according to the input password sequence to obtain a superposed graph; specifically, the input password is set to be D1 as a first password matching conversion graph and D2 as a second password matching conversion graph; the third password-matched conversion pattern is D3; placing the converted graph D1 at the bottom layer, then coinciding the center point of the converted graph D2 with the center point of the converted graph D1, and then coinciding the center point of the converted graph D3 with the center point of the converted graph D2; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times;
step five: sending the superposed graph to a password authentication module;
the password authentication module receives the superposed graphs and compares the graphs, and the specific comparison process is as follows:
a: the password authentication module acquires a contrast graph preset by a user and stored in the storage module;
b: matching the superposed graph with the comparison graph, and when the superposed graph is completely matched with the comparison graph, successfully authenticating, and increasing the successful verification times by one; if not, the authentication fails, and meanwhile, the number of times of failure verification is increased by one;
c: the password authentication module sends the successful verification times, the failed verification times and the corresponding failed verification times to the storage module for storage;
the positioning module sends the IP address of the user terminal to the storage module; the data acquisition module is used for storing the IP address, successful verification times and failed verification times of the user terminal stored in the module; the data acquisition module sends the acquired IP address of the user terminal, the successful verification times and the failed verification times to the calculation module; the calculation module is used for calculating the verification value of the user terminal, and comprises the following specific calculation steps:
s1: setting the successful verification times as P1 and the failed verification times as P2;
s2: using formulasObtaining a verification value YZ, wherein u1 and u2 are fixed values of preset proportionality coefficients, and lambda is a correction factor and takes the value of 0.96231; the more times of successful verification, the smaller the verification value, and the more times of verification failure of the user;
s3: when the verification value YZ is larger than a set threshold value, the calculation module generates a stop instruction and sends the stop instruction to the position authentication module; the position authentication module receives the stop instruction and stops sending the acquisition instruction to the password conversion module; through the limitation of the verification of times, the wireless router is prevented from being cracked by the conventional cracking software in wireless times of attempts;
and the counting module is used for counting the current online users successfully authenticated by the wireless router, sending the current online users to the user terminal corresponding to the preset IP address, and displaying the current connected users of the wireless router.
The working principle of the invention is as follows: the user terminal of the user sends position data and an IP address of the user terminal to the wireless router, a position authentication module in the wireless router carries out user position authentication, and when the position of the user terminal is located in the range of the specified internet access area, the position authentication module sends a collection instruction to a password conversion module of the user terminal; the password conversion module is used for receiving an input password sent by the password input module after receiving the acquisition instruction; the password conversion module converts the input password to obtain a superposed graph; the password authentication module receives the superposed graph and the comparison graph to be matched, and when the superposed graph and the comparison graph are completely matched, the authentication is successful; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (3)
1. A WiFi safe login authentication system comprises a user terminal and a wireless router; the system is characterized in that the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module;
the positioning module is used for acquiring the position data of the user terminal and the IP address of the user terminal; the positioning module sends the position data of the user terminal to the position authentication module; the position authentication module is used for authenticating the position of the user terminal, and the specific authentication steps are as follows:
step one; setting the position of the user terminal as Ai, wherein i is 1, … … and n;
step two: the position authentication module acquires a designated internet surfing area preset by a user and stored in the storage module;
step three: when the position Ai of the user terminal is in the range of the designated internet access area, the position authentication module sends an acquisition instruction to a password conversion module of the user terminal; when the position Ai of the user is outside the range of the designated internet access area, no operation is performed;
the password input module is used for inputting a password by a user and sending the password to the password conversion module; the password conversion module is used for receiving an input password sent by the password input module after receiving an acquisition instruction; the password conversion module converts the input password, and the specific conversion steps are as follows:
the method comprises the following steps: marking the password input by the user as Mi, i-1, … …, n; the input password is formed by sequencing and combining letters, numbers and symbols;
step two: setting a comparison password Ci, i being 1, … … and n; the comparison passwords are letters, numbers or symbols; each comparison password Ci corresponds to a conversion graph Di, i is 1, … … and n; converting the graphs Di into graphs with different sizes, wherein the graphs comprise squares, circles and triangles and central points inside the squares, the circles and the triangles;
step three: matching the input password Mi with the comparison password Ci to obtain a corresponding conversion graph Di;
step four: superposing the conversion graph Di according to the input password sequence to obtain a superposed graph; specifically, the input password is set to be D1 as a first password matching conversion graph and D2 as a second password matching conversion graph; the third password-matched conversion pattern is D3; placing the converted graph D1 at the bottom layer, then coinciding the center point of the converted graph D2 with the center point of the converted graph D1, and then coinciding the center point of the converted graph D3 with the center point of the converted graph D2;
step five: sending the superposed graph to a password authentication module;
the password authentication module receives the superposed graphs and compares the graphs, and the specific comparison process is as follows:
a: the password authentication module acquires a contrast graph preset by a user and stored in the storage module;
b: matching the superposed graph with the comparison graph, and when the superposed graph is completely matched with the comparison graph, successfully authenticating, and increasing the successful verification times by one; if not, the authentication fails, and meanwhile, the number of times of failure verification is increased by one;
c: and the password authentication module sends the successful verification times and the failed verification times to the storage module for storage.
2. The WiFi secure login authentication system of claim 1, wherein the positioning module sends an IP address of the user terminal to the storage module; the data acquisition module is used for storing the IP address, successful verification times and failed verification times of the user terminal stored in the module; the data acquisition module sends the acquired IP address of the user terminal, the successful verification times and the failed verification times to the calculation module; the calculation module is used for calculating the verification value of the user terminal, and the specific calculation steps are as follows:
s1: setting the successful verification times as P1 and the failed verification times as P2;
s2: using formulasObtaining a verification value YZ, wherein e1 and e2 are fixed values of preset proportionality coefficients, and lambda is a correction factor and takes the value of 0.96231;
s3: when the verification value YZ is larger than a set threshold value, the calculation module generates a stop instruction and sends the stop instruction to the position authentication module; and the position authentication module receives the stop instruction and stops sending the acquisition instruction to the password conversion module.
3. The WiFi secure login authentication system of claim 1, wherein the statistics module is configured to count current online users successfully authenticated by the wireless router, send the current online users to a user terminal corresponding to a preset IP address, and display current connected users of the wireless router.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762379.2A CN110493778B (en) | 2019-08-19 | 2019-08-19 | WiFi safety login authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762379.2A CN110493778B (en) | 2019-08-19 | 2019-08-19 | WiFi safety login authentication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110493778A CN110493778A (en) | 2019-11-22 |
CN110493778B true CN110493778B (en) | 2022-03-22 |
Family
ID=68552061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910762379.2A Expired - Fee Related CN110493778B (en) | 2019-08-19 | 2019-08-19 | WiFi safety login authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110493778B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865962B (en) * | 2020-07-16 | 2022-04-08 | 国网山东省电力公司青岛供电公司 | WiFi (Wireless Fidelity) secure login authentication system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450604A (en) * | 2014-08-25 | 2016-03-30 | 苏宁云商集团股份有限公司 | Safe verifying method and device based on graphic feature |
CN105787323A (en) * | 2016-02-16 | 2016-07-20 | 广东欧珀移动通信有限公司 | Safety protection method for WiFi hotspot and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10055926B2 (en) * | 2016-09-09 | 2018-08-21 | Tyco Integrated Security, LLC | Architecture for access management |
-
2019
- 2019-08-19 CN CN201910762379.2A patent/CN110493778B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450604A (en) * | 2014-08-25 | 2016-03-30 | 苏宁云商集团股份有限公司 | Safe verifying method and device based on graphic feature |
CN105787323A (en) * | 2016-02-16 | 2016-07-20 | 广东欧珀移动通信有限公司 | Safety protection method for WiFi hotspot and mobile terminal |
Non-Patent Citations (1)
Title |
---|
WiFi无线网络的安全与防范措施探讨;谭悦平;《信息与电脑(理论版)》;20180515(第2018(09)期);192-196 * |
Also Published As
Publication number | Publication date |
---|---|
CN110493778A (en) | 2019-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI705349B (en) | Terminal authentication processing, authentication method, device and system | |
CN107493280B (en) | User authentication method, intelligent gateway and authentication server | |
US20230328516A1 (en) | Device based credentials | |
ES2607218T3 (en) | Improvement of biometric identification and authentication | |
US11399018B2 (en) | Network device proximity-based authentication | |
CN101772020B (en) | Method and system for authentication processing, 3GPP authentication authorization accounting server and user device | |
DK2924944T3 (en) | Presence authentication | |
CN101557406A (en) | User terminal authentication method, device and system thereof | |
CN101616412A (en) | The method of calibration of management frames in wireless local area and equipment | |
EP3179695B1 (en) | Network authentication | |
US11317285B2 (en) | Wireless network provisioning using a pre-shared key | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
WO2016188053A1 (en) | Wireless network access method, device, and computer storage medium | |
CN105050086A (en) | Method for terminal to log in Wifi hotspot | |
CN104869121B (en) | A kind of authentication method and device based on 802.1x | |
CN105763536B (en) | Network registration method and system based on dynamic graphic password | |
CN101132280A (en) | WAPI certificate identification method | |
CN105515781A (en) | Login system of application platform and login method thereof | |
CN110493778B (en) | WiFi safety login authentication system | |
CN103428698B (en) | Mobile interchange participant's identity strong authentication method | |
CN202206419U (en) | Network security terminal and interactive system based on terminal | |
CN109495500A (en) | A kind of double factor authentication method based on smart phone | |
Sun et al. | A lightweight multi-factor mobile user authentication scheme | |
CN106162644A (en) | A kind of WiFi system preventing camouflage equipment and safe verification method thereof | |
CN101765110A (en) | Dedicated encryption protection method between user and wireless access point |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220322 |