CN110493778B - WiFi safety login authentication system - Google Patents

WiFi safety login authentication system Download PDF

Info

Publication number
CN110493778B
CN110493778B CN201910762379.2A CN201910762379A CN110493778B CN 110493778 B CN110493778 B CN 110493778B CN 201910762379 A CN201910762379 A CN 201910762379A CN 110493778 B CN110493778 B CN 110493778B
Authority
CN
China
Prior art keywords
module
password
graph
user terminal
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201910762379.2A
Other languages
Chinese (zh)
Other versions
CN110493778A (en
Inventor
范申民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shangluo University
Original Assignee
Shangluo University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shangluo University filed Critical Shangluo University
Priority to CN201910762379.2A priority Critical patent/CN110493778B/en
Publication of CN110493778A publication Critical patent/CN110493778A/en
Application granted granted Critical
Publication of CN110493778B publication Critical patent/CN110493778B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a WiFi (wireless fidelity) safe login authentication system, which is used for solving the problems that the existing WiFi authentication is authenticated through letters, numbers and symbols, the safety is low, and the letters, the numbers and the symbols are easily sequenced and verified through the existing cracking software programming to be cracked; leading to a problem of low security authentication; the system comprises a user terminal and a wireless router; the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module; the password conversion module converts the input password to obtain a superposed graph; the password authentication module receives the superposed graph and the comparison graph to be matched, and when the superposed graph and the comparison graph are completely matched, the authentication is successful; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times.

Description

WiFi safety login authentication system
Technical Field
The invention relates to the technical field of WiFi authentication, in particular to a WiFi safe login authentication system.
Background
The WiFi technology is a short-distance wireless transmission technology, and is widely used in office spaces and homes because of its high transmission speed and long effective distance. After the terminal with the WiFi function is accessed to the WiFi router, the WiFi router authenticates the WiFi terminal, and after the authentication is passed, the WiFi terminal is allowed to access the Internet. The authentication method includes three ways, one is a password sharing way, such as WEP, WPA2 and the like; one is Web Portal authentication; one is 802.1X authentication.
The existing WiFi authentication is authenticated through letters, numbers and symbols, the safety is low, and the letters, the numbers and the symbols can be easily sequenced and verified through the existing cracking software programming for cracking; resulting in low security authentication.
Disclosure of Invention
The invention aims to provide a WiFi safe login authentication system; the method is used for solving the problems that the existing WiFi authentication is authenticated through letters, numbers and symbols, the safety is low, and the letters, numbers and symbols are easily sequenced and verified through the existing cracking software programming to be cracked; resulting in a problem of low security authentication.
The purpose of the invention can be realized by the following technical scheme: a WiFi safe login authentication system comprises a user terminal and a wireless router; the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module;
the positioning module is used for acquiring the position data of the user terminal and the IP address of the user terminal; the positioning module sends the position data of the user terminal to the position authentication module; the position authentication module is used for authenticating the position of the user terminal, and the specific authentication steps are as follows:
step one; setting the position of the user terminal as Ai, wherein i is 1, … … and n;
step two: the position authentication module acquires a designated internet surfing area preset by a user and stored in the storage module;
step three: when the position Ai of the user terminal is in the range of the designated internet access area, the position authentication module sends an acquisition instruction to a password conversion module of the user terminal; when the position Ai of the user is outside the range of the designated internet access area, no operation is performed;
the password input module is used for inputting a password by a user and sending the password to the password conversion module; the password conversion module is used for receiving an input password sent by the password input module after receiving an acquisition instruction; the password conversion module converts the input password, and the specific conversion steps are as follows:
the method comprises the following steps: marking the password input by the user as Mi, i-1, … …, n; the input password is formed by sequencing and combining letters, numbers and symbols;
step two: setting a comparison password Ci, i being 1, … … and n; the comparison passwords are letters, numbers or symbols; each comparison password Ci corresponds to a conversion graph Di, i is 1, … … and n; converting the graphs Di into graphs with different sizes, wherein the graphs comprise squares, circles and triangles and central points inside the squares, the circles and the triangles;
step three: matching the input password Mi with the comparison password Ci to obtain a corresponding conversion graph Di;
step four: superposing the conversion graph Di according to the input password sequence to obtain a superposed graph; specifically, the input password is set to be D1 as a first password matching conversion graph and D2 as a second password matching conversion graph; the third password-matched conversion pattern is D3; placing the converted graph D1 at the bottom layer, then coinciding the center point of the converted graph D2 with the center point of the converted graph D1, and then coinciding the center point of the converted graph D3 with the center point of the converted graph D2;
step five: sending the superposed graph to a password authentication module;
the password authentication module receives the superposed graphs and compares the graphs, and the specific comparison process is as follows:
a: the password authentication module acquires a contrast graph preset by a user and stored in the storage module;
b: matching the superposed graph with the comparison graph, and when the superposed graph is completely matched with the comparison graph, successfully authenticating, and increasing the successful verification times by one; if not, the authentication fails, and meanwhile, the number of times of failure verification is increased by one;
c: and the password authentication module sends the successful verification times, the failed verification times and the corresponding failed verification times to the storage module for storage.
Preferably, the positioning module sends the IP address of the user terminal to the storage module; the data acquisition module is used for storing the IP address, successful verification times and failed verification times of the user terminal stored in the module; the data acquisition module sends the acquired IP address of the user terminal, the successful verification times and the failed verification times to the calculation module; the calculation module is used for calculating the verification value of the user terminal, and the specific calculation steps are as follows:
s1: setting the successful verification times as P1 and the failed verification times as P2;
s2: using formulas
Figure BDA0002170763300000041
Obtaining a verification value YZ, wherein u1 and u2 are fixed values of preset proportionality coefficients, and lambda is a correction factor and takes the value of 0.96231;
s3: when the verification value YZ is larger than a set threshold value, the calculation module generates a stop instruction and sends the stop instruction to the position authentication module; and the position authentication module receives the stop instruction and stops sending the acquisition instruction to the password conversion module.
Preferably, the statistical module is used for counting the current online users successfully authenticated by the wireless router, sending the current online users to the user terminal corresponding to the preset IP address, and displaying the current connected users of the wireless router;
the invention has the beneficial effects that: the user terminal of the user sends position data and the IP address of the user terminal to the wireless router, the position authentication module in the wireless router carries out user position authentication, and when the position of the user terminal is located in the range of the specified internet access area, the position authentication module sends an acquisition instruction to the password conversion module of the user terminal; the password conversion module is used for receiving an input password sent by the password input module after receiving the acquisition instruction; the password conversion module converts the input password to obtain a superposed graph; the password authentication module receives the superposed graph and the comparison graph to be matched, and when the superposed graph and the comparison graph are completely matched, the authentication is successful; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times.
Drawings
The invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of a WiFi secure login authentication system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention is a WiFi secure login authentication system, which includes a user terminal and a wireless router; the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module;
the positioning module is used for acquiring the position data of the user terminal and the IP address of the user terminal; the positioning module sends the position data of the user terminal to the position authentication module; the location authentication module is used for authenticating the location of the user terminal, and the specific authentication steps are as follows:
step one; setting the position of the user terminal as Ai, wherein i is 1, … … and n;
step two: the position authentication module acquires a designated internet surfing area preset by a user and stored in the storage module;
step three: when the position Ai of the user terminal is in the range of the designated internet access area, the position authentication module sends an acquisition instruction to a password conversion module of the user terminal; when the position Ai of the user is outside the range of the designated internet access area, no operation is performed;
the password input module is used for inputting a password by a user and sending the password to the password conversion module; the password conversion module is used for receiving an input password sent by the password input module after receiving the acquisition instruction; the password conversion module converts the input password, and the specific conversion steps are as follows:
the method comprises the following steps: marking the password input by the user as Mi, i-1, … …, n; the input password is formed by sequencing and combining letters, numbers and symbols;
step two: setting a comparison password Ci, i being 1, … … and n; the comparison passwords are letters, numbers or symbols; each comparison password Ci corresponds to a conversion graph Di, i is 1, … … and n; converting the graphs Di into graphs with different sizes, wherein the graphs comprise squares, circles and triangles and central points inside the squares, the circles and the triangles;
step three: matching the input password Mi with the comparison password Ci to obtain a corresponding conversion graph Di;
step four: superposing the conversion graph Di according to the input password sequence to obtain a superposed graph; specifically, the input password is set to be D1 as a first password matching conversion graph and D2 as a second password matching conversion graph; the third password-matched conversion pattern is D3; placing the converted graph D1 at the bottom layer, then coinciding the center point of the converted graph D2 with the center point of the converted graph D1, and then coinciding the center point of the converted graph D3 with the center point of the converted graph D2; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times;
step five: sending the superposed graph to a password authentication module;
the password authentication module receives the superposed graphs and compares the graphs, and the specific comparison process is as follows:
a: the password authentication module acquires a contrast graph preset by a user and stored in the storage module;
b: matching the superposed graph with the comparison graph, and when the superposed graph is completely matched with the comparison graph, successfully authenticating, and increasing the successful verification times by one; if not, the authentication fails, and meanwhile, the number of times of failure verification is increased by one;
c: the password authentication module sends the successful verification times, the failed verification times and the corresponding failed verification times to the storage module for storage;
the positioning module sends the IP address of the user terminal to the storage module; the data acquisition module is used for storing the IP address, successful verification times and failed verification times of the user terminal stored in the module; the data acquisition module sends the acquired IP address of the user terminal, the successful verification times and the failed verification times to the calculation module; the calculation module is used for calculating the verification value of the user terminal, and comprises the following specific calculation steps:
s1: setting the successful verification times as P1 and the failed verification times as P2;
s2: using formulas
Figure BDA0002170763300000071
Obtaining a verification value YZ, wherein u1 and u2 are fixed values of preset proportionality coefficients, and lambda is a correction factor and takes the value of 0.96231; the more times of successful verification, the smaller the verification value, and the more times of verification failure of the user;
s3: when the verification value YZ is larger than a set threshold value, the calculation module generates a stop instruction and sends the stop instruction to the position authentication module; the position authentication module receives the stop instruction and stops sending the acquisition instruction to the password conversion module; through the limitation of the verification of times, the wireless router is prevented from being cracked by the conventional cracking software in wireless times of attempts;
and the counting module is used for counting the current online users successfully authenticated by the wireless router, sending the current online users to the user terminal corresponding to the preset IP address, and displaying the current connected users of the wireless router.
The working principle of the invention is as follows: the user terminal of the user sends position data and an IP address of the user terminal to the wireless router, a position authentication module in the wireless router carries out user position authentication, and when the position of the user terminal is located in the range of the specified internet access area, the position authentication module sends a collection instruction to a password conversion module of the user terminal; the password conversion module is used for receiving an input password sent by the password input module after receiving the acquisition instruction; the password conversion module converts the input password to obtain a superposed graph; the password authentication module receives the superposed graph and the comparison graph to be matched, and when the superposed graph and the comparison graph are completely matched, the authentication is successful; by means of pattern superposition encryption, the complexity of the password is improved, the existing wireless network cracking software is avoided, and cracking is realized through wireless times.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (3)

1. A WiFi safe login authentication system comprises a user terminal and a wireless router; the system is characterized in that the user terminal comprises a positioning module, a password input module and a password conversion module; the wireless router comprises a position authentication module, a storage module, a password authentication module, a data acquisition module, a calculation module and a statistic module;
the positioning module is used for acquiring the position data of the user terminal and the IP address of the user terminal; the positioning module sends the position data of the user terminal to the position authentication module; the position authentication module is used for authenticating the position of the user terminal, and the specific authentication steps are as follows:
step one; setting the position of the user terminal as Ai, wherein i is 1, … … and n;
step two: the position authentication module acquires a designated internet surfing area preset by a user and stored in the storage module;
step three: when the position Ai of the user terminal is in the range of the designated internet access area, the position authentication module sends an acquisition instruction to a password conversion module of the user terminal; when the position Ai of the user is outside the range of the designated internet access area, no operation is performed;
the password input module is used for inputting a password by a user and sending the password to the password conversion module; the password conversion module is used for receiving an input password sent by the password input module after receiving an acquisition instruction; the password conversion module converts the input password, and the specific conversion steps are as follows:
the method comprises the following steps: marking the password input by the user as Mi, i-1, … …, n; the input password is formed by sequencing and combining letters, numbers and symbols;
step two: setting a comparison password Ci, i being 1, … … and n; the comparison passwords are letters, numbers or symbols; each comparison password Ci corresponds to a conversion graph Di, i is 1, … … and n; converting the graphs Di into graphs with different sizes, wherein the graphs comprise squares, circles and triangles and central points inside the squares, the circles and the triangles;
step three: matching the input password Mi with the comparison password Ci to obtain a corresponding conversion graph Di;
step four: superposing the conversion graph Di according to the input password sequence to obtain a superposed graph; specifically, the input password is set to be D1 as a first password matching conversion graph and D2 as a second password matching conversion graph; the third password-matched conversion pattern is D3; placing the converted graph D1 at the bottom layer, then coinciding the center point of the converted graph D2 with the center point of the converted graph D1, and then coinciding the center point of the converted graph D3 with the center point of the converted graph D2;
step five: sending the superposed graph to a password authentication module;
the password authentication module receives the superposed graphs and compares the graphs, and the specific comparison process is as follows:
a: the password authentication module acquires a contrast graph preset by a user and stored in the storage module;
b: matching the superposed graph with the comparison graph, and when the superposed graph is completely matched with the comparison graph, successfully authenticating, and increasing the successful verification times by one; if not, the authentication fails, and meanwhile, the number of times of failure verification is increased by one;
c: and the password authentication module sends the successful verification times and the failed verification times to the storage module for storage.
2. The WiFi secure login authentication system of claim 1, wherein the positioning module sends an IP address of the user terminal to the storage module; the data acquisition module is used for storing the IP address, successful verification times and failed verification times of the user terminal stored in the module; the data acquisition module sends the acquired IP address of the user terminal, the successful verification times and the failed verification times to the calculation module; the calculation module is used for calculating the verification value of the user terminal, and the specific calculation steps are as follows:
s1: setting the successful verification times as P1 and the failed verification times as P2;
s2: using formulas
Figure FDA0003350871600000021
Obtaining a verification value YZ, wherein e1 and e2 are fixed values of preset proportionality coefficients, and lambda is a correction factor and takes the value of 0.96231;
s3: when the verification value YZ is larger than a set threshold value, the calculation module generates a stop instruction and sends the stop instruction to the position authentication module; and the position authentication module receives the stop instruction and stops sending the acquisition instruction to the password conversion module.
3. The WiFi secure login authentication system of claim 1, wherein the statistics module is configured to count current online users successfully authenticated by the wireless router, send the current online users to a user terminal corresponding to a preset IP address, and display current connected users of the wireless router.
CN201910762379.2A 2019-08-19 2019-08-19 WiFi safety login authentication system Expired - Fee Related CN110493778B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910762379.2A CN110493778B (en) 2019-08-19 2019-08-19 WiFi safety login authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910762379.2A CN110493778B (en) 2019-08-19 2019-08-19 WiFi safety login authentication system

Publications (2)

Publication Number Publication Date
CN110493778A CN110493778A (en) 2019-11-22
CN110493778B true CN110493778B (en) 2022-03-22

Family

ID=68552061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910762379.2A Expired - Fee Related CN110493778B (en) 2019-08-19 2019-08-19 WiFi safety login authentication system

Country Status (1)

Country Link
CN (1) CN110493778B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865962B (en) * 2020-07-16 2022-04-08 国网山东省电力公司青岛供电公司 WiFi (Wireless Fidelity) secure login authentication system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450604A (en) * 2014-08-25 2016-03-30 苏宁云商集团股份有限公司 Safe verifying method and device based on graphic feature
CN105787323A (en) * 2016-02-16 2016-07-20 广东欧珀移动通信有限公司 Safety protection method for WiFi hotspot and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10055926B2 (en) * 2016-09-09 2018-08-21 Tyco Integrated Security, LLC Architecture for access management

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450604A (en) * 2014-08-25 2016-03-30 苏宁云商集团股份有限公司 Safe verifying method and device based on graphic feature
CN105787323A (en) * 2016-02-16 2016-07-20 广东欧珀移动通信有限公司 Safety protection method for WiFi hotspot and mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WiFi无线网络的安全与防范措施探讨;谭悦平;《信息与电脑(理论版)》;20180515(第2018(09)期);192-196 *

Also Published As

Publication number Publication date
CN110493778A (en) 2019-11-22

Similar Documents

Publication Publication Date Title
TWI705349B (en) Terminal authentication processing, authentication method, device and system
CN107493280B (en) User authentication method, intelligent gateway and authentication server
US20230328516A1 (en) Device based credentials
ES2607218T3 (en) Improvement of biometric identification and authentication
US11399018B2 (en) Network device proximity-based authentication
CN101772020B (en) Method and system for authentication processing, 3GPP authentication authorization accounting server and user device
DK2924944T3 (en) Presence authentication
CN101557406A (en) User terminal authentication method, device and system thereof
CN101616412A (en) The method of calibration of management frames in wireless local area and equipment
EP3179695B1 (en) Network authentication
US11317285B2 (en) Wireless network provisioning using a pre-shared key
CN104469736B (en) A kind of data processing method, server and terminal
WO2016188053A1 (en) Wireless network access method, device, and computer storage medium
CN105050086A (en) Method for terminal to log in Wifi hotspot
CN104869121B (en) A kind of authentication method and device based on 802.1x
CN105763536B (en) Network registration method and system based on dynamic graphic password
CN101132280A (en) WAPI certificate identification method
CN105515781A (en) Login system of application platform and login method thereof
CN110493778B (en) WiFi safety login authentication system
CN103428698B (en) Mobile interchange participant's identity strong authentication method
CN202206419U (en) Network security terminal and interactive system based on terminal
CN109495500A (en) A kind of double factor authentication method based on smart phone
Sun et al. A lightweight multi-factor mobile user authentication scheme
CN106162644A (en) A kind of WiFi system preventing camouflage equipment and safe verification method thereof
CN101765110A (en) Dedicated encryption protection method between user and wireless access point

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220322