CN103116717A - User login method and system - Google Patents
User login method and system Download PDFInfo
- Publication number
- CN103116717A CN103116717A CN 201310030971 CN201310030971A CN103116717A CN 103116717 A CN103116717 A CN 103116717A CN 201310030971 CN201310030971 CN 201310030971 CN 201310030971 A CN201310030971 A CN 201310030971A CN 103116717 A CN103116717 A CN 103116717A
- Authority
- CN
- China
- Prior art keywords
- user
- login
- watermark
- information
- private information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention is suitable for the communication field, and provides a user login method. The method comprises: a user login interface is displayed, wherein the user login interface comprises an image which is embedded with a watermark, and the watermark carries private information of user login; an instruction that a user triggers the user login interface is received; watermark information inside the image of the user login interface, and the private information of the user login is obtained from the watermark information; and login is conducted according to the private information of the user login, wherein the private information is obtained from the watermark information. According to the user login method and a system, the user login can be achieved rapidly and accurately, and the private information can be stored safely.
Description
Technical field
The invention belongs to the communications field, relate in particular to a kind of user login method and system.
Background technology
The user login method of prior art, such as login after start login, touch-screen standby wakeup, application software login etc. is all by manually inputting account and password at login interface, being verified rear successfully login.
Therefore there is following shortcoming in the user login method of prior art:
(1) user can expend time in the input process of account and password, and often because the input of the mistake of individual characters causes and need re-enter;
(2) nowadays almost each Internet user have a plurality of electronic account, for guaranteeing safety, between account, password is not identical, so the user often can obscure the password note, causes repeatedly inputting;
(3) large multi-user can select the document software storage passwords such as word, and privacy is bad, and the extraction of password is inconvenient with utilization.
Summary of the invention
The purpose of the embodiment of the present invention is to provide a kind of can realize fast, accurately that the user logins and user login method and the system of privacy information energy safe storage.
The embodiment of the present invention is achieved in that a kind of user login method, and described method comprises:
Show user's login interface, described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
Receive the user to the triggering command of described user's login interface;
Extract the watermark information in the image of described user's login interface, obtain the private information of user's login from described watermark information;
Login according to the private information of user's login of obtaining from described watermark information.
Another purpose of the embodiment of the present invention is to provide a kind of logging in system by user, and described system comprises:
The first display module is used for showing user's login interface that described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
The command reception module is used for receiving the user to the triggering command of described user's login interface;
Extraction module for the watermark information of the image that extracts described user's login interface, obtains the private information of user's login from described watermark information;
Login module is used for logining according to the private information of user's login of obtaining from described watermark information.
In embodiments of the present invention, comprise the image that has embedded watermark due to user's login interface, the private information of user's login has been carried in described watermark, after receiving the triggering command of user to described user's login interface, extract the watermark information in the image of described user's login interface, obtain the private information of user's login from described watermark information; Login according to the private information of user's login of obtaining from described watermark information.Therefore can realize that fast, accurately the user logins.In addition, because private information is embedded in image with watermark, have invisibility, reduced the probability that is cracked, have more disguise, make the privacy information can safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid meets the android theory.
Description of drawings
Fig. 1 is the process flow diagram of the user login method that provides of the embodiment of the present invention one.
Fig. 2 is the schematic diagram of user's login interface in the user login method that provides of the embodiment of the present invention one.
Fig. 3 is the schematic diagram of the image of subregion storage watermark in the user login method that provides of the embodiment of the present invention one.
Fig. 4 is the functional block diagram of the logging in system by user that provides of the embodiment of the present invention two.
Embodiment
In order to make purpose of the present invention, technical scheme and beneficial effect clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
For technical solutions according to the invention are described, describe below by specific embodiment.
Embodiment one:
See also Fig. 1, the user login method that the embodiment of the present invention one provides comprises the following steps:
Step S101, demonstration user login interface, described user's login interface comprises the image that has embedded watermark, the private information of user's login has been carried in described watermark; User's login interface can be as shown in Figure 2 the interface;
In the embodiment of the present invention one, the private information of described user login refers to that the private information of logging in system by user or application software, described private information comprise the private data information such as user's logon account information and secret configuration information etc.
Step S102, receive the user to the triggering command of described user's login interface;
Watermark information in the image of step S103, the described user's login interface of extraction obtains the private information of user's login from described watermark information;
The private information of user's login that step S104, basis are obtained from described watermark information is logined.
In the embodiment of the present invention one, further comprising the steps of before step S101:
Private information with user's login is embedded in image as watermark in advance.
The described in advance private information of user login being embedded in image as watermark specifically comprises the following steps:
Show that secret arranges the interface;
The selection of the image that the private information that reception is logined the user will embed;
Receive the private information of user's login of input;
The private information of user's login is embedded in described image as watermark.
In the embodiment of the present invention one, the described in advance private information of user login being embedded in image as watermark specifically also can comprise the following steps:
Show that secret arranges the interface;
The selection in the zone of the image that the private information that reception is logined the user will embed; For example shown in Figure 3, different zones is selected to store the private information of different accounts; For example zone 1 and 2 correspondences be watermark stores A district, zone 1,6 and 12 correspondences be watermark stores B district, zone 3 and 5 correspondences be watermark stores C district, the activation key when the regional array mode of selection is extracted as watermark information;
Receive the private information of user's login of input;
The private information of user login is embedded in described image in selected zone as watermark.
In the embodiment of the present invention one, step S102 specifically comprises the following steps:
Reception to the embedding in user's login interface the touch operation of image of watermark;
Judge the watermark that whether has embedded the private information that has carried user's login in the zone at touch operation place, and it is pre-conditioned to judge whether described touch operation satisfies, if embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, execution in step S103, otherwise return described reception to the embedding in user's login interface the step of touch operation of image of watermark.Wherein, pre-conditionedly comprise default touch gestures, touch time, touch path or zone and the parameter such as choose.
In the embodiment of the present invention one, step S103 is specially:
Watermark information is separated from described image;
Watermark information is converted to the private information of user's login.
In the embodiment of the present invention one, step S104 is specially:
Login according to the private data information in the private information of user's login of obtaining from described watermark information.
In the embodiment of the present invention one, further comprising the steps of after step S104:
System or application software operate and related system or application software are configured the private data information of having stored according to the secret configuration information.
In the embodiment of the present invention one, comprise the image that has embedded watermark due to user's login interface, the private information of user's login has been carried in described watermark, after the triggering command that receives user's login, extract the watermark information in described image, obtain the private information of user's login from described watermark information; Login according to the private information of user's login of obtaining from described watermark information.Therefore can realize that fast, accurately the user logins.In addition, because private information is embedded in image with watermark, have invisibility, reduced the probability that is cracked, have more disguise, make the privacy information can safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid meets the android theory.In addition, because the zones of different of image is selected to store the private information of different accounts, therefore multiple private information can be preserved, many account logins and the secret setting of system or application software can be used for.
Embodiment two:
See also Fig. 4, the logging in system by user that the embodiment of the present invention two provides comprises: the first display module 11, command reception module 12, extraction module 13 and login module 14.
The first display module 11 is used for showing user's login interface that described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark; User's login interface can be as shown in Figure 2 the interface;
In the embodiment of the present invention two, the private information of described user login refers to that the private information of logging in system by user or application software, described private information comprise the private data information such as user's logon account information and secret configuration information etc.
In the embodiment of the present invention two, described logging in system by user also comprises the watermark merge module, and the private information that is used in advance the user being logined is embedded into image as watermark.
Described watermark merge module specifically comprises:
The second display module is used for showing that secret arranges the interface;
The first receiver module, the image that the private information of the user being logined for reception will embed or the selection of image-region; For example shown in Figure 3, different zones is selected to store the private information of different accounts; For example zone 1 and 2 correspondences be watermark stores A district, zone 1,6 and 12 correspondences be watermark stores B district, zone 3 and 5 correspondences be watermark stores C district, the activation key when the regional array mode of selection is extracted as watermark information;
The second receiver module is for the private information of the user's login that receives input;
The first merge module is used for the private information of user's login is embedded into described image or image-region as watermark.
In the embodiment of the present invention two, command reception module 12 specifically comprises:
The 3rd receiver module be used for to have received to the embedding of user's login interface the touch operation of the image of watermark;
judge module, whether the zone that is used for judge the touch operation place has embedded the watermark of having carried the private information that the user logins, and it is pre-conditioned to judge whether described touch operation satisfies, if embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, by the watermark information in the described image of extraction module extraction, obtain the private information of user's login from described watermark information, otherwise received to the embedding in user's login interface the touch operation of the image of watermark by described the 3rd receiver module.Wherein, pre-conditionedly comprise default touch gestures, touch time, touch path or zone and the parameter such as choose.
In the embodiment of the present invention two, extraction module 13 specifically comprises:
Separation module is used for watermark information is separated from described image;
Modular converter is used for watermark information is converted to the private information that the user logins.
In the embodiment of the present invention two, the private data information the concrete private information that is used for logining according to the user who obtains from described watermark information of login module 14 is logined.
In the embodiment of the present invention two, described logging in system by user also comprises operation and configuration module, is used for system or application software and according to the secret configuration information, the private data information of having stored is operated and related system or application software are configured.
In the embodiment of the present invention two, comprise the image that has embedded watermark due to user's login interface, the private information of user's login has been carried in described watermark, after the triggering command that receives user's login, extract the watermark information in described image, obtain the private information of user's login from described watermark information; Login according to the private information of user's login of obtaining from described watermark information.Therefore can realize that fast, accurately the user logins.In addition, because private information is embedded in image with watermark, have invisibility, reduced the probability that is cracked, have more disguise, make the privacy information can safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid meets the android theory.In addition, because the zones of different of image is selected to store the private information of different accounts, therefore multiple private information can be preserved, many account logins and the secret setting of system or application software can be used for.
One of ordinary skill in the art will appreciate that all or part of step that realizes in above-described embodiment method is to come the relevant hardware of instruction to complete by program, described program can be stored in a computer read/write memory medium, described storage medium is as ROM/RAM, disk, CD etc.
The above is only preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., within all should being included in protection scope of the present invention.
Claims (10)
1. a user login method, is characterized in that, described method comprises:
Show user's login interface, described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
Receive the user to the triggering command of described user's login interface;
Extract the watermark information in the image of described user's login interface, obtain the private information of user's login from described watermark information;
Login according to the private information of user's login of obtaining from described watermark information.
2. the method for claim 1, is characterized in that, described reception user specifically comprises the step of the triggering command of described user's login interface:
Reception to the embedding in described user's login interface the touch operation of image of watermark;
Judge the watermark that whether has embedded the private information that has carried user's login in the zone at touch operation place, and it is pre-conditioned to judge whether described touch operation satisfies;
If embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, carry out the watermark information in the image of the described user's login interface of described extraction, obtain the step of the private information of user's login from described watermark information.
3. the method for claim 1, is characterized in that, before described demonstration user login interface, described method also comprises:
Private information with user's login is embedded in image as watermark in advance;
The private information of described user's login refers to the private information of logging in system by user or application software.
4. method as claimed in claim 3, is characterized in that, the described private information of in advance user being logined is embedded in image as watermark and specifically comprises:
Show that secret arranges the interface;
The image that the private information that reception is logined the user will embed or the selection of image-region;
Receive the private information of user's login of input;
The private information of user's login is embedded in described image or image-region as watermark.
5. the method for claim 1, is characterized in that, after the private information of user's login that described basis is obtained from described watermark information was logined, described method also comprised:
System or application software operate and related system or application software are configured the private data information of having stored according to the secret configuration information.
6. a logging in system by user, is characterized in that, described system comprises:
The first display module is used for showing user's login interface that described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
The command reception module is used for receiving the user to the triggering command of described user's login interface;
Extraction module for the watermark information of the image that extracts described user's login interface, obtains the private information of user's login from described watermark information;
Login module is used for logining according to the private information of user's login of obtaining from described watermark information.
7. system as claimed in claim 6, is characterized in that, described command reception module specifically comprises:
The 3rd receiver module be used for to have received to the embedding of described user's login interface the touch operation of the image of watermark;
Whether judge module, the zone that is used for judge the touch operation place have embedded the watermark of having carried the private information that the user logins, and it is pre-conditioned to judge whether described touch operation satisfies; If embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, by the watermark information in the image of the described user's login interface of described extraction module extraction, obtain the private information of user's login from described watermark information.
8. system as claimed in claim 6, is characterized in that, described system also comprises the watermark merge module, and the private information that is used in advance the user being logined is embedded into image as watermark;
The private information of described user's login refers to the private information of logging in system by user or application software.
9. system as claimed in claim 8, is characterized in that, described watermark merge module specifically comprises:
The second display module is used for showing that secret arranges the interface;
The first receiver module, the image that the private information of the user being logined for reception will embed or the selection of image-region;
The second receiver module is for the private information of the user's login that receives input;
The first merge module is used for the private information of user's login is embedded into described image or image-region as watermark.
10. the system as claimed in claim 1, is characterized in that, described system also comprises:
Operation and configuration module are used for system or application software and according to the secret configuration information, the private data information of having stored are operated and related system or application software are configured.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310030971.6A CN103116717B (en) | 2013-01-25 | 2013-01-25 | A kind of user login method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310030971.6A CN103116717B (en) | 2013-01-25 | 2013-01-25 | A kind of user login method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103116717A true CN103116717A (en) | 2013-05-22 |
CN103116717B CN103116717B (en) | 2015-11-18 |
Family
ID=48415090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310030971.6A Active CN103116717B (en) | 2013-01-25 | 2013-01-25 | A kind of user login method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103116717B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103616998A (en) * | 2013-11-15 | 2014-03-05 | 北京智谷睿拓技术服务有限公司 | User information acquiring method and user information acquiring device |
CN103631503A (en) * | 2013-11-15 | 2014-03-12 | 北京智谷睿拓技术服务有限公司 | Information interaction method and information interaction device |
CN103678971A (en) * | 2013-11-15 | 2014-03-26 | 北京智谷睿拓技术服务有限公司 | User information extracting method and device |
CN103677631A (en) * | 2013-11-15 | 2014-03-26 | 北京智谷睿拓技术服务有限公司 | Information interaction method and information interaction device |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN105553655A (en) * | 2016-01-02 | 2016-05-04 | 熊桂荣 | Security control method for smart home |
CN109388447A (en) * | 2017-08-08 | 2019-02-26 | 深圳市腾讯计算机系统有限公司 | A kind of interface is drawn and image processing method, device, terminal and server |
WO2019085126A1 (en) * | 2017-10-30 | 2019-05-09 | 平安科技(深圳)有限公司 | Display method, device and apparatus for financial application interface, and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101321066B (en) * | 2008-05-20 | 2012-03-07 | 北京深思洛克软件技术股份有限公司 | Information safety device for internetwork communication |
CN102685076A (en) * | 2011-03-16 | 2012-09-19 | 中国电信股份有限公司 | Online information protection method and device |
-
2013
- 2013-01-25 CN CN201310030971.6A patent/CN103116717B/en active Active
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9877015B2 (en) | 2013-11-15 | 2018-01-23 | Beijing Zhigu Rui Tuo Tech Co., Ltd. | User information extraction method and user information extraction apparatus |
CN103631503A (en) * | 2013-11-15 | 2014-03-12 | 北京智谷睿拓技术服务有限公司 | Information interaction method and information interaction device |
CN103678971A (en) * | 2013-11-15 | 2014-03-26 | 北京智谷睿拓技术服务有限公司 | User information extracting method and device |
CN103677631A (en) * | 2013-11-15 | 2014-03-26 | 北京智谷睿拓技术服务有限公司 | Information interaction method and information interaction device |
CN103616998A (en) * | 2013-11-15 | 2014-03-05 | 北京智谷睿拓技术服务有限公司 | User information acquiring method and user information acquiring device |
WO2015070624A1 (en) * | 2013-11-15 | 2015-05-21 | Beijing Zhigu Rui Tuo Tech Co., Ltd | Information interaction |
WO2015070623A1 (en) * | 2013-11-15 | 2015-05-21 | Beijing Zhigu Rui Tuo Tech Co., Ltd | Information interaction |
WO2015070537A1 (en) * | 2013-11-15 | 2015-05-21 | 北京智谷睿拓技术服务有限公司 | User information extraction method and user information extraction apparatus |
US20160073002A1 (en) * | 2013-11-15 | 2016-03-10 | Beijing Zhigu Rui Tuo Tech Co., Ltd | User information acquisition method and user information acquisition apparatus |
CN103678971B (en) * | 2013-11-15 | 2019-05-07 | 北京智谷睿拓技术服务有限公司 | User information extracting method and user information extraction element |
CN103631503B (en) * | 2013-11-15 | 2017-12-22 | 北京智谷睿拓技术服务有限公司 | Information interacting method and information interactive device |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN105553655B (en) * | 2016-01-02 | 2019-05-03 | 南京云设智能科技有限公司 | Intelligent house security control method |
CN105553655A (en) * | 2016-01-02 | 2016-05-04 | 熊桂荣 | Security control method for smart home |
CN109388447A (en) * | 2017-08-08 | 2019-02-26 | 深圳市腾讯计算机系统有限公司 | A kind of interface is drawn and image processing method, device, terminal and server |
CN109388447B (en) * | 2017-08-08 | 2023-03-10 | 深圳市腾讯计算机系统有限公司 | Interface drawing and image processing method and device, terminal and server |
WO2019085126A1 (en) * | 2017-10-30 | 2019-05-09 | 平安科技(深圳)有限公司 | Display method, device and apparatus for financial application interface, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN103116717B (en) | 2015-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103116717B (en) | A kind of user login method and system | |
US20150113658A1 (en) | Mobile device and method for protecting private information stored in mobile device | |
CN103118031A (en) | Method and electronic device for logging in application account | |
CN102567680A (en) | Unlocking method and device | |
CN103677644A (en) | Unlocking method and system for smart mobile terminal | |
US20160150406A1 (en) | User-authentication-based approval of a first device via communication with a second device | |
TWI525467B (en) | Method and computer system for dynamically providing multi-dimensions based password/challenge authentication | |
CN107609914A (en) | A kind of intelligent menu design method and system | |
CN103714301A (en) | Password input method and device | |
CN104023332B (en) | A kind of electric terminal and its SMS encryption, decryption method | |
CN102880303A (en) | Dynamic password input method and device and gate control system | |
CN103384254A (en) | Application account login method, server, client and system | |
CN104765528A (en) | Display method and device of virtual keyboard | |
CN104598836A (en) | Method and device for managing communication content on mobile terminal as well as mobile terminal | |
CN104820794A (en) | Method and device for processing login data | |
US11282045B2 (en) | Methods, devices, and systems for verifying digital tickets at a client | |
CN104794412A (en) | Information input method and device and mobile terminal | |
CN104268460B (en) | Password setting method and device and mobile terminal | |
CN104486488A (en) | Rapid information entry method applied to mobile terminals | |
CN102830920A (en) | Handheld equipment privacy protection method | |
CN105554750A (en) | Transmission method of data frame, and terminal | |
CN107423585A (en) | The concealed application method and system of a kind of application | |
CN104811304B (en) | Identity verification method and device | |
CN104462043A (en) | Quick self-help form filling system and quick self-help form filling method | |
CN104333563A (en) | Method of information processing and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |