CN103116717A - User login method and system - Google Patents

User login method and system Download PDF

Info

Publication number
CN103116717A
CN103116717A CN 201310030971 CN201310030971A CN103116717A CN 103116717 A CN103116717 A CN 103116717A CN 201310030971 CN201310030971 CN 201310030971 CN 201310030971 A CN201310030971 A CN 201310030971A CN 103116717 A CN103116717 A CN 103116717A
Authority
CN
China
Prior art keywords
user
login
watermark
information
private information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201310030971
Other languages
Chinese (zh)
Other versions
CN103116717B (en
Inventor
戚玉顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201310030971.6A priority Critical patent/CN103116717B/en
Publication of CN103116717A publication Critical patent/CN103116717A/en
Application granted granted Critical
Publication of CN103116717B publication Critical patent/CN103116717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention is suitable for the communication field, and provides a user login method. The method comprises: a user login interface is displayed, wherein the user login interface comprises an image which is embedded with a watermark, and the watermark carries private information of user login; an instruction that a user triggers the user login interface is received; watermark information inside the image of the user login interface, and the private information of the user login is obtained from the watermark information; and login is conducted according to the private information of the user login, wherein the private information is obtained from the watermark information. According to the user login method and a system, the user login can be achieved rapidly and accurately, and the private information can be stored safely.

Description

A kind of user login method and system
Technical field
The invention belongs to the communications field, relate in particular to a kind of user login method and system.
Background technology
The user login method of prior art, such as login after start login, touch-screen standby wakeup, application software login etc. is all by manually inputting account and password at login interface, being verified rear successfully login.
Therefore there is following shortcoming in the user login method of prior art:
(1) user can expend time in the input process of account and password, and often because the input of the mistake of individual characters causes and need re-enter;
(2) nowadays almost each Internet user have a plurality of electronic account, for guaranteeing safety, between account, password is not identical, so the user often can obscure the password note, causes repeatedly inputting;
(3) large multi-user can select the document software storage passwords such as word, and privacy is bad, and the extraction of password is inconvenient with utilization.
Summary of the invention
The purpose of the embodiment of the present invention is to provide a kind of can realize fast, accurately that the user logins and user login method and the system of privacy information energy safe storage.
The embodiment of the present invention is achieved in that a kind of user login method, and described method comprises:
Show user's login interface, described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
Receive the user to the triggering command of described user's login interface;
Extract the watermark information in the image of described user's login interface, obtain the private information of user's login from described watermark information;
Login according to the private information of user's login of obtaining from described watermark information.
Another purpose of the embodiment of the present invention is to provide a kind of logging in system by user, and described system comprises:
The first display module is used for showing user's login interface that described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
The command reception module is used for receiving the user to the triggering command of described user's login interface;
Extraction module for the watermark information of the image that extracts described user's login interface, obtains the private information of user's login from described watermark information;
Login module is used for logining according to the private information of user's login of obtaining from described watermark information.
In embodiments of the present invention, comprise the image that has embedded watermark due to user's login interface, the private information of user's login has been carried in described watermark, after receiving the triggering command of user to described user's login interface, extract the watermark information in the image of described user's login interface, obtain the private information of user's login from described watermark information; Login according to the private information of user's login of obtaining from described watermark information.Therefore can realize that fast, accurately the user logins.In addition, because private information is embedded in image with watermark, have invisibility, reduced the probability that is cracked, have more disguise, make the privacy information can safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid meets the android theory.
Description of drawings
Fig. 1 is the process flow diagram of the user login method that provides of the embodiment of the present invention one.
Fig. 2 is the schematic diagram of user's login interface in the user login method that provides of the embodiment of the present invention one.
Fig. 3 is the schematic diagram of the image of subregion storage watermark in the user login method that provides of the embodiment of the present invention one.
Fig. 4 is the functional block diagram of the logging in system by user that provides of the embodiment of the present invention two.
Embodiment
In order to make purpose of the present invention, technical scheme and beneficial effect clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
For technical solutions according to the invention are described, describe below by specific embodiment.
Embodiment one:
See also Fig. 1, the user login method that the embodiment of the present invention one provides comprises the following steps:
Step S101, demonstration user login interface, described user's login interface comprises the image that has embedded watermark, the private information of user's login has been carried in described watermark; User's login interface can be as shown in Figure 2 the interface;
In the embodiment of the present invention one, the private information of described user login refers to that the private information of logging in system by user or application software, described private information comprise the private data information such as user's logon account information and secret configuration information etc.
Step S102, receive the user to the triggering command of described user's login interface;
Watermark information in the image of step S103, the described user's login interface of extraction obtains the private information of user's login from described watermark information;
The private information of user's login that step S104, basis are obtained from described watermark information is logined.
In the embodiment of the present invention one, further comprising the steps of before step S101:
Private information with user's login is embedded in image as watermark in advance.
The described in advance private information of user login being embedded in image as watermark specifically comprises the following steps:
Show that secret arranges the interface;
The selection of the image that the private information that reception is logined the user will embed;
Receive the private information of user's login of input;
The private information of user's login is embedded in described image as watermark.
In the embodiment of the present invention one, the described in advance private information of user login being embedded in image as watermark specifically also can comprise the following steps:
Show that secret arranges the interface;
The selection in the zone of the image that the private information that reception is logined the user will embed; For example shown in Figure 3, different zones is selected to store the private information of different accounts; For example zone 1 and 2 correspondences be watermark stores A district, zone 1,6 and 12 correspondences be watermark stores B district, zone 3 and 5 correspondences be watermark stores C district, the activation key when the regional array mode of selection is extracted as watermark information;
Receive the private information of user's login of input;
The private information of user login is embedded in described image in selected zone as watermark.
In the embodiment of the present invention one, step S102 specifically comprises the following steps:
Reception to the embedding in user's login interface the touch operation of image of watermark;
Judge the watermark that whether has embedded the private information that has carried user's login in the zone at touch operation place, and it is pre-conditioned to judge whether described touch operation satisfies, if embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, execution in step S103, otherwise return described reception to the embedding in user's login interface the step of touch operation of image of watermark.Wherein, pre-conditionedly comprise default touch gestures, touch time, touch path or zone and the parameter such as choose.
In the embodiment of the present invention one, step S103 is specially:
Watermark information is separated from described image;
Watermark information is converted to the private information of user's login.
In the embodiment of the present invention one, step S104 is specially:
Login according to the private data information in the private information of user's login of obtaining from described watermark information.
In the embodiment of the present invention one, further comprising the steps of after step S104:
System or application software operate and related system or application software are configured the private data information of having stored according to the secret configuration information.
In the embodiment of the present invention one, comprise the image that has embedded watermark due to user's login interface, the private information of user's login has been carried in described watermark, after the triggering command that receives user's login, extract the watermark information in described image, obtain the private information of user's login from described watermark information; Login according to the private information of user's login of obtaining from described watermark information.Therefore can realize that fast, accurately the user logins.In addition, because private information is embedded in image with watermark, have invisibility, reduced the probability that is cracked, have more disguise, make the privacy information can safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid meets the android theory.In addition, because the zones of different of image is selected to store the private information of different accounts, therefore multiple private information can be preserved, many account logins and the secret setting of system or application software can be used for.
Embodiment two:
See also Fig. 4, the logging in system by user that the embodiment of the present invention two provides comprises: the first display module 11, command reception module 12, extraction module 13 and login module 14.
The first display module 11 is used for showing user's login interface that described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark; User's login interface can be as shown in Figure 2 the interface;
In the embodiment of the present invention two, the private information of described user login refers to that the private information of logging in system by user or application software, described private information comprise the private data information such as user's logon account information and secret configuration information etc.
Command reception module 12 is used for receiving the user to the triggering command of described user's login interface;
Extraction module 13 for the watermark information of the image that extracts described user's login interface, obtains the private information of user's login from described watermark information;
Login module 14 is used for logining according to the private information of user's login of obtaining from described watermark information.
In the embodiment of the present invention two, described logging in system by user also comprises the watermark merge module, and the private information that is used in advance the user being logined is embedded into image as watermark.
Described watermark merge module specifically comprises:
The second display module is used for showing that secret arranges the interface;
The first receiver module, the image that the private information of the user being logined for reception will embed or the selection of image-region; For example shown in Figure 3, different zones is selected to store the private information of different accounts; For example zone 1 and 2 correspondences be watermark stores A district, zone 1,6 and 12 correspondences be watermark stores B district, zone 3 and 5 correspondences be watermark stores C district, the activation key when the regional array mode of selection is extracted as watermark information;
The second receiver module is for the private information of the user's login that receives input;
The first merge module is used for the private information of user's login is embedded into described image or image-region as watermark.
In the embodiment of the present invention two, command reception module 12 specifically comprises:
The 3rd receiver module be used for to have received to the embedding of user's login interface the touch operation of the image of watermark;
judge module, whether the zone that is used for judge the touch operation place has embedded the watermark of having carried the private information that the user logins, and it is pre-conditioned to judge whether described touch operation satisfies, if embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, by the watermark information in the described image of extraction module extraction, obtain the private information of user's login from described watermark information, otherwise received to the embedding in user's login interface the touch operation of the image of watermark by described the 3rd receiver module.Wherein, pre-conditionedly comprise default touch gestures, touch time, touch path or zone and the parameter such as choose.
In the embodiment of the present invention two, extraction module 13 specifically comprises:
Separation module is used for watermark information is separated from described image;
Modular converter is used for watermark information is converted to the private information that the user logins.
In the embodiment of the present invention two, the private data information the concrete private information that is used for logining according to the user who obtains from described watermark information of login module 14 is logined.
In the embodiment of the present invention two, described logging in system by user also comprises operation and configuration module, is used for system or application software and according to the secret configuration information, the private data information of having stored is operated and related system or application software are configured.
In the embodiment of the present invention two, comprise the image that has embedded watermark due to user's login interface, the private information of user's login has been carried in described watermark, after the triggering command that receives user's login, extract the watermark information in described image, obtain the private information of user's login from described watermark information; Login according to the private information of user's login of obtaining from described watermark information.Therefore can realize that fast, accurately the user logins.In addition, because private information is embedded in image with watermark, have invisibility, reduced the probability that is cracked, have more disguise, make the privacy information can safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid meets the android theory.In addition, because the zones of different of image is selected to store the private information of different accounts, therefore multiple private information can be preserved, many account logins and the secret setting of system or application software can be used for.
One of ordinary skill in the art will appreciate that all or part of step that realizes in above-described embodiment method is to come the relevant hardware of instruction to complete by program, described program can be stored in a computer read/write memory medium, described storage medium is as ROM/RAM, disk, CD etc.
The above is only preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a user login method, is characterized in that, described method comprises:
Show user's login interface, described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
Receive the user to the triggering command of described user's login interface;
Extract the watermark information in the image of described user's login interface, obtain the private information of user's login from described watermark information;
Login according to the private information of user's login of obtaining from described watermark information.
2. the method for claim 1, is characterized in that, described reception user specifically comprises the step of the triggering command of described user's login interface:
Reception to the embedding in described user's login interface the touch operation of image of watermark;
Judge the watermark that whether has embedded the private information that has carried user's login in the zone at touch operation place, and it is pre-conditioned to judge whether described touch operation satisfies;
If embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, carry out the watermark information in the image of the described user's login interface of described extraction, obtain the step of the private information of user's login from described watermark information.
3. the method for claim 1, is characterized in that, before described demonstration user login interface, described method also comprises:
Private information with user's login is embedded in image as watermark in advance;
The private information of described user's login refers to the private information of logging in system by user or application software.
4. method as claimed in claim 3, is characterized in that, the described private information of in advance user being logined is embedded in image as watermark and specifically comprises:
Show that secret arranges the interface;
The image that the private information that reception is logined the user will embed or the selection of image-region;
Receive the private information of user's login of input;
The private information of user's login is embedded in described image or image-region as watermark.
5. the method for claim 1, is characterized in that, after the private information of user's login that described basis is obtained from described watermark information was logined, described method also comprised:
System or application software operate and related system or application software are configured the private data information of having stored according to the secret configuration information.
6. a logging in system by user, is characterized in that, described system comprises:
The first display module is used for showing user's login interface that described user's login interface comprises the image that has embedded watermark, and the private information of user's login has been carried in described watermark;
The command reception module is used for receiving the user to the triggering command of described user's login interface;
Extraction module for the watermark information of the image that extracts described user's login interface, obtains the private information of user's login from described watermark information;
Login module is used for logining according to the private information of user's login of obtaining from described watermark information.
7. system as claimed in claim 6, is characterized in that, described command reception module specifically comprises:
The 3rd receiver module be used for to have received to the embedding of described user's login interface the touch operation of the image of watermark;
Whether judge module, the zone that is used for judge the touch operation place have embedded the watermark of having carried the private information that the user logins, and it is pre-conditioned to judge whether described touch operation satisfies; If embedded the watermark of the private information that has carried user's login in the zone at touch operation place, and described touch operation satisfies pre-conditioned, by the watermark information in the image of the described user's login interface of described extraction module extraction, obtain the private information of user's login from described watermark information.
8. system as claimed in claim 6, is characterized in that, described system also comprises the watermark merge module, and the private information that is used in advance the user being logined is embedded into image as watermark;
The private information of described user's login refers to the private information of logging in system by user or application software.
9. system as claimed in claim 8, is characterized in that, described watermark merge module specifically comprises:
The second display module is used for showing that secret arranges the interface;
The first receiver module, the image that the private information of the user being logined for reception will embed or the selection of image-region;
The second receiver module is for the private information of the user's login that receives input;
The first merge module is used for the private information of user's login is embedded into described image or image-region as watermark.
10. the system as claimed in claim 1, is characterized in that, described system also comprises:
Operation and configuration module are used for system or application software and according to the secret configuration information, the private data information of having stored are operated and related system or application software are configured.
CN201310030971.6A 2013-01-25 2013-01-25 A kind of user login method and system Active CN103116717B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310030971.6A CN103116717B (en) 2013-01-25 2013-01-25 A kind of user login method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310030971.6A CN103116717B (en) 2013-01-25 2013-01-25 A kind of user login method and system

Publications (2)

Publication Number Publication Date
CN103116717A true CN103116717A (en) 2013-05-22
CN103116717B CN103116717B (en) 2015-11-18

Family

ID=48415090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310030971.6A Active CN103116717B (en) 2013-01-25 2013-01-25 A kind of user login method and system

Country Status (1)

Country Link
CN (1) CN103116717B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103616998A (en) * 2013-11-15 2014-03-05 北京智谷睿拓技术服务有限公司 User information acquiring method and user information acquiring device
CN103631503A (en) * 2013-11-15 2014-03-12 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103678971A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 User information extracting method and device
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN105553655A (en) * 2016-01-02 2016-05-04 熊桂荣 Security control method for smart home
CN109388447A (en) * 2017-08-08 2019-02-26 深圳市腾讯计算机系统有限公司 A kind of interface is drawn and image processing method, device, terminal and server
WO2019085126A1 (en) * 2017-10-30 2019-05-09 平安科技(深圳)有限公司 Display method, device and apparatus for financial application interface, and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321066B (en) * 2008-05-20 2012-03-07 北京深思洛克软件技术股份有限公司 Information safety device for internetwork communication
CN102685076A (en) * 2011-03-16 2012-09-19 中国电信股份有限公司 Online information protection method and device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9877015B2 (en) 2013-11-15 2018-01-23 Beijing Zhigu Rui Tuo Tech Co., Ltd. User information extraction method and user information extraction apparatus
CN103631503A (en) * 2013-11-15 2014-03-12 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103678971A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 User information extracting method and device
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103616998A (en) * 2013-11-15 2014-03-05 北京智谷睿拓技术服务有限公司 User information acquiring method and user information acquiring device
WO2015070624A1 (en) * 2013-11-15 2015-05-21 Beijing Zhigu Rui Tuo Tech Co., Ltd Information interaction
WO2015070623A1 (en) * 2013-11-15 2015-05-21 Beijing Zhigu Rui Tuo Tech Co., Ltd Information interaction
WO2015070537A1 (en) * 2013-11-15 2015-05-21 北京智谷睿拓技术服务有限公司 User information extraction method and user information extraction apparatus
US20160073002A1 (en) * 2013-11-15 2016-03-10 Beijing Zhigu Rui Tuo Tech Co., Ltd User information acquisition method and user information acquisition apparatus
CN103678971B (en) * 2013-11-15 2019-05-07 北京智谷睿拓技术服务有限公司 User information extracting method and user information extraction element
CN103631503B (en) * 2013-11-15 2017-12-22 北京智谷睿拓技术服务有限公司 Information interacting method and information interactive device
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN105553655B (en) * 2016-01-02 2019-05-03 南京云设智能科技有限公司 Intelligent house security control method
CN105553655A (en) * 2016-01-02 2016-05-04 熊桂荣 Security control method for smart home
CN109388447A (en) * 2017-08-08 2019-02-26 深圳市腾讯计算机系统有限公司 A kind of interface is drawn and image processing method, device, terminal and server
CN109388447B (en) * 2017-08-08 2023-03-10 深圳市腾讯计算机系统有限公司 Interface drawing and image processing method and device, terminal and server
WO2019085126A1 (en) * 2017-10-30 2019-05-09 平安科技(深圳)有限公司 Display method, device and apparatus for financial application interface, and storage medium

Also Published As

Publication number Publication date
CN103116717B (en) 2015-11-18

Similar Documents

Publication Publication Date Title
CN103116717B (en) A kind of user login method and system
US20150113658A1 (en) Mobile device and method for protecting private information stored in mobile device
CN103118031A (en) Method and electronic device for logging in application account
CN102567680A (en) Unlocking method and device
CN103677644A (en) Unlocking method and system for smart mobile terminal
US20160150406A1 (en) User-authentication-based approval of a first device via communication with a second device
TWI525467B (en) Method and computer system for dynamically providing multi-dimensions based password/challenge authentication
CN107609914A (en) A kind of intelligent menu design method and system
CN103714301A (en) Password input method and device
CN104023332B (en) A kind of electric terminal and its SMS encryption, decryption method
CN102880303A (en) Dynamic password input method and device and gate control system
CN103384254A (en) Application account login method, server, client and system
CN104765528A (en) Display method and device of virtual keyboard
CN104598836A (en) Method and device for managing communication content on mobile terminal as well as mobile terminal
CN104820794A (en) Method and device for processing login data
US11282045B2 (en) Methods, devices, and systems for verifying digital tickets at a client
CN104794412A (en) Information input method and device and mobile terminal
CN104268460B (en) Password setting method and device and mobile terminal
CN104486488A (en) Rapid information entry method applied to mobile terminals
CN102830920A (en) Handheld equipment privacy protection method
CN105554750A (en) Transmission method of data frame, and terminal
CN107423585A (en) The concealed application method and system of a kind of application
CN104811304B (en) Identity verification method and device
CN104462043A (en) Quick self-help form filling system and quick self-help form filling method
CN104333563A (en) Method of information processing and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant