CN103116717B - A kind of user login method and system - Google Patents

A kind of user login method and system Download PDF

Info

Publication number
CN103116717B
CN103116717B CN201310030971.6A CN201310030971A CN103116717B CN 103116717 B CN103116717 B CN 103116717B CN 201310030971 A CN201310030971 A CN 201310030971A CN 103116717 B CN103116717 B CN 103116717B
Authority
CN
China
Prior art keywords
user
watermark
information
private information
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310030971.6A
Other languages
Chinese (zh)
Other versions
CN103116717A (en
Inventor
戚玉顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201310030971.6A priority Critical patent/CN103116717B/en
Publication of CN103116717A publication Critical patent/CN103116717A/en
Application granted granted Critical
Publication of CN103116717B publication Critical patent/CN103116717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention is applicable to the communications field, provides a kind of user login method, and described method comprises: display user login interface, and described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in; Receive user to the triggering command of described user's login interface; Extract the watermark information in the image of described user's login interface, from described watermark information, obtain the private information that user logs in; Log according to the private information that the user obtained from described watermark information logs in.The present invention fast, accurately can realize user and log in and privacy information energy safe storage.

Description

A kind of user login method and system
Technical field
The invention belongs to the communications field, particularly relate to a kind of user login method and system.
Background technology
The user login method of prior art, such as, after login of starting shooting, touch-screen standby wakeup, login, application software login etc., be all by manually inputting account and password at login interface, be verified rear Successful login.
Therefore there is following shortcoming in the user login method of prior art:
(1) user can expend time in the input process of account and password, and often because the mistake input of individual characters causes re-entering;
(2) nowadays almost each Internet user has multiple electronic account, and for guaranteeing safety, between account, password is not identical, and therefore user often can obscure password note, causes repeatedly inputting;
(3) Most users can select the document softwares such as word to store password, and privacy is bad, and the extraction of password is inconvenient with utilization.
Summary of the invention
The object of the embodiment of the present invention is that providing a kind of fast, accurately can realize user's login and the user login method of privacy information energy safe storage and system.
The embodiment of the present invention is achieved in that a kind of user login method, and described method comprises:
Display user login interface, described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in;
Receive user to the triggering command of described user's login interface;
Extract the watermark information in the image of described user's login interface, from described watermark information, obtain the private information that user logs in;
Log according to the private information that the user obtained from described watermark information logs in.
Another object of the embodiment of the present invention is to provide a kind of logging in system by user, and described system comprises:
First display module, for showing user's login interface, described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in;
Command reception module, for receiving the triggering command of user to described user's login interface;
Extraction module, for extracting the watermark information in the image of described user's login interface, obtains the private information that user logs in from described watermark information;
Login module, logs in for the private information logged according to the user obtained from described watermark information.
In embodiments of the present invention, because user's login interface comprises the image that embedded in watermark, described watermark carries the private information that user logs in, when receive user to the triggering command of described user's login interface after, extract the watermark information in the image of described user's login interface, from described watermark information, obtain the private information that user logs in; Log according to the private information that the user obtained from described watermark information logs in.Therefore fast, accurately can realize user to log in.In addition, due to private information with watermark embedment in image, there is invisibility, reduce the probability be cracked, have more disguise, make privacy information energy safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid, meet android theory.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the user login method that the embodiment of the present invention one provides.
Fig. 2 is the schematic diagram of user's login interface in the user login method that provides of the embodiment of the present invention one.
Fig. 3 is the schematic diagram that in the user login method that provides of the embodiment of the present invention one, subregion stores the image of watermark.
Fig. 4 is the functional block diagram of the logging in system by user that the embodiment of the present invention two provides.
Embodiment
In order to make object of the present invention, technical scheme and beneficial effect clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In order to technical solutions according to the invention are described, be described below by specific embodiment.
embodiment one:
Refer to Fig. 1, the user login method that the embodiment of the present invention one provides comprises the following steps:
Step S101, display user login interface, described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in; User's login interface can interface as shown in Figure 2;
In the embodiment of the present invention one, the private information that described user logs in refers to the private information of logging in system by user or application software, and described private information comprises private data information and the secret configuration informations etc. such as user's logon account information.
Step S102, reception user are to the triggering command of described user's login interface;
Step S103, the watermark information extracted in the image of described user's login interface, obtain the private information that user logs in from described watermark information;
The private information that the user that step S104, basis obtain from described watermark information logs in logs in.
In the embodiment of the present invention one, further comprising the steps of before step S101:
Private information user logged in advance is as watermark embedment in image.
Described in advance using user log in private information as watermark embedment to image in specifically comprise the following steps:
Display secret arranges interface;
Receive the selection to the image that the private information of user's login will embed;
The private information that the user receiving input logs in;
Private information user logged in is as watermark embedment in described image.
In the embodiment of the present invention one, described in advance using user log in private information as watermark embedment to image in specifically also can comprise the following steps:
Display secret arranges interface;
Receive the selection in the region to the image that the private information of user's login will embed; Such as shown in Fig. 3, different regional choice can store the private information of different account; Such as region 1 and 2 correspondence be watermark store A district, region 1,6 and 12 correspondence be watermark store B district, region 3 and 5 correspondence be watermark store C district, the activation key when array mode of selected zone is extracted as watermark information;
The private information that the user receiving input logs in;
In the region of the private information that user is logged in selected in as watermark embedment to described image.
In the embodiment of the present invention one, step S102 specifically comprises the following steps:
Receive the touch operation that embedded in the image of watermark in user's login interface;
Judge whether to embedded in the region at touch operation place the watermark carrying the private information that user logs in, and it is pre-conditioned to judge whether described touch operation meets, if embedded in the watermark carrying the private information that user logs in the region at touch operation place, and described touch operation meets pre-conditioned, then perform step S103, otherwise return described reception to the step that embedded in the touch operation of the image of watermark in user's login interface.Wherein, pre-conditionedly comprise default touch gestures, touch time, touch path or region and the parameter such as to choose.
In the embodiment of the present invention one, step S103 is specially:
Watermark information is separated from described image;
Watermark information is converted to the private information that user logs in.
In the embodiment of the present invention one, step S104 is specially:
Log according to the private data information in the private information that the user obtained from described watermark information logs in.
In the embodiment of the present invention one, further comprising the steps of after step S104:
System or application software operate according to secret configuration information the private data information stored and are configured related system or application software.
In the embodiment of the present invention one, because user's login interface comprises the image that embedded in watermark, described watermark carries the private information that user logs in, when after the triggering command receiving user's login, extract the watermark information in described image, from described watermark information, obtain the private information that user logs in; Log according to the private information that the user obtained from described watermark information logs in.Therefore fast, accurately can realize user to log in.In addition, due to private information with watermark embedment in image, there is invisibility, reduce the probability be cracked, have more disguise, make privacy information energy safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid, meet android theory.In addition, the zones of different due to image selects the private information that can store different account, therefore can preserve multiple private information, and the many Account Logon and the secret that may be used for system or application software are arranged.
embodiment two:
Refer to Fig. 4, the logging in system by user that the embodiment of the present invention two provides comprises: the first display module 11, command reception module 12, extraction module 13 and login module 14.
First display module 11, for showing user's login interface, described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in; User's login interface can interface as shown in Figure 2;
In the embodiment of the present invention two, the private information that described user logs in refers to the private information of logging in system by user or application software, and described private information comprises private data information and the secret configuration informations etc. such as user's logon account information.
Command reception module 12, for receiving the triggering command of user to described user's login interface;
Extraction module 13, for extracting the watermark information in the image of described user's login interface, obtains the private information that user logs in from described watermark information;
Login module 14, logs in for the private information logged according to the user obtained from described watermark information.
In the embodiment of the present invention two, described logging in system by user also comprises watermark embedding module, in advance using user log in private information as watermark embedment in image.
Described watermark embedding module specifically comprises:
Second display module, arranges interface for showing secret;
First receiver module, for receiving the selection of the private information image that will embed or the image-region logged in user; Such as shown in Fig. 3, different regional choice can store the private information of different account; Such as region 1 and 2 correspondence be watermark store A district, region 1,6 and 12 correspondence be watermark store B district, region 3 and 5 correspondence be watermark store C district, the activation key when array mode of selected zone is extracted as watermark information;
Second receiver module, the private information that the user for receiving input logs in;
First merge module, for the private information that user logged in as watermark embedment in described image or image-region.
In the embodiment of the present invention two, command reception module 12 specifically comprises:
3rd receiver module, for receiving the touch operation that embedded in the image of watermark in user's login interface;
Judge module, for judge touch operation place region in whether embedded in the watermark carrying the private information that user logs in, and it is pre-conditioned to judge whether described touch operation meets, if embedded in the watermark carrying the private information that user logs in the region at touch operation place, and described touch operation meets pre-conditioned, then extract the watermark information in described image by extraction module, the private information that user logs in is obtained from described watermark information, otherwise received the touch operation that embedded in the image of watermark in user's login interface by described 3rd receiver module.Wherein, pre-conditionedly comprise default touch gestures, touch time, touch path or region and the parameter such as to choose.
In the embodiment of the present invention two, extraction module 13 specifically comprises:
Separation module, for being separated watermark information from described image;
Modular converter, for being converted to the private information that user logs in by watermark information.
In the embodiment of the present invention two, login module 14 is specifically for logging according to the private data information in the private information of the user's login obtained from described watermark information.
In the embodiment of the present invention two, described logging in system by user also comprises operation and configuration module, operates and is configured related system or application software the private data information stored for system or application software according to secret configuration information.
In the embodiment of the present invention two, because user's login interface comprises the image that embedded in watermark, described watermark carries the private information that user logs in, when after the triggering command receiving user's login, extract the watermark information in described image, from described watermark information, obtain the private information that user logs in; Log according to the private information that the user obtained from described watermark information logs in.Therefore fast, accurately can realize user to log in.In addition, due to private information with watermark embedment in image, there is invisibility, reduce the probability be cracked, have more disguise, make privacy information energy safe storage; And make private information have portability, only need carry out image transmitting, can realize transplanting private information between different machines; Image conversion simple operation in addition, directly perceived, vivid, meet android theory.In addition, the zones of different due to image selects the private information that can store different account, therefore can preserve multiple private information, and the many Account Logon and the secret that may be used for system or application software are arranged.
One of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is that the hardware that can carry out instruction relevant by program has come, described program can be stored in a computer read/write memory medium, described storage medium, as ROM/RAM, disk, CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. a user login method, is characterized in that, described method comprises:
Display user login interface, described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in;
Receive user to the triggering command of described user's login interface;
Extract the watermark information in the image of described user's login interface, from described watermark information, obtain the private information that user logs in;
Log according to the private information that the user obtained from described watermark information logs in;
The step of described reception user to the triggering command of described user's login interface specifically comprises:
Receive the touch operation that embedded in the image of watermark in described user's login interface;
Judge whether to embedded in the region at touch operation place the watermark carrying the private information that user logs in, and it is pre-conditioned to judge whether described touch operation meets;
If embedded in the watermark carrying the private information that user logs in the region at touch operation place, and described touch operation meets pre-conditioned, then perform the watermark information in the image of the described user's login interface of described extraction, from described watermark information, obtain the step of the private information that user logs in.
2. the method for claim 1, is characterized in that, before described display user login interface, described method also comprises:
Private information user logged in advance is as watermark embedment in image;
The private information that described user logs in refers to the private information of logging in system by user or application software.
3. method as claimed in claim 2, is characterized in that, the described private information in advance user logged in as watermark embedment to image in specifically comprise:
Display secret arranges interface;
The selection of the image that the private information that reception logs in user will embed or image-region;
The private information that the user receiving input logs in;
Private information user logged in is as watermark embedment in described image or image-region.
4. the method for claim 1, is characterized in that, after the private information that the user that described basis obtains from described watermark information logs in logs in, described method also comprises:
System or application software operate according to secret configuration information the private data information stored and are configured related system or application software.
5. a logging in system by user, is characterized in that, described system comprises:
First display module, for showing user's login interface, described user's login interface comprises the image that embedded in watermark, and described watermark carries the private information that user logs in;
Command reception module, for receiving the triggering command of user to described user's login interface;
Extraction module, for extracting the watermark information in the image of described user's login interface, obtains the private information that user logs in from described watermark information;
Login module, logs in for the private information logged according to the user obtained from described watermark information;
Described command reception module specifically comprises:
3rd receiver module, for receiving the touch operation that embedded in the image of watermark in described user's login interface;
Judge module, for judge touch operation place region in whether embedded in the watermark carrying the private information that user logs in, and it is pre-conditioned to judge whether described touch operation meets; If embedded in the watermark carrying the private information that user logs in the region at touch operation place, and described touch operation meets pre-conditioned, then extracted the watermark information in the image of described user's login interface by described extraction module, from described watermark information, obtain the private information that user logs in.
6. system as claimed in claim 5, it is characterized in that, described system also comprises watermark embedding module, for the private information that user logged in advance as watermark embedment in image;
The private information that described user logs in refers to the private information of logging in system by user or application software.
7. system as claimed in claim 6, it is characterized in that, described watermark embedding module specifically comprises:
Second display module, arranges interface for showing secret;
First receiver module, for receiving the selection of the private information image that will embed or the image-region logged in user;
Second receiver module, the private information that the user for receiving input logs in;
First merge module, for the private information that user logged in as watermark embedment in described image or image-region.
8. system as claimed in claim 6, it is characterized in that, described system also comprises:
Operation and configuration module, operate and be configured related system or application software according to secret configuration information to the private data information stored for system or application software.
CN201310030971.6A 2013-01-25 2013-01-25 A kind of user login method and system Active CN103116717B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310030971.6A CN103116717B (en) 2013-01-25 2013-01-25 A kind of user login method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310030971.6A CN103116717B (en) 2013-01-25 2013-01-25 A kind of user login method and system

Publications (2)

Publication Number Publication Date
CN103116717A CN103116717A (en) 2013-05-22
CN103116717B true CN103116717B (en) 2015-11-18

Family

ID=48415090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310030971.6A Active CN103116717B (en) 2013-01-25 2013-01-25 A kind of user login method and system

Country Status (1)

Country Link
CN (1) CN103116717B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838588B2 (en) * 2013-11-15 2017-12-05 Beijing Zhigu Rui Tuo Tech Co., Ltd. User information acquisition method and user information acquisition apparatus

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678971B (en) * 2013-11-15 2019-05-07 北京智谷睿拓技术服务有限公司 User information extracting method and user information extraction element
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103631503B (en) * 2013-11-15 2017-12-22 北京智谷睿拓技术服务有限公司 Information interacting method and information interactive device
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN105553655B (en) * 2016-01-02 2019-05-03 南京云设智能科技有限公司 Intelligent house security control method
CN109388447B (en) * 2017-08-08 2023-03-10 深圳市腾讯计算机系统有限公司 Interface drawing and image processing method and device, terminal and server
CN107784207B (en) * 2017-10-30 2019-12-10 平安科技(深圳)有限公司 Display method, device and equipment of financial APP interface and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321066A (en) * 2008-05-20 2008-12-10 北京深思洛克数据保护中心 Information safety device for internetwork communication
CN102685076A (en) * 2011-03-16 2012-09-19 中国电信股份有限公司 Online information protection method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321066A (en) * 2008-05-20 2008-12-10 北京深思洛克数据保护中心 Information safety device for internetwork communication
CN102685076A (en) * 2011-03-16 2012-09-19 中国电信股份有限公司 Online information protection method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838588B2 (en) * 2013-11-15 2017-12-05 Beijing Zhigu Rui Tuo Tech Co., Ltd. User information acquisition method and user information acquisition apparatus

Also Published As

Publication number Publication date
CN103116717A (en) 2013-05-22

Similar Documents

Publication Publication Date Title
CN103116717B (en) A kind of user login method and system
US9716531B2 (en) Near field communication-based data transmission method and apparatus, and near field communication device
US9652704B2 (en) Method of providing content transmission service by using printed matter
CN104636924B (en) Secure payment method, server and system
US20150113658A1 (en) Mobile device and method for protecting private information stored in mobile device
CN104023332B (en) A kind of electric terminal and its SMS encryption, decryption method
TWI525467B (en) Method and computer system for dynamically providing multi-dimensions based password/challenge authentication
CN103384254A (en) Application account login method, server, client and system
CN105574418A (en) Data encryption method and apparatus
CN107615294A (en) A kind of identifying code short message display method and mobile terminal
CN104598836A (en) Method and device for managing communication content on mobile terminal as well as mobile terminal
CN103942121A (en) Data recovery system and mobile terminal
CN104820794A (en) Method and device for processing login data
CN101583204B (en) Method and system for realizing managing universal combined circuit card multiple application files
CN104486488A (en) Rapid information entry method applied to mobile terminals
CN104811304B (en) Identity verification method and device
CN104333563A (en) Method of information processing and electronic equipment
US9722994B2 (en) User terminal for password-based authentication, and password-based trading terminal, system, and method
KR101769562B1 (en) Apparatus for providing captcha using touch screen and method thereof
EP3410332B1 (en) A system and method for transferring data to an authentication device
CN102945338A (en) Method and device for providing passwords
CN104123146A (en) Method for achieving hot switching between two systems
CN203206256U (en) A mobile storage device
CN201233601Y (en) File concealment system and apparatus based on USB equipment
CN103490874A (en) Safety information interaction system, method, device and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant