CN105991559B - A kind of user security login method based on image encryption technology - Google Patents
A kind of user security login method based on image encryption technology Download PDFInfo
- Publication number
- CN105991559B CN105991559B CN201510059780.1A CN201510059780A CN105991559B CN 105991559 B CN105991559 B CN 105991559B CN 201510059780 A CN201510059780 A CN 201510059780A CN 105991559 B CN105991559 B CN 105991559B
- Authority
- CN
- China
- Prior art keywords
- client
- picture
- user
- cryptographic secret
- control stream
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The present invention relates to a kind of user security login method based on image encryption technology, comprising the following steps: client carries out md5 encryption to user password and obtains cryptographic secret;User name is embedded in picture by client by STDM;Client generates control stream according to local random seed is stored in, and encrypted cryptographic secret is embedded in picture by STDM;Picture is sent to server end by client;Server end extracts user name from the picture received by STDM;Server end generates control stream according to local random seed is stored in, and extracts to obtain cryptographic secret from the picture received by STDM;Server end is verified to obtain cryptographic secret, is proved to be successful, and generates a new random seed and is sent to client together with information is verified, client updates random seed;It is on the contrary then prompt authentication failed.Compared with prior art, the present invention is to control stream ciphertext is embedded in picture using random seed, increases the safety of system on the basis of traditional STDM.
Description
Technical field
The present invention relates to information security fields, more particularly, to a kind of user security side of logging in based on image encryption technology
Method.
Background technique
As Internet technology develops rapidly, people's living standard is improved, quality enhancing, but also under cover huge behind
Security risk.As the important means of protection userspersonal information and property safety, authentication is that all kinds of websites and software must
Standby function is embodied in user at the beginning and logs in, if it is payment platform or involve pecuniary exchange also have more into
The certification of one step.Network develops to mobile direction in a word, and people's life is more and more convenient, while also exposing and much asking
Topic.Plaintext transmission when many famous Web sites and software vendor are disclosed in transmission user login information in succession, it is only a part of
Whether password can be carried out MD5 operation transmission by website, but again safe in MD5 MD5 simple after verifying not impact resistant.Seldom
Several families of number will use the Encryption Algorithm of TLS to the company that safety compares emphasis to encrypt, but it uses CBC block cipher mode
But occupied.At 2 months 2013, NadhemAlFardan and Kenny Paterson had found attacking for an entitled Luck13
Hit mode, the block cipher mode for the CBC mode that this attack pattern primary challenge SSL/TLS takes.Resistance can be passed through by attacking
The mode (for example deliberately breaking link by Malware, TLS can be retransmitted automatically) of disconnected TLS connection, allows sender to send repeatedly
Same encrypted content (such as ciphertext of cookie or password), TLS send the analysis of the time difference of error message, Luck13
Attack can crack ciphertext within a short period of time.Therefore, direct plaintext transmission or simple encryption cannot protect use well
Family information can simply intercept and capture user with packet capturing analysis and log in content.For as log-on message or payment verification
Important information transmission process combines the cloud graduallyd mature now, it is proposed that the method for oneself.
Summary of the invention
It is an object of the present invention to overcome the above-mentioned drawbacks of the prior art and provide one kind to be based on image encryption
The user security login method of technology.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of user security login method based on image encryption technology, which comprises the following steps:
(1) client carries out md5 encryption to the modification logging of user and obtains cryptographic secret;
(2) user name is embedded in picture by client by the digital watermark method modulated based on expanding and transforming jitter;
(3) client generates control stream with local random seed is stored in, and become based on extension by the control stream
Cryptographic secret is embedded in picture by the digital watermark method for changing jitter modulation;
(4) picture is sent to server end by client;
(5) server end is extracted from the picture received by the digital watermark method modulated based on expanding and transforming jitter
User name out;
(6) server end generates control stream with local random seed is stored in, and is carried out by the control stream based on extension
The digital watermark method of transformation jitter modulation extracts cryptographic secret from the picture received;
(7) cryptographic secret that server end is extracted in verification step (6) with local cryptographic secret is stored in, if testing
It demonstrate,proves successfully, then generates a new random seed, and be sent to client together with information is verified, client updates random
Seed, client completion log in;On the contrary then prompt authentication failed, client logs in failure.
Client gives birth to the modification logging of user in conjunction with the software fingerprinting of the logged in software of the user in the step (1)
After being directed to the modification logging of the software at user, then carry out md5 encryption.
The local zone time when random seed is the success of server authentication user password ciphertext.
The client is converted to username and password ciphertext after 128 0-1 bit streams by trembling based on transform expansion
In the digital watermark method insertion picture of dynamic modulation.
Client is embedding by the digital watermark method modulated based on expanding and transforming jitter by user name in the step (2)
Enter in picture specifically:
(201) the very coloured silk BMP picture of 24 of one 256 × 256 pixel of client generation;
(202) dct transform that 8 × 8 are carried out to the picture generated in step (301), obtains 32 × 32 DCT coefficient squares
Battle array;
(203) number modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes
Word water mark method is embedded in 128 user names;
Client generates control stream with local random seed is stored in the step (3), is flowed by the control
Cryptographic secret is embedded in picture by row based on the digital watermark method that expanding and transforming jitter is modulated specifically:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed work for described
It is inputted for it, obtains one including at least 128 1 0-1 control stream;
(302) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes become based on extension according to following rule
Change the digital watermark method insertion cryptographic secret of jitter modulation:
(3021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (301), such as
Fruit is 1, then it is close that the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out is embedded in 1 password
Text does not do any operation to the matrix currently taken out if it is 0;(3022) judge whether 128 cryptographic secrets have fully embedded into
It completes, if YES then cryptographic secret insertion is completed, if it has not, returning to step (3021).
(303) 32 × 32 DCT coefficient matrixes are carried out with the inverse transformation of dct transform.
Server end is by the digital watermark method modulated based on expanding and transforming jitter from receiving in the step (5)
Picture in extract user name specifically:
(501) picture received is carried out 8 × 8 dct transform by server end, obtains 32 × 32 DCT coefficient matrixes;
(502) number modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes
Word water mark method extracts user name;
Server end generates control stream with local random seed is stored in the step (6), is flowed by the control
It carries out extracting cryptographic secret from the picture received based on the digital watermark method that expanding and transforming jitter is modulated specifically:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed work for described
It is inputted for it, obtains one including at least 128 1 0-1 control stream;
(602) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes become based on extension according to following rule
The digital watermark method for changing jitter modulation extracts cryptographic secret:
(6021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (601), such as
Fruit is 1, then it is close that the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 password
Text does not do any operation to the matrix currently taken out if it is 0;(6022) judge whether 128 cryptographic secrets all extract
It completes, is extracted if YES then completing ciphertext, if it has not, returning to step (6021).
Server end, which is stored in local cryptographic secret and is built-in, in the step (7) is stored in local picture
, specific cryptographic secret extracting method are as follows:
(701) server end will be stored in the dct transform of local picture progress 8 × 8, obtain 32 × 32 DCT coefficients
Matrix;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed work for described
It is inputted for it, obtains one including at least 128 1 0-1 control stream;
(703) 32 × 32 coefficient matrixes are carried out with the digital watermarking modulated based on expanding and transforming jitter according to following rule
Method extracts cryptographic secret:
(7031) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (702), such as
Fruit is 1, then it is close that the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 password
Text does not do any operation to the matrix currently taken out if it is 0;
(7032) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing ciphertext, if it has not,
Return to step (7031).
The length of the 0-1 control flow control stream is less than 896.
The client is mobile terminal or PC terminal.
It is communicated between the client and server by ssl protocol.
Compared with prior art, the invention has the following advantages that
1. utilizing Cipher Strength highest on the basis of traditional digital watermark method based on expanding and transforming jitter modulation
Pseudorandom number generator ANSI x9.17 generate pseudo random number as control stream, remaining based on expanding and transforming jitter modulate
Digital watermark method anti-interference height itself and inhibit host interference the advantages of on the basis of, further increase the safety of system
Property.
2. each software introduces software fingerprinting, unique software identification is generated.Be combineding with each other with original code, it is new close to generate
Code, accordingly even when multiple accounts use the same password, without worry, there are insecurity.It may be said that having combined safety
Property with and convenience.
3. being selected in communication process using the powerful calculating ability and storage capacity of cloud service instantly using picture as carrier
It is sent.In server end, the storage of data is carried out also with picture, is communicating and storing two links all to peace in this way
Full property has accomplished to be promoted.
Detailed description of the invention
The data flow diagram that Fig. 1 is communicated between client and server of the invention;
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.
Embodiment 1
Client: software of the user in PC inputs its username and password, and the end PC is stepped on according to user name and user's selection
The software of record, finds the corresponding software fingerprinting of the software and time seed in the local database, and by the original of user's input
Password encrypts in conjunction with software fingerprinting through md5, forms 16 cryptographic secrets, is further converted into the close of 128 0-1 bit streams
Code ciphertext.User name is equally filled into 128 0-1 bit streams.
For guarantee host image is sufficiently large can be by 256bit information (128 user names and 128 cryptographic secrets)
Insertion, we are using 24 of 256 × 256 true coloured silk bmp pictures.The dct transform that 8 × 8 are carried out to the picture of generation, obtain 32 ×
32 DCT coefficient matrixes;32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes modulated based on expanding and transforming jitter
Digital watermark method be embedded in 128 user names;
According to the time seed extracted from local data base, generated using the pseudo random number based on ANSI X9.17
Device obtains one including at least 128 1 0-1 control stream using time seed as its input.
Preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule
The digital watermark method of dynamic modulation is embedded in 128 cryptographic secrets, and specific rules are as follows:
(1) sequence takes out a matrix, and sequentially reads a data from gained control stream, if it is 1, to current
The digital watermark method that the matrix of taking-up modulated based on expanding and transforming jitter is embedded in 1 cryptographic secret, right if it is 0
The matrix currently taken out does not do any operation;
(2) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing cryptographic secret, if it has not,
Return to step (1).
After the insertion for completing username and password ciphertext, picture is sent to server end according to SSL mode by the end PC.
Server end: after carrying out 8 × 8 dct transform for the picture that server receives, 32 × 32 DCT systems are obtained
Matrix number carries out extracting user based on the digital watermark method that expanding and transforming jitter is modulated from wherein preceding 32 × 4 matrixes
Name;
The corresponding time seed of the user is extracted from database according to the user name extracted, using being based on
The pseudorandom number generator of ANSIX9.17 obtains the 0-1 for including at least 128 1 using the time seed as its input
Control stream;
Preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule
The digital watermark method of dynamic modulation extracts 128 cryptographic secrets:
(1) sequence takes out a matrix, and sequentially reads a data from gained control stream, if it is 1, to current
The digital watermark method that the matrix of taking-up modulated based on expanding and transforming jitter extracts 1 cryptographic secret, right if it is 0
The matrix currently taken out does not do any operation;
(2) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing cryptographic secret, if it has not,
Return to step (6021).
After extracting the cryptographic secret in the picture that the end PC is transmitted, server end also needs to take out the user locally saved
Cryptographic secret for verifying, in the present embodiment, server end, which is stored in local cryptographic secret and is also built-in, to be stored in
In local picture.
Therefore, server end will first be stored in the dct transform of local picture progress 8 × 8, obtain 32 × 32 DCT systems
Matrix number;
Using the pseudorandom number generator based on ANSI X9.17, to be stored in local random seed defeated as its using described
Enter, obtains one including at least 128 1 0-1 control stream;
According to following rule 32 × 32 coefficient matrixes are carried out with the digital watermark method modulated based on expanding and transforming jitter
Extract 128 cryptographic secrets:
(1) sequence takes out a matrix, and sequentially reads a data from gained control stream, if it is 1, to current
The digital watermark method that the matrix of taking-up modulated based on expanding and transforming jitter extracts 1 cryptographic secret, right if it is 0
The matrix currently taken out does not do any operation;
(2) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing cryptographic secret, if it has not,
Return to step (1).
After extracting the cryptographic secret locally saved, by two cryptographic secrets compared to pair.If be consistent, just sent out to client
It send License Info and updates the time seed in local data base, while also notice client is updated to the newly-generated time kind
Son.In addition, server end will also regenerate control stream with this newly-generated time seed, cryptographic secret is embedded in this again
Verifying work in ground picture, when being logged in for next user.
Embodiment 2
The present embodiment is substantially the same manner as Example 1, and unique difference is mobile phone terminal, hand in client in this present embodiment
Machine terminal is communicated by WLAN or mobile network with server end, and the trend that current network gradually tends to mobile is suitable for.
Claims (10)
1. a kind of user security login method based on image encryption technology, which comprises the following steps:
(1) client carries out md5 encryption to the modification logging of user and obtains cryptographic secret;
(2) user name is embedded in picture by client by the digital watermark method modulated based on expanding and transforming jitter;
(3) client generates control stream with local random seed is stored in, and tremble based on transform expansion by the control stream
Cryptographic secret is embedded in picture by the digital watermark method of dynamic modulation;
(4) picture is sent to server end by client;
(5) server end extracts use from the picture received by the digital watermark method modulated based on expanding and transforming jitter
Name in an account book;
(6) server end generates control stream with local random seed is stored in, and is carried out by the control stream based on transform expansion
The digital watermark method of jitter modulation extracts cryptographic secret from the picture received;
(7) cryptographic secret that server end is extracted in verification step (6) with local cryptographic secret is stored in, if verifying at
Function then generates a new random seed, and is sent to client together with information is verified, and client is updated with machine
Son, client completion log in;On the contrary then prompt authentication failed, client logs in failure;
The step (2) specifically:
(201) the very coloured silk BMP picture of 24 of one 256 × 256 pixel of client generation;
(202) dct transform that 8 × 8 are carried out to the picture generated in step (201), obtains 32 × 32 DCT coefficient matrixes;
(203) the digital water modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes
Impression method is embedded in 128 user names;
In the step (3) specifically:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed as it for described
Input obtains one including at least 128 1 0-1 control stream;
(302) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule
The digital watermark method of dynamic modulation is embedded in cryptographic secret;
(303) 32 × 32 DCT coefficient matrixes are carried out with the inverse transformation of dct transform;
The step (5) specifically:
(501) picture received is carried out 8 × 8 dct transform by server end, obtains 32 × 32 DCT coefficient matrixes;
(502) the digital water modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes
Impression method extracts user name;
The step (6) specifically:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed as it for described
Input obtains one including at least 128 1 0-1 control stream;
(602) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule
The digital watermark method of dynamic modulation extracts cryptographic secret.
2. a kind of user security login method based on image encryption technology according to claim 1, which is characterized in that institute
It states client in step (1) modification logging of user is generated into user in conjunction with the software fingerprinting of the logged in software of the user and be directed to
After the modification logging of the software, then carry out md5 encryption.
3. a kind of user security login method based on image encryption technology according to claim 1 or 2, feature exist
In the random seed is local zone time when server authentication user password ciphertext is successful.
4. a kind of user security login method based on image encryption technology according to claim 3, which is characterized in that institute
It states client and username and password ciphertext is converted to number after 128 0-1 bit streams by being modulated based on expanding and transforming jitter
Word water mark method is embedded in picture.
5. a kind of user security login method based on image encryption technology according to claim 4, which is characterized in that
The step (302) specifically:
(3021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (301), if it is
1, then the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out is embedded in 1 cryptographic secret, such as
Fruit is 0, then does not do any operation to the matrix currently taken out;
(3022) judge whether 128 cryptographic secrets have fully embedded into completion, if YES then cryptographic secret insertion is completed, if it has not,
Return to step (3021).
6. a kind of user security login method based on image encryption technology according to claim 5, which is characterized in that
The step (602) specifically:
(6021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (601), if it is
1, then the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 cryptographic secret, such as
Fruit is 0, then does not do any operation to the matrix currently taken out;
(6022) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing ciphertext, if it has not, returning to
Step (6021).
7. a kind of user security login method based on image encryption technology according to claim 6, which is characterized in that institute
It states server end in step (7) and is stored in local cryptographic secret and is built-in and be stored in local picture, it is specific close
Code ciphertext extracting method are as follows:
(701) server end will be stored in the dct transform of local picture progress 8 × 8, obtain 32 × 32 DCT coefficient matrixes;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed as it for described
Input obtains one including at least 128 1 0-1 control stream;
(703) 32 × 32 coefficient matrixes are carried out with the digital watermark method modulated based on expanding and transforming jitter according to following rule
Extract cryptographic secret:
(7031) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (702), if it is
1, then the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 cryptographic secret, such as
Fruit is 0, then does not do any operation to the matrix currently taken out;
(7032) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing ciphertext, if it has not, returning to
Step (7031).
8. a kind of user security login method based on image encryption technology according to claim 5 or 6 or 7, special
Sign is that the length of the 0-1 control flow control stream is less than 896.
9. a kind of user security login method based on image encryption technology according to claim 1, which is characterized in that
The client is mobile terminal or PC terminal.
10. a kind of any user security login method based on image encryption technology, feature according to claim 1
It is, is communicated between the client and server by ssl protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510059780.1A CN105991559B (en) | 2015-02-05 | 2015-02-05 | A kind of user security login method based on image encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510059780.1A CN105991559B (en) | 2015-02-05 | 2015-02-05 | A kind of user security login method based on image encryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105991559A CN105991559A (en) | 2016-10-05 |
CN105991559B true CN105991559B (en) | 2019-03-01 |
Family
ID=57036104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510059780.1A Expired - Fee Related CN105991559B (en) | 2015-02-05 | 2015-02-05 | A kind of user security login method based on image encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105991559B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110691103A (en) * | 2019-11-07 | 2020-01-14 | 南京航空航天大学 | Mobile terminal login verification method |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106657068A (en) * | 2016-12-23 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Login authorization method and device, login method and device |
CN108537009B (en) * | 2017-03-03 | 2022-03-04 | 绍兴读图网络科技有限公司 | Method and system for downloading picture and verifying original edition |
CN107395629A (en) * | 2017-08-23 | 2017-11-24 | 周口师范学院 | A kind of computer network security registration and verification method |
CN109214163B (en) * | 2018-09-14 | 2021-08-20 | 北卡科技有限公司 | Identity authentication method and device |
CN115348017B (en) * | 2022-10-18 | 2023-02-07 | 阿里巴巴(中国)有限公司 | Ciphertext processing method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN102254298A (en) * | 2011-08-17 | 2011-11-23 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN103427979A (en) * | 2013-06-09 | 2013-12-04 | 浙江工业大学 | Internet picture transparent and safe transmission method based on chaotic encryption |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5206024B2 (en) * | 2008-02-28 | 2013-06-12 | 富士通株式会社 | Image decryption device, image encryption device, image decryption method, and image decryption program |
-
2015
- 2015-02-05 CN CN201510059780.1A patent/CN105991559B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101739657A (en) * | 2009-11-06 | 2010-06-16 | 上海第二工业大学 | DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method |
CN102254298A (en) * | 2011-08-17 | 2011-11-23 | 北京新媒传信科技有限公司 | Digital watermark encrypting/decrypting method and system |
CN103427979A (en) * | 2013-06-09 | 2013-12-04 | 浙江工业大学 | Internet picture transparent and safe transmission method based on chaotic encryption |
Non-Patent Citations (1)
Title |
---|
《Quantization Index Modulation: A Class of Provably》;Brian CHEN etal;《IEEE TRANSACTION ON INFORMATION THEORY》;20010531;全文 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110691103A (en) * | 2019-11-07 | 2020-01-14 | 南京航空航天大学 | Mobile terminal login verification method |
Also Published As
Publication number | Publication date |
---|---|
CN105991559A (en) | 2016-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105991559B (en) | A kind of user security login method based on image encryption technology | |
CN104469767B (en) | The implementation method of integrated form security protection subsystem in a set of mobile office system | |
CN105162772B (en) | A kind of internet of things equipment certifiede-mail protocol method and apparatus | |
CN104219228B (en) | A kind of user's registration, user identification method and system | |
CN103763356B (en) | A kind of SSL establishment of connection method, apparatus and system | |
CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
CN103428221B (en) | Safe login method, system and device to Mobile solution | |
CN106709963B (en) | The method and apparatus of the authentication image true and false | |
CN106330850A (en) | Biological characteristic-based security verification method, client and server | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
CN101662458A (en) | Authentication method | |
CN104468126B (en) | A kind of safe communication system and method | |
CN110611670A (en) | API request encryption method and device | |
CN107181770A (en) | Method of data synchronization and system | |
CN103327034A (en) | Safe login method, system and device | |
CZ2013373A3 (en) | Authentication method of safe data channel | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN105592056A (en) | Password safety system for mobile device and password safety input method thereof | |
CN104270346B (en) | The methods, devices and systems of two-way authentication | |
CN106302539A (en) | A kind of embedded type WEB safety certifying method | |
CN107835168A (en) | A kind of authentication method being multiplied based on client information sequence spreading matrix transposition | |
CN105071941A (en) | Method and device for identity authentication of nodes of distributed system | |
CN102571341B (en) | A kind of Verification System based on dynamic image and authentication method | |
CN100561913C (en) | A kind of method of access code equipment | |
CN116743470A (en) | Service data encryption processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190301 Termination date: 20220205 |
|
CF01 | Termination of patent right due to non-payment of annual fee |