CN105991559B - A kind of user security login method based on image encryption technology - Google Patents

A kind of user security login method based on image encryption technology Download PDF

Info

Publication number
CN105991559B
CN105991559B CN201510059780.1A CN201510059780A CN105991559B CN 105991559 B CN105991559 B CN 105991559B CN 201510059780 A CN201510059780 A CN 201510059780A CN 105991559 B CN105991559 B CN 105991559B
Authority
CN
China
Prior art keywords
client
picture
user
cryptographic secret
control stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510059780.1A
Other languages
Chinese (zh)
Other versions
CN105991559A (en
Inventor
程久军
秦鹏宇
杨阳
张庆阳
胡刘飞
柳影波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tongji University
Original Assignee
Tongji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongji University filed Critical Tongji University
Priority to CN201510059780.1A priority Critical patent/CN105991559B/en
Publication of CN105991559A publication Critical patent/CN105991559A/en
Application granted granted Critical
Publication of CN105991559B publication Critical patent/CN105991559B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention relates to a kind of user security login method based on image encryption technology, comprising the following steps: client carries out md5 encryption to user password and obtains cryptographic secret;User name is embedded in picture by client by STDM;Client generates control stream according to local random seed is stored in, and encrypted cryptographic secret is embedded in picture by STDM;Picture is sent to server end by client;Server end extracts user name from the picture received by STDM;Server end generates control stream according to local random seed is stored in, and extracts to obtain cryptographic secret from the picture received by STDM;Server end is verified to obtain cryptographic secret, is proved to be successful, and generates a new random seed and is sent to client together with information is verified, client updates random seed;It is on the contrary then prompt authentication failed.Compared with prior art, the present invention is to control stream ciphertext is embedded in picture using random seed, increases the safety of system on the basis of traditional STDM.

Description

A kind of user security login method based on image encryption technology
Technical field
The present invention relates to information security fields, more particularly, to a kind of user security side of logging in based on image encryption technology Method.
Background technique
As Internet technology develops rapidly, people's living standard is improved, quality enhancing, but also under cover huge behind Security risk.As the important means of protection userspersonal information and property safety, authentication is that all kinds of websites and software must Standby function is embodied in user at the beginning and logs in, if it is payment platform or involve pecuniary exchange also have more into The certification of one step.Network develops to mobile direction in a word, and people's life is more and more convenient, while also exposing and much asking Topic.Plaintext transmission when many famous Web sites and software vendor are disclosed in transmission user login information in succession, it is only a part of Whether password can be carried out MD5 operation transmission by website, but again safe in MD5 MD5 simple after verifying not impact resistant.Seldom Several families of number will use the Encryption Algorithm of TLS to the company that safety compares emphasis to encrypt, but it uses CBC block cipher mode But occupied.At 2 months 2013, NadhemAlFardan and Kenny Paterson had found attacking for an entitled Luck13 Hit mode, the block cipher mode for the CBC mode that this attack pattern primary challenge SSL/TLS takes.Resistance can be passed through by attacking The mode (for example deliberately breaking link by Malware, TLS can be retransmitted automatically) of disconnected TLS connection, allows sender to send repeatedly Same encrypted content (such as ciphertext of cookie or password), TLS send the analysis of the time difference of error message, Luck13 Attack can crack ciphertext within a short period of time.Therefore, direct plaintext transmission or simple encryption cannot protect use well Family information can simply intercept and capture user with packet capturing analysis and log in content.For as log-on message or payment verification Important information transmission process combines the cloud graduallyd mature now, it is proposed that the method for oneself.
Summary of the invention
It is an object of the present invention to overcome the above-mentioned drawbacks of the prior art and provide one kind to be based on image encryption The user security login method of technology.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of user security login method based on image encryption technology, which comprises the following steps:
(1) client carries out md5 encryption to the modification logging of user and obtains cryptographic secret;
(2) user name is embedded in picture by client by the digital watermark method modulated based on expanding and transforming jitter;
(3) client generates control stream with local random seed is stored in, and become based on extension by the control stream Cryptographic secret is embedded in picture by the digital watermark method for changing jitter modulation;
(4) picture is sent to server end by client;
(5) server end is extracted from the picture received by the digital watermark method modulated based on expanding and transforming jitter User name out;
(6) server end generates control stream with local random seed is stored in, and is carried out by the control stream based on extension The digital watermark method of transformation jitter modulation extracts cryptographic secret from the picture received;
(7) cryptographic secret that server end is extracted in verification step (6) with local cryptographic secret is stored in, if testing It demonstrate,proves successfully, then generates a new random seed, and be sent to client together with information is verified, client updates random Seed, client completion log in;On the contrary then prompt authentication failed, client logs in failure.
Client gives birth to the modification logging of user in conjunction with the software fingerprinting of the logged in software of the user in the step (1) After being directed to the modification logging of the software at user, then carry out md5 encryption.
The local zone time when random seed is the success of server authentication user password ciphertext.
The client is converted to username and password ciphertext after 128 0-1 bit streams by trembling based on transform expansion In the digital watermark method insertion picture of dynamic modulation.
Client is embedding by the digital watermark method modulated based on expanding and transforming jitter by user name in the step (2) Enter in picture specifically:
(201) the very coloured silk BMP picture of 24 of one 256 × 256 pixel of client generation;
(202) dct transform that 8 × 8 are carried out to the picture generated in step (301), obtains 32 × 32 DCT coefficient squares Battle array;
(203) number modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes Word water mark method is embedded in 128 user names;
Client generates control stream with local random seed is stored in the step (3), is flowed by the control Cryptographic secret is embedded in picture by row based on the digital watermark method that expanding and transforming jitter is modulated specifically:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed work for described It is inputted for it, obtains one including at least 128 1 0-1 control stream;
(302) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes become based on extension according to following rule Change the digital watermark method insertion cryptographic secret of jitter modulation:
(3021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (301), such as Fruit is 1, then it is close that the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out is embedded in 1 password Text does not do any operation to the matrix currently taken out if it is 0;(3022) judge whether 128 cryptographic secrets have fully embedded into It completes, if YES then cryptographic secret insertion is completed, if it has not, returning to step (3021).
(303) 32 × 32 DCT coefficient matrixes are carried out with the inverse transformation of dct transform.
Server end is by the digital watermark method modulated based on expanding and transforming jitter from receiving in the step (5) Picture in extract user name specifically:
(501) picture received is carried out 8 × 8 dct transform by server end, obtains 32 × 32 DCT coefficient matrixes;
(502) number modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes Word water mark method extracts user name;
Server end generates control stream with local random seed is stored in the step (6), is flowed by the control It carries out extracting cryptographic secret from the picture received based on the digital watermark method that expanding and transforming jitter is modulated specifically:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed work for described It is inputted for it, obtains one including at least 128 1 0-1 control stream;
(602) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes become based on extension according to following rule The digital watermark method for changing jitter modulation extracts cryptographic secret:
(6021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (601), such as Fruit is 1, then it is close that the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 password Text does not do any operation to the matrix currently taken out if it is 0;(6022) judge whether 128 cryptographic secrets all extract It completes, is extracted if YES then completing ciphertext, if it has not, returning to step (6021).
Server end, which is stored in local cryptographic secret and is built-in, in the step (7) is stored in local picture , specific cryptographic secret extracting method are as follows:
(701) server end will be stored in the dct transform of local picture progress 8 × 8, obtain 32 × 32 DCT coefficients Matrix;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed work for described It is inputted for it, obtains one including at least 128 1 0-1 control stream;
(703) 32 × 32 coefficient matrixes are carried out with the digital watermarking modulated based on expanding and transforming jitter according to following rule Method extracts cryptographic secret:
(7031) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (702), such as Fruit is 1, then it is close that the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 password Text does not do any operation to the matrix currently taken out if it is 0;
(7032) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing ciphertext, if it has not, Return to step (7031).
The length of the 0-1 control flow control stream is less than 896.
The client is mobile terminal or PC terminal.
It is communicated between the client and server by ssl protocol.
Compared with prior art, the invention has the following advantages that
1. utilizing Cipher Strength highest on the basis of traditional digital watermark method based on expanding and transforming jitter modulation Pseudorandom number generator ANSI x9.17 generate pseudo random number as control stream, remaining based on expanding and transforming jitter modulate Digital watermark method anti-interference height itself and inhibit host interference the advantages of on the basis of, further increase the safety of system Property.
2. each software introduces software fingerprinting, unique software identification is generated.Be combineding with each other with original code, it is new close to generate Code, accordingly even when multiple accounts use the same password, without worry, there are insecurity.It may be said that having combined safety Property with and convenience.
3. being selected in communication process using the powerful calculating ability and storage capacity of cloud service instantly using picture as carrier It is sent.In server end, the storage of data is carried out also with picture, is communicating and storing two links all to peace in this way Full property has accomplished to be promoted.
Detailed description of the invention
The data flow diagram that Fig. 1 is communicated between client and server of the invention;
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.
Embodiment 1
Client: software of the user in PC inputs its username and password, and the end PC is stepped on according to user name and user's selection The software of record, finds the corresponding software fingerprinting of the software and time seed in the local database, and by the original of user's input Password encrypts in conjunction with software fingerprinting through md5, forms 16 cryptographic secrets, is further converted into the close of 128 0-1 bit streams Code ciphertext.User name is equally filled into 128 0-1 bit streams.
For guarantee host image is sufficiently large can be by 256bit information (128 user names and 128 cryptographic secrets) Insertion, we are using 24 of 256 × 256 true coloured silk bmp pictures.The dct transform that 8 × 8 are carried out to the picture of generation, obtain 32 × 32 DCT coefficient matrixes;32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes modulated based on expanding and transforming jitter Digital watermark method be embedded in 128 user names;
According to the time seed extracted from local data base, generated using the pseudo random number based on ANSI X9.17 Device obtains one including at least 128 1 0-1 control stream using time seed as its input.
Preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule The digital watermark method of dynamic modulation is embedded in 128 cryptographic secrets, and specific rules are as follows:
(1) sequence takes out a matrix, and sequentially reads a data from gained control stream, if it is 1, to current The digital watermark method that the matrix of taking-up modulated based on expanding and transforming jitter is embedded in 1 cryptographic secret, right if it is 0 The matrix currently taken out does not do any operation;
(2) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing cryptographic secret, if it has not, Return to step (1).
After the insertion for completing username and password ciphertext, picture is sent to server end according to SSL mode by the end PC.
Server end: after carrying out 8 × 8 dct transform for the picture that server receives, 32 × 32 DCT systems are obtained Matrix number carries out extracting user based on the digital watermark method that expanding and transforming jitter is modulated from wherein preceding 32 × 4 matrixes Name;
The corresponding time seed of the user is extracted from database according to the user name extracted, using being based on The pseudorandom number generator of ANSIX9.17 obtains the 0-1 for including at least 128 1 using the time seed as its input Control stream;
Preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule The digital watermark method of dynamic modulation extracts 128 cryptographic secrets:
(1) sequence takes out a matrix, and sequentially reads a data from gained control stream, if it is 1, to current The digital watermark method that the matrix of taking-up modulated based on expanding and transforming jitter extracts 1 cryptographic secret, right if it is 0 The matrix currently taken out does not do any operation;
(2) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing cryptographic secret, if it has not, Return to step (6021).
After extracting the cryptographic secret in the picture that the end PC is transmitted, server end also needs to take out the user locally saved Cryptographic secret for verifying, in the present embodiment, server end, which is stored in local cryptographic secret and is also built-in, to be stored in In local picture.
Therefore, server end will first be stored in the dct transform of local picture progress 8 × 8, obtain 32 × 32 DCT systems Matrix number;
Using the pseudorandom number generator based on ANSI X9.17, to be stored in local random seed defeated as its using described Enter, obtains one including at least 128 1 0-1 control stream;
According to following rule 32 × 32 coefficient matrixes are carried out with the digital watermark method modulated based on expanding and transforming jitter Extract 128 cryptographic secrets:
(1) sequence takes out a matrix, and sequentially reads a data from gained control stream, if it is 1, to current The digital watermark method that the matrix of taking-up modulated based on expanding and transforming jitter extracts 1 cryptographic secret, right if it is 0 The matrix currently taken out does not do any operation;
(2) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing cryptographic secret, if it has not, Return to step (1).
After extracting the cryptographic secret locally saved, by two cryptographic secrets compared to pair.If be consistent, just sent out to client It send License Info and updates the time seed in local data base, while also notice client is updated to the newly-generated time kind Son.In addition, server end will also regenerate control stream with this newly-generated time seed, cryptographic secret is embedded in this again Verifying work in ground picture, when being logged in for next user.
Embodiment 2
The present embodiment is substantially the same manner as Example 1, and unique difference is mobile phone terminal, hand in client in this present embodiment Machine terminal is communicated by WLAN or mobile network with server end, and the trend that current network gradually tends to mobile is suitable for.

Claims (10)

1. a kind of user security login method based on image encryption technology, which comprises the following steps:
(1) client carries out md5 encryption to the modification logging of user and obtains cryptographic secret;
(2) user name is embedded in picture by client by the digital watermark method modulated based on expanding and transforming jitter;
(3) client generates control stream with local random seed is stored in, and tremble based on transform expansion by the control stream Cryptographic secret is embedded in picture by the digital watermark method of dynamic modulation;
(4) picture is sent to server end by client;
(5) server end extracts use from the picture received by the digital watermark method modulated based on expanding and transforming jitter Name in an account book;
(6) server end generates control stream with local random seed is stored in, and is carried out by the control stream based on transform expansion The digital watermark method of jitter modulation extracts cryptographic secret from the picture received;
(7) cryptographic secret that server end is extracted in verification step (6) with local cryptographic secret is stored in, if verifying at Function then generates a new random seed, and is sent to client together with information is verified, and client is updated with machine Son, client completion log in;On the contrary then prompt authentication failed, client logs in failure;
The step (2) specifically:
(201) the very coloured silk BMP picture of 24 of one 256 × 256 pixel of client generation;
(202) dct transform that 8 × 8 are carried out to the picture generated in step (201), obtains 32 × 32 DCT coefficient matrixes;
(203) the digital water modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes Impression method is embedded in 128 user names;
In the step (3) specifically:
(301) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed as it for described Input obtains one including at least 128 1 0-1 control stream;
(302) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule The digital watermark method of dynamic modulation is embedded in cryptographic secret;
(303) 32 × 32 DCT coefficient matrixes are carried out with the inverse transformation of dct transform;
The step (5) specifically:
(501) picture received is carried out 8 × 8 dct transform by server end, obtains 32 × 32 DCT coefficient matrixes;
(502) the digital water modulated based on expanding and transforming jitter is carried out to 32 × 4 matrixes preceding in 32 × 32 DCT coefficient matrixes Impression method extracts user name;
The step (6) specifically:
(601) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed as it for described Input obtains one including at least 128 1 0-1 control stream;
(602) preceding 32 × 4 matrixes are skipped, rear 32 × 28 coefficient matrixes trembled based on transform expansion according to following rule The digital watermark method of dynamic modulation extracts cryptographic secret.
2. a kind of user security login method based on image encryption technology according to claim 1, which is characterized in that institute It states client in step (1) modification logging of user is generated into user in conjunction with the software fingerprinting of the logged in software of the user and be directed to After the modification logging of the software, then carry out md5 encryption.
3. a kind of user security login method based on image encryption technology according to claim 1 or 2, feature exist In the random seed is local zone time when server authentication user password ciphertext is successful.
4. a kind of user security login method based on image encryption technology according to claim 3, which is characterized in that institute It states client and username and password ciphertext is converted to number after 128 0-1 bit streams by being modulated based on expanding and transforming jitter Word water mark method is embedded in picture.
5. a kind of user security login method based on image encryption technology according to claim 4, which is characterized in that The step (302) specifically:
(3021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (301), if it is 1, then the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out is embedded in 1 cryptographic secret, such as Fruit is 0, then does not do any operation to the matrix currently taken out;
(3022) judge whether 128 cryptographic secrets have fully embedded into completion, if YES then cryptographic secret insertion is completed, if it has not, Return to step (3021).
6. a kind of user security login method based on image encryption technology according to claim 5, which is characterized in that The step (602) specifically:
(6021) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (601), if it is 1, then the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 cryptographic secret, such as Fruit is 0, then does not do any operation to the matrix currently taken out;
(6022) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing ciphertext, if it has not, returning to Step (6021).
7. a kind of user security login method based on image encryption technology according to claim 6, which is characterized in that institute It states server end in step (7) and is stored in local cryptographic secret and is built-in and be stored in local picture, it is specific close Code ciphertext extracting method are as follows:
(701) server end will be stored in the dct transform of local picture progress 8 × 8, obtain 32 × 32 DCT coefficient matrixes;
(702) pseudorandom number generator based on ANSI X9.17 is utilized, is stored in local random seed as it for described Input obtains one including at least 128 1 0-1 control stream;
(703) 32 × 32 coefficient matrixes are carried out with the digital watermark method modulated based on expanding and transforming jitter according to following rule Extract cryptographic secret:
(7031) sequence takes out a matrix, and sequentially reads a data in gained control stream from step (702), if it is 1, then the digital watermark method for modulate based on expanding and transforming jitter to the matrix currently taken out extracts 1 cryptographic secret, such as Fruit is 0, then does not do any operation to the matrix currently taken out;
(7032) judge whether 128 cryptographic secrets all extract to complete, be extracted if YES then completing ciphertext, if it has not, returning to Step (7031).
8. a kind of user security login method based on image encryption technology according to claim 5 or 6 or 7, special Sign is that the length of the 0-1 control flow control stream is less than 896.
9. a kind of user security login method based on image encryption technology according to claim 1, which is characterized in that The client is mobile terminal or PC terminal.
10. a kind of any user security login method based on image encryption technology, feature according to claim 1 It is, is communicated between the client and server by ssl protocol.
CN201510059780.1A 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology Expired - Fee Related CN105991559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510059780.1A CN105991559B (en) 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510059780.1A CN105991559B (en) 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology

Publications (2)

Publication Number Publication Date
CN105991559A CN105991559A (en) 2016-10-05
CN105991559B true CN105991559B (en) 2019-03-01

Family

ID=57036104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510059780.1A Expired - Fee Related CN105991559B (en) 2015-02-05 2015-02-05 A kind of user security login method based on image encryption technology

Country Status (1)

Country Link
CN (1) CN105991559B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691103A (en) * 2019-11-07 2020-01-14 南京航空航天大学 Mobile terminal login verification method

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657068A (en) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 Login authorization method and device, login method and device
CN108537009B (en) * 2017-03-03 2022-03-04 绍兴读图网络科技有限公司 Method and system for downloading picture and verifying original edition
CN107395629A (en) * 2017-08-23 2017-11-24 周口师范学院 A kind of computer network security registration and verification method
CN109214163B (en) * 2018-09-14 2021-08-20 北卡科技有限公司 Identity authentication method and device
CN115348017B (en) * 2022-10-18 2023-02-07 阿里巴巴(中国)有限公司 Ciphertext processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101739657A (en) * 2009-11-06 2010-06-16 上海第二工业大学 DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method
CN102254298A (en) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN103427979A (en) * 2013-06-09 2013-12-04 浙江工业大学 Internet picture transparent and safe transmission method based on chaotic encryption

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5206024B2 (en) * 2008-02-28 2013-06-12 富士通株式会社 Image decryption device, image encryption device, image decryption method, and image decryption program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101739657A (en) * 2009-11-06 2010-06-16 上海第二工业大学 DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method
CN102254298A (en) * 2011-08-17 2011-11-23 北京新媒传信科技有限公司 Digital watermark encrypting/decrypting method and system
CN103427979A (en) * 2013-06-09 2013-12-04 浙江工业大学 Internet picture transparent and safe transmission method based on chaotic encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《Quantization Index Modulation: A Class of Provably》;Brian CHEN etal;《IEEE TRANSACTION ON INFORMATION THEORY》;20010531;全文

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691103A (en) * 2019-11-07 2020-01-14 南京航空航天大学 Mobile terminal login verification method

Also Published As

Publication number Publication date
CN105991559A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
CN105991559B (en) A kind of user security login method based on image encryption technology
CN104469767B (en) The implementation method of integrated form security protection subsystem in a set of mobile office system
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
CN104219228B (en) A kind of user's registration, user identification method and system
CN103763356B (en) A kind of SSL establishment of connection method, apparatus and system
CN103944900B (en) It is a kind of that attack prevention method and its device are asked across station based on encryption
CN103428221B (en) Safe login method, system and device to Mobile solution
CN106709963B (en) The method and apparatus of the authentication image true and false
CN106330850A (en) Biological characteristic-based security verification method, client and server
CN106104562A (en) Safety of secret data stores and recovery system and method
CN101662458A (en) Authentication method
CN104468126B (en) A kind of safe communication system and method
CN110611670A (en) API request encryption method and device
CN107181770A (en) Method of data synchronization and system
CN103327034A (en) Safe login method, system and device
CZ2013373A3 (en) Authentication method of safe data channel
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN105592056A (en) Password safety system for mobile device and password safety input method thereof
CN104270346B (en) The methods, devices and systems of two-way authentication
CN106302539A (en) A kind of embedded type WEB safety certifying method
CN107835168A (en) A kind of authentication method being multiplied based on client information sequence spreading matrix transposition
CN105071941A (en) Method and device for identity authentication of nodes of distributed system
CN102571341B (en) A kind of Verification System based on dynamic image and authentication method
CN100561913C (en) A kind of method of access code equipment
CN116743470A (en) Service data encryption processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190301

Termination date: 20220205

CF01 Termination of patent right due to non-payment of annual fee