CN101162489A - Personate photograph producing method used for keep input secret and method of use thereof - Google Patents

Personate photograph producing method used for keep input secret and method of use thereof Download PDF

Info

Publication number
CN101162489A
CN101162489A CNA200710178080XA CN200710178080A CN101162489A CN 101162489 A CN101162489 A CN 101162489A CN A200710178080X A CNA200710178080X A CN A200710178080XA CN 200710178080 A CN200710178080 A CN 200710178080A CN 101162489 A CN101162489 A CN 101162489A
Authority
CN
China
Prior art keywords
picture
machine
camouflage
credible
click
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200710178080XA
Other languages
Chinese (zh)
Other versions
CN101162489B (en
Inventor
唐荣华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yao Hua
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200710178080.XA priority Critical patent/CN101162489B/en
Publication of CN101162489A publication Critical patent/CN101162489A/en
Application granted granted Critical
Publication of CN101162489B publication Critical patent/CN101162489B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a generation method and a use method of camouflage picture used in secure input, wherein, a credible machine can be preinstalled with a background picture, a conceptual picture and corresponding conceptual information through other machines; moreover, the conceptual picture and corresponding conceptual information are concealed in the background picture in random distribution; the corresponding relation of the coordinate region and the conceptual information of the conceptual picture is stored to form a camouflage picture; in addition, a camouflage picture preappointed with a person knowing the range is generated through creating concealed appointment mode between an operator and the credible machine. During use, the credible machine which displays a combined camouflage picture and clicks the corresponding area on another machine through a driver judges the character to be input by the operator according to the returned click position coordinate; therefore, the credible machine realizes information input by certain means. Through adopting the camouflage picture based on image, the invention determines the input content through clicking corresponding image position information in the picture by a mouse keystroke; therefore, secure input for computer is realized along with convenience and shortcut in use.

Description

The camouflage picture production method and the using method thereof that are used for secret input
Technical field
The invention belongs to the computerized information field, relate in particular to a kind of production method and using method thereof of pretending picture, to realize the safe and secret input of computing machine.
Background technology
People always can face the danger of divulging a secret inevitably receiving, handle by computing machine and provide in the process of data, and hard to guard against.All might be found to just look to understand that even if the secrecy provision of taking, as encrypting, existing computer-internal information also all might be found by others or be decoded out by the program in the computing machine during with the computer keyboard input or with the click character by others.Therefore the input of maintaining secrecy is vital for the security that improves in the computing machine use.
In the prior art, in order to prevent to divulge a secret, utilize the input of maintaining secrecy of camouflage picture.Significant conceptual information is hidden in the special visual, makes people therefrom find out concrete image easily and understand wherein implication, and computing machine is difficult to or can't discern and understand.But simply pretending picture, as the identifying code picture that generally uses on the current web, because of the method and the hiding degree of feature of its camouflage are not enough, be very easy to by computer Recognition, is the effect of discerning thereby lost the pressure people.In addition, using at present the mode of camouflage picture also more single, mainly is to read symbol in the picture by the people, is input to then in the input frame, and these methods are not suitable for high security system, because input can not prevent the supervision of trojan horse program by keyboard.Simple camouflage and single application mode, make that the foreseeability of picture is very strong, the trojan horse program that very easy quilt contains mode identification technology is discerned automatically, for example, the USB flash disk of an encryption, insert in the computing machine of a security the unknown, must import the password of USB flash disk, if there is wooden horse to exist in this computing machine, the password of USB flash disk is dangerous.
Summary of the invention
In order to overcome the deficiency that prior art exists, the object of the present invention is to provide a kind of camouflage picture production method and using method thereof that is used for secret input, Computer Automatic Recognition was lost efficacy, even if someone monitors the content that also can't understand input by screen, thereby can not expose real input information, reach the purpose of computer security and secrecy input.
The technical solution adopted for the present invention to solve the technical problems is: the present invention is used for the camouflage picture production method of secret input, may further comprise the steps:
(1) credible machine is connected on other machine, and installation and operation corresponding driving program;
(2) at least one width of cloth background picture is preloaded onto the credible machine from other machine;
(3) picture one that some is embodied conceptual information is called for short the notion picture, and corresponding conceptual information is preloaded onto the credible machine from other machine;
(4) before each the use, credible machine is hidden in a certain background picture to stochastic distribution after these notion pictures are handled, and preserves the coordinates regional of notion picture and the corresponding relation of conceptual information, constitutes the camouflage picture.
The present invention is used for the camouflage picture production method of secret input, and is further comprising the steps of:
(1) by other machine, sets up hidden agreement between operator and the credible machine, but, be pre-stored in the credible machine corresponding relation between click on area and the conceptual information and the distribution range of these click on area in background picture;
(2) before each the use, but credible machine is determined the particular location of these click on area in distribution range at random, and preserves this corresponding relation, constitutes the camouflage picture.
The present invention is used for the using method of the camouflage picture of secret input, may further comprise the steps:
(1) credible machine scope is by appointment done a random arrangement to notion picture or click on area, and writes down the relation between this coordinate and the conceptual information, adopts the synthetic camouflage picture that generates of certain camouflage;
(2) credible machine shows this camouflage picture by driver on other machine;
(3) operator clicks the respective regions in the camouflage picture, and by driver the position is sent to credible machine;
(4) the credible machine character that comes decision operation person to import according to coordinate;
(5) if credible machine carries display unit, then show this character, judge for the operator whether input is correct; If credible machine does not have display unit, then adopt to repeat to import and confirm; Checking is the known fixed sequence program of credible machine if desired, then can adopt camouflage echo technology.
The invention has the beneficial effects as follows, because the present invention has used the camouflage picture based on image, the notion picture is hidden in the background picture, decide concrete input content by corresponding picture position information in the mousebutton click picture, the people can a glance just can see content clearly, but image recognition software can't be judged, make that other machine except that credible machine is discerned inefficacy automatically.In addition, the present invention also can be by setting up the mode of hidden agreement between operator and the credible machine, produce and the camouflage picture that should know the busy elder generation of scope people agreement, not only other machine is discerned inefficacy automatically, does not also know the particular content of being imported even if the overseer has seen click location.By setting up and use the echo step, operator's input is correctness no matter, all can echo on other machine, that guarantees to import is safe, reliable.Thereby it is realized the purpose of computer security and secrecy input, and easy to use, quick.
Embodiment
The invention will be further described below in conjunction with embodiment.
Department of the present invention provides a kind of picture of high-end camouflage, makes that computer patterns identification is utterly useless, even and if have the people to monitor also can't understand in what content of input by screen, to realize the input of maintaining secrecy.Force computing machine and people's analysis ability to combine, the people can't provide the rule of analysis to calculation procedure, and computing machine can't provide significant information analysis to the people, and then forces decoding to enter the manual analysis state fully, and computing machine is taken on the role of picture transmission at most.
The present invention's be used for maintaining secrecy camouflage picture of input is hidden in background picture with the notion picture and constitutes, and the operator passes through the secret input of other Realization by Machine and credible machine by this camouflage picture.That described credible machine is meant is that operator (or user) can trust fully, do not contain parts spyware, as can be known or device, as cipher machine, bank card, USB flash disk, server etc., be sure of not have hardware virus, also comprises the computing machine that is enough to trust.Other machine is meant that to operator (or user) be unknown, untrustworthy parts or device, as computing machine, machine etc. makes a draft of money.Some picture (hereinafter to be referred as the notion picture) and corresponding conceptual informations thereof that embody conceptual information are preloaded onto the credible machine from other machine, before each the use, after credible machine is handled these notion pictures, be hidden in to stochastic distribution in a certain background picture, and preserve the coordinates regional of notion picture and the corresponding relation of conceptual information, constitute the camouflage picture.Wherein, the notion picture is advisable with the different picture that takes out magnanimity at random, as far as possible synthetic large-scale camouflage picture, and repeat the significant and insignificant image that gathers, background picture is also selected the colour picture with arbitrary image for use, makes others can't finish decoding in effective time.Can also adopt different digital watermarks randomly, also can adopt stochastic distribution, variable means such as stack produces the camouflage picture at random, make wooden horse to come analysis image in the face of huge capacity, force wooden horse to carry out a large amount of computings, learn the existence of wooden horse from computing velocity decline, force it to possess a large amount of identification references, thereby can learn from capacity and have wooden horse.For example: the camouflage picture is by randomly drawing in 20,000 groups of 24*24 true color images, every group contains at least 64 symbols, then wooden horse needs the 2.74G data to help its identification camouflage picture at least, and wooden horse need expend a large amount of time, yet these identifications are things of moment only for the mankind.
The notion picture comprises one or more combinations in conceptual view, the character, and conceptual view comprises can cause that the end user associates the object of specific character or the photo of icon, or the image of drawing or drawing.The notion picture all is significant In the view of common people, and camouflage picture itself is image rather than the figure that is difficult to be identified, and discerns it and just must analyze from the angle of image, promptly at first will judge the border of figure, then removes to understand figure; And adopt several icons to represent numeral or character.Icon can be an image, and two identical icons adopt deformation technology, make it sees it is diverse from the image angle, like this possibility with regard to having prevented that wooden horse from discerning by more identical image.Being pre-stored on the credible machine the corresponding conceptual information of coordinates regional with click on area or notion picture, can be significant symbol or insignificant symbol or null symbol.Adopt the means of implied meaning to represent character, for example: a chicken is arranged on the picture, and the implied meaning problem can be: what is this? answer " this is a chicken "! Perhaps take the phonetic or the part of each word, as: " zsyzxj ", can the implied meaning problem be: the animal of What be in it color? answer " a yellow chicken ", it is complete or discrete that these implied meaning problems can be arranged, it also can be public or own privately owned agreement, others does not know that you have such agreement, is the image of a chicken even if he can discern, but does not know import what symbol yet; Oneself can be sure of meaningless, but others looks like significant picture, is mingled in wherein, has hidden real meaning.Advise that each group is not less than 12, described " meaningless " can be that picture can not have meaning under certain implied meaning.
The operator can also pass through other machine, and sets up hidden agreement between the credible machine, but with corresponding relation between click on area and the conceptual information and the distribution range of these click on area in background picture, is pre-stored in the credible machine.Before each the use, but credible machine is determined the particular location of these click on area in distribution range at random, and preserves this corresponding relation, constitutes the camouflage picture.The method of setting up hidden agreement is, credible machine is combined into a figure with many background pictures, as the camouflage picture, send back in other machine and show, the operator is rolling mouse on this picture, click those positions that it sees fit, and the corresponding coordinate of click location is sent back to credible machine by this other machine.If the existing keyboard of credible machine also has display unit, the conceptual information of then utilizing the keyboard input to hide; If credible machine has only keyboard and do not have display unit, then repeat to import the conceptual information that will hide, double or repeatedly, till the input unanimity; If credible machine has keyboard display unit is not arranged, can pass through to click the character in the picture, and on display unit, observing the input correctness; If on the credible machine both on-keyboard do not have display unit yet, then repeat to click the character twice in the picture, determine it.Repeat above-mentioned steps, finish, cause the operator that conceptual information is input to credible machine and corresponding with this camouflage picture, constitute hidden agreement until all hidden agreements are set up.
Use the method for camouflage picture to be, at first, credible machine scope is by appointment done a random arrangement to notion picture or click on area, and writes down the relation between this coordinate and the conceptual information, adopts the synthetic camouflage picture that generates of certain camouflage.Then, credible machine shows this camouflage picture by driver on other machine.The operator clicks the respective regions in the camouflage picture, and by driver the position is sent to credible machine.The character that credible machine comes decision operation person to import according to coordinate.If credible machine carries display unit, then show this character, judge for the operator whether input is correct; If credible machine does not have display unit, then adopt to repeat to import and confirm; Checking is the known fixed sequence program of credible machine if desired, then can adopt camouflage echo technology.Hidden approximately regularly credible machine should have display unit when adopting, and using method also comprises: synthetic generate the camouflage picture after, credible machine immediately the character of agreement be associated in a sub regions of arranging hidden area; Operator's moving cursor, driver constantly send to credible machine to position coordinates, and credible machine shows the character of receiving in real time, when the operator thinks that character of needs, click; What the operator clicked is click on area, and click on area can be significant and insignificant, and hides significant character in the significant click on area; Repeat above-mentioned steps, think that up to the operator those characters of required click all import, import and finish.This is a kind of hiding click relation, fascination the other side's input mode, and the feinting deception that keeps this many places to click can be protected your true input well.
Can also use special-shaped mouse pointer, have only operator oneself to know that specifically that is only reference point on the figure, there is a vectorial difference between the mouse point of the feasible reality of this way and the reasonable clicking point of image, and wooden horse is not known this vectorial difference, and this way also will greatly confuse the overseer.
Hide and handle the method for notion picture, can select in embossment, concavo-convex, watermark, incompletenessization, background colour camouflage, transparent stack, the Nonlinear and Random deformation method one or more for use, and in conjunction with the edge fuzzy processing method, to conceptual information or contain background picture and divide other or unified or layering or subregional processing interior.The edge fuzzy processing method, can the company of selecting for use limit, mutually transparent stack, the pixel separately of gradual transition be diffused in the other side's the zone randomly, in the stack of the variegated edge at random of background width or the transparent stacking method one or more.
Import under the situation of a certain sequence of having arranged the credible confidential operator of asking, the present invention also sets up and uses camouflage echo step, comprises; The operator will send credible machine to the different one to one picture of a certain sequence and one group of non-corresponding picture group; Credible machine notifying operation person has carried out the preparation that receives; The operator clicks camouflage corresponding zone of picture or notion picture according to the order of sequence; Credible machine whenever receives a coordinate time, at first converts respective symbols to, if input effectively, just the character with the corresponding sequence position compares, if consistent, then send the picture corresponding back to demonstration, otherwise an optional width of cloth picture is sent demonstration back to from the picture group of non-correspondence with this sequence bit.Operator's input is correctness no matter, all can echo on other machine.Thereby avoided occurring that any information that the operator sends to credible machine " is crossed the Rubicon " or the situation of input error, guaranteeing to have has back, and the safe and reliable of input of maintaining secrecy guaranteed in error correction in time.
The present invention has adopted the technology of image+mouse that computing machine can't discern, and at first gets rid of keyboard.And this click location information, in internal memory, show in, all be visible in the communication, but have only credible machine of the present invention just to know wherein real meaning, and this implication may be related with the clicked image in the picture, may there be association yet, and picture only is in order to remind the operator, is what has only operator and credible machine of the present invention to know on earth as for the content of reminding.Thereby realized the purpose of computer security and secrecy input.

Claims (11)

1. be used for the camouflage picture production method of secret input, it is characterized in that, may further comprise the steps:
(1) credible machine is connected on other machine, and installation and operation corresponding driving program;
(2) at least one width of cloth background picture is preloaded onto the credible machine from other machine;
(3) picture one that some is embodied conceptual information is called for short the notion picture, and corresponding conceptual information is preloaded onto the credible machine from other machine;
(4) before each the use, credible machine is hidden in a certain background picture to stochastic distribution after these notion pictures are handled, and preserves the coordinates regional of notion picture and the corresponding relation of conceptual information, constitutes the camouflage picture.
2. the camouflage picture production method that is used for secret input according to claim 1 is characterized in that, and is further comprising the steps of:
(1) by other machine, sets up hidden agreement between operator and the credible machine, but, be pre-stored in the credible machine corresponding relation between click on area and the conceptual information and the distribution range of these click on area in background picture;
(2) before each the use, but credible machine is determined the particular location of these click on area in distribution range at random, and preserves this corresponding relation, constitutes the camouflage picture.
3. the camouflage picture production method that is used for secret input according to claim 1 and 2, it is characterized in that, described notion picture all is significant In the view of common people, it comprises one or more combinations in conceptual view, the character, conceptual view comprises can cause that the end user associates the object of specific character or the photo of icon, or the image of drawing or drawing.
4. the camouflage picture production method that is used for secret input according to claim 3, it is characterized in that, being pre-stored on the credible machine the corresponding conceptual information of coordinates regional with click on area or notion picture, can be significant symbol or insignificant symbol or null symbol.
5. the camouflage picture production method that is used for secret input according to claim 2 is characterized in that, sets up the method for hidden agreement between described operator and the credible machine, may further comprise the steps:
(1) credible machine is combined into a figure with many background pictures, show that as pretending picture, sending back in other machine the operator is rolling mouse on this picture, click those positions that it sees fit, and the corresponding coordinate of click location is sent back to credible machine by this other machine;
(2) if the existing keyboard of credible machine also has display unit, the conceptual information of then utilizing the keyboard input to hide; If credible machine has only keyboard and do not have display unit, then repeat to import the conceptual information that will hide, double or repeatedly, till the input unanimity; If credible machine has keyboard display unit is not arranged, can pass through to click the character in the picture, and on display unit, observe the input correctness; If on the credible machine both on-keyboard do not have display unit yet, then repeat to click the character twice in the picture, determine it;
(3) repeat above-mentioned steps (1) and (2), finish, cause the operator that conceptual information is input to credible machine and corresponding with this camouflage picture, constitute the camouflage picture of hidden agreement until all hidden agreements are set up.
6. the camouflage picture production method that is used for secret input according to claim 1 and 2, it is characterized in that, the described method of hiding and handling the notion picture, select in embossment, concavo-convex, watermark, incompletenessization, background colour camouflage, transparent stack, the Nonlinear and Random deformation method one or more for use, and in conjunction with the edge fuzzy processing method, to conceptual information or contain background picture and divide other or unified or layering or subregional processing interior.
7. the camouflage picture production method that is used for secret input according to claim 6, it is characterized in that, described edge fuzzy processing method, the company of selecting for use limit, mutually transparent stack, the pixel separately of gradual transition be diffused in the other side's the zone randomly, in the stack of the variegated edge at random of background width or the transparent stacking method one or more.
8. the camouflage picture production method that is used for secret input according to claim 1 and 2 is characterized in that described background picture is the colour picture with arbitrary image.
9. the camouflage picture production method that is used for secret input according to claim 1 and 2 is characterized in that, imports under the situation of a certain sequence of having arranged the credible confidential operator of asking, and sets up and use camouflage echo step, comprising:
(1) operator will send credible machine to the different one to one picture of a certain sequence and one group of non-corresponding picture group;
(2) credible machine notifying operation person has carried out the preparation that receives;
(3) operator clicks camouflage corresponding zone of picture or notion picture according to the order of sequence;
(4) credible machine whenever receives a coordinate time, at first converts respective symbols to, if input effectively, just the character with the corresponding sequence position compares, if consistent, then send the picture corresponding back to demonstration, otherwise an optional width of cloth picture is sent demonstration back to from the picture group of non-correspondence with this sequence bit.
10. be used for the using method of the camouflage picture of secret input, it is characterized in that, may further comprise the steps:
(1) credible machine scope is by appointment done a random arrangement to notion picture or click on area, and writes down the relation between this coordinate and the conceptual information, adopts the synthetic camouflage picture that generates of certain camouflage;
(2) credible machine shows this camouflage picture by driver on other machine;
(3) operator clicks the respective regions in the camouflage picture, and by driver the position is sent to credible machine;
(4) the credible machine character that comes decision operation person to import according to coordinate;
(5) if credible machine carries display unit, then show this character, judge for the operator whether input is correct; If credible machine does not have display unit, then adopt to repeat to import and confirm; Checking is the known fixed sequence program of credible machine if desired, then can adopt camouflage echo technology.
11. the using method that is used for the camouflage picture of secret input according to claim 10 is characterized in that, when adopting hidden timing approximately, credible machine should have display unit, and using method also comprises:
1) after step (1), credible machine immediately the character of agreement be associated in a sub regions of arranging hidden area;
2) in step (3), operator's moving cursor, driver constantly send to credible machine to position coordinates, and credible machine shows the character of receiving in real time, when the operator thinks that character of needs, click;
What 3) operator clicked is click on area, and click on area can be significant and insignificant, and hides significant character in the significant click on area;
Repeat 2)~3) step, think that up to the operator those characters of required click all import, input is finished.
CN200710178080.XA 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof Expired - Fee Related CN101162489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710178080.XA CN101162489B (en) 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710178080.XA CN101162489B (en) 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof

Publications (2)

Publication Number Publication Date
CN101162489A true CN101162489A (en) 2008-04-16
CN101162489B CN101162489B (en) 2014-07-16

Family

ID=39297412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710178080.XA Expired - Fee Related CN101162489B (en) 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof

Country Status (1)

Country Link
CN (1) CN101162489B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102483678A (en) * 2009-08-31 2012-05-30 日本电气株式会社 Information processor, method for controlling information processor, and program
CN102779326A (en) * 2012-06-12 2012-11-14 浙江大学 Generating method for digital disguise image
CN103824249A (en) * 2014-03-21 2014-05-28 上海斐讯数据通信技术有限公司 Picture hiding and acquiring method and intelligent terminal
CN104102872A (en) * 2013-04-12 2014-10-15 中国移动通信集团安徽有限公司 Password protection method and system
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104484614A (en) * 2014-11-26 2015-04-01 形山科技(深圳)有限公司 Picture processing method and device
CN108647365A (en) * 2018-05-29 2018-10-12 青岛九维华盾科技研究院有限公司 A kind of camouflage of target effect evaluation method and system based on artificial interpretation
WO2019137489A1 (en) * 2018-01-12 2019-07-18 于君 Password input method, device, and computer-readable storage medium
CN110619225A (en) * 2019-09-04 2019-12-27 无锡市公安局 Practitioner electronic identity card generation method suitable for dynamic public security management and control

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1256652C (en) * 2003-03-31 2006-05-17 联想(北京)有限公司 Method of cipher setting and safety identification

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102483678A (en) * 2009-08-31 2012-05-30 日本电气株式会社 Information processor, method for controlling information processor, and program
CN102483678B (en) * 2009-08-31 2014-06-04 日本电气株式会社 Information processor, method for controlling information processor, and program
CN102779326A (en) * 2012-06-12 2012-11-14 浙江大学 Generating method for digital disguise image
CN102779326B (en) * 2012-06-12 2014-08-06 浙江大学 Generating method for digital disguise image
CN104102872A (en) * 2013-04-12 2014-10-15 中国移动通信集团安徽有限公司 Password protection method and system
CN103824249A (en) * 2014-03-21 2014-05-28 上海斐讯数据通信技术有限公司 Picture hiding and acquiring method and intelligent terminal
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104484614A (en) * 2014-11-26 2015-04-01 形山科技(深圳)有限公司 Picture processing method and device
WO2019137489A1 (en) * 2018-01-12 2019-07-18 于君 Password input method, device, and computer-readable storage medium
CN108647365A (en) * 2018-05-29 2018-10-12 青岛九维华盾科技研究院有限公司 A kind of camouflage of target effect evaluation method and system based on artificial interpretation
CN110619225A (en) * 2019-09-04 2019-12-27 无锡市公安局 Practitioner electronic identity card generation method suitable for dynamic public security management and control
CN110619225B (en) * 2019-09-04 2023-04-14 无锡市公安局 Electronic identity card generation method suitable for public security dynamic management and control of employees

Also Published As

Publication number Publication date
CN101162489B (en) 2014-07-16

Similar Documents

Publication Publication Date Title
CN101162489B (en) Personate photograph producing method used for keep input secret and method of use thereof
US9813441B2 (en) Detecting and breaking CAPTCHA automation scripts and preventing image scraping
US8990959B2 (en) Manipulable human interactive proofs
US20090158424A1 (en) Method of inputting password
Chiasson et al. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
Gao et al. Design and analysis of a graphical password scheme
CN102724191B (en) Safe protecting method and device for Web verification code with combined picture and characters
CN106228076B (en) A kind of picture validation code guard method and system based on SGX
JP2010067096A (en) Authentication device, authentication method, information processing program, and recording medium
US20120159592A1 (en) Multi-layered color-sensitive passwords
CN1628432A (en) Secure visual message communication method and device
CN100559399C (en) Be used to protect method at the character of graphical interfaces place input
CN113918898B (en) Security verification code generation method, system and medium based on track drawing interaction
JP2006520047A (en) Method and system for enabling remote message creation
CN107873125A (en) Active/standby devices scramble is shown
EP1509879B1 (en) Tamper-resistant visual encryption method and device
CN103116718A (en) Password setting and verification method based on spatial position code log-in computer system
US20190258829A1 (en) Securely performing a sensitive operation using a non-secure terminal
CN106650395B (en) A kind of confidential information display methods based on Morie fringe
Raj et al. A new architecture for the generation of picture based CAPTCHA
RU2445685C2 (en) Method to authenticate users based on graphic password that varies in time
US10554400B2 (en) Method and a system for generating a multi-factor authentication code
CN105897716A (en) Website login verification code generating method
CN101561714A (en) Group password input method
CN103136461A (en) Implementation method and device of anti-screenshot soft keyboard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHI XIAHONG

Free format text: FORMER OWNER: TANG RONGHUA

Effective date: 20140319

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100089 HAIDIAN, BEIJING TO: 100091 HAIDIAN, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20140319

Address after: 100091 No. 202, building No. 27, box 2, Hongqi hospital, Beijing, Haidian District

Applicant after: Shi Xiahong

Address before: 100089 Beijing city Haidian District Willow Road hummingbird home 4-4-407

Applicant before: Tang Ronghua

C14 Grant of patent or utility model
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Yao Hua

Inventor before: Tang Ronghua

CB03 Change of inventor or designer information
TR01 Transfer of patent right

Effective date of registration: 20170922

Address after: 300000 Tianjin city Nankai District wangdingdi Pan Feng International 2-1601

Patentee after: Yao Hua

Address before: 100091 No. 202, building No. 27, box 2, Hongqi hospital, Beijing, Haidian District

Patentee before: Shi Xiahong

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140716

Termination date: 20191126