CN101162489B - Personate photograph producing method used for keep input secret and method of use thereof - Google Patents

Personate photograph producing method used for keep input secret and method of use thereof Download PDF

Info

Publication number
CN101162489B
CN101162489B CN200710178080.XA CN200710178080A CN101162489B CN 101162489 B CN101162489 B CN 101162489B CN 200710178080 A CN200710178080 A CN 200710178080A CN 101162489 B CN101162489 B CN 101162489B
Authority
CN
China
Prior art keywords
picture
machine
credible
camouflage
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200710178080.XA
Other languages
Chinese (zh)
Other versions
CN101162489A (en
Inventor
唐荣华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yao Hua
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200710178080.XA priority Critical patent/CN101162489B/en
Publication of CN101162489A publication Critical patent/CN101162489A/en
Application granted granted Critical
Publication of CN101162489B publication Critical patent/CN101162489B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a generation method and a use method of camouflage picture used in secure input, wherein, a credible machine can be preinstalled with a background picture, a conceptual picture and corresponding conceptual information through other machines; moreover, the conceptual picture and corresponding conceptual information are concealed in the background picture in random distribution; the corresponding relation of the coordinate region and the conceptual information of the conceptual picture is stored to form a camouflage picture; in addition, a camouflage picture preappointed with a person knowing the range is generated through creating concealed appointment mode between an operator and the credible machine. During use, the credible machine which displays a combined camouflage picture and clicks the corresponding area on another machine through a driver judges the character to be input by the operator according to the returned click position coordinate; therefore, the credible machine realizes information input by certain means. Through adopting the camouflage picture based on image, the invention determines the input content through clicking corresponding image position information in the picture by a mouse keystroke; therefore, secure input for computer is realized along with convenience and shortcut in use.

Description

For camouflage picture production method and the using method thereof of the input of maintaining secrecy
Technical field
The invention belongs to computerized information field, relate in particular to a kind of production method and using method thereof of pretending picture, to realize the safe and secret input of computing machine.
Background technology
People receive, process at computer and provide in the process of data and always inevitably can face the danger of divulging a secret, and hard to guard against.While clicking character with computer Chinese input with keyboard or with mouse, all be likely found to just look at and understand, even if the secrecy provision of taking, as encrypted, existing computer-internal information is also all likely found or is decoded out by the program in computing machine.Therefore the input of maintaining secrecy is vital for the security improving in computing machine use.
In prior art, in order to prevent divulging a secret, utilize the input of maintaining secrecy of camouflage picture.Significant conceptual information is hidden in a special visual, make people easily therefrom find out concrete image and understand wherein implication, and computing machine is difficult to or None-identified and understanding.But simply pretending picture, as the identifying code picture generally using on current web, because method and the hiding degree of feature of its camouflage are inadequate, be very easy to be identified by computing machine, is effect of identification thereby lost pressure people.In addition, using at present the mode of camouflage picture also more single, is mainly to read the symbol in picture by people, is then input in input frame, and these methods are not suitable for high security system, because can not prevent the supervision of trojan horse program by keyboard input.Simple camouflage and single application mode, make the foreseeability of picture very strong, the trojan horse program that very easy quilt contains mode identification technology is identified automatically, for example, the USB flash disk of an encryption, insert in the computing machine of a security the unknown, must input the password of USB flash disk, if there is wooden horse to exist in this computing machine, the password of USB flash disk is dangerous.
Summary of the invention
The deficiency existing in order to overcome prior art, the object of the present invention is to provide a kind of camouflage picture production method and using method thereof for the input of maintaining secrecy, can make Computer Automatic Recognition lose efficacy, even if someone monitors the content that also cannot understand input by screen, thereby can not expose real input message, reach the object of computer security and secrecy input.
The technical solution adopted for the present invention to solve the technical problems is: the present invention, for the camouflage picture production method of the input of maintaining secrecy, comprises the following steps:
(1) credible machine is connected on other machine, and the corresponding driver of installation and operation;
(2) at least one width background picture is preloaded onto credible machine from other machine;
(3) picture one that some is embodied to conceptual information is called for short concept picture, and corresponding conceptual information is preloaded onto credible machine from other machine;
(4) before each use, credible machine, by after these concept picture processings, is hidden in a certain background picture to stochastic distribution, and preserves the coordinates regional of concept picture and the corresponding relation of conceptual information, forms camouflage picture.
The present invention is for the camouflage picture production method of the input of maintaining secrecy, further comprising the steps of:
(1) by other machine, between operator and credible machine, set up hidden agreement, by the corresponding relation between click on area and conceptual information with these click on area in background picture can distribution range, be pre-stored in credible machine;
(2), before each use, credible machine is determined the particular location of these click on area in can distribution range at random, and preserves this corresponding relation, forms camouflage picture.
The present invention, for the using method of the camouflage picture of the input of maintaining secrecy, comprises the following steps:
(1) credible machine is made a random arrangement according to the scope of agreement concept picture or click on area, and records the relation between this coordinate and conceptual information, adopts the synthetic camouflage picture that generates of certain camouflage;
(2) credible machine shows this camouflage picture on other machine by driver;
(3) operator clicks the respective regions in camouflage picture, and by driver, position is sent to credible machine;
(4) credible machine carrys out according to coordinate the character that decision operation person will input;
(5) if credible machine carries display unit, show this character, judge that for operator whether input is correct; If credible machine does not have display unit, adopt and repeat to input to confirm; If what need checking is the fixed sequence program that credible machine is known, can adopt camouflage echo technology.
The invention has the beneficial effects as follows, because the present invention has used taking image as basic camouflage picture, concept picture is hidden in a background picture, click corresponding picture position information in picture by mousebutton and decide concrete input content, people can a glance just can see content clearly, but image recognition software cannot judge, make other machine except credible machine automatically identify inefficacy.In addition, the present invention also can be by setting up the mode of hidden agreement between operator and credible machine, produce and should know the busy first camouflage picture of agreement of scope people, not only other machine is identified inefficacy automatically, does not also know inputted particular content even if overseer has seen click location.By setting up and use echo step, no matter correctness of operator's input, all can echo on other machine, guarantee the safe, reliable of input.Thereby realized the object of computer security and secrecy input, and easy to use, quick.
Embodiment
Below in conjunction with embodiment, the invention will be further described.
Department of the present invention provides a kind of picture of high-end camouflage, makes computer patterns identification utterly useless, even and if have people to monitor also cannot understand in what content of input by screen, to realize the input of maintaining secrecy.Force computing machine and people's analysis ability to combine, people cannot provide to calculation procedure the rule of analysis, and computing machine cannot provide significant information analysis to people, and then force decoding to enter manual analysis state completely, and computing machine is taken at most the role of picture transmission.
The present invention is hidden in concept picture background picture and forms for the camouflage picture of the input of maintaining secrecy, and operator is the secret input with credible machine by other machine realization by this camouflage picture.That described credible machine refers to is that operator (or user) can trust completely, containing parts spyware, known or device, as cipher machine, bank card, USB flash disk, server etc., be sure of not have hardware virus, also comprise the computing machine that is enough to trust.Other machine refers to that to operator (or user) be unknown, untrustworthy parts or device, as computing machine, machine etc. makes a draft of money.Picture (hereinafter to be referred as concept picture) and corresponding conceptual information thereof that some are embodied to conceptual information are preloaded onto credible machine from other machine, before each use, credible machine is by after these concept picture processings, be hidden in to stochastic distribution in a certain background picture, and preserve the coordinates regional of concept picture and the corresponding relation of conceptual information, form camouflage picture.Wherein, concept picture is advisable with the different picture that takes out at random magnanimity, as far as possible synthetic large-scale camouflage picture, and repeat the significant and insignificant image that gathers, background picture is also selected the colour picture with arbitrary image, makes others cannot within effective time, complete decoding.Can also adopt randomly different digital watermarks, also can adopt the variable means such as stochastic distribution, random stack to produce camouflage picture, make wooden horse to carry out analysis image in the face of huge capacity, force wooden horse to carry out a large amount of computings, learn the existence of wooden horse from computing velocity decline, force it to possess a large amount of identification references, thereby can learn and have wooden horse from capacity.For example: camouflage picture is by randomly drawing in 20,000 groups of 24*24 true color images, every group contains at least 64 symbols, wooden horse at least needs 2.74G data to help its identification camouflage picture, and wooden horse need to expend a large amount of time, but these identifications are things of moment only for the mankind.
Concept picture comprises one or more combinations in conceptual view, character, and conceptual view comprises can cause that end user associates the object of specific character or the photo of icon, or the image of drawing or drawing.Concept picture is all significant In the view of common people, and camouflage picture itself is image instead of the figure that is difficult to be identified, and identifies it and just must analyze from the angle of image, first will judge the border of figure, then removes to understand figure; And adopt several icons to come representative digit or character.Icon can be image, and two identical icons adopt deformation technology, make it see it is diverse from image angle, like this possibility with regard to having prevented that wooden horse from identifying by more identical image.Being pre-stored in conceptual information corresponding with the coordinates regional of click on area or concept picture on credible machine, can be significant symbol or insignificant symbol or null symbol.Adopt the means of implied meaning to represent character, for example: on picture, have a chicken, implied meaning problem can be: what is this? answer " this is a chicken "! Or take each word phonetic or part as: " zsyzxj ", can implied meaning problem be: the animal of What be in it color? answer " a yellow chicken ", it is complete or discrete that these implied meaning problems can be arranged, also can be public or own privately owned agreement, others does not know that you have such agreement, even if he can identify is the image of a chicken, but do not know input what symbol yet; Oneself can be sure of meaningless, but others looks like significant picture, is mingled in wherein, has hidden real meaning.Advise that each group is not less than 12, described " meaningless " can be that picture can not have meaning under certain implied meaning.
Operator can also pass through other machine, and between credible machine, sets up hidden agreement, by the corresponding relation between click on area and conceptual information and these click on area in background picture can distribution range, be pre-stored in credible machine.Before each use, credible machine is determined the particular location of these click on area in can distribution range at random, and preserves this corresponding relation, forms camouflage picture.The method of setting up hidden agreement is, multiple background pictures are combined into a figure by credible machine, as camouflage picture, send back in other machine and show, operator is rolling mouse on this picture, click those positions that it considers appropriate, and by this other machine, the corresponding coordinate of click location is sent back to credible machine.If the existing keyboard of credible machine also has display unit, utilize the conceptual information that keyboard input will be hiding; If credible machine only has keyboard and there is no display unit, repeat the conceptual information that input will be hiding, double or repeatedly, until input is consistent; There is display unit if credible machine does not have keyboard, can pass through to click the character in picture, and on display unit, observing input correctness; If both on-keyboard, also without display unit, repeated to click the character twice in picture on credible machine, determine it.Repeat above-mentioned steps, until all hidden agreements are set up complete, cause operator that conceptual information is input to credible machine corresponding with this camouflage picture, form and have hidden agreement.
Use the method for camouflage picture to be, first, credible machine is made a random arrangement according to the scope of agreement concept picture or click on area, and records the relation between this coordinate and conceptual information, adopts the synthetic camouflage picture that generates of certain camouflage.Then, credible machine shows this camouflage picture on other machine by driver.Operator clicks the respective regions in camouflage picture, and by driver, position is sent to credible machine.Credible machine carrys out according to coordinate the character that decision operation person will input.If credible machine carries display unit, show this character, judge that for operator whether input is correct; If credible machine does not have display unit, adopt and repeat to input to confirm; If what need checking is the fixed sequence program that credible machine is known, can adopt camouflage echo technology.When adopting hidden approximately timing, credible machine should have display unit, and using method also comprises: generate after camouflage picture synthetic, credible machine immediately the character of agreement be associated in a sub regions of arranging hidden area; Operator moves cursor, and driver constantly sends to credible machine position coordinates, and credible machine shows the character of receiving in real time, until operator think need that character time, click; What operator clicked is click on area, and click on area can be significant and insignificant, and in significant click on area, hides significant character; Repeat above-mentioned steps, until operator thinks that those characters of required click all input, inputted.This is a kind of click relation of hiding, fascination the other side's input mode, and the feinting deception that keeps this many places to click, can protect your true input well.
Can also use special-shaped mouse pointer, only have operator oneself to know that on figure, specifically that is only reference point, this way makes to have a vectorial difference between the reasonable clicking point of actual mouse point and image, and wooden horse is not known this vectorial difference, this way also will greatly confuse overseer.
Hide and process the method for concept picture, can select one or more in embossment, concavo-convex, watermark, incompletenessization, background colour camouflage, transparent stack, Nonlinear Stochastic deformation method, and in conjunction with edge fuzzy processing method, divide other or unify or layering or subregional processing interior to conceptual information or containing background picture.Edge fuzzy processing method, can the company of selecting limit, mutually in the transparent stack, region that pixel is separately diffused into the other side randomly of gradual transition, the variegated Random Edge of background along width superpose or transparent stacking method in one or more.
Input a certain sequence of having arranged in the case of the credible confidential operator of asking, the present invention also sets up and uses camouflage echo step, comprises; Operator is by different picture and one group of non-corresponding picture group send credible machine to one to one with a certain sequence; Credible machine notifies operator to carry out the preparation receiving; Operator clicks the camouflage corresponding region of picture or concept picture according to the order of sequence; Credible machine often receives a coordinate time, first converts respective symbols to, if input effectively, just with the charactor comparison of corresponding sequence position, if consistent, send the picture corresponding with this sequence bit back to demonstration, otherwise an optional width picture is sent demonstration back to from the picture group of non-correspondence.No matter correctness of operator's input, all can echo on other machine.Thereby avoided occurring that operator sends to any information of credible machine " to cross the Rubicon " or the situation of input error, guaranteeing to have has back, and the safe and reliable of input of maintaining secrecy guaranteed in error correction in time.
The present invention, has adopted the technology of the image+mouse of computing machine None-identified, first gets rid of keyboard.And this click location information, in internal memory, show in, in communication, be all visible, but only have credible machine of the present invention just to know real meaning wherein, and this implication may be associated with the clicked image in picture, may there is no association yet, and picture is only used to remind operator, be what only has operator and credible machine of the present invention to know on earth as for the content of reminding.Thereby realize the object of computer security and secrecy input.

Claims (9)

1. for the camouflage picture production method of the input of maintaining secrecy, it is characterized in that, comprise the following steps:
(1) credible machine is connected on other machine, and the corresponding driver of installation and operation, that described credible machine refers to is that operator can trust completely, containing parts spyware, known or device, comprise cipher machine, bank card, USB flash disk or the server of be sure oing not have hardware virus, also comprise the computing machine that is enough to trust; Described other machine refers to that to operator be unknown, untrustworthy parts or device, comprises computing machine, machine makes a draft of money;
(2) at least one width background picture is preloaded onto credible machine from other machine;
(3) picture one that some is embodied to conceptual information is called for short concept picture, and conceptual information corresponding to concept picture is preloaded onto credible machine from other machine; Described concept picture comprises one or more combinations in conceptual view, character;
(4) before each use, credible machine, by after these concept picture processings, is hidden in a certain background picture to stochastic distribution, and preserves the coordinates regional of concept picture and the corresponding relation of conceptual information, forms camouflage picture.
2. the camouflage picture production method for the input of maintaining secrecy according to claim 1, is characterized in that, further comprising the steps of:
(1) by other machine, between operator and credible machine, set up hidden agreement, by the corresponding relation between click on area and conceptual information with these click on area in background picture can distribution range, be pre-stored in credible machine;
(2), before each use, credible machine is determined the particular location of these click on area in can distribution range at random, and preserves this corresponding relation, forms camouflage picture.
3. the camouflage picture production method for the input of maintaining secrecy according to claim 2, is characterized in that, sets up the method for hidden agreement between described operator and credible machine, comprises the following steps:
(1) multiple background pictures are combined into a figure by credible machine, as camouflage picture, send back in other machine and show, operator is rolling mouse on this camouflage picture, click those positions that it considers appropriate, be the click on area set up between clicking operation person and credible machine in background picture can distribution range, and by this other machine, the corresponding coordinate of click location is sent back to credible machine;
(2), if the existing keyboard of credible machine also has display unit, utilize the conceptual information that keyboard input will be hiding; If credible machine only has keyboard and there is no display unit, repeat the conceptual information that input will be hiding, double or repeatedly, until input is consistent; There is display unit if credible machine does not have keyboard, can pass through to click the character in picture, and on display unit, observe input correctness; If both on-keyboard, also without display unit, repeated to click the character twice in picture on credible machine, determine that click on content is consistent;
(3) repeat above-mentioned steps (1) and (2), until all hidden agreements are set up complete, cause operator that conceptual information is input to credible machine corresponding with this camouflage picture, formation has the camouflage picture of hidden agreement.
4. the camouflage picture production method for the input of maintaining secrecy according to claim 1 and 2, it is characterized in that, described concept picture processing and when hiding, select one or several different methods in embossment, concavo-convex, watermark, incompletenessization, background colour camouflage, transparent stack, Nonlinear Stochastic deformation method, and in conjunction with edge fuzzy processing method, divide other or unify or layering or subregional processing interior to conceptual information or containing background picture.
5. the camouflage picture production method for the input of maintaining secrecy according to claim 4, it is characterized in that, described edge fuzzy processing method, the company of selecting limit, mutually in the transparent stack, region that pixel is separately diffused into the other side randomly of gradual transition, the variegated Random Edge of background along width superpose or transparent stacking method in one or more.
6. the camouflage picture production method for the input of maintaining secrecy according to claim 1 and 2, is characterized in that, described background picture is the colour picture with arbitrary image.
7. the camouflage picture production method for the input of maintaining secrecy according to claim 1 and 2, is characterized in that, inputs a certain sequence of having arranged in the case of the credible confidential operator of asking, and sets up and uses camouflage echo step, comprising:
(1) operator is by different picture and one group of non-corresponding picture group send credible machine to one to one with a certain sequence;
(2) credible machine notifies operator to carry out the preparation receiving;
(3) operator clicks the camouflage corresponding region of picture or concept picture according to the order of sequence;
(4) credible machine often receives a coordinate time, first converts respective symbols to, if input effectively, just with the charactor comparison of corresponding sequence position, if consistent, send the picture corresponding with this sequence bit back to demonstration, otherwise an optional width picture is sent demonstration back to from the picture group of non-correspondence.
8. the using method of the camouflage picture of inputting for maintaining secrecy, is characterized in that, comprises the following steps:
(1) credible machine is made a random arrangement according to the scope of agreement concept picture or click on area, and record the relation between this coordinate and conceptual information, refer to its stochastic distribution is hidden in a certain background picture for the random arrangement of concept picture, for click on area refer to click on area in background picture can distribution range in particular location, adopt the synthetic camouflage picture that generates of these camouflages, described concept picture is the picture that embodies conceptual information, described credible machine refers to what operator can trust completely, containing spyware, known parts or device, comprise the cipher machine of be sure oing not have hardware virus, bank card, USB flash disk or server, also comprise the computing machine that is enough to trust,
(2) credible machine shows this camouflage picture on other machine by driver, and described other machine refers to that to operator be unknown, untrustworthy parts or device, comprises computing machine, machine makes a draft of money;
(3) operator clicks the respective regions in camouflage picture, and by driver, the position of the respective regions of clicking is sent out
Give credible machine;
(4) credible machine carrys out according to coordinate the character that decision operation person will input;
(5) if credible machine carries display unit, show this character, judge that for operator whether input is correct; If credible machine does not have display unit, adopt and repeat to input to confirm; If what need checking is the fixed sequence program that credible machine is known, can sets up with right to use the 7 camouflage echo steps that provide are provided.
9. the using method of the camouflage picture for the input of maintaining secrecy according to claim 8, is characterized in that, when adopting hidden approximately timing, credible machine should have display unit, and using method also comprises:
1), after step (1), credible machine is associated the character of agreement immediately with arranging a sub regions of hidden area;
2) in step (3), operator moves cursor, and driver constantly sends to credible machine position coordinates, and credible machine shows the character of receiving in real time, until operator think need that character time, click;
3) what operator clicked is click on area, click on area can be agreement and agreement not, and in the click on area of agreement, hide the character of agreement;
Repeat 2)~3) step, until operator thinks that those characters of required click all input, input completes.
CN200710178080.XA 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof Expired - Fee Related CN101162489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710178080.XA CN101162489B (en) 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710178080.XA CN101162489B (en) 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof

Publications (2)

Publication Number Publication Date
CN101162489A CN101162489A (en) 2008-04-16
CN101162489B true CN101162489B (en) 2014-07-16

Family

ID=39297412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710178080.XA Expired - Fee Related CN101162489B (en) 2007-11-26 2007-11-26 Personate photograph producing method used for keep input secret and method of use thereof

Country Status (1)

Country Link
CN (1) CN101162489B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120154432A1 (en) * 2009-08-31 2012-06-21 Akitake Misuhashi Information processing apparatus, information processing apparatus control method and program
CN102779326B (en) * 2012-06-12 2014-08-06 浙江大学 Generating method for digital disguise image
CN104102872A (en) * 2013-04-12 2014-10-15 中国移动通信集团安徽有限公司 Password protection method and system
CN103824249A (en) * 2014-03-21 2014-05-28 上海斐讯数据通信技术有限公司 Picture hiding and acquiring method and intelligent terminal
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104484614A (en) * 2014-11-26 2015-04-01 形山科技(深圳)有限公司 Picture processing method and device
CN108133156A (en) * 2018-01-12 2018-06-08 于君 A kind of cipher-code input method and equipment
CN108647365A (en) * 2018-05-29 2018-10-12 青岛九维华盾科技研究院有限公司 A kind of camouflage of target effect evaluation method and system based on artificial interpretation
CN110619225B (en) * 2019-09-04 2023-04-14 无锡市公安局 Electronic identity card generation method suitable for public security dynamic management and control of employees

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1534445A (en) * 2003-03-31 2004-10-06 联想(北京)有限公司 Method of cipher setting and safety identification

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1534445A (en) * 2003-03-31 2004-10-06 联想(北京)有限公司 Method of cipher setting and safety identification

Also Published As

Publication number Publication date
CN101162489A (en) 2008-04-16

Similar Documents

Publication Publication Date Title
CN101162489B (en) Personate photograph producing method used for keep input secret and method of use thereof
US9813441B2 (en) Detecting and breaking CAPTCHA automation scripts and preventing image scraping
US8990959B2 (en) Manipulable human interactive proofs
Dunphy et al. A closer look at recognition-based graphical passwords on mobile devices
US8385605B2 (en) Image based turing test
Dirik et al. Modeling user choice in the PassPoints graphical password scheme
Chen et al. Detecting visually similar web pages: Application to phishing detection
Gao et al. Design and analysis of a graphical password scheme
US20090158424A1 (en) Method of inputting password
Kim et al. A new shoulder-surfing resistant password for mobile environments
CN106228076B (en) A kind of picture validation code guard method and system based on SGX
CN102148826B (en) Method for dynamically setting password by setting graphic per se in grid digital array
CN110113535A (en) terminal information tracing method, device, terminal and medium
EP1604258A1 (en) Method and system for enabling remote message composition
EP1509879B1 (en) Tamper-resistant visual encryption method and device
CN106650395B (en) A kind of confidential information display methods based on Morie fringe
CN103116718A (en) Password setting and verification method based on spatial position code log-in computer system
Tabrez et al. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system
Raj et al. A new architecture for the generation of picture based CAPTCHA
RU2445685C2 (en) Method to authenticate users based on graphic password that varies in time
RU2541868C2 (en) Anti-peep user authentication method
Joshuva et al. Implementing CHC to counter shoulder surfing attack in PassPoint–style graphical passwords
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
WO2019157574A1 (en) Method for proving user identity and or user's choice
CN115134473B (en) Image encryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHI XIAHONG

Free format text: FORMER OWNER: TANG RONGHUA

Effective date: 20140319

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100089 HAIDIAN, BEIJING TO: 100091 HAIDIAN, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20140319

Address after: 100091 No. 202, building No. 27, box 2, Hongqi hospital, Beijing, Haidian District

Applicant after: Shi Xiahong

Address before: 100089 Beijing city Haidian District Willow Road hummingbird home 4-4-407

Applicant before: Tang Ronghua

C14 Grant of patent or utility model
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Yao Hua

Inventor before: Tang Ronghua

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170922

Address after: 300000 Tianjin city Nankai District wangdingdi Pan Feng International 2-1601

Patentee after: Yao Hua

Address before: 100091 No. 202, building No. 27, box 2, Hongqi hospital, Beijing, Haidian District

Patentee before: Shi Xiahong

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140716

Termination date: 20191126