CN102970307B - Cipher safety system and password safety method - Google Patents

Cipher safety system and password safety method Download PDF

Info

Publication number
CN102970307B
CN102970307B CN201210560775.5A CN201210560775A CN102970307B CN 102970307 B CN102970307 B CN 102970307B CN 201210560775 A CN201210560775 A CN 201210560775A CN 102970307 B CN102970307 B CN 102970307B
Authority
CN
China
Prior art keywords
image
encrypted message
user
cipher
integrated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210560775.5A
Other languages
Chinese (zh)
Other versions
CN102970307A (en
Inventor
杰弗里·特伦斯·凯斯里
朱利安·卢埃林·赛弗里德·伊文思
程平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Original Assignee
NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd filed Critical NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Priority to CN201210560775.5A priority Critical patent/CN102970307B/en
Priority to PCT/CN2013/072392 priority patent/WO2014094389A1/en
Publication of CN102970307A publication Critical patent/CN102970307A/en
Application granted granted Critical
Publication of CN102970307B publication Critical patent/CN102970307B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention provides a kind of cipher safety system (3000), comprising: server (300) and terminal (500), wherein said terminal (500) is for receiving encrypted message and the image of user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And return the image after process, described server (300) for receive user input process after image; Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And return the encrypted message extracted.Present invention also offers a kind of password safety method.

Description

Cipher safety system and password safety method
Technical field
The present invention relates to information security field, more specifically, relate to a kind of cipher safety system and password safety method.
Background technology
A lot of application at present all needs user to arrange password, such as, and chat software, E-mail address etc.Usually, after these application also allow user's setting to forget Password, the operation of retrieving password, such as, arranges and answers prompting problem, after answering questions, directly password is sent to the mailbox of specifying in advance; Or, after answering questions, directly send the link etc. resetting password.
But this fetching cipher mode is easily utilized by the people be familiar with, and causes security information to be revealed.And user also may forget the answer of the prompting problem set by oneself sometimes, and cause finally cannot retrieving password, has a strong impact on the use of user.
Summary of the invention
The invention provides a kind of cipher safety system and password safety method.Utilizing the present invention, greatly facilitating the memory of user by using image (picture, photo etc.), make user need not remember the answer of complicated prompting problem; Meanwhile, owing to only having user to know unique password image, greatly reduce the possibility that user cipher is revealed.While improve fetching cipher convenience, also improve the fail safe of password.
Particularly, according to first scheme of the present invention, provide a kind of cipher safety system, comprising: server and terminal, wherein said terminal is for receiving encrypted message and the image of user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And return the image after process, described server for receive user input process after image; Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And return the encrypted message extracted.
According to alternative plan of the present invention, provide a kind of cipher safety system, comprising: server and terminal, wherein said server is for receiving encrypted message and the image of user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And return the image after process, described terminal for receive user input process after image; Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And return the encrypted message extracted.
According to third program of the present invention, provide a kind of cipher safety system, comprising: server and terminal, wherein said server is for receiving encrypted message and the image of user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And return the image after process, described server also for receive user input process after image; Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And return the encrypted message extracted.
According to fourth program of the present invention, provide a kind of cipher safety system, comprising: server and terminal, wherein said terminal is for receiving encrypted message and the image of user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And return the image after process, described terminal also for receive user input process after image; Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And return the encrypted message extracted.
According to the 5th scheme of the present invention, provide a kind of password safety method, comprising: cipher mask process and fetching cipher process.Described cipher mask process comprises: the encrypted message and the image that receive user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And return the image after process.Described fetching cipher process comprises: receive the image after the process of user's input; Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And return the encrypted message extracted.
In the of the present invention first to the 5th scheme, described image is that described user specifies or the piece image of captured in real-time voluntarily.
In the of the present invention first to the 5th scheme, the image after the process of user's input is the piece image that described user selects from multiple image providing with the machine, or the piece image of specifying voluntarily.
In the of the present invention first to the 5th scheme, described encrypted message is integrated in the data of described image in mode not easy to identify.Such as, described encrypted message is encrypted, and the encrypted message after encryption is integrated in the data of described image.Encrypted message described in a pair of following encryption technology can be adopted to be encrypted: RSA, DES, AES.Correspondingly, described encrypted message is integrated in the data of the image after the process of user's input in mode not easy to identify.Such as, described encrypted message is decrypted, and returns the encrypted message after deciphering.Encrypted message described in a pair of following decryption technology can be adopted to be decrypted: RSA, DES, AES.
Alternatively, in the of the present invention first to the 5th scheme, utilize digital watermark technology, described encrypted message is integrated in the data of described image.Correspondingly, utilize digital watermark technology, extract described encrypted message.
Alternatively, in the of the present invention first to the 5th scheme, described encrypted message is integrated in exchangeable image file (EXIF) data of described image.Correspondingly, described encrypted message is gone out from exchangeable image file (EXIF) extracting data of described image.
In the of the present invention first to the 5th scheme, the image after described process is stored in described server place, or is stored in described end.
Utilize the present invention, password can be hidden in the image (picture, photo etc.) oneself be familiar with or liked by user, is convenient to user's memory.And, even be familiar with very much the people of user, be also difficult to know user and have employed which image (picture, photo etc.) as fetching cipher image, therefore, it is possible to improve the fail safe of password.Meanwhile, the normal use (and/or not easy to identify) of not effect diagram picture hidden by password of the present invention, and what can realize password effectively hides the effective use with image.
Accompanying drawing explanation
By the preferred embodiments of the present invention being described below in conjunction with accompanying drawing, above-mentioned and other objects, features and advantages of the present invention will be made clearly, wherein:
Fig. 1 shows the schematic diagram of the application scenarios of mobile communication system 3000 of the present invention.
Fig. 2 is the sequential chart 1100 of the operation showing cipher safety system 3000 according to a first embodiment of the present invention.
Fig. 3 is the sequential chart 1200 of the operation showing cipher safety system 3000 according to a second embodiment of the present invention.
Fig. 4 is the sequential chart 1300 of the operation showing cipher safety system 3000 according to a third embodiment of the present invention.
Fig. 5 is the sequential chart 1400 of the operation showing cipher safety system 3000 according to a fourth embodiment of the present invention.
Fig. 6 shows the flow chart of the cipher mask method 100 according to the embodiment of the present invention.
Fig. 7 shows the block diagram of the cipher mask device 1000 according to the embodiment of the present invention.
Fig. 8 shows the flow chart of the fetching cipher method 200 according to the embodiment of the present invention.
Fig. 9 shows the block diagram of the fetching cipher device 2000 according to the embodiment of the present invention.
In all the drawings in the present invention, same or analogous structure is all with same or analogous designated.
Embodiment
With reference to the accompanying drawings to a preferred embodiment of the present invention will be described in detail, eliminating in the course of the description is unnecessary details and function for the present invention, causes obscure to prevent the understanding of the present invention.Below, be applied to the scene of mobile radio system for the present invention, to invention has been detailed description.But the present invention is not limited thereto, the present invention also can be applied to fixed communications, wired communication system, or is applied to any mixed structure of fixed communications, wired communication system, mobile radio system etc.With regard to mobile communication system, the present invention is not limited to concrete mobile communication protocol, 2G, 3G, 4G, 5G network can be included but not limited to, WCDMA, CDMA2000, TD-SCDMA system etc., different mobile terminals can adopt identical communication protocol, also can adopt different communication protocol.The present invention is not limited to the specific operating system of mobile terminal, can include but not limited to iOS, WindowsMobile, Symbian, Android etc., and different mobile terminals can adopt identical operating system, also can adopt different operating system.In addition, the present invention is not limited to concrete picture format, can include but not limited to: JPEG, JPEG2000, TIFF, RIFF, PNG.
Fig. 1 shows the schematic diagram of the application scenarios of mobile communication system 3000 of the present invention.As shown in Figure 1, application scenarios 3000 can comprise server 300 and mobile terminal 500.For the sake of clarity, illustrate only a mobile terminal 500 in figure, but the present invention is not limited thereto, the mobile terminal of two or more numbers can be comprised.Mobile terminal 500 can be operated by user A.Mobile terminal 500 can be connected with server 300 by communication network 400.The example of communication network 400 can include but not limited to: the Internet, mobile communications network.Communication link between server 300 and mobile terminal 500 can be safe or encrypt, and is not revealed with the account and encrypted message that guarantee user A.
Mobile terminal 500 can comprise the cryptosecurity client (not shown) be arranged on wherein.Cryptosecurity client can be arranged in mobile terminal 500 in the form of software voluntarily by user A, or can be arranged in mobile terminal 500 with the form of hardware or firmware by mobile terminal production firm.
User A by mobile terminal 500 access services device 300, can register or set account and password 520 to server 300, such as, by webpage or the cryptosecurity client that is arranged on mobile terminal 500.After user A registers or sets account and password 520, server 300 or mobile terminal 500 (cryptosecurity client) can point out user A whether to arrange fetching cipher operation (being described in detail by composition graphs 2 ~ 5 after a while).After user A completes fetching cipher operation setting, once user A forgets Password 520, the password 520 that user A is set before can being fetched by server 300 or mobile terminal 500 (cryptosecurity client).
Fig. 2 is the sequential chart 1100 of the operation showing cipher safety system 3000 according to a first embodiment of the present invention.
As shown in Figure 2, mobile terminal 500 (cryptosecurity client) completes the process of hidden encrypted message 520, and server 300 completes the process of retrieving password information 520.
Hookup 1, user A selects to arrange fetching cipher operation, and in step S110, mobile terminal 500 (cryptosecurity client) receives encrypted message 520 and image 510.For the situation by web page access server 300, when user A selects to arrange fetching cipher operation, server 300 notifies the fetching cipher operation setting request (can comprise the password 520 (S1105) of user A) of user A to mobile terminal 500 (cryptosecurity client), and mobile terminal 500 points out user A to provide image 510.For the situation by being arranged on cryptosecurity client (password 520 of known users A) the access services device 300 on mobile terminal 500, when user A selects to arrange fetching cipher operation, mobile terminal 500 (cryptosecurity client) can directly point out user A to provide image 510.Such as, user A can choose the image 510 or captured in real-time piece image 510 that have stored from mobile terminal 500 this locality.
In step S120, mobile terminal 500 (cryptosecurity client) processes the image 510 selected by user A, encrypted message 520 is integrated in the data of image 510 with not effect diagram as the mode that 510 use, the image 510 ' after generating process.Such as, as effect diagram is not as the example of 510 operations used, encrypted message 520 can be integrated in the EXIF data of image 510 by mobile terminal 500, the image 510 ' after generating process.As effect diagram is not as another example of 510 operations used, mobile terminal 500 can utilize digital watermark technology, is integrated into by encrypted message 520 in the data of image 510, the image 510 ' after generating process.In addition, mobile terminal 500 can in data encrypted message 520 being integrated into image 510 before, encrypted message 520 is encrypted, thus the encrypted message (not easy to identify) after encryption is integrated in the data of image 510, as the example of encryption technology, RSA, DES, AES etc. can be included but not limited to.
In step S130, mobile terminal 500 (cryptosecurity client) returns the image 510 ' after process.For generated image 510 ', mobile terminal 500 can point out user A to upload onto the server 300, it is local or not only uploaded onto the server 300 but also to be kept at mobile terminal 500 local to be kept at mobile terminal 500.Generated image 510 ' can be stored in optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.Such as, as shown in Figure 2, according to the selection of user A, in step S1115, generated image 510 ' is uploaded onto the server 300 preservations (the image 510 ' account with user A can store by server 300 explicitly) by mobile terminal 500.
When user A forgets Password, user A can by mobile terminal 500 (or other mobile terminals or fixed terminal, as long as can access services device 300 and can image 510 ' be obtained) perform fetching cipher and operate.User A provides registered account number to server 300, and selects with image mode retrieving password.In step S210, server 300 receives image 510 '.Server 300 can point out user A to carry out selecting from the image that system provides or upload images voluntarily.If user A selects upload images voluntarily, the optional position that then server 300 can be specified from user A obtains image 510 ', includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.Such as, as shown in Figure 2, server 300 receives from mobile terminal 500 image (S1125) that user A uploads.If user A selects to select from the image that system provides, then server 300 provides multiple image (such as, 20 width images) (being saved in the image 510 ' on server 300 before wherein comprising user A) (other images in this multiple image, can be that server 300 adds voluntarily, also add before can being user A), selected by user A.After user A uploads or have selected correct image 510 ', in step S220, server 300 pairs of images 510 ' process, and extract the encrypted message 520 be integrated into as the mode that 510 ' uses with not effect diagram in image 510 '.In step S230, server 300 returns encrypted message 520.Encrypted message 520 can directly be returned to mobile terminal 500 (S1135) and show by server 300, or the position (e.g., e-mail address, phone number etc.) of specifying before encrypted message 520 is returned to user A.In addition, (comprise image uploading and image is selected) the limited number of times that can also specify that user A can only attempt, such as, 3 times, if 3 times all failed, then can not try again, and other modes can only be utilized to fetch (such as, take identity document to fetch to operator), also can be set in 3 times all failure time, empty the full content in account.
Fig. 3 is the sequential chart 1200 of the operation showing cipher safety system 3000 according to a second embodiment of the present invention.
As shown in Figure 3, server 300 completes the process of hidden encrypted message 520, and mobile terminal 500 (cryptosecurity client) completes the process of retrieving password information 520.
Hookup 1, user A selects to arrange fetching cipher operation, and in step S110, server 300 receives encrypted message 520 and image 510.Encrypted message 520 can obtain at server 300 place, and image 510 can be uploaded onto the server 300 (S1205) by mobile terminal 500 (cryptosecurity client) by user A.Server 300 can provide image 510 by webpage or cryptosecurity Client-Prompt user A.Such as, user A can choose the image 510 or captured in real-time piece image 510 that have stored from mobile terminal 500 this locality.
In step S120, the image 510 selected by server 300 couples of user A processes, and is integrated in the data of image 510, the image 510 ' after generating process by encrypted message 520 with not effect diagram as the mode that 510 use.Such as, as effect diagram is not as the example of 510 operations used, encrypted message 520 can be integrated in the EXIF data of image 510 by server 300, the image 510 ' after generating process.As effect diagram is not as another example of 510 operations used, server 300 can utilize digital watermark technology, is integrated into by encrypted message 520 in the data of image 510, the image 510 ' after generating process.In addition, server 300 can in data encrypted message 520 being integrated into image 510 before, encrypted message 520 is encrypted, thus the encrypted message (not easy to identify) after encryption is integrated in the data of image 510, as the example of encryption technology, RSA, DES, AES etc. can be included but not limited to.
In step S130, server 300 returns the image 510 ' after process.For generated image 510 ', server 300 can upload onto the server 300 by webpage or cryptosecurity Client-Prompt user A, it is local or not only uploaded onto the server 300 but also to be kept at mobile terminal 500 local to be kept at mobile terminal 500.Generated image 510 ' can be stored in optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.Such as, as shown in Figure 3, according to the selection of user A, in step S1215, generated image 510 ' is sent to mobile terminal 500 (cryptosecurity client) and preserves by server 300.
When user A forgets Password, user A can perform fetching cipher operation by mobile terminal 500 (cryptosecurity client).In step S210, mobile terminal 500 (cryptosecurity client) receives image 510 '.Mobile terminal 500 (cryptosecurity client) can point out user A to carry out selecting or selecting image voluntarily from the image that system provides.If user A selects to select image voluntarily, the optional position that then mobile terminal 500 (cryptosecurity client) can be specified from user A obtains image 510 ', includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.If user A selects to select from the image that system provides, then mobile terminal 500 (cryptosecurity client) provides multiple image (such as, 20 width images) (image 510 ' preserved before wherein comprising user A), selected by user A.Other images in this multiple image, can be that mobile terminal 500 (cryptosecurity client)/server 300 adds voluntarily, add before also can being user A.Such as, as shown in Figure 3, mobile terminal 500 (cryptosecurity client) can receive image 510 ' (S1125) (now from server 300, the account information of user A need be provided) to server 300, server 300 only can return image 510 ', also also can return the multiple image comprising image 510 ' in the lump.After user A have selected correct image 510 ', in step S220, mobile terminal 500 (cryptosecurity client) processes image 510 ', extracts the encrypted message 520 be integrated into as the mode that 510 ' uses with not effect diagram in image 510 '.In step S230, mobile terminal 500 (cryptosecurity client) returns encrypted message 520.Mobile terminal 500 (cryptosecurity client) can directly show encrypted message 520, or the position (e.g., e-mail address, phone number etc.) of specifying before encrypted message 520 is returned to user A.In addition, can also specify that user A can only attempt (selection image) limited number of times, such as, 3 times, if 3 times all failed, then can not try again, and other modes can only be utilized to fetch (such as, take identity document to fetch to operator), also can be set in 3 times all failure time, empty the full content in account.
Fig. 4 is the sequential chart 1300 of the operation showing cipher safety system 3000 according to a third embodiment of the present invention.
As shown in Figure 4, server 300 had both completed the process of hidden encrypted message 520, completed again the process of retrieving password information 520.
Hookup 1, user A selects to arrange fetching cipher operation, and in step S110, server 300 receives encrypted message 520 and image 510.Encrypted message 520 can obtain at server 300 place, and image 510 can be uploaded onto the server 300 (S1305) by mobile terminal 500 (cryptosecurity client) by user A.Server 300 can provide image 510 by webpage or cryptosecurity Client-Prompt user A.Such as, user A can choose the image 510 or captured in real-time piece image 510 that have stored from mobile terminal 500 this locality.
In step S120, the image 510 selected by server 300 couples of user A processes, and is integrated in the data of image 510, the image 510 ' after generating process by encrypted message 520 with not effect diagram as the mode that 510 use.Such as, as effect diagram is not as the example of 510 operations used, encrypted message 520 can be integrated in the EXIF data of image 510 by server 300, the image 510 ' after generating process.As effect diagram is not as another example of 510 operations used, server 300 can utilize digital watermark technology, is integrated into by encrypted message 520 in the data of image 510, the image 510 ' after generating process.In addition, server 300 can in data encrypted message 520 being integrated into image 510 before, encrypted message 520 is encrypted, thus the encrypted message (not easy to identify) after encryption is integrated in the data of image 510, as the example of encryption technology, RSA, DES, AES etc. can be included but not limited to.
In step S130, server 300 returns the image 510 ' after process.For generated image 510 ', server 300 can upload onto the server 300 by webpage or cryptosecurity Client-Prompt user A, it is local or not only uploaded onto the server 300 but also to be kept at mobile terminal 500 local to be kept at mobile terminal 500.Generated image 510 ' can be stored in optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.Such as, as shown in Figure 4, according to the selection of user A, in step S1215, generated image 510 ' is sent to mobile terminal 500 (cryptosecurity client) and preserves by server 300.
When user A forgets Password, user A can by mobile terminal 500 (or other mobile terminals or fixed terminal, as long as can access services device 300 and can image 510 ' be obtained) perform fetching cipher and operate.User A provides registered account number to server 300, and selects with image mode retrieving password.In step S210, server 300 receives image 510 '.Server 300 can point out user A to carry out selecting from the image that system provides or upload images voluntarily.If user A selects upload images voluntarily, the optional position that then server 300 can be specified from user A obtains image 510 ', includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.Such as, as shown in Figure 4, server 300 receives from mobile terminal 500 image (S1325) that user A uploads.If user A selects to select from the image that system provides, then server 300 provides multiple image (such as, 20 width images) (being saved in the image 510 ' on server 300 before wherein comprising user A) (other images in this multiple image, can be that server 300 adds voluntarily, also add before can being user A), selected by user A.After user A uploads or have selected correct image 510 ', in step S220, server 300 pairs of images 510 ' process, and extract the encrypted message 520 be integrated into as the mode that 510 ' uses with not effect diagram in image 510 '.In step S230, server 300 returns encrypted message 520.Encrypted message 520 can directly be returned to mobile terminal 500 (S1335) and show by server 300, or the position (e.g., e-mail address, phone number etc.) of specifying before encrypted message 520 is returned to user A.In addition, (comprise image uploading and image is selected) the limited number of times that can also specify that user A can only attempt, such as, 3 times, if 3 times all failed, then can not try again, and other modes can only be utilized to fetch (such as, take identity document to fetch to operator), also can be set in 3 times all failure time, empty the full content in account.
Fig. 5 is the sequential chart 1400 of the operation showing cipher safety system 3000 according to a fourth embodiment of the present invention.
As shown in Figure 5, mobile terminal 500 (cryptosecurity client) had both completed the process of hidden encrypted message 520, completed again the process of retrieving password information 520.
Hookup 1, user A selects to arrange fetching cipher operation, and in step S110, mobile terminal 500 (cryptosecurity client) receives encrypted message 520 and image 510.For the situation by web page access server 300, when user A selects to arrange fetching cipher operation, server 300 notifies the fetching cipher operation setting request (can comprise the password 520 (S1405) of user A) of user A to mobile terminal 500 (cryptosecurity client), and mobile terminal 500 points out user A to provide image 510.For the situation by being arranged on cryptosecurity client (password 520 of known users A) the access services device 300 on mobile terminal 500, when user A selects to arrange fetching cipher operation, mobile terminal 500 (cryptosecurity client) can directly point out user A to provide image 510.Such as, user A can choose the image 510 or captured in real-time piece image 510 that have stored from mobile terminal 500 this locality.
In step S120, mobile terminal 500 (cryptosecurity client) processes the image 510 selected by user A, encrypted message 520 is integrated in the data of image 510 with not effect diagram as the mode that 510 use, the image 510 ' after generating process.Such as, as effect diagram is not as the example of 510 operations used, encrypted message 520 can be integrated in the EXIF data of image 510 by mobile terminal 500, the image 510 ' after generating process.As effect diagram is not as another example of 510 operations used, mobile terminal 500 can utilize digital watermark technology, is integrated into by encrypted message 520 in the data of image 510, the image 510 ' after generating process.In addition, mobile terminal 500 can in data encrypted message 520 being integrated into image 510 before, encrypted message 520 is encrypted, thus the encrypted message (not easy to identify) after encryption is integrated in the data of image 510, as the example of encryption technology, RSA, DES, AES etc. can be included but not limited to.
In step S130, mobile terminal 500 (cryptosecurity client) returns the image 510 ' after process.For generated image 510 ', mobile terminal 500 can point out user A to upload onto the server 300, it is local or not only uploaded onto the server 300 but also to be kept at mobile terminal 500 local to be kept at mobile terminal 500.Generated image 510 ' can be stored in optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.Such as, as shown in Figure 5, according to the selection of user A, in step S1415, generated image 510 ' is uploaded onto the server 300 preservations (the image 510 ' account with user A can store by server 300 explicitly) by mobile terminal 500.
When user A forgets Password, user A can perform fetching cipher operation by mobile terminal 500 (cryptosecurity client).In step S210, mobile terminal 500 (cryptosecurity client) receives image 510 '.Mobile terminal 500 (cryptosecurity client) can point out user A to carry out selecting or selecting image voluntarily from the image that system provides.If user A selects to select image voluntarily, the optional position that then mobile terminal 500 (cryptosecurity client) can be specified from user A obtains image 510 ', includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.If user A selects to select from the image that system provides, then mobile terminal 500 (cryptosecurity client) provides multiple image (such as, 20 width images) (image 510 ' preserved before wherein comprising user A), selected by user A.Other images in this multiple image, can be that mobile terminal 500 (cryptosecurity client)/server 300 adds voluntarily, add before also can being user A.Such as, as shown in Figure 5, mobile terminal 500 (cryptosecurity client) can receive image 510 ' (S1425) (now from server 300, the account information of user A need be provided) to server 300, server 300 only can return image 510 ', also can return the multiple image comprising image 510 ' in the lump.After user A have selected correct image 510 ', in step S220, mobile terminal 500 (cryptosecurity client) processes image 510 ', extracts the encrypted message 520 be integrated into as the mode that 510 ' uses with not effect diagram in image 510 '.In step S230, mobile terminal 500 (cryptosecurity client) returns encrypted message 520.Mobile terminal 500 (cryptosecurity client) can directly show encrypted message 520, or the position (e.g., e-mail address, phone number etc.) of specifying before encrypted message 520 is returned to user A.In addition, can also specify that user A can only attempt (selection image) limited number of times, such as, 3 times, if 3 times all failed, then can not try again, and other modes can only be utilized to fetch (such as, take identity document to fetch to operator), also can be set in 3 times all failure time, empty the full content in account.
Fig. 6 shows the flow chart of the cipher mask method 100 according to the embodiment of the present invention.As shown in Figure 6, cipher mask method 100 can comprise step S110, S120 and S130.
Fig. 7 shows the block diagram of the cipher mask device 1000 according to the embodiment of the present invention.As shown in Figure 7, password masking device 100 can comprise input unit 1100, graphics processing unit 1200 and output unit 1300.Input unit 1100 is for receiving encrypted message and the image of user's input.Described encrypted message, for processing described image, is integrated in the data of described image in the mode not affecting the use of described image by graphics processing unit 1200.Output unit 1300 is for returning the image after process.
Below with reference to Fig. 1 ~ 7, be described in detail according to the cipher mask method 100 of the embodiment of the present invention and cipher mask device 1000.It should be noted that cipher mask method 100 and the cipher mask device 1000 of the embodiment of the present invention both can realize in the server 300 shown in Fig. 1 ~ 5, also can realize in the mobile terminal 500 shown in Fig. 1 ~ 5, the present invention is not limited thereto.
In step S110, the input unit 1100 of cipher mask device 1000 receives encrypted message 520 and the image 510 of user A input.Such as, image 510 is that user A specifies or the piece image of captured in real-time voluntarily.
In step S120, graphics processing unit 1200 pairs of images 510 of cipher mask device 1000 process, and are integrated in the data of image 510, the image 510 ' after generating process by encrypted message 520 with not effect diagram as the mode that 510 use.Such as, as effect diagram is not as the example of 510 operations used, encrypted message 520 can be integrated in the EXIF data of image 510 by graphics processing unit 1200, the image 510 ' after generating process.As effect diagram is not as another example of 510 operations used, graphics processing unit 1200 can utilize digital watermark technology, is integrated into by encrypted message 520 in the data of image 510, the image 510 ' after generating process.In addition, graphics processing unit 1200 can in data encrypted message 520 being integrated into image 510 before, encrypted message 520 is encrypted, thus the encrypted message (not easy to identify) after encryption is integrated in the data of image 510, as the example of encryption technology, RSA, DES, AES etc. can be included but not limited to.
Finally, in step S130, the output unit 1300 of cipher mask device 1000 returns the image 510 ' after process.Image 510 ' can be stored in optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.
Fig. 8 shows the flow chart of the fetching cipher method 200 according to the embodiment of the present invention.As shown in Figure 8, fetching cipher method 200 can comprise step S202, S204, S210, S220 and S230.It should be noted that wherein step S202 and S204 is optional step.
Fig. 9 shows the block diagram of the fetching cipher device 2000 according to the embodiment of the present invention.As shown in Figure 9, password masking device 200 can comprise input unit 2100, graphics processing unit 2200 and output unit 2300.Input unit 2100 is for receiving the image of user's input.Graphics processing unit 2200, for processing described image, extracts not affect mode that described image uses and is integrated into encrypted message in described image.Output unit 2300 is for returning the encrypted message extracted.
Below with reference to Fig. 1 ~ 5,8 and 9, be described in detail according to the fetching cipher method 200 of the embodiment of the present invention and fetching cipher device 2000.It should be noted that fetching cipher method 200 and the fetching cipher device 2000 of the embodiment of the present invention both can realize in the server 300 shown in Fig. 1 ~ 5, also can realize in the mobile terminal 500 shown in Fig. 1 ~ 5, the present invention is not limited thereto.
In step S202, fetching cipher device 2000 (such as, input unit 2100 or output unit 2300) prompting user A selects image.
In step S210, the input unit 2100 of fetching cipher device 2000 receives the image 510 ' of user A input.Such as, image 510 ' is the piece image that user A selects from multiple image providing with the machine, or the piece image of specifying voluntarily.Image 510 ' can be specified from optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of mobile terminal 500, server 300, user A.
In step S220, graphics processing unit 2200 pairs of images 510 ' of fetching cipher device 2000 process, and extract the encrypted message 520 be integrated into as the mode that 510 ' uses with not effect diagram in image 510 '.Such as, as effect diagram is not as the example of the 510 ' operation used, encrypted message 520 can be integrated in the EXIF data of image 510 ', and graphics processing unit 2200 goes out encrypted message 520 from the EXIF extracting data of image 510 '.As effect diagram is not as another example of the 510 ' operation used, encrypted message 520 can be utilize digital watermark technology to be integrated in the data of image 510, and graphics processing unit 2200 utilizes digital watermark technology, extracts encrypted message 520.In addition, encrypted message 520 can be in the data being integrated into image 510 ' before encrypted (not easy to identify), graphics processing unit 2200 is decrypted the encrypted message extracted from image 510 ', obtain encrypted message 520, as the example of decryption technology, RSA, DES, AES etc. can be included but not limited to.
In step S204, the image selected by fetching cipher device 2000 (graphics processing unit 2200 or output unit 2300) judges whether correct (that is, whether extracting correct encrypted message 520 (such as, non-NULL)).If determine to extract correct encrypted message 520 (step S204: yes), then perform step S230.If determine not extract correct encrypted message 520 (step S204: no), then return step S202, prompting user A reselects image.The circulation of step S204 to step S202 may be limited to predetermined limited number of times, such as, 3 times, if 3 times all failed, then can not try again, and other modes can only be utilized to fetch (such as, taking identity document to fetch to operator), also can be set in 3 times all failure time, empty the full content in account.
Finally, in step S230, the output unit 2300 of fetching cipher device 2000 returns the encrypted message 520 extracted.Encrypted message 520 directly can be shown on the screen of mobile terminal 500, or the position (e.g., e-mail address, phone number etc.) of specifying before encrypted message 520 can being returned to user A.
So far invention has been described in conjunction with the preferred embodiments.Should be appreciated that, those skilled in the art without departing from the spirit and scope of the present invention, can carry out various other change, replacement and interpolation.Therefore, scope of the present invention is not limited to above-mentioned specific embodiment, and should be limited by claims.

Claims (70)

1. one kind for the cipher safety system (3000) using image to carry out fetching cipher, comprising: server (300) and terminal (500), wherein
Described terminal (500) for
Receive encrypted message and the image of user's input;
Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And
Return the image after process to described user,
Described server (300) for
Receive the image after the process of user's input;
Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And
Return the encrypted message that extracts to described user.
2. cipher safety system according to claim 1 (3000), wherein said image is that described user specifies or the piece image of captured in real-time voluntarily.
3. cipher safety system according to claim 1 (3000), is wherein integrated into described encrypted message in the data of described image in mode not easy to identify.
4. cipher safety system according to claim 3 (3000), is wherein encrypted described encrypted message, and is integrated in the data of described image by the encrypted message after encryption.
5. cipher safety system according to claim 4 (3000), wherein adopts encrypted message described in a pair of following encryption technology to be encrypted: RSA, DES, AES.
6., according to the cipher safety system (3000) one of Claims 1 to 5 Suo Shu, wherein utilize digital watermark technology, described encrypted message is integrated in the data of described image.
7., according to the cipher safety system (3000) one of Claims 1 to 5 Suo Shu, wherein described encrypted message is integrated in exchangeable image file (EXIF) data of described image.
8. according to the cipher safety system (3000) one of Claims 1 to 5 Suo Shu, wherein the image after described process is stored in described server (300) place, or is stored in described terminal (500) place.
9., according to the cipher safety system (3000) one of Claims 1 to 5 Suo Shu, the image after the process of wherein user's input is the piece image that described user selects from multiple image providing with the machine, or the piece image of specifying voluntarily.
10. cipher safety system according to claim 3 (3000), wherein said encrypted message is integrated in the data of the image after the process of user's input in mode not easy to identify.
11. cipher safety systems according to claim 4 (3000), are wherein decrypted described encrypted message, and return the encrypted message after deciphering.
12. cipher safety systems according to claim 5 (3000), wherein adopt encrypted message described in a pair of following decryption technology to be decrypted: RSA, DES, AES.
13. cipher safety systems according to claim 6 (3000), wherein utilize digital watermark technology, extract described encrypted message.
14. cipher safety systems according to claim 7 (3000), wherein go out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
15. 1 kinds, for the cipher safety system (3000) using image to carry out fetching cipher, comprising: server (300) and terminal (500), wherein
Described server (300) for
Receive encrypted message and the image of user's input;
Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And
Return the image after process to described user,
Described terminal (500) for
Receive the image after the process of user's input;
Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And
Return the encrypted message that extracts to described user.
16. cipher safety systems according to claim 15 (3000), wherein said image is that described user specifies or the piece image of captured in real-time voluntarily.
17. cipher safety systems according to claim 15 (3000), are wherein integrated into described encrypted message in the data of described image in mode not easy to identify.
18. cipher safety systems according to claim 17 (3000), are wherein encrypted described encrypted message, and are integrated in the data of described image by the encrypted message after encryption.
19. cipher safety systems according to claim 18 (3000), wherein adopt encrypted message described in a pair of following encryption technology to be encrypted: RSA, DES, AES.
20., according to the cipher safety system (3000) one of claim 15 ~ 19 Suo Shu, wherein utilize digital watermark technology, are integrated into by described encrypted message in the data of described image.
Described encrypted message, according to the cipher safety system (3000) one of claim 15 ~ 19 Suo Shu, is wherein integrated in exchangeable image file (EXIF) data of described image by 21..
Image after described process, according to the cipher safety system (3000) one of claim 15 ~ 19 Suo Shu, is wherein stored in described server (300) place by 22., or is stored in described terminal (500) place.
23. according to the cipher safety system (3000) one of claim 15 ~ 19 Suo Shu, and the image after the process of wherein user's input is the piece image that described user selects from multiple image providing with the machine, or the piece image of specifying voluntarily.
24. cipher safety systems according to claim 17 (3000), wherein said encrypted message is integrated in the data of the image after the process of user's input in mode not easy to identify.
25. cipher safety systems according to claim 18 (3000), are wherein decrypted described encrypted message, and return the encrypted message after deciphering.
26. cipher safety systems according to claim 19 (3000), wherein adopt encrypted message described in a pair of following decryption technology to be decrypted: RSA, DES, AES.
27. cipher safety systems according to claim 20 (3000), wherein utilize digital watermark technology, extract described encrypted message.
28. cipher safety systems according to claim 21 (3000), wherein go out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
29. 1 kinds, for the cipher safety system (3000) using image to carry out fetching cipher, comprising: server (300) and terminal (500), wherein
Described server (300) for
Receive encrypted message and the image of user's input;
Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And
Return the image after process to described user,
Described server (300) also for
Receive the image after the process of user's input;
Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And
Return the encrypted message that extracts to described user.
30. cipher safety systems according to claim 29 (3000), wherein said image is that described user specifies or the piece image of captured in real-time voluntarily.
31. cipher safety systems according to claim 29 (3000), are wherein integrated into described encrypted message in the data of described image in mode not easy to identify.
32. cipher safety systems according to claim 31 (3000), are wherein encrypted described encrypted message, and are integrated in the data of described image by the encrypted message after encryption.
33. cipher safety systems according to claim 32 (3000), wherein adopt encrypted message described in a pair of following encryption technology to be encrypted: RSA, DES, AES.
34., according to the cipher safety system (3000) one of claim 29 ~ 33 Suo Shu, wherein utilize digital watermark technology, are integrated into by described encrypted message in the data of described image.
Described encrypted message, according to the cipher safety system (3000) one of claim 29 ~ 33 Suo Shu, is wherein integrated in exchangeable image file (EXIF) data of described image by 35..
Image after described process, according to the cipher safety system (3000) one of claim 29 ~ 33 Suo Shu, is wherein stored in described server (300) place by 36., or is stored in described terminal (500) place.
37. according to the cipher safety system (3000) one of claim 29 ~ 33 Suo Shu, and the image after the process of wherein user's input is the piece image that described user selects from multiple image providing with the machine, or the piece image of specifying voluntarily.
38. cipher safety systems according to claim 31 (3000), wherein said encrypted message is integrated in the data of the image after the process of user's input in mode not easy to identify.
39. cipher safety systems according to claim 32 (3000), are wherein decrypted described encrypted message, and return the encrypted message after deciphering.
40. cipher safety systems according to claim 33 (3000), wherein adopt encrypted message described in a pair of following decryption technology to be decrypted: RSA, DES, AES.
41. cipher safety systems according to claim 34 (3000), wherein utilize digital watermark technology, extract described encrypted message.
42. cipher safety systems according to claim 35 (3000), wherein go out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
43. 1 kinds, for the cipher safety system (3000) using image to carry out fetching cipher, comprising: server (300) and terminal (500), wherein
Described terminal (500) for
Receive encrypted message and the image of user's input;
Described image is processed, described encrypted message is integrated in the data of described image in the mode not affecting the use of described image; And
Return the image after process to described user,
Described terminal (500) also for
Receive the image after the process of user's input;
Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message in the image after the process of user's input; And
Return the encrypted message that extracts to described user.
44. cipher safety systems according to claim 43 (3000), wherein said image is that described user specifies or the piece image of captured in real-time voluntarily.
45. cipher safety systems according to claim 43 (3000), are wherein integrated into described encrypted message in the data of described image in mode not easy to identify.
46. cipher safety systems according to claim 45 (3000), are wherein encrypted described encrypted message, and are integrated in the data of described image by the encrypted message after encryption.
47. cipher safety systems according to claim 46 (3000), wherein adopt encrypted message described in a pair of following encryption technology to be encrypted: RSA, DES, AES.
48., according to the cipher safety system (3000) one of claim 43 ~ 47 Suo Shu, wherein utilize digital watermark technology, are integrated into by described encrypted message in the data of described image.
Described encrypted message, according to the cipher safety system (3000) one of claim 43 ~ 47 Suo Shu, is wherein integrated in exchangeable image file (EXIF) data of described image by 49..
Image after described process, according to the cipher safety system (3000) one of claim 43 ~ 47 Suo Shu, is wherein stored in described server (300) place by 50., or is stored in described terminal (500) place.
51. according to the cipher safety system (3000) one of claim 43 ~ 47 Suo Shu, and the image after the process of wherein user's input is the piece image that described user selects from multiple image providing with the machine, or the piece image of specifying voluntarily.
52. cipher safety systems according to claim 45 (3000), wherein said encrypted message is integrated in the data of the image after the process of user's input in mode not easy to identify.
53. cipher safety systems according to claim 46 (3000), are wherein decrypted described encrypted message, and return the encrypted message after deciphering.
54. cipher safety systems according to claim 47 (3000), wherein adopt encrypted message described in a pair of following decryption technology to be decrypted: RSA, DES, AES.
55. cipher safety systems according to claim 48 (3000), wherein utilize digital watermark technology, extract described encrypted message.
56. cipher safety systems according to claim 49 (3000), wherein go out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
57. 1 kinds, for the password safety method using image to carry out fetching cipher, comprising: cipher mask process (100) and fetching cipher process (200), wherein
Described cipher mask process (100) comprising:
Receive encrypted message and the image (S110) of user's input;
Described image is processed, described encrypted message is integrated into (S120) in the data of described image in the mode not affecting the use of described image; And
Return the image after process to described user (S130),
Described fetching cipher process (200) comprising:
Receive the image (S210) after the process of user's input;
Image after the process of user's input is processed, extracts the mode used with not effect diagram picture and be integrated into encrypted message (S220) in the image after the process of user's input; And
Return the encrypted message that extracts to described user (S230).
58. password safety method according to claim 57, wherein said image is that described user specifies or the piece image of captured in real-time voluntarily.
59. password safety method according to claim 57 or 58, are wherein integrated into described encrypted message in the data of described image in mode not easy to identify.
60. password safety method according to claim 59, are wherein encrypted described encrypted message, and are integrated in the data of described image by the encrypted message after encryption.
61. password safety method according to claim 60, wherein adopt encrypted message described in a pair of following encryption technology to be encrypted: RSA, DES, AES.
62. password safety method according to claim 57 or 58, wherein utilize digital watermark technology, are integrated into by described encrypted message in the data of described image.
63. password safety method according to claim 57 or 58, are wherein integrated into described encrypted message in exchangeable image file (EXIF) data of described image.
64. password safety method according to claim 57 or 58, are wherein stored in server place by the image after described process, or are stored in the memory of user this locality.
65. password safety method according to claim 57 or 58, the image after the process of wherein user's input is the piece image that described user selects from multiple image providing with the machine, or the piece image of specifying voluntarily.
66. password safety method according to claim 59, wherein said encrypted message is integrated in the data of the image after the process of user's input in mode not easy to identify.
67. password safety method according to claim 60, are wherein decrypted described encrypted message, and return the encrypted message after deciphering.
68. password safety method according to claim 61, wherein adopt encrypted message described in a pair of following decryption technology to be decrypted: RSA, DES, AES.
69. password safety method according to claim 62, wherein utilize digital watermark technology, extract described encrypted message.
70. password safety method according to claim 63, wherein go out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
CN201210560775.5A 2012-12-21 2012-12-21 Cipher safety system and password safety method Expired - Fee Related CN102970307B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210560775.5A CN102970307B (en) 2012-12-21 2012-12-21 Cipher safety system and password safety method
PCT/CN2013/072392 WO2014094389A1 (en) 2012-12-21 2013-03-11 Password security system and password security method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210560775.5A CN102970307B (en) 2012-12-21 2012-12-21 Cipher safety system and password safety method

Publications (2)

Publication Number Publication Date
CN102970307A CN102970307A (en) 2013-03-13
CN102970307B true CN102970307B (en) 2016-01-13

Family

ID=47800193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210560775.5A Expired - Fee Related CN102970307B (en) 2012-12-21 2012-12-21 Cipher safety system and password safety method

Country Status (2)

Country Link
CN (1) CN102970307B (en)
WO (1) WO2014094389A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678971B (en) 2013-11-15 2019-05-07 北京智谷睿拓技术服务有限公司 User information extracting method and user information extraction element
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103616998B (en) * 2013-11-15 2018-04-06 北京智谷睿拓技术服务有限公司 User information acquiring method and user profile acquisition device
CN103631503B (en) * 2013-11-15 2017-12-22 北京智谷睿拓技术服务有限公司 Information interacting method and information interactive device
CN103685939B (en) * 2013-11-22 2016-07-13 杭州百航信息技术有限公司 The method that when taking pictures, photo is added a cover watermark
CN105989254A (en) * 2015-02-12 2016-10-05 深圳积友聚乐科技有限公司 Touch screen-based remote password verification system and method as well as electronic device
CN105550548A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information processing method and terminal
CN105427234A (en) * 2016-01-25 2016-03-23 上海斐讯数据通信技术有限公司 Sharing method and sharing system for WIFI password
CN107994994A (en) * 2017-11-24 2018-05-04 深圳中兴网信科技有限公司 Image authentication code verification method, system, server and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321066A (en) * 2008-05-20 2008-12-10 北京深思洛克数据保护中心 Information safety device for internetwork communication
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN102075547A (en) * 2011-02-18 2011-05-25 北京天地融科技有限公司 Dynamic password generating method and device and authentication method and system
US8214892B2 (en) * 2009-07-15 2012-07-03 Hewlett-Packard Development Company, L.P. Password authentication system and methods
CN102801724A (en) * 2012-08-09 2012-11-28 长城瑞通(北京)科技有限公司 Identity authentication method combining graphic image with dynamic password

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174948A (en) * 2006-11-02 2008-05-07 上海银晨智能识别科技有限公司 Network login system and method with face authentication
US8601589B2 (en) * 2007-03-05 2013-12-03 Microsoft Corporation Simplified electronic messaging system
CN102164366A (en) * 2011-01-30 2011-08-24 广西师范大学 Message-hidden mobile phone information safety communication method based on JPEG (joint photographic experts group) image

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321066A (en) * 2008-05-20 2008-12-10 北京深思洛克数据保护中心 Information safety device for internetwork communication
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
US8214892B2 (en) * 2009-07-15 2012-07-03 Hewlett-Packard Development Company, L.P. Password authentication system and methods
CN102075547A (en) * 2011-02-18 2011-05-25 北京天地融科技有限公司 Dynamic password generating method and device and authentication method and system
CN102801724A (en) * 2012-08-09 2012-11-28 长城瑞通(北京)科技有限公司 Identity authentication method combining graphic image with dynamic password

Also Published As

Publication number Publication date
WO2014094389A1 (en) 2014-06-26
CN102970307A (en) 2013-03-13

Similar Documents

Publication Publication Date Title
CN102970307B (en) Cipher safety system and password safety method
CN104040934B (en) Image privacy is protected when being manipulated by cloud service
CN102855059B (en) Terminal and information sharing method
WO2014201940A1 (en) Photographing method and apparatus and storage medium
JPWO2008010275A1 (en) Media data processing apparatus and media data processing method
US10223537B2 (en) Method and electronic device for managing data
US9143940B2 (en) Wireless communication system, portable terminal, digital camera, communication method, and computer-readable storage device
US8738928B2 (en) Apparatus and method for processing extension information in image files
JP6277868B2 (en) Document management system, document reproduction device, document management method, and computer program
CN103067367A (en) Password hidden method and device and password retrieval method and device
CN106203141A (en) The data processing method of a kind of application and device
CN107644168B (en) Information extraction method, terminal and computer readable storage medium
CN106033518B (en) Information processing method and device
JP6149749B2 (en) Information processing apparatus, information processing system, and program
WO2018090685A1 (en) Image data encryption method and apparatus, and network camera
KR20150100602A (en) Data storing and reading methods, apparatuses and devices
WO2014096519A1 (en) Method and apparatus for sharing content
KR20140043836A (en) Communication system utilizing fingerprint information and use of the system
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
KR102236757B1 (en) Video providing method, server and user terminal device
CN106650469B (en) Photo processing method and terminal equipment
KR101132361B1 (en) Method and system for transferring data with improved security
WO2016195060A1 (en) Image processing system, server device, method for controlling server device, and program
CN114996663A (en) Picture processing method, storage medium and computer terminal
CN114339282A (en) Method and device for transmitting anchor image picture in live broadcast interaction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160113

Termination date: 20191221

CF01 Termination of patent right due to non-payment of annual fee