CN103067367A - Password hidden method and device and password retrieval method and device - Google Patents

Password hidden method and device and password retrieval method and device Download PDF

Info

Publication number
CN103067367A
CN103067367A CN2012105643874A CN201210564387A CN103067367A CN 103067367 A CN103067367 A CN 103067367A CN 2012105643874 A CN2012105643874 A CN 2012105643874A CN 201210564387 A CN201210564387 A CN 201210564387A CN 103067367 A CN103067367 A CN 103067367A
Authority
CN
China
Prior art keywords
image
encrypted message
cipher
user
integrated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105643874A
Other languages
Chinese (zh)
Inventor
杰弗里·特伦斯·凯斯里
朱利安·卢埃林·赛弗里德·伊文思
程平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Beijing Netqin Technology Co Ltd
Original Assignee
NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd filed Critical NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Priority to CN2012105643874A priority Critical patent/CN103067367A/en
Priority to PCT/CN2013/072387 priority patent/WO2014094388A1/en
Publication of CN103067367A publication Critical patent/CN103067367A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Abstract

The invention provides a password hidden method (100). The password hidden method (100) comprises the following steps: receiving password information inputted by a user and an image (S110); processing the image, and integrating the password information to data (S120) of the image in a method that the using method of the image is not influenced; and returning an image (S130) after the image is processed. The invention further provides a password retrieval method (200), a password hidden device (1000) and a password retrieval device (2000).

Description

Cipher mask method and apparatus, fetching cipher method and apparatus
Technical field
The present invention relates to information security field, more specifically, relate to a kind of cipher mask method, a kind of fetching cipher method, a kind of cipher mask device and a kind of fetching cipher device.
Background technology
At present a lot of application all need the user that password is set, for example, and chat software, E-mail address etc.Usually, these are used and also allow the user that the operation of the rear retrieving password that forgets Password is set, and for example, arrange and answer the prompting problem, after answering questions, directly password are sent to the mailbox of prior appointment; Perhaps, after answering questions, directly transmission resets the link of password etc.
Yet the people that this fetching cipher mode is familiar with easily utilizes, and causes security information to be revealed.And the user also may forget the answer of own set prompting problem sometimes, and cause finally can't retrieving password, has a strong impact on user's use.
Summary of the invention
The invention provides a kind of cipher mask method, a kind of fetching cipher method, a kind of cipher mask device and a kind of fetching cipher device.Utilize the present invention, greatly facilitate user's memory by using image (picture, photo etc.), make the user needn't remember the answer of complicated prompting problem; Simultaneously, owing to only have the user to know unique password image, greatly reduce the possibility that user cipher is revealed.When having improved the fetching cipher convenience, also improved the fail safe of password.
Particularly, according to the first scheme of the present invention, provide a kind of cipher mask method, having comprised: the encrypted message and the image that receive user's input; Described image is processed, described encrypted message is integrated in the data of described image in the mode that does not affect described image use; And return image after the processing.
Correspondingly, according to the first scheme of the present invention, also provide a kind of cipher mask device, having comprised: input unit is used for receiving encrypted message and the image that the user inputs; Graphics processing unit is used for described image is processed, and described encrypted message is integrated in the data of described image in the mode that does not affect described image use; And output unit, be used for returning the image after the processing.
Described image is the piece image that described user specifies voluntarily or takes in real time.
Described graphics processing unit is integrated into described encrypted message in the data of described image in mode not easy to identify.For example, described graphics processing unit is encrypted described encrypted message, and the encrypted message after will encrypting is integrated in the data of described image.Described graphics processing unit can adopt one of following encryption technology that described encrypted message is encrypted: RSA, DES, AES.
Described graphics processing unit utilizes digital watermark technology, described encrypted message is integrated in the data of described image.
Described graphics processing unit is integrated into described encrypted message in exchangeable image file (EXIF) data of described image.
Image after described output unit will be processed is stored in the server place, perhaps returns to the user, is stored in by the user in the memory of subscriber's local.
According to alternative plan of the present invention, a kind of fetching cipher method is provided, comprising: the image that receives user's input; Described image is processed, extracted not affect mode that described image uses and be integrated into encrypted message in the described image; And return the encrypted message that extracts.
Correspondingly, according to alternative plan of the present invention, also provide a kind of fetching cipher device, having comprised: input unit is used for receiving the image that the user inputs; Graphics processing unit is used for described image is processed, and extracts not affect mode that described image uses and is integrated into encrypted message in the described image; And output unit, be used for returning the encrypted message that extracts.
Described image is the piece image that described user selects from multiple image providing with the machine, or the piece image of appointment voluntarily.
Described encrypted message is to be integrated in the data of described image in mode not easy to identify.Described graphics processing unit is decrypted described encrypted message, and returns the encrypted message after the deciphering.Described graphics processing unit adopts one of following decryption technology that described encrypted message is decrypted: RSA, DES, AES.
Described graphics processing unit utilizes digital watermark technology, extracts described encrypted message.
Described graphics processing unit goes out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
Utilize the present invention, the user can be hidden in password in the image (picture, photo etc.) of oneself being familiar with or liking, is convenient to user's memory.And, even be familiar with very much user's people, also be difficult to know the user and adopted which image (picture, photo etc.) as the fetching cipher image, therefore, can improve the fail safe of password.Meanwhile, password of the present invention is hidden the normal use (and/or not easy to identify) that does not affect image, can realize effective use of the effectively hiding and image of password.
Description of drawings
By below in conjunction with description of drawings the preferred embodiments of the present invention, will make of the present invention above-mentioned and other objects, features and advantages are clearer, wherein:
Fig. 1 shows the schematic diagram of the application scenarios of mobile communication system 3000 of the present invention.
Fig. 2 is the sequential chart 1100 that shows the operation of cipher safety system 3000 according to first embodiment of the invention.
Fig. 3 is the sequential chart 1200 that shows the operation of cipher safety system 3000 according to second embodiment of the invention.
Fig. 4 is the sequential chart 1300 that shows the operation of cipher safety system 3000 according to third embodiment of the invention.
Fig. 5 is the sequential chart 1400 that shows the operation of cipher safety system 3000 according to fourth embodiment of the invention.
Fig. 6 shows the flow chart according to the cipher mask method 100 of the embodiment of the invention.
Fig. 7 shows the block diagram according to the cipher mask device 1000 of the embodiment of the invention.
Fig. 8 shows the flow chart according to the fetching cipher method 200 of the embodiment of the invention.
Fig. 9 shows the block diagram according to the fetching cipher device 2000 of the embodiment of the invention.
In institute of the present invention drawings attached, same or analogous structure is all with same or analogous designated.
Embodiment
To a preferred embodiment of the present invention will be described in detail, having omitted in the description process is unnecessary details and function for the present invention with reference to the accompanying drawings, obscures to prevent that the understanding of the present invention from causing.Below, the scene that is applied to mobile radio system take the present invention is example, and the present invention is described in detail.But the present invention is not limited thereto, and the present invention also can be applied to fixed communications, wired communication system, perhaps is applied to any mixed structure of fixed communications, wired communication system, mobile radio system etc.With regard to mobile communication system, the present invention is not limited to concrete mobile communication protocol, can include but not limited to 2G, 3G, 4G, 5G network, WCDMA, CDMA2000, TD-SCDMA system etc., different portable terminals can adopt identical communication protocol, also can adopt different communication protocol.The present invention is not limited to the specific operating system of portable terminal, can include but not limited to iOS, Windows Mobile, Symbian, Android etc., and different portable terminals can adopt identical operating system, also can adopt different operating system.In addition, the present invention is not limited to concrete picture format, can include but not limited to: JPEG, JPEG2000, TIFF, RIFF, PNG.
Fig. 1 shows the schematic diagram of the application scenarios of mobile communication system 3000 of the present invention.As shown in Figure 1, application scenarios 3000 can comprise server 300 and portable terminal 500.For the sake of clarity, only show a portable terminal 500 among the figure, but the present invention is not limited thereto, can comprise two ones or the portable terminal of more number more.Portable terminal 500 can be operated by user A.Portable terminal 500 can link to each other with server 300 by communication network 400.The example of communication network 400 can include but not limited to: the Internet, mobile communications network.Communication link between server 300 and the portable terminal 500 can be safe or encrypt, do not revealed with account and the encrypted message of guaranteeing user A.
Portable terminal 500 can comprise the cryptosecurity client (not shown) that is installed in wherein.The cryptosecurity client can be installed in the portable terminal 500 with the form of software voluntarily by user A, perhaps can be installed in the portable terminal 500 with the form of hardware or firmware by portable terminal production firm.
User A can or set account and password 520 to server 300 registrations by portable terminal 500 access servers 300, for example, and by webpage or be installed in cryptosecurity client on the portable terminal 500.After user A registration or setting account and password 520, whether server 300 or portable terminal 500 (cryptosecurity client) can arrange fetching cipher operation (being described in detail in connection with Fig. 2~5 after a while) by prompting user A.User A finishes after the fetching cipher operation setting, in case user A forgets Password 520, and set password 520 before user A can fetch by server 300 or portable terminal 500 (cryptosecurity client).
Fig. 2 is the sequential chart 1100 that shows the operation of cipher safety system 3000 according to first embodiment of the invention.
As shown in Figure 2, portable terminal 500 (cryptosecurity client) is finished the processing of hidden encrypted message 520, and server 300 is finished the processing of retrieving password information 520.
Hookup 1, user A select to arrange the fetching cipher operation, and at step S110, portable terminal 500 (cryptosecurity client) receives encrypted message 520 and image 510.For the situation by web page access server 300, when user A selects to arrange the fetching cipher operation, server 300 is notified the fetching cipher operation setting request (password 520 (S1105) that can comprise user A) of user A to portable terminal 500 (cryptosecurity client), and portable terminal 500 prompting user A provide image 510.For by being installed in the situation of cryptosecurity client (password 520 of the known users A) access server 300 on the portable terminal 500, when user A selected to arrange the fetching cipher operation, portable terminal 500 (cryptosecurity client) directly prompting user A provided image 510.For example, user A can choose the image 510 of having stored or take in real time piece image 510 from portable terminal 500 this locality.
At step S120, portable terminal 500 (cryptosecurity client) is processed the selected image 510 of user A, and encrypted message 520 is integrated in the data of image 510 in the mode that does not affect image 510 uses, generates the image 510 ' after processing.For example, as the example of the operation that does not affect image 510 uses, portable terminal 500 can be integrated into encrypted message 520 in the EXIF data of image 510, generates the image 510 ' after processing.As another example of the operation that does not affect image 510 uses, portable terminal 500 can utilize digital watermark technology, encrypted message 520 is integrated in the data of image 510, generates the image 510 ' after processing.In addition, portable terminal 500 can be in the data that encrypted message 520 are integrated into image 510 before, encrypted message 520 is encrypted, thereby the encrypted message after will encrypting (not easy to identify) is integrated in the data of image 510, as the example of encryption technology, can include but not limited to RSA, DES, AES etc.
At step S130, portable terminal 500 (cryptosecurity client) returns the image 510 ' after the processing.For the image 510 ' that generates, portable terminal 500 can prompting user A uploads onto the server 300, be kept at portable terminal 500 this locality or not only uploaded onto the server 300 but also be kept at portable terminal 500 this locality.User A can be stored in the optional position with the image 510 ' that generates, and includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.For example, as shown in Figure 2, according to the selection of user A, at step S1115, portable terminal 500 is uploaded onto the server the image 510 ' that generates and 300 is preserved (server 300 can be stored the account of image 510 ' with user A explicitly).
When user A forgets Password, user A can pass through portable terminal 500 (or other portable terminals or fixed terminal, as long as can access server 300 and can access image 510 ') carry out fetching cipher and operate.User A provides the account number of registering to server 300, and selects with the image mode retrieving password.At step S210, server 300 receives image 510 '.Image be selected or be uploaded voluntarily to server 300 can by prompting user A from the image that system provides.If user A selects to upload voluntarily image, then server 300 can obtain image 510 ' from the optional position of user A appointment, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.For example, as shown in Figure 2, server 300 receives the image (S1125) that user A uploads from portable terminal 500.If user A selects to select from the image that system provides, then server 300 provides multiple image (for example, 20 width of cloth images) (other images in this multiple image that (wherein comprise the image 510 ' that is saved in before the user A on the server 300), can be that server 300 adds voluntarily, also can be that user A adds before), selected by user A.After user A had uploaded or selected correct image 510 ', at step S220,300 pairs of images 510 ' of server were processed, and extracted not affect mode that image 510 ' uses and were integrated into encrypted message 520 in the image 510 '.At step S230, server 300 returns encrypted message 520.Server 300 can directly return to encrypted message 520 portable terminal 500 (S1135) and show, perhaps encrypted message 520 is returned to appointment before the user A the position (as, e-mail address, phone number etc.).In addition, can also stipulate that user A can only attempt (comprising the selection of image uploading and image) limited number of times, for example, 3 times, if 3 all failures then can not try again, and can only utilize other modes fetch (such as, carrying part certificate is fetched to operator), also can be set in whens failure all 3 times, empty the full content in the account.
Fig. 3 is the sequential chart 1200 that shows the operation of cipher safety system 3000 according to second embodiment of the invention.
As shown in Figure 3, server 300 is finished the processing of hidden encrypted message 520, and portable terminal 500 (cryptosecurity client) is finished the processing of retrieving password information 520.
Hookup 1, user A select to arrange the fetching cipher operation, and at step S110, server 300 receives encrypted message 520 and image 510.Encrypted message 520 can obtain at server 300 places, and image 510 can be by user A by portable terminal 500 (cryptosecurity client) 300 (S1205) that upload onto the server.Server 300 can provide image 510 by webpage or cryptosecurity Client-Prompt user A.For example, user A can choose the image 510 of having stored or take in real time piece image 510 from portable terminal 500 this locality.
At step S120, the selected image 510 of 300 couples of user A of server is processed, and encrypted message 520 is integrated in the data of image 510 in the mode that does not affect image 510 uses, generates the image 510 ' after processing.For example, as the example of the operation that does not affect image 510 uses, server 300 can be integrated into encrypted message 520 in the EXIF data of image 510, generates the image 510 ' after processing.As another example of the operation that does not affect image 510 uses, server 300 can utilize digital watermark technology, encrypted message 520 is integrated in the data of image 510, generates the image 510 ' after processing.In addition, server 300 can be in the data that encrypted message 520 are integrated into image 510 before, encrypted message 520 is encrypted, thereby the encrypted message after will encrypting (not easy to identify) is integrated in the data of image 510, as the example of encryption technology, can include but not limited to RSA, DES, AES etc.
At step S130, server 300 returns the image 510 ' after the processing.For the image 510 ' that generates, server 300 can upload onto the server 300 by webpage or cryptosecurity Client-Prompt user A, be kept at portable terminal 500 this locality or not only uploaded onto the server 300 but also be kept at portable terminal 500 this locality.User A can be stored in the optional position with the image 510 ' that generates, and includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.For example, as shown in Figure 3, according to the selection of user A, at step S1215, server 300 is sent to portable terminal 500 (cryptosecurity client) with the image 510 ' that generates and preserves.
When user A forgot Password, user A can pass through portable terminal 500 (cryptosecurity client) and carry out the fetching cipher operation.At step S210, portable terminal 500 (cryptosecurity client) receives image 510 '.Image be selected or be selected voluntarily to portable terminal 500 (cryptosecurity client) can by prompting user A from the image that system provides.If user A selects to select voluntarily image, then portable terminal 500 (cryptosecurity client) can obtain image 510 ' from the optional position of user A appointment, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.If user A selects to select from the image that system provides, then portable terminal 500 (cryptosecurity client) provides multiple image (for example, 20 width of cloth images) (wherein comprising the image 510 ' of preserving before the user A), is selected by user A.Other images in this multiple image can be that portable terminal 500 (cryptosecurity client)/server 300 adds voluntarily, also can be that user A adds before.For example, as shown in Figure 3, portable terminal 500 (cryptosecurity client) can receive image 510 ' (S1125) (at this moment from server 300, need to provide to server 300 account information of user A), server 300 can only return image 510 ', also can also can return in the lump to comprise image 510 ' at interior multiple image.After user A had selected correct image 510 ', at step S220, portable terminal 500 (cryptosecurity client) was processed image 510 ', extracted not affect mode that image 510 ' uses and was integrated into encrypted message 520 in the image 510 '.At step S230, portable terminal 500 (cryptosecurity client) returns encrypted message 520.Portable terminal 500 (cryptosecurity client) is display password information 520 directly, perhaps encrypted message 520 is returned to appointment before the user A the position (as, e-mail address, phone number etc.).In addition, can also stipulate that user A can only attempt (selection image) limited number of times, for example, 3 times, if 3 all failures then can not try again, and can only utilize other modes fetch (such as, carrying part certificate is fetched to operator), also can be set in whens failure all 3 times, empty the full content in the account.
Fig. 4 is the sequential chart 1300 that shows the operation of cipher safety system 3000 according to third embodiment of the invention.
As shown in Figure 4, server 300 had both been finished the processing of hidden encrypted message 520, finished again the processing of retrieving password information 520.
Hookup 1, user A select to arrange the fetching cipher operation, and at step S110, server 300 receives encrypted message 520 and image 510.Encrypted message 520 can obtain at server 300 places, and image 510 can be by user A by portable terminal 500 (cryptosecurity client) 300 (S1305) that upload onto the server.Server 300 can provide image 510 by webpage or cryptosecurity Client-Prompt user A.For example, user A can choose the image 510 of having stored or take in real time piece image 510 from portable terminal 500 this locality.
At step S120, the selected image 510 of 300 couples of user A of server is processed, and encrypted message 520 is integrated in the data of image 510 in the mode that does not affect image 510 uses, generates the image 510 ' after processing.For example, as the example of the operation that does not affect image 510 uses, server 300 can be integrated into encrypted message 520 in the EXIF data of image 510, generates the image 510 ' after processing.As another example of the operation that does not affect image 510 uses, server 300 can utilize digital watermark technology, encrypted message 520 is integrated in the data of image 510, generates the image 510 ' after processing.In addition, server 300 can be in the data that encrypted message 520 are integrated into image 510 before, encrypted message 520 is encrypted, thereby the encrypted message after will encrypting (not easy to identify) is integrated in the data of image 510, as the example of encryption technology, can include but not limited to RSA, DES, AES etc.
At step S130, server 300 returns the image 510 ' after the processing.For the image 510 ' that generates, server 300 can upload onto the server 300 by webpage or cryptosecurity Client-Prompt user A, be kept at portable terminal 500 this locality or not only uploaded onto the server 300 but also be kept at portable terminal 500 this locality.User A can be stored in the optional position with the image 510 ' that generates, and includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.For example, as shown in Figure 4, according to the selection of user A, at step S1215, server 300 is sent to portable terminal 500 (cryptosecurity client) with the image 510 ' that generates and preserves.
When user A forgets Password, user A can pass through portable terminal 500 (or other portable terminals or fixed terminal, as long as can access server 300 and can access image 510 ') carry out fetching cipher and operate.User A provides the account number of registering to server 300, and selects with the image mode retrieving password.At step S210, server 300 receives image 510 '.Image be selected or be uploaded voluntarily to server 300 can by prompting user A from the image that system provides.If user A selects to upload voluntarily image, then server 300 can obtain image 510 ' from the optional position of user A appointment, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.For example, as shown in Figure 4, server 300 receives the image (S1325) that user A uploads from portable terminal 500.If user A selects to select from the image that system provides, then server 300 provides multiple image (for example, 20 width of cloth images) (other images in this multiple image that (wherein comprise the image 510 ' that is saved in before the user A on the server 300), can be that server 300 adds voluntarily, also can be that user A adds before), selected by user A.After user A had uploaded or selected correct image 510 ', at step S220,300 pairs of images 510 ' of server were processed, and extracted not affect mode that image 510 ' uses and were integrated into encrypted message 520 in the image 510 '.At step S230, server 300 returns encrypted message 520.Server 300 can directly return to encrypted message 520 portable terminal 500 (S1335) and show, perhaps encrypted message 520 is returned to appointment before the user A the position (as, e-mail address, phone number etc.).In addition, can also stipulate that user A can only attempt (comprising the selection of image uploading and image) limited number of times, for example, 3 times, if 3 all failures then can not try again, and can only utilize other modes fetch (such as, carrying part certificate is fetched to operator), also can be set in whens failure all 3 times, empty the full content in the account.
Fig. 5 is the sequential chart 1400 that shows the operation of cipher safety system 3000 according to fourth embodiment of the invention.
As shown in Figure 5, portable terminal 500 (cryptosecurity client) had both been finished the processing of hidden encrypted message 520, finished again the processing of retrieving password information 520.
Hookup 1, user A select to arrange the fetching cipher operation, and at step S110, portable terminal 500 (cryptosecurity client) receives encrypted message 520 and image 510.For the situation by web page access server 300, when user A selects to arrange the fetching cipher operation, server 300 is notified the fetching cipher operation setting request (password 520 (S1405) that can comprise user A) of user A to portable terminal 500 (cryptosecurity client), and portable terminal 500 prompting user A provide image 510.For by being installed in the situation of cryptosecurity client (password 520 of the known users A) access server 300 on the portable terminal 500, when user A selected to arrange the fetching cipher operation, portable terminal 500 (cryptosecurity client) directly prompting user A provided image 510.For example, user A can choose the image 510 of having stored or take in real time piece image 510 from portable terminal 500 this locality.
At step S120, portable terminal 500 (cryptosecurity client) is processed the selected image 510 of user A, and encrypted message 520 is integrated in the data of image 510 in the mode that does not affect image 510 uses, generates the image 510 ' after processing.For example, as the example of the operation that does not affect image 510 uses, portable terminal 500 can be integrated into encrypted message 520 in the EXIF data of image 510, generates the image 510 ' after processing.As another example of the operation that does not affect image 510 uses, portable terminal 500 can utilize digital watermark technology, encrypted message 520 is integrated in the data of image 510, generates the image 510 ' after processing.In addition, portable terminal 500 can be in the data that encrypted message 520 are integrated into image 510 before, encrypted message 520 is encrypted, thereby the encrypted message after will encrypting (not easy to identify) is integrated in the data of image 510, as the example of encryption technology, can include but not limited to RSA, DES, AES etc.
At step S130, portable terminal 500 (cryptosecurity client) returns the image 510 ' after the processing.For the image 510 ' that generates, portable terminal 500 can prompting user A uploads onto the server 300, be kept at portable terminal 500 this locality or not only uploaded onto the server 300 but also be kept at portable terminal 500 this locality.User A can be stored in the optional position with the image 510 ' that generates, and includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.For example, as shown in Figure 5, according to the selection of user A, at step S1415, portable terminal 500 is uploaded onto the server the image 510 ' that generates and 300 is preserved (server 300 can be stored the account of image 510 ' with user A explicitly).
When user A forgot Password, user A can pass through portable terminal 500 (cryptosecurity client) and carry out the fetching cipher operation.At step S210, portable terminal 500 (cryptosecurity client) receives image 510 '.Image be selected or be selected voluntarily to portable terminal 500 (cryptosecurity client) can by prompting user A from the image that system provides.If user A selects to select voluntarily image, then portable terminal 500 (cryptosecurity client) can obtain image 510 ' from the optional position of user A appointment, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.If user A selects to select from the image that system provides, then portable terminal 500 (cryptosecurity client) provides multiple image (for example, 20 width of cloth images) (wherein comprising the image 510 ' of preserving before the user A), is selected by user A.Other images in this multiple image can be that portable terminal 500 (cryptosecurity client)/server 300 adds voluntarily, also can be that user A adds before.For example, as shown in Figure 5, portable terminal 500 (cryptosecurity client) can receive image 510 ' (S1425) (at this moment from server 300, need to provide to server 300 account information of user A), server 300 can only return image 510 ', also can return in the lump to comprise image 510 ' at interior multiple image.After user A had selected correct image 510 ', at step S220, portable terminal 500 (cryptosecurity client) was processed image 510 ', extracted not affect mode that image 510 ' uses and was integrated into encrypted message 520 in the image 510 '.At step S230, portable terminal 500 (cryptosecurity client) returns encrypted message 520.Portable terminal 500 (cryptosecurity client) is display password information 520 directly, perhaps encrypted message 520 is returned to appointment before the user A the position (as, e-mail address, phone number etc.).In addition, can also stipulate that user A can only attempt (selection image) limited number of times, for example, 3 times, if 3 all failures then can not try again, and can only utilize other modes fetch (such as, carrying part certificate is fetched to operator), also can be set in whens failure all 3 times, empty the full content in the account.
Fig. 6 shows the flow chart according to the cipher mask method 100 of the embodiment of the invention.As shown in Figure 6, cipher mask method 100 can comprise step S110, S120 and S130.
Fig. 7 shows the block diagram according to the cipher mask device 1000 of the embodiment of the invention.As shown in Figure 7, password masking device 100 can comprise input unit 1100, graphics processing unit 1200 and output unit 1300.Input unit 1100 is used for receiving encrypted message and the image of user's input.Graphics processing unit 1200 is used for described image is processed, and described encrypted message is integrated in the data of described image in the mode that does not affect described image use.Output unit 1300 is used for returning the image after the processing.
Below with reference to Fig. 1~7, cipher mask method 100 and cipher mask device 1000 according to the embodiment of the invention are described in detail.The cipher mask method 100 and the cipher mask device 1000 that should be noted that the embodiment of the invention both can be realized in the server 300 shown in Fig. 1~5, also can realize that in the portable terminal 500 shown in Fig. 1~5 the present invention is not limited thereto.
At step S110, the input unit 1100 of cipher mask device 1000 receives encrypted message 520 and the image 510 of user A input.For example, image 510 is piece images that user A specifies voluntarily or takes in real time.
At step S120,1200 pairs of images 510 of the graphics processing unit of cipher mask device 1000 are processed, and encrypted message 520 is integrated in the data of image 510 in the mode that does not affect image 510 uses, generate the image 510 ' after processing.For example, as the example of the operation that does not affect image 510 uses, graphics processing unit 1200 can be integrated into encrypted message 520 in the EXIF data of image 510, generates the image 510 ' after processing.As another example of the operation that does not affect image 510 uses, graphics processing unit 1200 can utilize digital watermark technology, encrypted message 520 is integrated in the data of image 510, generates the image 510 ' after processing.In addition, graphics processing unit 1200 can be in the data that encrypted message 520 are integrated into image 510 before, encrypted message 520 is encrypted, thereby the encrypted message after will encrypting (not easy to identify) is integrated in the data of image 510, as the example of encryption technology, can include but not limited to RSA, DES, AES etc.
At last, at step S130, the output unit 1300 of cipher mask device 1000 returns the image 510 ' after the processing.Image 510 ' can be stored in the optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.
Fig. 8 shows the flow chart according to the fetching cipher method 200 of the embodiment of the invention.As shown in Figure 8, fetching cipher method 200 can comprise step S202, S204, S210, S220 and S230.Should be noted that wherein step S202 and S204 are optional steps.
Fig. 9 shows the block diagram according to the fetching cipher device 2000 of the embodiment of the invention.As shown in Figure 9, password masking device 200 can comprise input unit 2100, graphics processing unit 2200 and output unit 2300.Input unit 2100 is used for receiving the image of user's input.Graphics processing unit 2200 is used for described image is processed, and extracts not affect mode that described image uses and is integrated into encrypted message in the described image.Output unit 2300 is used for returning the encrypted message that extracts.
Below with reference to Fig. 1~5,8 and 9, fetching cipher method 200 and fetching cipher device 2000 according to the embodiment of the invention are described in detail.The fetching cipher method 200 and the fetching cipher device 2000 that should be noted that the embodiment of the invention both can be realized in the server 300 shown in Fig. 1~5, also can realize that in the portable terminal 500 shown in Fig. 1~5 the present invention is not limited thereto.
At step S202, fetching cipher device 2000 (for example, input unit 2100 or output unit 2300) prompting user A selects image.
At step S210, the input unit 2100 of fetching cipher device 2000 receives the image 510 ' of user A input.For example, image 510 ' is the piece image that user A selects from multiple image providing with the machine, or the piece image of appointment voluntarily.Image 510 ' can be specified from the optional position by user A, includes but not limited to the portable memory apparatus (SD card, USB flash disk, portable hard drive etc.) of portable terminal 500, server 300, user A.
At step S220,2200 pairs of images 510 ' of the graphics processing unit of fetching cipher device 2000 are processed, and extract not affect mode that image 510 ' uses and are integrated into encrypted message 520 in the image 510 '.For example, as the example of the operation that does not affect image 510 ' use, encrypted message 520 can be to be integrated in the EXIF data of image 510 ', and graphics processing unit 2200 goes out encrypted message 520 from the EXIF extracting data of image 510 '.As another example of the operation that does not affect image 510 ' use, encrypted message 520 can be to utilize digital watermark technology to be integrated in the data of image 510, and graphics processing unit 2200 utilizes digital watermark technology, extracts encrypted message 520.In addition, encrypted message 520 can be in being integrated into the data of image 510 ' before encrypted (not easy to identify), 2200 pairs of encrypted messages that extract from image 510 ' of graphics processing unit are decrypted, obtain encrypted message 520, as the example of decryption technology, can include but not limited to RSA, DES, AES etc.
At step S204, whether correctly fetching cipher device 2000 (graphics processing unit 2200 or output unit 2300) judges selected image (that is, whether extracting correct encrypted message 520 (for example, non-NULL)).If determine to extract correct encrypted message 520 (step S204: be), then execution in step S230.If determine not extract correct encrypted message 520 (step S204: no), then return step S202, prompting user A reselects image.Step S204 may be limited to predetermined limited number of times to the circulation of step S202, for example, 3 times, if 3 all failures, then can not try again, and can only utilize other modes fetch (such as, carrying part certificate is fetched to operator), also can be set in whens failure all 3 times, empty the full content in the account.
At last, at step S230, the output unit 2300 of fetching cipher device 2000 returns the encrypted message 520 that extracts.Encrypted message 520 directly can be shown at the screens of portable terminal 500, perhaps encrypted message 520 can be returned to appointment before the user A the position (as, e-mail address, phone number etc.).
So far invention has been described in conjunction with the preferred embodiments.Should be appreciated that those skilled in the art can carry out various other change, replacement and interpolations in the situation that does not break away from the spirit and scope of the present invention.Therefore, scope of the present invention is not limited to above-mentioned specific embodiment, and should be limited by claims.

Claims (30)

1. a cipher mask method (100) comprising:
Receive encrypted message and the image (S110) of user's input;
Described image is processed, described encrypted message is integrated in the mode that does not affect described image and use in the data of described image (S120); And
Return the image (S130) after the processing.
2. cipher mask method according to claim 1 (100), wherein said image are the piece images that described user specifies voluntarily or takes in real time.
3. cipher mask method according to claim 1 (100) wherein is integrated into described encrypted message in the data of described image in mode not easy to identify.
4. cipher mask method according to claim 3 (100) wherein is encrypted described encrypted message, and the encrypted message after will encrypting is integrated in the data of described image.
5. cipher mask method according to claim 4 (100) wherein adopts one of following encryption technology that described encrypted message is encrypted: RSA, DES, AES.
6. one of according to claim 1~5 described cipher mask method (100) is wherein utilized digital watermark technology, described encrypted message is integrated in the data of described image.
7. one of according to claim 1~5 described cipher mask method (100) wherein is integrated into described encrypted message in exchangeable image file (EXIF) data of described image.
8. described cipher mask method (100) one of according to claim 1~7, the image after wherein will processing is stored in the server place, perhaps is stored in the memory of subscriber's local.
9. a fetching cipher method (200) comprising:
Receive the image (S210) of user's input;
Described image is processed, extracted not affect mode that described image uses and be integrated into encrypted message (S220) in the described image; And
Return the encrypted message (S230) that extracts.
10. fetching cipher method according to claim 9 (200), wherein said image is the piece image that described user selects from multiple image providing with the machine, or the piece image of appointment voluntarily.
11. fetching cipher method according to claim 9 (200), wherein said encrypted message are to be integrated in the data of described image in mode not easy to identify.
12. fetching cipher method according to claim 11 (200) wherein is decrypted described encrypted message, and returns the encrypted message after the deciphering.
13. fetching cipher method according to claim 12 (200) wherein adopts one of following decryption technology that described encrypted message is decrypted: RSA, DES, AES.
14. one of according to claim 9~13 described fetching cipher method (200) is wherein utilized digital watermark technology, extracts described encrypted message.
15. described fetching cipher method (200) one of according to claim 1~5, wherein exchangeable image file (EXIF) extracting data from described image goes out described encrypted message.
16. a cipher mask device (1000) comprising:
Input unit (1100) is used for receiving encrypted message and the image that the user inputs;
Graphics processing unit (1200) is used for described image is processed, and described encrypted message is integrated in the data of described image in the mode that does not affect described image use; And
Output unit (1300) is used for returning the image after the processing.
The piece image that 17. cipher mask device according to claim 16 (1000), wherein said image are described users specifies voluntarily or take in real time.
18. cipher mask device according to claim 16 (1000), wherein said graphics processing unit (1200) is integrated into described encrypted message in the data of described image in mode not easy to identify.
19. cipher mask device according to claim 18 (1000), wherein said graphics processing unit (1200) is encrypted described encrypted message, and the encrypted message after will encrypting is integrated in the data of described image.
20. cipher mask device according to claim 19 (1000), wherein said graphics processing unit (1200) adopt one of following encryption technology that described encrypted message is encrypted: RSA, DES, AES.
21. described cipher mask device (1000) one of according to claim 16~20, wherein said graphics processing unit (1200) utilizes digital watermark technology, described encrypted message is integrated in the data of described image.
22. described cipher mask device (1000) one of according to claim 16~20, wherein said graphics processing unit (1200) is integrated into described encrypted message in exchangeable image file (EXIF) data of described image.
23. described cipher mask device (1000) one of according to claim 16~22, the image after wherein said output unit (1100) will be processed is stored in the server place, perhaps returns to the user, is stored in by the user in the memory of subscriber's local.
24. a fetching cipher device (2000) comprising:
Input unit (2100) is used for receiving the image that the user inputs;
Graphics processing unit (2200) is used for described image is processed, and extracts not affect mode that described image uses and is integrated into encrypted message in the described image; And
Output unit (2300) is used for returning the encrypted message that extracts.
25. fetching cipher device according to claim 24 (2000), wherein said image are the piece images that described user selects from multiple image providing with the machine, or the piece image of appointment voluntarily.
26. fetching cipher device according to claim 24 (2000), wherein said encrypted message are to be integrated in the data of described image in mode not easy to identify.
27. fetching cipher device according to claim 26 (2000), wherein said graphics processing unit (2200) is decrypted described encrypted message, and returns the encrypted message after the deciphering.
28. fetching cipher device according to claim 27 (2000), wherein said graphics processing unit (2200) adopt one of following decryption technology that described encrypted message is decrypted: RSA, DES, AES.
29. described fetching cipher device (2000) one of according to claim 24~28, wherein said graphics processing unit (2200) utilizes digital watermark technology, extracts described encrypted message.
30. described fetching cipher device (2000) one of according to claim 24~28, wherein said graphics processing unit (2200) goes out described encrypted message from exchangeable image file (EXIF) extracting data of described image.
CN2012105643874A 2012-12-21 2012-12-21 Password hidden method and device and password retrieval method and device Pending CN103067367A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2012105643874A CN103067367A (en) 2012-12-21 2012-12-21 Password hidden method and device and password retrieval method and device
PCT/CN2013/072387 WO2014094388A1 (en) 2012-12-21 2013-03-11 Password hiding method and apparatus, and password retrieval method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105643874A CN103067367A (en) 2012-12-21 2012-12-21 Password hidden method and device and password retrieval method and device

Publications (1)

Publication Number Publication Date
CN103067367A true CN103067367A (en) 2013-04-24

Family

ID=48109829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105643874A Pending CN103067367A (en) 2012-12-21 2012-12-21 Password hidden method and device and password retrieval method and device

Country Status (2)

Country Link
CN (1) CN103067367A (en)
WO (1) WO2014094388A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429959A (en) * 2015-11-02 2016-03-23 北京旷视科技有限公司 Image processing method, client equipment, image verification method and server
WO2017128788A1 (en) * 2016-01-25 2017-08-03 上海斐讯数据通信技术有限公司 Sharing method and sharing system of wifi password
CN107180342A (en) * 2017-07-28 2017-09-19 广东工业大学 A kind of guard method of block chain private key, apparatus and system
CN110545263A (en) * 2019-08-15 2019-12-06 咪咕视讯科技有限公司 Decryption method, encryption method, terminal device, server and readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359989A (en) * 2008-09-03 2009-02-04 深圳华为通信技术有限公司 Method, apparatus and mobile communication terminal generating safe digital photograph

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH099075A (en) * 1995-06-22 1997-01-10 Murata Mach Ltd Cipher image communication equipment
CN102164366A (en) * 2011-01-30 2011-08-24 广西师范大学 Message-hidden mobile phone information safety communication method based on JPEG (joint photographic experts group) image
CN102184380B (en) * 2011-05-10 2014-12-17 华南农业大学 Color-superposition two-dimension code system and application method thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359989A (en) * 2008-09-03 2009-02-04 深圳华为通信技术有限公司 Method, apparatus and mobile communication terminal generating safe digital photograph

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
41学习: "《把密码隐藏到图片里》", 《百度经验》, 29 August 2011 (2011-08-29) *
尤新刚等: "《多媒体信息技术及安全概述》", 《信息安全与通信保密》, 31 October 2011 (2011-10-31) *
张毅,梅挺: "《针对 JPEG 格式的数字隐写与隐写分析》", 《电子设计工程》, no. 2, 31 January 2012 (2012-01-31) *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429959A (en) * 2015-11-02 2016-03-23 北京旷视科技有限公司 Image processing method, client equipment, image verification method and server
US10356063B2 (en) 2015-11-02 2019-07-16 Beijing Kuangshi Technology Co., Ltd. Image processing method and client device, image authentication method and server device
CN105429959B (en) * 2015-11-02 2019-08-16 北京旷视科技有限公司 Image processing method and client device, image authentication method and server
WO2017128788A1 (en) * 2016-01-25 2017-08-03 上海斐讯数据通信技术有限公司 Sharing method and sharing system of wifi password
CN107180342A (en) * 2017-07-28 2017-09-19 广东工业大学 A kind of guard method of block chain private key, apparatus and system
CN110545263A (en) * 2019-08-15 2019-12-06 咪咕视讯科技有限公司 Decryption method, encryption method, terminal device, server and readable storage medium

Also Published As

Publication number Publication date
WO2014094388A1 (en) 2014-06-26

Similar Documents

Publication Publication Date Title
CN102970307B (en) Cipher safety system and password safety method
JP5893169B2 (en) Anti-theft protection method and device for mobile phone
US9800925B2 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
US9495530B2 (en) Wireless security configuration
CN104602238B (en) A kind of wireless network connecting method, device and system
JP6814147B2 (en) Terminals, methods, non-volatile storage media
US20110072263A1 (en) Device Pairing Based on Graphically Encoded Data
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
US9467860B2 (en) Wireless security configuration
US10097666B2 (en) Accessing a service using an encrypted token
JPWO2008010275A1 (en) Media data processing apparatus and media data processing method
CN107196917B (en) Service response method and middleware thereof
US9479678B1 (en) Method and device for image processing, and storage medium
JP6277868B2 (en) Document management system, document reproduction device, document management method, and computer program
CN103020504A (en) Image management system and image management method based on fingerprint identification
CN103067367A (en) Password hidden method and device and password retrieval method and device
JP6397046B2 (en) Address book protection method, apparatus and communication system
CN105743917B (en) Message transmission method and terminal
CN106203141A (en) The data processing method of a kind of application and device
WO2016141797A1 (en) Information processing method and apparatus, and computer-readable medium
CN105635100A (en) Information encryption method, information decryption method and terminal
CN106385684B (en) Method and device for sharing wireless network and method and device for accessing wireless network
CN105025203A (en) Image encryption and decryption method combining physiological features and image capture device thereof
CN111314207B (en) Instant communication receiving method, device and equipment
JP2020140735A (en) Apparatus and method for camera-based user authentication for content access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130424