Personate photograph producing method used for keep input secret and method of use thereof

A technology for generating methods and pictures, applied in the field of computer information, can solve the problems of single, unsuitable for high security systems, password danger of U disk, etc., and achieve the effect of convenient use

Inactive Publication Date: 2008-04-16
姚华
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hiding meaningful conceptual information in a special visual picture makes it easy for people to see the specific image and understand its meaning, but it is difficult or impossible for computers to recognize and understand
However, simple camouflaged pictures, such as the verification code pictures commonly used on websites, are easily recognized by computers because of the insufficient concealment of the camouflaged method and features, thus losing the effect of forcing people to identify
In addition, the current method of using camouflaged pictures is also relatively single, mainly by people reading the symbols in the pictures and then inputting them into the input box. These methods are not suitable for high security systems, because keyboard input cannot prevent Trojans monitor
Simple camouflage and a single application method make the picture very predictable, and it is very easy to be automatically recognized by a Trojan horse program with pattern recognition technology. For example, if you insert an encrypted USB flash drive into a computer with unknown security, you must enter U The password of the U disk, if there is a Trojan horse in the computer, the password of the U disk is dangerous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with embodiment.

[0021] The present invention provides a high-end camouflage picture, which makes computer pattern recognition useless, and even if someone monitors through the screen, they cannot understand what content is being input, so as to realize confidential input. Forcing the analysis capabilities of computers and humans to be unable to combine, humans cannot provide analysis rules to computing programs, and computers cannot provide meaningful information analysis to humans, thus forcing deciphering to completely enter the state of manual analysis, and computers take on the role of picture transmission at most .

[0022] The camouflage picture used for confidential input in the present invention is formed by hiding the concept picture in the background picture, and the operator realizes the confidential input with the trusted machine through other machines by means of the camouflage picture....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a generation method and a use method of camouflage picture used in secure input, wherein, a credible machine can be preinstalled with a background picture, a conceptual picture and corresponding conceptual information through other machines; moreover, the conceptual picture and corresponding conceptual information are concealed in the background picture in random distribution; the corresponding relation of the coordinate region and the conceptual information of the conceptual picture is stored to form a camouflage picture; in addition, a camouflage picture preappointed with a person knowing the range is generated through creating concealed appointment mode between an operator and the credible machine. During use, the credible machine which displays a combined camouflage picture and clicks the corresponding area on another machine through a driver judges the character to be input by the operator according to the returned click position coordinate; therefore, the credible machine realizes information input by certain means. Through adopting the camouflage picture based on image, the invention determines the input content through clicking corresponding image position information in the picture by a mouse keystroke; therefore, secure input for computer is realized along with convenience and shortcut in use.

Description

technical field [0001] The invention belongs to the field of computer information, and in particular relates to a method for generating a camouflage picture and a method for using the same, so as to realize safe and confidential input of a computer. Background technique [0002] In the process of receiving, processing and providing data with the help of computers, people will inevitably face the danger of leaking secrets, which is hard to guard against. Inputting with a computer keyboard or clicking characters with a mouse may be discovered and understood by others. Even if security measures are taken, such as encryption, the existing internal information of the computer may be discovered by others or deciphered by programs in the computer. Therefore confidential input is crucial to improving the security in computer use. [0003] In the prior art, in order to prevent leakage of secrets, camouflaged pictures are used for confidential input. Hiding meaningful conceptual inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/83
Inventor 唐荣华
Owner 姚华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products