1344856 九、發明說明: 【發明所屬之技術領域】 本發明係有關於一種電子式刮刮樂系統與方法(electr〇nic scratch system and method),特別是有關於一種利用視覺密碼技術 之電子式刮刮樂系統與方法,可取代傳統的紙張刮刮樂。 【先前技術】 電子與網路社會的興起’傳統的日常生活正逐漸地為電子化 所取代,沒有人敢忽略數位時代的重要性。在電子化逐漸顚覆傳 統商品之際,越來越多的商品利用電子與資訊技術,逐步將原本 的商品導入數位化,電子化之商品不僅提供廠商新的市場機會, 也為現代生活提供了便利的服務。 曰 在資訊發展的技術之下,許多資訊上之加密與解密方法亦可 以應用於日常生活需要加密與解密之商品,進而將此類之商品電 子化。譬如RSA加密演算法即是一種特殊的非對稱密碼法,利 用,個質數作為加密與解密的兩個鑰匙,分別是公開鑰匙與私人 ,匙。公開鑰匙作為加密,只有使用私人鑰匙才能解密,解密者 只,不洩漏私人鑰匙,別人就算有公開鑰匙,也很難推算出私人 輸i即使疋利用反向工程也不是件簡單的事,所以RSA演算 以說是—種十分安全的加密與解密演算法。另外如視覺密碼 ^^lsual cryptography technique) ’亦是一種用來秘密分享的加 席丨一 術之糊樂商品大多是_-張紙並在隱藏資料上印 料’丨當使用,者刮除保護膜之後,可以得知隱藏資 =者需要刮除保護膜之後才能看㈣^ 、-缺點疋、、、氏張不防水且容易腐爛,長久之下保護膜也容易 (S ) 5 ^44856 磨掉 法,決料係在於提供-種電子式到到樂系統與方 【發明内容】 以及處理單元。 °己隐早凡、顯示單元 分享預ί利5視覺密碼技術將—機密影像加密成-第- ;=享一以口⑻ 塊與複數個第二方塊,並且在顯i 切割成複數個第一方 的其中之一。當複數個ί域第二方塊 5V並且在顯不單凡上顯示上述之可辨識影像。 5 $2_機_進行加密,可 == 3 := 子ί置呈現之方式,使二= 提供互動式之呈現效果,進而達到電子化之目的。 1344856 關於本發明之優點與精神可以藉由以下的發明詳述及所附圖 式得到進一步的瞭解。 【實施方式】 /凊參閱圖一,圖一係繪示本發明一具體實施例之電子式刮刮 樂系統1之外觀圖。電子式刮刮樂***1包含儲存裝置⑼ device)10以及電子裴置(electr〇nic device)12。儲存裝置1〇可為 你硬碟(11±111^1(1(1131<:)或記憶卡(11祀„1〇17(^(1),其中記憶卡可為快 閃記憶卡(__ flash card,cF _)、xD 圖像卡(xD pic^ Card)、安全數位記憶卡(Secured Digital card, SD car(J)、多媒體 (Multi Media Card,MMC)、智慧媒體卡(Smart Media —咖 card)、記憶棒(Memory Stick)等。電子裝置12可為行動電話 人數位助理、掌上型電腦等。 ,如圖所示’電子裝置12包含顯示單元以以及插槽。 ίΐΐ者置Λ〇***插槽128,電子裝置12即可從儲存 裝置0接收貝料。而5兄明的是,電子裝置12亦 線傳輸,從儲存裝置1G接收資料。 ^ 請參酬二,圖二係繪示圖—巾電子式_縣統ι之功能 方塊圖。如圖二所示,電子震置12包含接收單元12〇、記 m、顯示料m以及處理單元126。於實際應 ^ 丨糾请仔於冤子裝置12之記,障單元 m中。視覺密碼技術的觀念是由N〇ar與Shamif首先^= 的’它與傳絲碼學的主要差異在於解密過 重疊在-S,就可赠過眼睛看龍衫彡像 張g 密碼技術係為習知技藝之人可輕易達成,在視見 1344856 當儲存裝置10與電子梦罢i 直接在顯示單元124上進乍了利用觸控筆或其他類似元件 機密外ί 100與第二分享影像1〇2中的 二=鑰_& ke_f加密,並在記憶單元i儲^$ =(^ate key):當接收單元12G從儲 :g 衫像刚,處理單元126即可以私人金餘m刀= 再贅述。 切异法亦為習知技藝之人可輕易達成,在此不 辟六^使用者欲透過電子裝置12進行到刮樂時,使用者需先將 儲存裝置H)***電子裴置12之鋪 = 接至電子裝置12。接著,接收單元 加密,處理單元i26會先以預先以公開金鍮 第一 理單元126分別將第一分享影像100與 t刀上 切割成複數個第—方塊與複數個第二方塊,並 不複數個區域於顯示單元m,複數個第一方塊 S2複,個區ί的Γ可相同,如圖三所示切割成二: 卜甘、Γ η一個第一方塊,並且顯示_個區域於顯示單元124 ^中,母一區域分別對應上述m*n個第一方塊的其中之-以 述m*n個第二方塊的其中之一,爪知皆為正整數。 當使用者在電子裴置12之顯示單元12 刮除上述m*n個區域的其中之一時,處理 -分子影像102之第二方塊進行對序排列填入記憶單元122, =ΐ 重宜為可辨識影像(reC〇ngnizable hage)。於此實施例中, 所述序號由行數、列數、右轉90度次數、 • ^80 下!^180度次數、左移行數、右移行數、二 移行數、流水號以及影像編號所組成,但不以此為限。 取後’處理單元將可辨識影像顯示於顯示單元m上,使 可觀視被刮除的區域所呈現的機密訊息。 以下茲舉一實際應用例,進一步說明本發明。 假設序號號碼係依序由Μ, Pl,N,P2, R, P3, L, P4, U,No.5, D • Νο·6^ Μί Ν〇· 7, Mr, No. 8, Nu, No. 9, Nd, No. 10, No. 4, No 3 No 21344856 IX. Description of the Invention: [Technical Field] The present invention relates to an electronic squeegee system and method, and more particularly to an electronic squeegee system using visual cryptography The method can replace the traditional paper scratching. [Prior Art] The rise of the electronic and online society 'Traditional daily life is gradually being replaced by electronic, and no one dares to ignore the importance of the digital age. As electronic products gradually overturn traditional products, more and more products use electronic and information technology to gradually introduce the original products into digital. Electronic products not only provide new market opportunities for manufacturers, but also provide modern life. Convenient service.曰 Under the technology of information development, many information encryption and decryption methods can also be applied to commodities that need to be encrypted and decrypted in daily life, and then electronically convert such products. For example, the RSA encryption algorithm is a special asymmetric cryptography. The use of prime numbers as the two keys for encryption and decryption are public key and private key. The public key is used for encryption. Only the private key can be used for decryption. The decryptor only does not leak the private key. Even if someone else has a public key, it is difficult to calculate the private input. Even if the reverse engineering is used, it is not a simple matter, so RSA The calculus is a very secure encryption and decryption algorithm. In addition, such as visual password ^^lsual cryptography technique) 'is also used to secretly share the 糊 丨 术 之 之 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 并 并 并 并After the film, you can know that the hidden asset = need to scrape off the protective film before you can see it. (4)^,------,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, The method is based on the provision of an electronic type to the music system and the [invention] and the processing unit. ° 隐 隐, display unit sharing pre-profit 5 visual cryptography technology - confidential image encryption into - the first; = enjoy one mouth (8) block and a plurality of second squares One of the parties. When a plurality of ί second blocks are 5V and the above identifiable image is displayed on the display. 5 $2_machine_encryption, == 3 := The sub-imposition is presented in such a way that the second= provides an interactive presentation effect, which is electronically achieved. 1344856 The advantages and spirit of the present invention will be further understood from the following detailed description of the invention and the accompanying drawings. [Embodiment] Referring to Fig. 1, there is shown an external view of an electronic scratch system 1 according to an embodiment of the present invention. The electronic scratch system 1 includes a storage device (9) device 10 and an electronic device (electr〇nic device) 12. The storage device 1 can be your hard disk (11±111^1 (1 (1131<:) or memory card (11祀„1〇17(^(1), where the memory card can be a flash memory card (__ flash) Card, cF _), xD image card (xD pic^ Card), Secure Digital Card (SD Car (J), Multimedia (Multi Media Card, MMC), Smart Media Card (Smart Media) ), a memory stick, etc. The electronic device 12 can be a mobile phone number assistant, a palmtop computer, etc. As shown in the figure, the electronic device 12 includes a display unit and a slot. In the slot 128, the electronic device 12 can receive the bedding material from the storage device 0. In the case of the 5 brothers, the electronic device 12 is also transmitted in line and receives data from the storage device 1G. ^ Please pay 2, and Figure 2 is a diagram- As shown in Figure 2, the electronic vibration device 12 includes a receiving unit 12, a m, a display material m, and a processing unit 126. In practice, the device should be smashed into the scorpion. The device 12 is recorded in the barrier unit m. The concept of visual cryptography is the main difference between N〇ar and Shamif's first and it is related to the transmission code. In order to decrypt the overlap in -S, you can give your eyes to look at the dragon shirt. The g-encryption technology is easy for people with the know-how. At 1344856, when the storage device 10 and the electronic dream are directly in the display unit. 124 is loaded with a stylus or other similar component secret ί 100 and the second shared image 1 〇 2 in the second = key _ & ke_f encryption, and stored in the memory unit i ^ $ = (^ate key) : When the receiving unit 12G is from the storage: g shirt image, the processing unit 126 can be privately replenished with m knife = again. The different method is also easily achieved by a person skilled in the art, and no user desire is made here. When the electronic device 12 is used for scratching, the user first needs to insert the storage device H) into the electronic device 12 to connect to the electronic device 12. Then, the receiving unit encrypts, and the processing unit i26 first uses the public payment. The first processing unit 126 respectively cuts the first shared image 100 and the t-knife into a plurality of first blocks and a plurality of second blocks, and does not have a plurality of regions in the display unit m, and the plurality of first blocks S2 are complex. ί Γ can be the same, cut into two as shown in Figure 3: Bu Gan, Γ η a first block, and displaying _ regions in the display unit 124^, the parent regions correspond to one of the m*n first blocks, respectively, to one of the m*n second blocks, All of them are positive integers. When the user scrapes one of the above m*n regions in the display unit 12 of the electronic device 12, the second block of the processed-molecular image 102 is sequentially arranged and filled into the memory unit 122, ΐ It should be recognizable image (reC〇ngnizable hage). In this embodiment, the serial number is the number of rows, the number of columns, the number of right turns 90 degrees, • ^80! ^180 degree number, left shift line number, right shift line number, second shift line number, serial number, and image number, but not limited to this. The post-processing unit displays the recognizable image on the display unit m to view the confidential information presented by the scraped area. The present invention will be further described below with reference to a practical application. Assume that the serial number is in the order of Μ, Pl, N, P2, R, P3, L, P4, U, No. 5, D • Νο·6^ Μί Ν〇· 7, Mr, No. 8, Nu, No . 9, Nd, No. 10, No. 4, No 3 No 2
No. 1等24組數字欄位所組成。其中,M為行數,N為列數,r’ 為右轉90度次數,L為左轉90度次數,u為上翻下18〇度次 數’ D為下翻上180度次數’ M1為左移行數,Mr為右移行數, Nu為上移行數,Nd為下移行數,N〇丨〜1〇分別代表1〇位數字 流水號,P1〜4分別代表4位數字分享影像編號。 當接收單元120從儲存裝置10接收第一分享影像1〇〇後, 假設所接收之第一分享影像1〇〇之序號 888〇〇〇〇〇〇〇〇0〇〇〇〇〇〇〇〇〇〇〇1 ’其中分享影像編號為〇〇〇8,流水號 φ 為麵麵麵1,以及麵RLUDMIMrNuNd 為 88〇000〇〇〇〇。 接著,處理單元126利用記憶單元122中之私人金鑰解密第 一分享影,100。然後,處理單元126進一步依據第一分享&像 100之分旱影像編號從記憶單元122中取出相對應之影像作為第 二分享影像102,本實施例中係從記憶單元122中取出分享影像 編號為0008的影像作為第二分享影像1〇2,並分別將第一分享影 像100與第二分旱影像1〇2切割成複數個第一方塊以及複數個第 二方塊’如圖三所示,本實施例將第一分享影像100與第二分享 影像102切割成54(即m*n=9*6)個第一方塊以及54個第二方 塊0 9 1344856 _,所示,當使用者透過顯示單元124刮除第一方塊SAl 一 早70 126依據MNRLUDMIMrNuNd對序排列填入記憶 對應之位置,對序完後可與SB1重疊合成一可辨識影 示於顯示單元124上。藉此,使用者即可觀視被刮除 的區域所呈現的機密訊息。 f圖难)’圖难)騎示本發明—具體實施例之電子 之前段流程圖。配合圖一與圖二,首先,執行步驟 二〇巧像加密成第一分享影像100以及第二分享影像 =。ί二行步驟S12 ’利用公開金錄加密第一分享影像 至電子裝署= ’將第二分享影像102以及私人金鑰儲存 Ϊ 10: έ 5 ^ 816 J ^ 切Γ,ίΐΐ四⑼’圖四⑻係緣示本發明一具體實施例之電子 128,或猎由有線或無線傳輸方式連接至 =〇與電子裝置12形成通訊時,執行步驟二 收早兀120接收第一分享影像1〇〇。接著, 分享影像励。之後’執行步“、34,將第-H象與第二分享影像102切割成複數個第一方塊與i數 塊。然後,執行步驟S36 ’顯示複數個區域,立ΐ,每 對應複數個第—方塊的其中之—以及複數個第二】 當使用者刮除複數個區域的其中之一時, 子震置12根據-組序號,將對應於被刮除 ^No. 1 and other 24 groups of numeric fields. Where M is the number of rows, N is the number of columns, r' is the number of turns 90 degrees to the right, L is the number of turns 90 degrees to the left, u is the number of times to turn up 18 degrees, 'D is the number of times to turn up 180 degrees' M1 is The number of rows moved to the left, Mr is the number of rows shifted to the right, Nu is the number of rows moved up, Nd is the number of rows moved downwards, N〇丨~1〇 represents the number of serial numbers of 1 digits, and P1 to 4 represent the number of shared images of 4 digits respectively. After the receiving unit 120 receives the first shared image 1 from the storage device 10, it is assumed that the received first shared image 1 has a serial number of 888 〇〇〇〇〇〇〇〇 0 〇〇〇〇〇〇〇〇〇 〇〇1 'The shared image number is 〇〇〇8, the serial number φ is the face number 1, and the face RLUDMIMrNuNd is 88〇000〇〇〇〇. Next, processing unit 126 decrypts the first shared shadow, 100, using the private key in memory unit 122. Then, the processing unit 126 further extracts the corresponding image from the memory unit 122 as the second shared image 102 according to the first share image of the first share & image 100. In this embodiment, the shared image number is taken out from the memory unit 122. The image of 0008 is used as the second shared image 1〇2, and the first shared image 100 and the second divided image 1〇2 are respectively cut into a plurality of first squares and a plurality of second squares, as shown in FIG. In this embodiment, the first shared image 100 and the second shared image 102 are cut into 54 (ie, m*n=9*6) first blocks and 54 second blocks 0 9 1344856 _, as shown by the user. The display unit 124 scrapes off the first block SA1 and the early 70 126 is filled in the memory corresponding position according to the MNRLUDMIMrNuNd sequence. After the sequence is completed, it can be overlapped with the SB1 to form an identifiable image on the display unit 124. Thereby, the user can view the confidential information presented by the scraped area. f Figure is difficult. The figure is difficult to ride. The invention is shown in the prior art. In conjunction with FIG. 1 and FIG. 2, first, the step 2 is performed to encrypt the image into the first shared image 100 and the second shared image.二Two steps S12 'Use the public record to encrypt the first shared image to the electronic assembly = 'Save the second shared image 102 and private key Ϊ 10: έ 5 ^ 816 J ^ cut, ΐΐ four (9) 'Figure 4 (8) When the electronic 128 of the embodiment of the present invention is connected, or the hunting is connected to the electronic device 12 by wired or wireless transmission, the second shared image is received. Then, share the image. After the 'execution step', 34, the first-H image and the second shared image 102 are cut into a plurality of first blocks and i-number blocks. Then, step S36' is executed to display a plurality of regions, each of which corresponds to a plurality of blocks. - one of the squares - and a plurality of seconds) When the user scrapes one of the plurality of regions, the sub-set 12 is corresponding to the scraped according to the -group number ^
100之第-方塊以及第二分享影像102刀H 列,並填入電子裝置12之記憶單元122 n塊;^丁對序排 镬者,執行步驟S40, 1344856 =之t方塊以及第二分享影像H)2之 影像於電子裝置12 订步驟s42,顯示可辨識 之作用原理嫩_軸_/^,=^本^例 券加 褽置,不僅方便攜帶,且可快速的,f子办券存入儲存 本發明之電怖_。此外’ 或互動式學習(如語言學習、學前幼童學習^遊戲(如絲遊蝴 相較於先前技術,本發明係以電子式 紙張刮觸,不僅方便攜帶,且可降低2 統的 万便且4供絲式之呈現效果,_翻電子化之目的。 藉由以上較佳具體實施例之詳述,係希 =之特徵與精神,而並非以上述所揭露的較; 純聞。減地,其目岐村能涵蓋各種改變 ,具,等性的安排於本發明所欲申請之專利範圍的範嘴内。因 ^ ’本發明射請之專利範_範4應該根據上述的說明作最寬 廣的解釋’贿使其涵蓋财可能敝變以及具轉性的安排。The first block of 100 and the second shared image 102 are cut into H columns, and are filled in the memory unit 122 n block of the electronic device 12; and the step S40, 1344856 = t block and the second shared image are executed. The image of H) 2 is set in the electronic device 12 to step s42, and the identifiable function principle is displayed. The _axis _/^, =^ the present example is not only convenient to carry, but also fast, f Into the storage of the invention of the invention. In addition, or interactive learning (such as language learning, preschool children learning ^ games (such as silk swim butterfly compared to the prior art, the invention is based on electronic paper scraping, not only convenient to carry, but also can reduce the two things And the effect of the 4th wire feeding type, the purpose of turning the electronic. By the detailed description of the above preferred embodiments, the characteristics and spirit of the system are not the above-mentioned disclosure; The project village can cover all kinds of changes, and the equivalence is arranged in the scope of the patent scope of the invention to be applied for. The patent of the invention should be the broadest according to the above description. The explanation of 'bribe makes it possible to cover the possible changes in the currency and the transferable arrangements.
11 1344856 【圖式簡單說明】 • 雜示本發明-具體實_之電子_卿“ 圖。 』呆糸統之外觀 圖二係緣示圖-巾電子式觸縣統之魏方塊圖。 圖三係繪示本發明一具體實施例之第一分 與第二分享影像之第二方塊合成可辨識影像之示H之第-方塊 籲段流=⑷係繪示本發明一具體實施例之電子式到到樂方法之前 段流ΞΓ)係繪示本發明—具體實施例之電子式到刮樂方法之後 【主要元件符號說明】 1 :電子式刮刮樂系統 12 :電子裝置 10 :儲存裝置 120 :接收單元 :記憶單元 124 :顯示單元 126 :處理單元 128 :插槽 100 :第一分享影像 102 ·第二分享影像 SA1 :第一方塊 SB1 :第二方塊 S1 :可辨識影像 S10-S16、S30-S42 :流程步驟 C S ) 1211 1344856 [Simple description of the diagram] • The invention of the invention - the actual implementation of the electronic _ Qing "Figure." 〗 〖The appearance of the 糸 之 二 二 系 - 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾 巾The second block of the first and second shared images of the first embodiment of the present invention is combined with the first block of the second shared image. The first block of the identifiable image is displayed. Before the arrival of the music method, the present invention is shown after the electronic method of the present invention - the main component symbol description 1 : electronic scratch system 12 : electronic device 10 : storage device 120 : receiving unit Memory unit 124: display unit 126: processing unit 128: slot 100: first shared image 102 • second shared image SA1: first square SB1: second square S1: identifiable image S10-S16, S30-S42: Process step CS) 12