WO2017148315A1 - 基于验证码的验证处理方法及装置 - Google Patents

基于验证码的验证处理方法及装置 Download PDF

Info

Publication number
WO2017148315A1
WO2017148315A1 PCT/CN2017/074319 CN2017074319W WO2017148315A1 WO 2017148315 A1 WO2017148315 A1 WO 2017148315A1 CN 2017074319 W CN2017074319 W CN 2017074319W WO 2017148315 A1 WO2017148315 A1 WO 2017148315A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification code
dimensional
pattern
client
generate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/074319
Other languages
English (en)
French (fr)
Inventor
栗志果
申军立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to JP2018546438A priority Critical patent/JP7169720B2/ja
Priority to EP17759166.6A priority patent/EP3425847B1/en
Priority to KR1020187025637A priority patent/KR102763505B1/ko
Priority to SG11201806933WA priority patent/SG11201806933WA/en
Publication of WO2017148315A1 publication Critical patent/WO2017148315A1/zh
Priority to US16/119,883 priority patent/US11288354B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T15/00Three-dimensional [3D] image rendering
    • G06T15/10Geometric effects
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/50Depth or shape recovery
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Definitions

  • the present invention relates to the field of network security, and in particular to a verification code based verification processing method and apparatus.
  • the existing picture verification code is divided into a copy verification code, a text prompt multi-picture selection, a text prompt click on a picture color element position, etc., but the graphic verification code is easily recognized by the optical character recognition (OCR) technology, and the above three types In the scheme, the verification code generates a picture with strong regularity, and the content or template is single. It can be intercepted by intercepting the text prompt and the image decompilation code analysis to find the difference, and there are already multiple image algorithm scheme identification verification codes. Therefore, the graphic verification code The safety factor is relatively low. And the user experience is low.
  • a verification code-based verification processing method including: a server acquiring a verification code parameter required to generate a verification code; the server using the verification code parameter as an input of a three-dimensional stereo model And generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the server sends the three-dimensional three-dimensional pattern as a verification code to the client for display.
  • a verification code-based verification processing apparatus is further provided, which is applied to a server, where the apparatus includes: a processing module, configured to acquire a verification code parameter required for generating a verification code; The verification code parameter is used as an input of the three-dimensional model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and a communication module is configured to use the three-dimensional pattern as The verification code is sent to the client for display.
  • another verification code-based verification processing method including: a client acquiring a verification code parameter required to generate a verification code; the client using the verification code parameter as Input of a three-dimensional model to generate a three-dimensional pattern, wherein The identifiable content corresponding to the specified gaze focus position of the user is embedded in the three-dimensional pattern; the client displays the three-dimensional pattern as a verification code.
  • a verification code-based verification processing apparatus which is applied to a client, and includes: a processing module, configured to acquire a verification code parameter required for generating a verification code; The verification code parameter is used as an input of the three-dimensional model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and a display module is configured to verify the three-dimensional pattern The code is displayed.
  • the technical means for transmitting the three-dimensional stereoscopic pattern as a verification code to the client for display is adopted, thereby enhancing the difficulty of the verification code identification, improving the security of the verification code verification, and solving the existing graphic verification.
  • FIG. 1 is a block diagram showing the hardware structure of a computer terminal based on a verification code verification processing method according to an embodiment of the present invention
  • FIG. 2 is a schematic flow chart of an optional verification code based verification processing method according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of an alternative verification code generation principle according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an optional three-dimensional verification code according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a verification process of an optional browser/server based verification code according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of an optional verification code based verification processing apparatus according to an embodiment of the present invention.
  • FIG. 7 is a schematic flow chart of another optional verification code based verification processing method according to an embodiment of the present invention.
  • FIG. 8 is a structural block diagram of another optional verification code based verification processing apparatus according to an embodiment of the present invention.
  • FIG. 9 is a structural block diagram of a computer terminal according to an embodiment of the present invention.
  • Depth of field refers to the depth of the stereoscopic three-dimensional pattern, that is, the range of the distance between the front and back of the object measured by the image that can obtain a clear image at the front of the camera lens or other imager.
  • a clear image can be formed in the range before and after the focus, and the range of the distance before and after is called the depth of field.
  • Level refers to the richness of the content of the three-dimensional graphics. Different levels of images are located at different focus positions, and the image of this layer can only be seen when the observer's eye focus falls on the corresponding position.
  • a verification code based verification processing method embodiment there is also provided a verification code based verification processing method embodiment, and it should be noted that the steps shown in the flowchart of the drawing may be executed in a computer system such as a set of computer executable instructions. And, although the logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in a different order than the ones described herein.
  • FIG. 1 is a hardware structural block diagram of a computer terminal based on a verification code verification processing method according to an embodiment of the present invention.
  • computer terminal 10 may include one or more (only one shown) processor 102 (processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA)
  • processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA)
  • a memory 104 for storing data
  • a transmission device 106 for communication functions.
  • computer terminal 10 may also include more or fewer components than those shown in FIG. 1, or have a different configuration than that shown in FIG.
  • the memory 104 can be used to store software programs and modules of application software, such as program instructions/modules corresponding to the verification code-based verification processing method in the embodiment of the present invention, and the processor 102 runs the software programs and modules stored in the memory 104. Thereby performing various functional applications and data processing, that is, implementing the vulnerability detection method of the above application.
  • Memory 104 may include high speed random access memory, and may also include non-volatile memory such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • memory 104 may further include memory remotely located relative to processor 102, which may be coupled to computer terminal 10 via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Transmission device 106 is for receiving or transmitting data via a network.
  • the network specific examples described above may include a wireless network provided by a communication provider of the computer terminal 10.
  • the transmission device 106 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
  • the transmission device 106 can be a radio frequency (RF) module for passing Communicate wirelessly with the Internet.
  • NIC Network Interface Controller
  • RF radio frequency
  • FIG. 2 is a schematic flow chart of an optional verification code based verification processing method according to an embodiment of the present invention. As shown in FIG. 2, the method includes steps S202-S206:
  • Step S202 the server acquires the verification code parameter required to generate the verification code.
  • the “acquisition” in the step S202 may be performed as being acquired from a third-party device, or may be performed as being obtained locally (for example, when the execution subject of the step is a server, obtained from parameters pre-stored by the server) .
  • the verification code parameter may include one or more of the following, but is not limited thereto: a distortion parameter or position, color of a text, a pattern, a text or a pattern.
  • the verification code parameter in step S202 may be pre-acquired or may be triggered in real time; for the latter, the following implementation process may be performed, but is not limited thereto: obtaining a verification code required to generate the verification code Before the parameter, the client is requested to obtain a verification code, wherein the request is used to trigger execution of step S202.
  • Step S204 the server uses the verification code parameter as an input of the three-dimensional stereo model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to the specified focus position of the user (ie, the observer is only in the human eye)
  • the focus of the object is observed when the current focus position is specified, that is, the content that the observer can observe when viewing the three-dimensional pattern at a specific angle); because the identifiable content in the three-dimensional pattern is The content corresponding to the focus position of the eye is specified. Therefore, the observer can only observe from the specified focus position of the eye to recognize the identifiable content, which enhances the security of the verification code recognition process.
  • the three-dimensional model mentioned in this step may use all models in the related art that can generate a three-dimensional stereoscopic pattern, such as a 3D MAX model, etc., but is not limited thereto.
  • the two-eye visual difference and the optical refraction principle to make a direct view of a three-dimensional image in a plane, and the objects in the image can be highlighted.
  • the device observes the pattern, and the principle is to observe the stereo image from the rear (far) or front (near) of the figure.
  • the purpose of changing the focus position of the eye is to make the two adjacent repeating patterns on the perspective view "look" exactly overlap, and use the difference between the overlapping patterns to create a stereoscopic feeling.
  • it can be implemented by the following processing procedures, but is not limited thereto:
  • the foreground picture is a three-dimensional figure that can be recognized from the three-dimensional pattern in observation.
  • the reason why the observer can see the stereoscopic image from the plan is that the grayscales of the foreground (also called the template) of the image are different.
  • the human eye captures these subtle grayscale differences, it can be simulated in the brain. Create corresponding 3D graphics. The smaller the gray level in the image (the whiter the template is), the closer it looks to the viewer, and the higher the gray level (the darker the template), the farther it looks from the viewer.
  • the background image refers to the visual illusion picture seen by the observer, that is, the plan view itself.
  • the selection of the background image is such that the visual illusion effect is as strong as possible. Avoid too many regular patterns (such as regular repeating patterns of leaves, rings, squares, etc.) to prevent the observer from paying too much attention to the flat pattern when observing the three-dimensional pattern, ignoring the three-dimensional Grayscale information hidden in the pattern (ie, the content can be identified).
  • the background picture and the foreground picture located at different levels are set at different gaze focus positions according to a preset depth of field to generate the three-dimensional three-dimensional pattern. That is, the image is synthesized by "depth of field” and “hierarchy” to generate a planar two-dimensional picture. Among them, for the depth of field, the value should be avoided to avoid too much difficulty in observing the three-dimensional pattern.
  • the level refers to the richness of the content in the three-dimensional pattern.
  • the images of different levels are located at different focus positions. Only when the observer's eye focus falls on the corresponding position, the image of this layer can be seen. Therefore, it can be reasonable. Arranging levels to create multi-level images increases difficulty.
  • one or more verification code parameters may be randomly selected from the obtained verification code parameters required for generating the verification code, as the verification code parameters for generating the background image and the foreground image. And generating the above background image and the foreground image according to the randomly selected verification code parameter. In this way, randomly select the position, direction, and The verification code parameters such as content and color system enhance the difficulty of generating the verification code, reduce the repetition rate of the image verification code, and cannot find the verification code generation law when decompiling the verification code pattern.
  • FIG. 3 is a schematic diagram of an alternative verification code generation principle according to an embodiment of the present invention. As shown in Figure 3:
  • the optical illusion image generation library is developed by the rule method of edge blending, cascading, and deformation for the random generation of the verification code.
  • the optical illusion picture in the optical illusion picture generation library can be inserted into the text area, so that the position of the verification code text can be offset and distorted, and the probability of repeated combination of the verification code is reduced, that is, the pattern text and the like are distorted by using the picture distortion space coordinate system in FIG. .
  • a user-recognizable color library of verification code pictures and copy files can be established, thereby further improving the difficulty of machine cracking.
  • step S206 the server sends the three-dimensional stereoscopic pattern as a verification code to the client for display.
  • the sending process of the step can be implemented by using a communication process in the related art.
  • the verification code sent at this time is a three-dimensional three-dimensional pattern, so that the observer (ie, the user) on the client side can quickly read out the valid information ( The content can be recognized.
  • the specified eye focus position for prompting to recognize the identifiable content from the three-dimensional stereoscopic pattern may be sent to the client. In order to quickly find the focus position of the eye in the observation, and improve the recognition efficiency of the verification code, thereby further improving the user experience.
  • the specified gaze focus position may be sent separately from the verification code as two independent processes, or may be simultaneously sent.
  • the indication information for indicating the specified gaze focus position may be inserted into the three-dimensional three-dimensional pattern. Sent to the above client.
  • FIG. 4 is a schematic diagram of an optional three-dimensional verification code according to an embodiment of the present invention.
  • the three-dimensional code generated by using the above principle is only in the perspective of the terminal and the observer (ie, the user). In the case of an angle (such as 45 degrees), the picture on the left in Figure 4 is seen. When at other angles, the alphanumeric characters in the captcha are obscured, as shown in the right image of Figure 4.
  • FIG. 5 is a schematic diagram of a verification process of an optional browser/server based verification code according to an embodiment of the invention. As shown in Figure 5,
  • the server receives, by using a browser, a request sent by the user to the server through the browser for obtaining the verification code, and feeds back the verification code system browser for the user to view;
  • the data is submitted (that is, the verification copy is recognized by the browser and submitted to the server): looking for the observation position, converting the viewing angle, and reading the content;
  • the server judges user security through user access characteristics (such as UA, recognition time, number of accesses) and submitted verification files, and returns results to the browser for user operation feedback.
  • user access characteristics such as UA, recognition time, number of accesses
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • an apparatus for implementing the above-described verification code based verification processing method which may be run on the computer terminal shown in FIG. 1 or in a computer terminal as shown in FIG. More or less certain functional modules on the computer terminal, but are not limited to this.
  • the apparatus includes a processing module 60 and a communication module 62, wherein:
  • the processing module 60 is configured to obtain a verification code parameter required for generating the verification code, and use the verification code parameter as an input of the three-dimensional stereo model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with a specified focus position of the user.
  • Corresponding identifiable content may be expressed as follows, but is not limited thereto: (1) generating a background image and a foreground image recognizable by the user according to the verification code parameter; and (2) according to the preset depth of field The background picture and the foreground picture at different levels are set at different gaze focus positions to generate the three-dimensional pattern.
  • the processing module 60 is further configured to generate a background image and a foreground image recognizable by the user according to the verification code parameter, and set the background image and the foreground image located at different levels according to the preset depth of field to different eye focus positions.
  • the above three-dimensional pattern is generated.
  • the processing module 62 is further configured to: randomly select one or more verification code parameters from the obtained verification code parameters required to generate the verification code, as the verification code parameter for generating the background image and the foreground image; The randomly selected verification code parameters generate the above background picture and the above foreground picture.
  • the communication module 62 is configured to send the foregoing three-dimensional stereoscopic pattern as a verification code to the client. display.
  • the communication module 62 is further configured to send the specified focus focus position for prompting to identify the identifiable content from the three-dimensional stereoscopic pattern to the foregoing Client.
  • the specified gaze focus position may be sent separately from the verification code as two independent processes, or may be simultaneously sent.
  • the indication information for indicating the specified gaze focus position may be inserted into the three-dimensional three-dimensional pattern. Sent to the above client.
  • each module in this embodiment may be embodied in the form of software or hardware.
  • the processing module 60 is a processor, such as a CPU.
  • the communication module is a wireless communication module (such as a mobile communication module) or a wired communication module.
  • FIG. 7 is a schematic flowchart of another optional verification code based verification processing method according to an embodiment of the present invention. As shown in FIG. 7, the method includes:
  • Step S702 the client obtains the verification code parameter required to generate the verification code.
  • the client obtains the foregoing verification code parameters in various manners, for example, all of them may be locally obtained from the client; of course, all may be obtained from the server; or a part may be obtained from the client, and the remaining part may be obtained from the server (for example, Obtaining larger data such as pictures from the server) Obtaining the verification code parameters required to generate the verification code,
  • Step S704 the client generates the three-dimensional three-dimensional pattern by using the verification code parameter as an input of the three-dimensional stereo model, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to the designated focus position of the user. Since the identifiable content in the three-dimensional pattern is the content corresponding to the specified gaze focus position, the observer can only observe from the specified gaze focus position to recognize The identifiable content is enhanced, which enhances the security of the verification code recognition process.
  • the process of generating the three-dimensional three-dimensional pattern may be implemented in the following implementation manner, but is not limited thereto: the client generates a background image and a foreground image recognizable by the user according to the verification code parameter; the client is based on the preset depth of field.
  • the above-mentioned background image and foreground image at different levels are set at different gaze focusing positions to generate the three-dimensional three-dimensional pattern.
  • the verification code parameter may be randomly selected in the verification code generation process, specifically: the client randomly selects one or more verification codes from the obtained verification code parameters required for generating the verification code.
  • the parameter is used as a verification code parameter for generating the background image and the foreground image, and generates the background image and the foreground image according to the randomly selected verification code parameter.
  • step S706 the client displays the three-dimensional stereoscopic pattern as a verification code.
  • the verification code parameter includes one or more of the following parameters: a distortion parameter or position, a color of a text, a pattern, a text, or a pattern.
  • the specific can be determined according to the actual situation.
  • the client displays the three-dimensional three-dimensional pattern as a verification code
  • the client displays the specified eye focus for prompting to recognize the identifiable content from the three-dimensional three-dimensional pattern. position. In this way, the observer (user) can quickly recognize the identifiable content in the three-dimensional stereoscopic pattern.
  • the manner of displaying the focus position of the specified eye is various, for example, the static pattern or the dynamic pattern display may be used, and may be displayed separately from the three-dimensional pattern, or the indication information for indicating the focus position of the specified eye may be inserted into the three-dimensional image. Displayed in the pattern.
  • the client can verify the verification code locally, that is, after the client displays the three-dimensional stereoscopic pattern as a verification code, the client receives the user according to the above.
  • the verification code input by the three-dimensional pattern is verified, and the verification code is verified, wherein the verification is performed when the input verification code matches the identifiable content in the three-dimensional pattern.
  • the above verification process can also be verified by the server.
  • the identifiable content in the three-dimensional stereoscopic pattern can be sent to the server in advance by the client, and then the content input by the user is sent to the server for verification.
  • the apparatus may be applied to a client, or may be run on the computer terminal shown in FIG. 1 or may be operated. It is on a computer terminal that has more or less certain functional modules than the computer terminal shown in FIG. 1, but is not limited thereto.
  • the apparatus includes a processing module 80 and a display module 82, wherein:
  • the processing module 80 is configured to obtain a verification code parameter required for generating the verification code, and generate the three-dimensional three-dimensional pattern by using the verification code parameter as an input of the three-dimensional stereo model, wherein the three-dimensional stereoscopic pattern is embedded with a specified eye focus of the user.
  • the processing module 80 is configured to obtain the verification code parameter from the client locally and/or from the server.
  • the processing module 80 is configured to generate the foregoing three-dimensional stereoscopic pattern according to the following manner: generating a background image and a user-recognizable foreground image according to the verification code parameter; and positioning the different levels according to the preset depth of field
  • the background image and the foreground image are disposed at different gaze focus positions to generate the three-dimensional three-dimensional pattern. Since the background image and the foreground image are set at different gaze focus positions, when the observer observes at other gaze focus positions outside the specified gaze focus position, a blur pattern appears (ie, the content cannot be recognized).
  • the display module 82 is connected to the processing module 80 for displaying the three-dimensional stereoscopic pattern as a verification code.
  • the display module 82 is further configured to display, when the three-dimensional stereoscopic pattern is displayed as the verification code, the specified eye focus position for prompting to identify the identifiable content from the three-dimensional stereoscopic pattern. In this way, the observer can quickly recognize the identifiable content in the three-dimensional pattern and improve the user experience.
  • each of the foregoing processing modules may be implemented by software (for example, the display module 82 is a display interface on the terminal) or hardware, and the latter may be implemented by the following manner, but is not limited thereto: the processing module 80 is A processor, such as a CPU or the like; the display module 82 can represent a display or the like.
  • Embodiments of the present invention may provide a computer terminal, which may be any one of computer terminal groups.
  • the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
  • the computer terminal may be located in at least one network device of the plurality of network devices of the computer network.
  • the computer terminal may execute the program code of the following steps in the verification code-based verification processing method: the server acquires the verification code parameter required to generate the verification code; and the server uses the verification code parameter as the input of the three-dimensional model. And generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the server sends the three-dimensional three-dimensional pattern as a verification code to the client for display.
  • FIG. 9 is a structural block diagram of a computer terminal according to an embodiment of the present invention.
  • the computer terminal A may include one or more (only one shown in the figure) processor 91, a memory 93, and a transmission device 95 connected to the website server.
  • the processor 91 can call the information and the application stored in the memory 93 through the transmission device to perform the following steps: randomly selecting a plurality of verification code generation rules from the multidimensional verification code generation rules, wherein the multidimensional verification code generation rules are different Forming a verification code generation rule of the dimension; combining the randomly selected plurality of verification code generation rules to obtain a combination rule; generating a final verification code according to the combination rule, and transmitting the result to the terminal for display by the transmission device 75 .
  • the processor 91 may further execute the following steps: generating a background image and a foreground image recognizable by the user according to the verification code parameter; and the background image and the foreground image located at different levels according to the preset depth of field
  • the three-dimensional three-dimensional pattern is generated by being disposed at different gaze focusing positions.
  • the processor 91 may further execute the following program code: randomly select one or more verification code parameters from the acquired verification code parameters required to generate the verification code, as the background image and the foreground are generated. a verification code parameter of the picture; and generating the background picture and the foreground picture according to the randomly selected verification code parameter.
  • the processor 91 may further execute the program code of: sending, by the transmitting device 95, the specified gaze focus position for prompting to identify the identifiable content from the three-dimensional stereo pattern to the Client.
  • the processor 91 may further execute the following program code: inserting indication information for indicating the specified focus position of the eye into the three-dimensional stereo pattern and transmitting the information to the client by using the transmission device 95.
  • FIG. 9 is only an illustration, and the computer terminal can also be a smart phone (such as an Android mobile phone, an iOS mobile phone, etc.), a tablet computer, an applause computer, and a mobile Internet device (Mobile Internet Devices, MID). ), PAD and other terminal devices.
  • FIG. 9 does not limit the structure of the above electronic device.
  • computer terminal A may also include more or fewer components (such as a network interface, display device, etc.) than shown in FIG. 9, or have a different configuration than that shown in FIG.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be used to save the program code executed by the verification code based verification processing method provided in Embodiment 1 above.
  • the foregoing storage medium may be located in a computer network. Any one of the computer terminals in the terminal group or located in any one of the mobile terminal groups.
  • the storage medium is configured to store program code for performing the following steps: obtaining a verification code parameter required to generate the verification code; and using the verification code parameter as an input of the three-dimensional model to generate three-dimensional a three-dimensional pattern in which the identifiable content corresponding to the designated focus position of the user is embedded; and the three-dimensional pattern is sent as a verification code to the client for display.
  • any one of the above computer terminal groups can establish a communication relationship with the website server.
  • Embodiments of the present invention may provide another computer terminal, which may be any one of computer terminal groups.
  • the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
  • the computer terminal may be located in at least one network device of the plurality of network devices of the computer network.
  • the computer terminal may execute the program code of the following steps in the verification code-based verification processing method: the client obtains the verification code parameter required to generate the verification code; and the client uses the verification code parameter as the three-dimensional model Inputting, generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the client displays the three-dimensional three-dimensional pattern as a verification code.
  • Embodiments of the present invention also provide another storage medium.
  • the foregoing storage medium may be used to save the program code executed by the verification code based verification processing method provided in the first embodiment.
  • the foregoing storage medium may be located in any one of the computer terminal groups in the computer network, or in any one of the mobile terminal groups.
  • the storage medium is configured to store program code for performing the following steps: the client obtains the verification code parameter required to generate the verification code; and the client uses the verification code parameter as the three-dimensional model Inputting, generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the client displays the three-dimensional three-dimensional pattern as a verification code.
  • the disclosed client may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, unit or module, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or soft. The form of the functional unit is implemented.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Geometry (AREA)
  • Computer Graphics (AREA)
  • Processing Or Creating Images (AREA)
  • User Interface Of Digital Computer (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明公开了一种基于验证码的验证处理方法及装置。其中,该方法包括:服务器获取生成验证码所需要的验证码参数;服务器将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;服务器将所述三维立体图案作为验证码发送至客户端进行显示。

Description

基于验证码的验证处理方法及装置 技术领域
本发明涉及网络安全领域,具体而言,涉及一种基于验证码的验证处理方法及装置。
背景技术
现有图片验证码分为文案性验证码、文字提示多图选择、文字提示点击图片某色元素位置等方式,但是图形验证码容易被光学字符识别(OCR)技术自动识别,并且,以上三类方案中验证码生成图片规则性强,且内容或模板单一,可以通过拦截文字提示和图片反编译代码分析寻找差异性进行破解,且已存在多种图片算法方案识别验证码,因此,图形验证码安全系数比较低。且用户体验度低。
发明内容
根据本发明实施例的一个方面,提供了一种基于验证码的验证处理方法,包括:服务器获取生成验证码所需要的验证码参数;所述服务器将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;所述服务器将所述三维立体图案作为验证码发送至客户端进行显示。
根据本发明实施例的另一方面,还提供了一种基于验证码的验证处理装置,应用于服务器,所述装置包括:处理模块,用于获取生成验证码所需要的验证码参数;将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;通信模块,用于将所述三维立体图案作为验证码发送至客户端进行显示。
根据本发明实施例的又一方面,还提供了另一种基于验证码的验证处理方法,包括:客户端获取生成验证码所需要的验证码参数;所述客户端将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中, 该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;所述客户端将所述三维立体图案作为验证码进行显示。
根据本发明实施例的再一方面,还提供了一种基于验证码的验证处理装置,应用于客户端,包括:处理模块,用于获取生成验证码所需要的验证码参数;以及将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;显示模块,用于将所述三维立体图案作为验证码进行显示。
在本发明实施例中,采用将三维立体图案作为验证码发送给客户端进行显示的技术手段,从而增强了验证码识别的难度,提高了验证码验证的安全性,进而解决了现有图形验证码安全性不高的技术问题。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是本发明实施例的一种基于验证码的验证处理方法的计算机终端的硬件结构框图;
图2是根据本发明实施例的一种可选的基于验证码的验证处理方法的流程示意图;
图3根据本发明实施例的一种可选的验证码的生成原理示意图;
图4是根据本发明实施例的一种可选的三维验证码示意图;
图5是根据本发明实施例的一种可选的基于浏览器/服务器(Browser/Server)架构的验证码的验证过程示意图;
图6是根据本发明实施例的一种可选的基于验证码的验证处理装置的结构示意图;
图7是根据本发明实施例的另一种可选的基于验证码的验证处理方法的流程示意图;
图8是根据本发明实施例的另一种可选的基于验证码的验证处理装置的结构框图;
图9是根据本发明实施例的一种计算机终端的结构框图。
具体实施方式
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
为便于理解本发明实施例,现将本发明实施例中使用的技术术语解释如下:
景深,是指立体三维图案的深度,即在摄影机镜头或其他成像器前沿能够取得清晰图像的成像所测定的被摄物体前后距离范围。换而言之,在聚焦完成后,在焦点前后的范围内都能形成清晰的像,这一前一后的距离范围,叫做景深。
层次,是指三维立体图案内容的丰富程度。不同层次的图像位于不同的焦点位置上,只有当观察者的眼睛焦点落在对应的位置上,才能看到这一层的图像。
实施例1
根据本发明实施例,还提供了一种基于验证码的验证处理方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
本申请实施例一所提供的方法实施例可以在移动终端、计算机终端或者类似的运算装置中执行。以运行在计算机终端上为例,图1是本发明实施例的一种基于验证码的验证处理方法的计算机终端的硬件结构框图。如图1所示,计算机终端10可以包括一个或多个(图中仅示出一个)处理器102(处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)、用于存储数据的存储器104、以及用于通信功能的传输装置106。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述电子装置的结构造成限定。例如,计算机终端10还可包括比图1中所示更多或者更少的组件,或者具有与图1所示不同的配置。
存储器104可用于存储应用软件的软件程序以及模块,如本发明实施例中的基于验证码的验证处理方法对应的程序指令/模块,处理器102通过运行存储在存储器104内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的应用程序的漏洞检测方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至计算机终端10。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输装置106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机终端10的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,RF)模块,其用于通过 无线方式与互联网进行通讯。
在上述运行环境下,本申请提供了如图2所示的基于验证码的验证处理方法。图2是根据本发明实施例的一种可选的基于验证码的验证处理方法的流程示意图。如图2所示,该方法包括步骤S202-S206:
步骤S202,服务器获取生成验证码所需要的验证码参数;
可选地,该步骤S202中的“获取”可以表现为从第三方设备获取,也可以表现为从本地获取(例如,在该步骤的执行主体为服务器时,从服务器预先存储的参数中获取)。
其中,对于验证码参数可以包括以下一个或多个,但不限于此:文字、图案、文字或图案的扭曲参数或位置、色彩。
可选地,步骤S202中的验证码参数可以是预先获取的,也可以是实时触发获取的;对于后者,可以表现为以下实现过程,但不限于此:获取生成验证码所需要的验证码参数之前,接收所述客户端用于获取验证码的请求,其中,该请求可用于触发步骤S202的执行。
步骤S204,服务器将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容(即观察者只有在人眼的焦点落在指定目前聚焦位置处时才可观察到的内容,亦即观察者在一特定的角度观察三维立体图案时才可观察到的内容);由于三维立体图案中的可识别内容是与指定目光聚焦位置对应的内容,因此,观察者只能从指定目光聚焦位置观测,才能识别出可识别内容,这样增强了验证码识别过程的安全性。
可选地,该步骤中所提及的三维立体模型可以使用相关技术中所有可生成三维立体图案的模型,例如3D MAX模型等,但不限于此
其中,对于该步骤中三维立体图案的生成,通俗的讲就是利用人们两眼视觉差别和光学折射原理在一个平面内使人们可直接看到一幅三维立体图像,图像中事物既可以凸出于画面之外,也可以深藏其中,这主要是运用光影、虚实、明暗对比来体现的。观察者可以通过角度或者使用特殊 的设备观测其中的图案,原理是通过将目光聚焦到图的后方(远处)或前方(近处)可以从中观察到立体影像。改变目光聚焦位置的目的在于让立体图上相邻的两个重复图案“看起来”恰好重叠,并利用重叠图案之间的差异来产生立体感。具体地,可以通过以下处理过程实现,但不限于此:
(1)依据上述验证码参数生成背景图片和用户可识别的前景图片;
其中,前景图片就是观察中可以从三维立体图案中识别出的三维图形。观察者之所以能从平面图中看出立体图像,原因就在于图像的前景(又称模板)的各部分灰度不同,当人眼捕捉到这些细微的灰度差别时,就能在大脑中模拟建立出对应的三维图形。图像中灰度越小(模板中越白)的地方,看起来就离观察者越近,灰度越大(模板中越黑)的地方,看起来就距离观察者越远。
其中,背景图片,是指观察者所看到的视错觉图片,即平面图本身。原则上背景图片的选取是视错觉效果越强越好。避免太多的规则性图案(比如树叶、圆环、方块等有规律的重复图案),以防止观察者在观察三维立体图案时将过多的注意力放在平面图案上,而忽略了三维立体图案中隐藏的灰度信息(即可识别内容)。
(2)依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。即通过“景深”和“层次”进行图片合成,生成平面二维图片。其中,对于景深,应避免数值过大,以避免在观察三维立体图案时会很吃力。层次是指三维立体图案中内容的丰富程度,不同层次的图像位于不同的焦点位置上,只有当观察者的眼睛焦点落在对应的位置上,才能看到这一层的图像,因此,可以合理安排层次,以制造多层次的图像提高难度。
可选地,为了增强验证码的破译难度,可以从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成上述背景图片和上述前景图片的验证码参数;并依据随机选择的验证码参数生成上述背景图片和上述前景图片。这样,将验证码合成时随机选择位置、方向、 内容、色彩体系等验证码参数,从而增强了验证码生成难度,降低图片验证码重复率,且对验证码的图案进行反编译时无法寻找验证码生成规律。
为便于理解,以下以图3所示原理为例,详细说明验证码的生成过程。图3根据本发明实施例的一种可选的验证码的生成原理示意图。如图3所示:
通过边线融合、层叠、变形等规则方法开发出视错觉图片生成库供验证码随机生成的使用。视错觉图片生成库中的视错觉图片可插入文字区域,使得验证码文字位置可偏移、扭曲,降低验证码重复组合概率,即利用图3中的图片扭曲空间坐标系对图案文字等进行扭曲。指定验证文字随机选择:文字(汉字、英文字母、数字)、字体大小及其组合,增加验证文案组合机率和用户可选择模式(如:汉字、汉英、数字、英文+数字、汉字+数字、汉字+英文+数字),当然也可以对文字形状进行扭曲处理。为实现视错觉图片变化多样性、降低客户端验证码重复机率、用户可识别提升,可以建立验证码图片、文案的用户可识别色系库,进一步提升机器破解难度。
步骤S206,服务器将上述三维立体图案作为验证码发送至客户端进行显示。该步骤的发送过程可以采用相关技术中的通信过程实现,但是,由此此时发送的验证码为三位立体图案,为便于客户端侧的观察者(即用户)快速读取出有效信息(即可识别内容),在将上述三维立体图案作为验证码发送至客户端时,还可以将用于提示从上述三维立体图案中识别出上述可识别内容的上述指定目光聚焦位置发送至上述客户端,以便于观察中快速找到目光聚焦位置,提高验证码的识别效率,从而进一步提升用户的体验度。
可选地,上述指定目光聚焦位置可以和验证码作为两个独立的过程分别发送,也可以同时发送,例如对于后者,可以将用于指示上述指定目光聚焦位置的指示信息插入上述三维立体图案中发送至上述客户端。
图4是根据本发明实施例的一种可选的三维验证码示意图,如图4所示,利用上述原理生成的三维码,只有在终端与观测者(即用户)视角呈 某个角度(如45度)的情况下,看到的图4中的左图图片。当处于其它角度的情况下,验证码中的字母文字是模糊不可见的,如图4中的右图所示。
图5是根据本发明实施例的一种可选的基于浏览器/服务器(Browser/Server)架构的验证码的验证流程示意图。如图5所示,
服务器通过浏览器接收用户通过浏览器向服务器发送的用于获取验证码的请求,并反馈验证码制浏览器供用户查看;
在用户对验证码进行以下分析识别的动作后,提交数据(即在浏览器输入识别后的验证文案,并提交至服务器):寻找观察位置、转换视角以及读取内容;
服务端通过用户访问特征(如:UA、识别时间、访问次数)和提交的验证文案进行判断用户安全性,并向浏览器返回结果进行用户操作反馈。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
实施例2
根据本发明实施例,还提供了一种用于实施上述基于验证码的验证处理方法的装置,该装置可以运行于图1所示的计算机终端上,也可以运行于比图1所示计算机终端多或少某些功能模块的计算机终端上,但是并不限于此。如图6所示,该装置包括处理模块60和通信模块62,其中:
处理模块60,用于获取生成验证码所需要的验证码参数;将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容。可选地,对于三维立体图案的生成过程,可以表现为以下处理过程,但不限于此:(1)依据上述验证码参数生成背景图片和用户可识别的前景图片;(2)依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
其中,对于三维立体图案的生成,通俗的讲就是利用人们两眼视觉差别和光学折射原理在一个平面内使人们可直接看到一幅三维立体图像,图像中事物既可以凸出于画面之外,也可以深藏其中,这主要是运用光影、虚实、明暗对比来体现的。观察者可以通过角度或者使用特殊的设备观测其中的图案,原理是通过将目光聚焦到图的后方(远处)或前方(近处)可以从中观察到立体影像。改变目光聚焦位置的目的在于让立体图上相邻的两个重复图案“看起来”恰好重叠,并利用重叠图案之间的差异来产生立体感。
可选地,处理模块60,还用于依据上述验证码参数生成背景图片和用户可识别的前景图片;以及依据预设景深将位于不同层次的上述背景图片和前景图片设置于不同的目光聚焦位置上,生成上述三维立体图案。
可选地,处理模块62,还用于从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成上述背景图片和上述前景图片的验证码参数;并依据随机选择的验证码参数生成上述背景图片和上述前景图片。
通信模块62,用于将上述三维立体图案作为验证码发送至客户端进行 显示。
可选地,为进一步提升用户体验度,提高验证码的识别效率,通信模块62,还用于将用于提示从上述三维立体图案中识别出上述可识别内容的上述指定目光聚焦位置发送至上述客户端。可选地,上述指定目光聚焦位置可以和验证码作为两个独立的过程分别发送,也可以同时发送,例如对于后者,可以将用于指示上述指定目光聚焦位置的指示信息插入上述三维立体图案中发送至上述客户端。
需要说明的是,本实施例中的各个模块是可以通过软件或硬件的形式体现的,对于后者,可以表现为以下实现形式,但不限于此:1)处理模块60为处理器,例如CPU等,通信模块为无线通信模块(例如移动通信模块)或有线通信模块等。
实施例3
正如实施例1和实施例2中所述,本申请实施例中的验证码可以在服务器侧生成,但是,也可以在客户端侧生成,具体地,本实施例提供一种在客户端生成验证码场景下,基于验证码的验证处理方法,图7是根据本发明实施例的另一种可选的基于验证码的验证处理方法的流程示意图。如图7所示,该方法包括:
步骤S702,客户端获取生成验证码所需要的验证码参数;
可选地,客户端获取上述验证码参数的方式有多种,例如,可以全部从客户端本地获取;当然也可以全部从服务器获取;也可以从客户端获取一部分,从服务器获取剩余部分(例如从服务器获取图片等较大数据)获取生成验证码所需要的验证码参数,
步骤S704,客户端将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容。由于三维立体图案中的可识别内容是与指定目光聚焦位置对应的内容,因此,观察者只能从指定目光聚焦位置观测,才能识别 出可识别内容,这样增强了验证码识别过程的安全性。
在一个可选实施例中,三维立体图案的生成过程可以表现为以下实现形式,但不限于此:客户端依据上述验证码参数生成背景图片和用户可识别的前景图片;客户端依据预设景深将位于不同层次的上述背景图片和前景图片设置于不同的目光聚焦位置上,生成上述三维立体图案。
为了进一步增强验证码的反编译难度,上述验证码参数可以在验证码生成过程中随机选择,具体地:客户端从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成上述背景图片和上述前景图片的验证码参数;并依据随机选择的验证码参数生成上述背景图片和上述前景图片。
步骤S706,客户端将上述三维立体图案作为验证码进行显示。
可选地,上述验证码参数包括以下一个参数或多个参数的组合:文字、图案、文字或图案的扭曲参数或位置、色彩。具体可以根据实际情况确定。
为了提高验证码识别的效率,提升用户体验,在客户端将上述三维立体图案作为验证码进行显示时,客户端显示用于提示从上述三维立体图案中识别出上述可识别内容的上述指定目光聚焦位置。这样,观察者(用户)便可以快速识别三维立体图案中的可识别内容。
其中,显示上述指定目光聚焦位置的方式有多种,例如可以采用静态图案或动态图案显示,可以和三维立体图案分开显示,也可以将用于指示上述指定目光聚焦位置的指示信息插入上述三维立体图案中进行显示。
由于本实施例提供的方案是客户端本地生成验证码,因此,客户端可以在本地对验证码进行验证,即在客户端将上述三维立体图案作为验证码进行显示之后,客户端接收用户依据上述三维立体图案输入的验证码,并对上述验证码进行验证,其中,在上述输入的验证码与上述三维立体图案中的上述可识别内容一致时,通过验证。当然,上述验证过程也可以交由服务器进行验证,此时,可以由客户端预先将三维立体图案中的可识别内容发送至服务器,然后再将用户输入的内容发送至服务器,以进行验证。
本实施例的可选实施方案可以参照实施例1和2中的相关方案,此处不再赘述。
实施例4
根据本发明实施例,还提供了另外一种用于实施上述基于验证码的验证处理方法的装置,该装置可以应用于客户端,也可以运行于图1所示的计算机终端上,也可以运行于比图1所示计算机终端多或少某些功能模块的计算机终端上,但是并不限于此。如图8所示,该装置包括处理模块80和显示模块82,其中:
处理模块80,用于获取生成验证码所需要的验证码参数;以及将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;
可选地,处理模块80,用于从客户端本地和/或从服务器获取上述验证码参数。
在一个可选实施例中,处理模块80,用于依据以下方式生成上述三维立体图案:依据上述验证码参数生成背景图片和用户可识别的前景图片;以及依据预设景深将位于不同层次的上述背景图片和前景图片设置于不同的目光聚焦位置上,生成上述三维立体图案。由于将背景图片和前景图片设置在了不同的目光聚焦位置上,因此,观察者在上述指定目光聚焦位置外的其他目光聚焦位置处观察时,会出现模糊图案(即不能识别出内容)
显示模块82,连接至处理模块80,用于将上述三维立体图案作为验证码进行显示。
可选地,显示模块82,还用于在显示上述三维立体图案作为验证码时,显示用于提示从上述三维立体图案中识别出上述可识别内容的上述指定目光聚焦位置。这样,便可以使观察者快速识别出三维立体图案中的可识别内容,提升用户体验度。
需要说明的是,上述各个处理模块是可以通过软件(例如显示模块82为终端上的显示界面)或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:处理模块80为处理器,例如CPU等;显示模块82可以表现显示器等。
实施例5
本发明的实施例可以提供一种计算机终端,该计算机终端可以是计算机终端群中的任意一个计算机终端设备。可选地,在本实施例中,上述计算机终端也可以替换为移动终端等终端设备。
可选地,在本实施例中,上述计算机终端可以位于计算机网络的多个网络设备中的至少一个网络设备。
在本实施例中,上述计算机终端可以执行基于验证码的验证处理方法中以下步骤的程序代码:服务器获取生成验证码所需要的验证码参数;服务器将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;服务器将上述三维立体图案作为验证码发送至客户端进行显示。
可选地,图9是根据本发明实施例的一种计算机终端的结构框图。如图9所示,该计算机终端A可以包括:一个或多个(图中仅示出一个)处理器91、存储器93、以及与网站服务器连接的传输装置95。
处理器91可以通过传输装置调用存储器93存储的信息及应用程序,以执行下述步骤:从多维验证码生成规则中随机选择多个验证码生成规则,其中,所述多维验证码生成规则由不同维度的验证码生成规则组成;将随机选择的所述多个验证码生成规则进行组合,得到组合规则;依据所述组合规则生成最终的验证码,并通过传输装置75发送至所述终端进行显示。
可选的,上述处理器91还可以执行如下步骤的程序代码:依据所述验证码参数生成背景图片和用户可识别的前景图片;依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
可选的,上述处理器91还可以执行如下步骤的程序代码:从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
可选的,上述处理器91还可以执行如下步骤的程序代码:将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置通过传输装置95发送至所述客户端。
可选的,上述处理器91还可以执行如下步骤的程序代码:将用于指示所述指定目光聚焦位置的指示信息插入所述三维立体图案中通过传输装置95发送至所述客户端。
本领域普通技术人员可以理解,图9所示的结构仅为示意,计算机终端也可以是智能手机(如Android手机、iOS手机等)、平板电脑、掌声电脑以及移动互联网设备(Mobile Internet Devices,MID)、PAD等终端设备。图9其并不对上述电子装置的结构造成限定。例如,计算机终端A还可包括比图9中所示更多或者更少的组件(如网络接口、显示装置等),或者具有与图9所示不同的配置。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令终端设备相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:闪存盘、只读存储器(Read-Only Memory,ROM)、随机存取器(Random Access Memory,RAM)、磁盘或光盘等。
实施例6
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以用于保存上述实施例一所提供的基于验证码的验证处理方法所执行的程序代码。
可选地,在本实施例中,上述存储介质可以位于计算机网络中计算机 终端群中的任意一个计算机终端中,或者位于移动终端群中的任意一个移动终端中。
可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:获取生成验证码所需要的验证码参数;将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;将上述三维立体图案作为验证码发送至客户端进行显示。
此处需要说明的是,上述计算机终端群中的任意一个可以与网站服务器建立通信关系。
实施例7
本发明的实施例可以提供另外一种计算机终端,该计算机终端可以是计算机终端群中的任意一个计算机终端设备。可选地,在本实施例中,上述计算机终端也可以替换为移动终端等终端设备。
可选地,在本实施例中,上述计算机终端可以位于计算机网络的多个网络设备中的至少一个网络设备。
在本实施例中,上述计算机终端可以执行基于验证码的验证处理方法中以下步骤的程序代码:客户端获取生成验证码所需要的验证码参数;客户端将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;客户端将上述三维立体图案作为验证码进行显示。
本实施例中计算机终端的具体结构或配置可以参照图1或图7所示计算机终端的结构或配置,但是并不限于此。
实施例8
本发明的实施例还提供了另外一种存储介质。可选地,在本实施例中, 上述存储介质可以用于保存上述实施例一所提供的基于验证码的验证处理方法所执行的程序代码。
可选地,在本实施例中,上述存储介质可以位于计算机网络中计算机终端群中的任意一个计算机终端中,或者位于移动终端群中的任意一个移动终端中。
可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:客户端获取生成验证码所需要的验证码参数;客户端将上述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;客户端将上述三维立体图案作为验证码进行显示。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
在本发明的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
在本申请所提供的几个实施例中,应该理解到,所揭露的客户端,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软 件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (23)

  1. 一种基于验证码的验证处理方法,其特征在于,包括:
    服务器获取生成验证码所需要的验证码参数;
    所述服务器将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;
    所述服务器将所述三维立体图案作为验证码发送至客户端进行显示。
  2. 根据权利要求1所述的方法,其特征在于,所述服务器将所述验证码参数作为三维立体模型的输入,生成三维立体图案,包括:
    所述服务器依据所述验证码参数生成背景图片和用户可识别的前景图片;
    所述服务器依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
  3. 根据权利要求2所述的方法,其特征在于,所述服务器依据所述验证码参数生成背景图片和用户可识别的前景图片,包括:
    所述服务器从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
  4. 根据权利要求1所述的方法,其特征在于,所述验证码参数包括以下一个参数或多个参数的组合:
    文字、图案、文字或图案的扭曲参数或位置、色彩。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述服务器将所述三维立体图案作为验证码发送至客户端时,所述方法还包括:
    所述服务器将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置发送至所述客户端。
  6. 根据权利要求5所述的方法,其特征在于,所述服务器将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置发送至所述客户端,包括:
    所述服务器将用于指示所述指定目光聚焦位置的指示信息插入所述三维立体图案中发送至所述客户端。
  7. 根据权利要求1至4中任一项所述的方法,其特征在于,所述服务器获取生成验证码所需要的验证码参数之前,所述方法还包括:
    所述服务器接收所述客户端用于获取验证码的请求。
  8. 一种基于验证码的验证处理装置,应用于服务器,其特征在于,包括:
    处理模块,用于获取生成验证码所需要的验证码参数;将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;
    通信模块,用于将所述三维立体图案作为验证码发送至客户端进行显示。
  9. 根据权利要求8所述的装置,其特征在于,所述处理模块,还用于依据所述验证码参数生成背景图片和用户可识别的前景图片;以及依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
  10. 根据权利要求9所述的装置,其特征在于,所述处理模块,还用于从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
  11. 根据权利要求8至10中任一项所述的装置,其特征在于,所述通信模块,还用于将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置发送至所述客户端。
  12. 一种基于验证码的验证处理方法,其特征在于,包括:
    客户端获取生成验证码所需要的验证码参数;
    所述客户端将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;
    所述客户端将所述三维立体图案作为验证码进行显示。
  13. 根据权利要求12所述的方法,其特征在于,所述客户端获取生成验证码所需要的验证码参数,包括:
    所述客户端从客户端本地和/或从服务器获取所述验证码参数。
  14. 根据权利要求12所述的方法,其特征在于,所述客户端将所述验证码参数作为三维立体模型的输入,生成三维立体图案,包括:
    所述客户端依据所述验证码参数生成背景图片和用户可识别的前景图片;
    所述客户端依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
  15. 根据权利要求14所述的方法,其特征在于,所述客户端依据所述验证码参数生成背景图片和用户可识别的前景图片,包括:
    所述客户端从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
  16. 根据权利要求12所述的方法,其特征在于,所述验证码参数包括以下一个参数或多个参数的组合:
    文字、图案、文字或图案的扭曲参数或位置、色彩。
  17. 根据权利要求12至16中任一项所述的方法,其特征在于,所述客户端将所述三维立体图案作为验证码进行显示时,所述方法还包括:
    所述客户端显示用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置。
  18. 根据权利要求17所述的方法,其特征在于,所述客户端显示用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置,包括:
    将用于指示所述指定目光聚焦位置的指示信息插入所述三维立体图案中进行显示。
  19. 根据权利要求12所述的方法,其特征在于,所述客户端将所述三维立体图案作为验证码进行显示之后,所述方法还包括:
    所述客户端接收用户依据所述三维立体图案输入的验证码,并对所述验证码进行验证,其中,在所述输入的验证码与所述三维立体图案中的所述可识别内容一致时,通过验证。
  20. 一种基于验证码的验证处理装置,应用于客户端,其特征在于,包括:
    处理模块,用于获取生成验证码所需要的验证码参数;以及将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;
    显示模块,用于将所述三维立体图案作为验证码进行显示。
  21. 根据权利要求20所述的装置,其特征在于,所述处理模块,用于从客户端本地和/或从服务器获取所述验证码参数。
  22. 根据权利要求20所述的装置,其特征在于,所述处理模块,用于依据所述验证码参数生成背景图片和用户可识别的前景图片;以及依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
  23. 根据权利要求20至22中任一项所述的装置,其特征在于,所述显示模块,还用于在显示所述三维立体图案作为验证码时,显示用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置。
PCT/CN2017/074319 2016-03-04 2017-02-21 基于验证码的验证处理方法及装置 Ceased WO2017148315A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2018546438A JP7169720B2 (ja) 2016-03-04 2017-02-21 検証コードに基づく検証処理方法及び装置
EP17759166.6A EP3425847B1 (en) 2016-03-04 2017-02-21 Captcha-based authentication processing method and device
KR1020187025637A KR102763505B1 (ko) 2016-03-04 2017-02-21 검증 코드 기반의 검증 프로세싱 방법 및 장치
SG11201806933WA SG11201806933WA (en) 2016-03-04 2017-02-21 Verification code-based verification processing method and apparatus
US16/119,883 US11288354B2 (en) 2016-03-04 2018-08-31 Verification code-based verification processing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610125755.3 2016-03-04
CN201610125755.3A CN107154924B (zh) 2016-03-04 2016-03-04 基于验证码的验证处理方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/119,883 Continuation US11288354B2 (en) 2016-03-04 2018-08-31 Verification code-based verification processing

Publications (1)

Publication Number Publication Date
WO2017148315A1 true WO2017148315A1 (zh) 2017-09-08

Family

ID=59742503

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/074319 Ceased WO2017148315A1 (zh) 2016-03-04 2017-02-21 基于验证码的验证处理方法及装置

Country Status (8)

Country Link
US (1) US11288354B2 (zh)
EP (1) EP3425847B1 (zh)
JP (1) JP7169720B2 (zh)
KR (1) KR102763505B1 (zh)
CN (1) CN107154924B (zh)
SG (1) SG11201806933WA (zh)
TW (1) TWI738717B (zh)
WO (1) WO2017148315A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652958A (zh) * 2020-06-04 2020-09-11 通华财富(上海)基金销售有限公司 一种增强型图形验证码生成方法、装置及存储介质
US11138306B2 (en) * 2016-03-14 2021-10-05 Amazon Technologies, Inc. Physics-based CAPTCHA
CN113568794A (zh) * 2021-07-29 2021-10-29 中国银行股份有限公司 前端自动化测试方法及装置

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154924B (zh) 2016-03-04 2021-01-05 阿里巴巴集团控股有限公司 基于验证码的验证处理方法及装置
CN110213205B (zh) * 2018-03-27 2021-08-24 腾讯科技(深圳)有限公司 验证方法、装置及设备
CN110378095B (zh) * 2019-07-17 2022-02-25 杭州网易智企科技有限公司 基于验证码的交互验证方法、装置、介质和计算设备
CN110321691B (zh) * 2019-07-30 2022-03-11 东南大学 一种适用于脑机接口的用户鉴权装置及其鉴权方法
JP7509032B2 (ja) * 2020-12-25 2024-07-02 サクサ株式会社 認証システム及び認証プログラム
CN114268430B (zh) * 2021-12-15 2024-05-24 瀚云科技有限公司 一种验证码生成方法、装置、电子设备及存储介质
CN114237678B (zh) * 2021-12-22 2026-03-17 广州品唯软件有限公司 组件更新方法、装置、存储介质及计算机设备
CN114357388A (zh) * 2021-12-29 2022-04-15 苏州浪潮智能科技有限公司 参数校验方法、装置、电子设备及存储介质
CN115688080B (zh) * 2022-10-26 2025-08-26 咪咕文化科技有限公司 一种验证码生成方法、通信设备及计算机可读存储介质
US12470556B2 (en) * 2023-03-22 2025-11-11 Microsoft Technology Licensing, Llc Generating captchas using generative imaging models
CN118429757B (zh) * 2024-03-22 2024-11-05 三峡高科信息技术有限责任公司 基于球体验证码的验证方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937500A (zh) * 2006-10-16 2007-03-28 北京金山软件有限公司 网络用户身份认证的方法及系统
CN102685078A (zh) * 2011-03-17 2012-09-19 中国电信股份有限公司 对验证码进行验证的方法和服务器
CN103220142A (zh) * 2011-12-08 2013-07-24 果核数位股份有限公司 利用字元的立体图形进行验证的系统及其方法
CN104298912A (zh) * 2013-07-15 2015-01-21 深圳市腾讯计算机系统有限公司 抗破解的验证码实现方法、生成方法及装置
CN104852889A (zh) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 图片验证码生成方法和系统、验证方法和客户端及服务器

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6687836B1 (en) * 1999-11-26 2004-02-03 Hewlett-Packard Development Company, L.P. Method and apparatus which enable a computer user to verify whether they have correctly input their password into a computer
US7053953B2 (en) * 2001-12-21 2006-05-30 Eastman Kodak Company Method and camera system for blurring portions of a verification image to show out of focus areas in a captured archival image
US7397969B2 (en) * 2002-08-30 2008-07-08 Fujifilm Corporation Red eye compensation method, image processing apparatus and method for implementing the red eye compensation method, as well as printing method and printer
US7606417B2 (en) * 2004-08-16 2009-10-20 Fotonation Vision Limited Foreground/background segmentation in digital images with differential exposure calculations
US20080181507A1 (en) * 2007-01-29 2008-07-31 Intellivision Technologies Corp. Image manipulation for videos and still images
US20080209223A1 (en) * 2007-02-27 2008-08-28 Ebay Inc. Transactional visual challenge image for user verification
US9858712B2 (en) 2007-04-09 2018-01-02 Sam Stathis System and method capable of navigating and/or mapping any multi-dimensional space
KR101089443B1 (ko) * 2007-12-04 2011-12-07 에이.티 코뮤니케이션즈 가부시끼가이샤 2차원 코드 표시 시스템, 2차원 코드 표시 방법, 및 프로그램
JP5400301B2 (ja) * 2008-01-23 2014-01-29 インターナショナル・ビジネス・マシーンズ・コーポレーション 認証サーバ装置、認証方法、及び認証プログラム
US9842204B2 (en) 2008-04-01 2017-12-12 Nudata Security Inc. Systems and methods for assessing security risk
EP2330529A3 (en) * 2009-08-19 2011-06-22 Deutsche Telekom AG CAPTCHAs based on visual illusions
CN101739720B (zh) 2009-12-18 2012-02-22 武汉大学 三维动态验证码的生成方法及装置
US8990959B2 (en) * 2010-05-28 2015-03-24 Microsoft Corporation Manipulable human interactive proofs
EP2410450A1 (en) 2010-07-19 2012-01-25 Dan-Mihai Negrea Method for providing a challenge based on a content
US8701183B2 (en) * 2010-09-30 2014-04-15 Intel Corporation Hardware-based human presence detection
US20120291122A1 (en) 2011-05-13 2012-11-15 University Of Wollongong Multi Dimensional CAPTCHA System and Method
US20120323700A1 (en) * 2011-06-20 2012-12-20 Prays Nikolay Aleksandrovich Image-based captcha system
CN102254355B (zh) * 2011-07-05 2015-07-01 周圣云 一种立体验证码的生成方法和装置
US9183672B1 (en) * 2011-11-11 2015-11-10 Google Inc. Embeddable three-dimensional (3D) image viewer
CN102663672B (zh) * 2012-05-03 2013-12-04 杭州朗和科技有限公司 一种图片验证码生成方法和装置
CN103514393A (zh) 2012-06-20 2014-01-15 上海市上海中学 一种三维验证码的实现方法
CN102769628B (zh) * 2012-07-27 2014-03-26 腾讯科技(深圳)有限公司 页面登录方法及服务器
CN102768754B (zh) * 2012-08-03 2014-07-09 网易(杭州)网络有限公司 一种图片验证码的实现方法和装置
CN102831568B (zh) * 2012-08-03 2014-07-09 网易(杭州)网络有限公司 一种生成验证码图片的方法和装置
CN103685195A (zh) * 2012-09-21 2014-03-26 华为技术有限公司 用户验证处理方法、用户设备和服务器
US8978121B2 (en) 2013-01-04 2015-03-10 Gary Stephen Shuster Cognitive-based CAPTCHA system
US9721086B2 (en) * 2013-03-15 2017-08-01 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing
CN103824107B (zh) * 2013-11-15 2015-12-02 深圳光启智能光子技术有限公司 产品标识装置、终端、产品信息验证系统和方法
CN103853968B (zh) * 2014-02-28 2017-05-10 百度在线网络技术(北京)有限公司 验证码图片的生成方法和装置及其验证方法和装置
CN104618316B (zh) * 2014-03-17 2018-07-06 腾讯科技(深圳)有限公司 安全验证方法、装置和系统
US9264419B1 (en) 2014-06-26 2016-02-16 Amazon Technologies, Inc. Two factor authentication with authentication objects
CN106575166B (zh) * 2014-08-11 2022-11-29 张锐 手写输入字符的处理、数据拆分和合并及编解码处理方法
CN104657654B (zh) * 2014-12-22 2017-05-31 河海大学 一种利用人眼视觉补偿原理的图片验证码生成方法
US10331945B2 (en) 2015-12-22 2019-06-25 Intel Corporation Fair, secured, and efficient completely automated public Turing test to tell computers and humans apart (CAPTCHA)
CN107154924B (zh) 2016-03-04 2021-01-05 阿里巴巴集团控股有限公司 基于验证码的验证处理方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937500A (zh) * 2006-10-16 2007-03-28 北京金山软件有限公司 网络用户身份认证的方法及系统
CN102685078A (zh) * 2011-03-17 2012-09-19 中国电信股份有限公司 对验证码进行验证的方法和服务器
CN103220142A (zh) * 2011-12-08 2013-07-24 果核数位股份有限公司 利用字元的立体图形进行验证的系统及其方法
CN104298912A (zh) * 2013-07-15 2015-01-21 深圳市腾讯计算机系统有限公司 抗破解的验证码实现方法、生成方法及装置
CN104852889A (zh) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 图片验证码生成方法和系统、验证方法和客户端及服务器

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3425847A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11138306B2 (en) * 2016-03-14 2021-10-05 Amazon Technologies, Inc. Physics-based CAPTCHA
CN111652958A (zh) * 2020-06-04 2020-09-11 通华财富(上海)基金销售有限公司 一种增强型图形验证码生成方法、装置及存储介质
CN113568794A (zh) * 2021-07-29 2021-10-29 中国银行股份有限公司 前端自动化测试方法及装置

Also Published As

Publication number Publication date
CN107154924A (zh) 2017-09-12
JP7169720B2 (ja) 2022-11-11
EP3425847B1 (en) 2021-04-28
CN107154924B (zh) 2021-01-05
KR20180121902A (ko) 2018-11-09
US20180373860A1 (en) 2018-12-27
TW201734891A (zh) 2017-10-01
SG11201806933WA (en) 2018-09-27
KR102763505B1 (ko) 2025-02-07
EP3425847A4 (en) 2019-08-21
US11288354B2 (en) 2022-03-29
JP2019513257A (ja) 2019-05-23
EP3425847A1 (en) 2019-01-09
TWI738717B (zh) 2021-09-11

Similar Documents

Publication Publication Date Title
WO2017148315A1 (zh) 基于验证码的验证处理方法及装置
US11551482B2 (en) Facial recognition-based authentication
CN106529512B (zh) 活体人脸验证方法及装置
US20120291122A1 (en) Multi Dimensional CAPTCHA System and Method
CN111447207B (zh) 验证码验证方法、电子设备及存储介质
KR102030322B1 (ko) 비디오 프레임의 다수의 부분들에 대한 지문들을 생성함으로써 입체 비디오들을 검출하기 위한 방법들, 시스템들, 및 매체들
CN108460268A (zh) 验证方法及装置
CN107509080A (zh) 一种编码图像显示方法、装置和电子设备
CN113158167B (zh) 验证码实现方法及电子设备和计算机可读存储介质
CN113033243A (zh) 一种人脸识别方法、装置及设备
CN114648801B (zh) 人脸活体的检测方法及装置、处理器和电子设备
CN108140080B (zh) 一种显示的方法、装置及系统
KR102593934B1 (ko) 증강 현실 글라스를 이용한 증강 현실 보안 키보드 제공 방법 및 그를 위한 장치 및 시스템
CN103853968B (zh) 验证码图片的生成方法和装置及其验证方法和装置
WO2017076232A1 (zh) 虚拟现实设备中显示屏的配置方法及装置
CN106249858B (zh) 一种显示转换方法、装置及终端设备
HK1243843B (zh) 基於验证码的验证处理方法及装置
HK1243843A1 (zh) 基於验证码的验证处理方法及装置
US20240119674A1 (en) Terminal apparatus
CN107168662B (zh) 一种信息处理方法及电子设备
CN121261935A (zh) 基于互联网的信息安全交互方法及系统
CN106231281B (zh) 一种显示转换方法和装置
CN121544262A (zh) 基于增强现实技术的安全验证方法、装置及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 11201806933W

Country of ref document: SG

ENP Entry into the national phase

Ref document number: 2018546438

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20187025637

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2017759166

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017759166

Country of ref document: EP

Effective date: 20181004

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17759166

Country of ref document: EP

Kind code of ref document: A1

WWG Wipo information: grant in national office

Ref document number: 201817031379

Country of ref document: IN