WO2017148315A1 - 基于验证码的验证处理方法及装置 - Google Patents
基于验证码的验证处理方法及装置 Download PDFInfo
- Publication number
- WO2017148315A1 WO2017148315A1 PCT/CN2017/074319 CN2017074319W WO2017148315A1 WO 2017148315 A1 WO2017148315 A1 WO 2017148315A1 CN 2017074319 W CN2017074319 W CN 2017074319W WO 2017148315 A1 WO2017148315 A1 WO 2017148315A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification code
- dimensional
- pattern
- client
- generate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T15/00—Three-dimensional [3D] image rendering
- G06T15/10—Geometric effects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/50—Depth or shape recovery
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Definitions
- the present invention relates to the field of network security, and in particular to a verification code based verification processing method and apparatus.
- the existing picture verification code is divided into a copy verification code, a text prompt multi-picture selection, a text prompt click on a picture color element position, etc., but the graphic verification code is easily recognized by the optical character recognition (OCR) technology, and the above three types In the scheme, the verification code generates a picture with strong regularity, and the content or template is single. It can be intercepted by intercepting the text prompt and the image decompilation code analysis to find the difference, and there are already multiple image algorithm scheme identification verification codes. Therefore, the graphic verification code The safety factor is relatively low. And the user experience is low.
- a verification code-based verification processing method including: a server acquiring a verification code parameter required to generate a verification code; the server using the verification code parameter as an input of a three-dimensional stereo model And generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the server sends the three-dimensional three-dimensional pattern as a verification code to the client for display.
- a verification code-based verification processing apparatus is further provided, which is applied to a server, where the apparatus includes: a processing module, configured to acquire a verification code parameter required for generating a verification code; The verification code parameter is used as an input of the three-dimensional model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and a communication module is configured to use the three-dimensional pattern as The verification code is sent to the client for display.
- another verification code-based verification processing method including: a client acquiring a verification code parameter required to generate a verification code; the client using the verification code parameter as Input of a three-dimensional model to generate a three-dimensional pattern, wherein The identifiable content corresponding to the specified gaze focus position of the user is embedded in the three-dimensional pattern; the client displays the three-dimensional pattern as a verification code.
- a verification code-based verification processing apparatus which is applied to a client, and includes: a processing module, configured to acquire a verification code parameter required for generating a verification code; The verification code parameter is used as an input of the three-dimensional model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and a display module is configured to verify the three-dimensional pattern The code is displayed.
- the technical means for transmitting the three-dimensional stereoscopic pattern as a verification code to the client for display is adopted, thereby enhancing the difficulty of the verification code identification, improving the security of the verification code verification, and solving the existing graphic verification.
- FIG. 1 is a block diagram showing the hardware structure of a computer terminal based on a verification code verification processing method according to an embodiment of the present invention
- FIG. 2 is a schematic flow chart of an optional verification code based verification processing method according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of an alternative verification code generation principle according to an embodiment of the present invention.
- FIG. 4 is a schematic diagram of an optional three-dimensional verification code according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of a verification process of an optional browser/server based verification code according to an embodiment of the present invention
- FIG. 6 is a schematic structural diagram of an optional verification code based verification processing apparatus according to an embodiment of the present invention.
- FIG. 7 is a schematic flow chart of another optional verification code based verification processing method according to an embodiment of the present invention.
- FIG. 8 is a structural block diagram of another optional verification code based verification processing apparatus according to an embodiment of the present invention.
- FIG. 9 is a structural block diagram of a computer terminal according to an embodiment of the present invention.
- Depth of field refers to the depth of the stereoscopic three-dimensional pattern, that is, the range of the distance between the front and back of the object measured by the image that can obtain a clear image at the front of the camera lens or other imager.
- a clear image can be formed in the range before and after the focus, and the range of the distance before and after is called the depth of field.
- Level refers to the richness of the content of the three-dimensional graphics. Different levels of images are located at different focus positions, and the image of this layer can only be seen when the observer's eye focus falls on the corresponding position.
- a verification code based verification processing method embodiment there is also provided a verification code based verification processing method embodiment, and it should be noted that the steps shown in the flowchart of the drawing may be executed in a computer system such as a set of computer executable instructions. And, although the logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in a different order than the ones described herein.
- FIG. 1 is a hardware structural block diagram of a computer terminal based on a verification code verification processing method according to an embodiment of the present invention.
- computer terminal 10 may include one or more (only one shown) processor 102 (processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA)
- processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA)
- a memory 104 for storing data
- a transmission device 106 for communication functions.
- computer terminal 10 may also include more or fewer components than those shown in FIG. 1, or have a different configuration than that shown in FIG.
- the memory 104 can be used to store software programs and modules of application software, such as program instructions/modules corresponding to the verification code-based verification processing method in the embodiment of the present invention, and the processor 102 runs the software programs and modules stored in the memory 104. Thereby performing various functional applications and data processing, that is, implementing the vulnerability detection method of the above application.
- Memory 104 may include high speed random access memory, and may also include non-volatile memory such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
- memory 104 may further include memory remotely located relative to processor 102, which may be coupled to computer terminal 10 via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
- Transmission device 106 is for receiving or transmitting data via a network.
- the network specific examples described above may include a wireless network provided by a communication provider of the computer terminal 10.
- the transmission device 106 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
- the transmission device 106 can be a radio frequency (RF) module for passing Communicate wirelessly with the Internet.
- NIC Network Interface Controller
- RF radio frequency
- FIG. 2 is a schematic flow chart of an optional verification code based verification processing method according to an embodiment of the present invention. As shown in FIG. 2, the method includes steps S202-S206:
- Step S202 the server acquires the verification code parameter required to generate the verification code.
- the “acquisition” in the step S202 may be performed as being acquired from a third-party device, or may be performed as being obtained locally (for example, when the execution subject of the step is a server, obtained from parameters pre-stored by the server) .
- the verification code parameter may include one or more of the following, but is not limited thereto: a distortion parameter or position, color of a text, a pattern, a text or a pattern.
- the verification code parameter in step S202 may be pre-acquired or may be triggered in real time; for the latter, the following implementation process may be performed, but is not limited thereto: obtaining a verification code required to generate the verification code Before the parameter, the client is requested to obtain a verification code, wherein the request is used to trigger execution of step S202.
- Step S204 the server uses the verification code parameter as an input of the three-dimensional stereo model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to the specified focus position of the user (ie, the observer is only in the human eye)
- the focus of the object is observed when the current focus position is specified, that is, the content that the observer can observe when viewing the three-dimensional pattern at a specific angle); because the identifiable content in the three-dimensional pattern is The content corresponding to the focus position of the eye is specified. Therefore, the observer can only observe from the specified focus position of the eye to recognize the identifiable content, which enhances the security of the verification code recognition process.
- the three-dimensional model mentioned in this step may use all models in the related art that can generate a three-dimensional stereoscopic pattern, such as a 3D MAX model, etc., but is not limited thereto.
- the two-eye visual difference and the optical refraction principle to make a direct view of a three-dimensional image in a plane, and the objects in the image can be highlighted.
- the device observes the pattern, and the principle is to observe the stereo image from the rear (far) or front (near) of the figure.
- the purpose of changing the focus position of the eye is to make the two adjacent repeating patterns on the perspective view "look" exactly overlap, and use the difference between the overlapping patterns to create a stereoscopic feeling.
- it can be implemented by the following processing procedures, but is not limited thereto:
- the foreground picture is a three-dimensional figure that can be recognized from the three-dimensional pattern in observation.
- the reason why the observer can see the stereoscopic image from the plan is that the grayscales of the foreground (also called the template) of the image are different.
- the human eye captures these subtle grayscale differences, it can be simulated in the brain. Create corresponding 3D graphics. The smaller the gray level in the image (the whiter the template is), the closer it looks to the viewer, and the higher the gray level (the darker the template), the farther it looks from the viewer.
- the background image refers to the visual illusion picture seen by the observer, that is, the plan view itself.
- the selection of the background image is such that the visual illusion effect is as strong as possible. Avoid too many regular patterns (such as regular repeating patterns of leaves, rings, squares, etc.) to prevent the observer from paying too much attention to the flat pattern when observing the three-dimensional pattern, ignoring the three-dimensional Grayscale information hidden in the pattern (ie, the content can be identified).
- the background picture and the foreground picture located at different levels are set at different gaze focus positions according to a preset depth of field to generate the three-dimensional three-dimensional pattern. That is, the image is synthesized by "depth of field” and “hierarchy” to generate a planar two-dimensional picture. Among them, for the depth of field, the value should be avoided to avoid too much difficulty in observing the three-dimensional pattern.
- the level refers to the richness of the content in the three-dimensional pattern.
- the images of different levels are located at different focus positions. Only when the observer's eye focus falls on the corresponding position, the image of this layer can be seen. Therefore, it can be reasonable. Arranging levels to create multi-level images increases difficulty.
- one or more verification code parameters may be randomly selected from the obtained verification code parameters required for generating the verification code, as the verification code parameters for generating the background image and the foreground image. And generating the above background image and the foreground image according to the randomly selected verification code parameter. In this way, randomly select the position, direction, and The verification code parameters such as content and color system enhance the difficulty of generating the verification code, reduce the repetition rate of the image verification code, and cannot find the verification code generation law when decompiling the verification code pattern.
- FIG. 3 is a schematic diagram of an alternative verification code generation principle according to an embodiment of the present invention. As shown in Figure 3:
- the optical illusion image generation library is developed by the rule method of edge blending, cascading, and deformation for the random generation of the verification code.
- the optical illusion picture in the optical illusion picture generation library can be inserted into the text area, so that the position of the verification code text can be offset and distorted, and the probability of repeated combination of the verification code is reduced, that is, the pattern text and the like are distorted by using the picture distortion space coordinate system in FIG. .
- a user-recognizable color library of verification code pictures and copy files can be established, thereby further improving the difficulty of machine cracking.
- step S206 the server sends the three-dimensional stereoscopic pattern as a verification code to the client for display.
- the sending process of the step can be implemented by using a communication process in the related art.
- the verification code sent at this time is a three-dimensional three-dimensional pattern, so that the observer (ie, the user) on the client side can quickly read out the valid information ( The content can be recognized.
- the specified eye focus position for prompting to recognize the identifiable content from the three-dimensional stereoscopic pattern may be sent to the client. In order to quickly find the focus position of the eye in the observation, and improve the recognition efficiency of the verification code, thereby further improving the user experience.
- the specified gaze focus position may be sent separately from the verification code as two independent processes, or may be simultaneously sent.
- the indication information for indicating the specified gaze focus position may be inserted into the three-dimensional three-dimensional pattern. Sent to the above client.
- FIG. 4 is a schematic diagram of an optional three-dimensional verification code according to an embodiment of the present invention.
- the three-dimensional code generated by using the above principle is only in the perspective of the terminal and the observer (ie, the user). In the case of an angle (such as 45 degrees), the picture on the left in Figure 4 is seen. When at other angles, the alphanumeric characters in the captcha are obscured, as shown in the right image of Figure 4.
- FIG. 5 is a schematic diagram of a verification process of an optional browser/server based verification code according to an embodiment of the invention. As shown in Figure 5,
- the server receives, by using a browser, a request sent by the user to the server through the browser for obtaining the verification code, and feeds back the verification code system browser for the user to view;
- the data is submitted (that is, the verification copy is recognized by the browser and submitted to the server): looking for the observation position, converting the viewing angle, and reading the content;
- the server judges user security through user access characteristics (such as UA, recognition time, number of accesses) and submitted verification files, and returns results to the browser for user operation feedback.
- user access characteristics such as UA, recognition time, number of accesses
- the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
- the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- an apparatus for implementing the above-described verification code based verification processing method which may be run on the computer terminal shown in FIG. 1 or in a computer terminal as shown in FIG. More or less certain functional modules on the computer terminal, but are not limited to this.
- the apparatus includes a processing module 60 and a communication module 62, wherein:
- the processing module 60 is configured to obtain a verification code parameter required for generating the verification code, and use the verification code parameter as an input of the three-dimensional stereo model to generate a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with a specified focus position of the user.
- Corresponding identifiable content may be expressed as follows, but is not limited thereto: (1) generating a background image and a foreground image recognizable by the user according to the verification code parameter; and (2) according to the preset depth of field The background picture and the foreground picture at different levels are set at different gaze focus positions to generate the three-dimensional pattern.
- the processing module 60 is further configured to generate a background image and a foreground image recognizable by the user according to the verification code parameter, and set the background image and the foreground image located at different levels according to the preset depth of field to different eye focus positions.
- the above three-dimensional pattern is generated.
- the processing module 62 is further configured to: randomly select one or more verification code parameters from the obtained verification code parameters required to generate the verification code, as the verification code parameter for generating the background image and the foreground image; The randomly selected verification code parameters generate the above background picture and the above foreground picture.
- the communication module 62 is configured to send the foregoing three-dimensional stereoscopic pattern as a verification code to the client. display.
- the communication module 62 is further configured to send the specified focus focus position for prompting to identify the identifiable content from the three-dimensional stereoscopic pattern to the foregoing Client.
- the specified gaze focus position may be sent separately from the verification code as two independent processes, or may be simultaneously sent.
- the indication information for indicating the specified gaze focus position may be inserted into the three-dimensional three-dimensional pattern. Sent to the above client.
- each module in this embodiment may be embodied in the form of software or hardware.
- the processing module 60 is a processor, such as a CPU.
- the communication module is a wireless communication module (such as a mobile communication module) or a wired communication module.
- FIG. 7 is a schematic flowchart of another optional verification code based verification processing method according to an embodiment of the present invention. As shown in FIG. 7, the method includes:
- Step S702 the client obtains the verification code parameter required to generate the verification code.
- the client obtains the foregoing verification code parameters in various manners, for example, all of them may be locally obtained from the client; of course, all may be obtained from the server; or a part may be obtained from the client, and the remaining part may be obtained from the server (for example, Obtaining larger data such as pictures from the server) Obtaining the verification code parameters required to generate the verification code,
- Step S704 the client generates the three-dimensional three-dimensional pattern by using the verification code parameter as an input of the three-dimensional stereo model, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to the designated focus position of the user. Since the identifiable content in the three-dimensional pattern is the content corresponding to the specified gaze focus position, the observer can only observe from the specified gaze focus position to recognize The identifiable content is enhanced, which enhances the security of the verification code recognition process.
- the process of generating the three-dimensional three-dimensional pattern may be implemented in the following implementation manner, but is not limited thereto: the client generates a background image and a foreground image recognizable by the user according to the verification code parameter; the client is based on the preset depth of field.
- the above-mentioned background image and foreground image at different levels are set at different gaze focusing positions to generate the three-dimensional three-dimensional pattern.
- the verification code parameter may be randomly selected in the verification code generation process, specifically: the client randomly selects one or more verification codes from the obtained verification code parameters required for generating the verification code.
- the parameter is used as a verification code parameter for generating the background image and the foreground image, and generates the background image and the foreground image according to the randomly selected verification code parameter.
- step S706 the client displays the three-dimensional stereoscopic pattern as a verification code.
- the verification code parameter includes one or more of the following parameters: a distortion parameter or position, a color of a text, a pattern, a text, or a pattern.
- the specific can be determined according to the actual situation.
- the client displays the three-dimensional three-dimensional pattern as a verification code
- the client displays the specified eye focus for prompting to recognize the identifiable content from the three-dimensional three-dimensional pattern. position. In this way, the observer (user) can quickly recognize the identifiable content in the three-dimensional stereoscopic pattern.
- the manner of displaying the focus position of the specified eye is various, for example, the static pattern or the dynamic pattern display may be used, and may be displayed separately from the three-dimensional pattern, or the indication information for indicating the focus position of the specified eye may be inserted into the three-dimensional image. Displayed in the pattern.
- the client can verify the verification code locally, that is, after the client displays the three-dimensional stereoscopic pattern as a verification code, the client receives the user according to the above.
- the verification code input by the three-dimensional pattern is verified, and the verification code is verified, wherein the verification is performed when the input verification code matches the identifiable content in the three-dimensional pattern.
- the above verification process can also be verified by the server.
- the identifiable content in the three-dimensional stereoscopic pattern can be sent to the server in advance by the client, and then the content input by the user is sent to the server for verification.
- the apparatus may be applied to a client, or may be run on the computer terminal shown in FIG. 1 or may be operated. It is on a computer terminal that has more or less certain functional modules than the computer terminal shown in FIG. 1, but is not limited thereto.
- the apparatus includes a processing module 80 and a display module 82, wherein:
- the processing module 80 is configured to obtain a verification code parameter required for generating the verification code, and generate the three-dimensional three-dimensional pattern by using the verification code parameter as an input of the three-dimensional stereo model, wherein the three-dimensional stereoscopic pattern is embedded with a specified eye focus of the user.
- the processing module 80 is configured to obtain the verification code parameter from the client locally and/or from the server.
- the processing module 80 is configured to generate the foregoing three-dimensional stereoscopic pattern according to the following manner: generating a background image and a user-recognizable foreground image according to the verification code parameter; and positioning the different levels according to the preset depth of field
- the background image and the foreground image are disposed at different gaze focus positions to generate the three-dimensional three-dimensional pattern. Since the background image and the foreground image are set at different gaze focus positions, when the observer observes at other gaze focus positions outside the specified gaze focus position, a blur pattern appears (ie, the content cannot be recognized).
- the display module 82 is connected to the processing module 80 for displaying the three-dimensional stereoscopic pattern as a verification code.
- the display module 82 is further configured to display, when the three-dimensional stereoscopic pattern is displayed as the verification code, the specified eye focus position for prompting to identify the identifiable content from the three-dimensional stereoscopic pattern. In this way, the observer can quickly recognize the identifiable content in the three-dimensional pattern and improve the user experience.
- each of the foregoing processing modules may be implemented by software (for example, the display module 82 is a display interface on the terminal) or hardware, and the latter may be implemented by the following manner, but is not limited thereto: the processing module 80 is A processor, such as a CPU or the like; the display module 82 can represent a display or the like.
- Embodiments of the present invention may provide a computer terminal, which may be any one of computer terminal groups.
- the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
- the computer terminal may be located in at least one network device of the plurality of network devices of the computer network.
- the computer terminal may execute the program code of the following steps in the verification code-based verification processing method: the server acquires the verification code parameter required to generate the verification code; and the server uses the verification code parameter as the input of the three-dimensional model. And generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the server sends the three-dimensional three-dimensional pattern as a verification code to the client for display.
- FIG. 9 is a structural block diagram of a computer terminal according to an embodiment of the present invention.
- the computer terminal A may include one or more (only one shown in the figure) processor 91, a memory 93, and a transmission device 95 connected to the website server.
- the processor 91 can call the information and the application stored in the memory 93 through the transmission device to perform the following steps: randomly selecting a plurality of verification code generation rules from the multidimensional verification code generation rules, wherein the multidimensional verification code generation rules are different Forming a verification code generation rule of the dimension; combining the randomly selected plurality of verification code generation rules to obtain a combination rule; generating a final verification code according to the combination rule, and transmitting the result to the terminal for display by the transmission device 75 .
- the processor 91 may further execute the following steps: generating a background image and a foreground image recognizable by the user according to the verification code parameter; and the background image and the foreground image located at different levels according to the preset depth of field
- the three-dimensional three-dimensional pattern is generated by being disposed at different gaze focusing positions.
- the processor 91 may further execute the following program code: randomly select one or more verification code parameters from the acquired verification code parameters required to generate the verification code, as the background image and the foreground are generated. a verification code parameter of the picture; and generating the background picture and the foreground picture according to the randomly selected verification code parameter.
- the processor 91 may further execute the program code of: sending, by the transmitting device 95, the specified gaze focus position for prompting to identify the identifiable content from the three-dimensional stereo pattern to the Client.
- the processor 91 may further execute the following program code: inserting indication information for indicating the specified focus position of the eye into the three-dimensional stereo pattern and transmitting the information to the client by using the transmission device 95.
- FIG. 9 is only an illustration, and the computer terminal can also be a smart phone (such as an Android mobile phone, an iOS mobile phone, etc.), a tablet computer, an applause computer, and a mobile Internet device (Mobile Internet Devices, MID). ), PAD and other terminal devices.
- FIG. 9 does not limit the structure of the above electronic device.
- computer terminal A may also include more or fewer components (such as a network interface, display device, etc.) than shown in FIG. 9, or have a different configuration than that shown in FIG.
- Embodiments of the present invention also provide a storage medium.
- the foregoing storage medium may be used to save the program code executed by the verification code based verification processing method provided in Embodiment 1 above.
- the foregoing storage medium may be located in a computer network. Any one of the computer terminals in the terminal group or located in any one of the mobile terminal groups.
- the storage medium is configured to store program code for performing the following steps: obtaining a verification code parameter required to generate the verification code; and using the verification code parameter as an input of the three-dimensional model to generate three-dimensional a three-dimensional pattern in which the identifiable content corresponding to the designated focus position of the user is embedded; and the three-dimensional pattern is sent as a verification code to the client for display.
- any one of the above computer terminal groups can establish a communication relationship with the website server.
- Embodiments of the present invention may provide another computer terminal, which may be any one of computer terminal groups.
- the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
- the computer terminal may be located in at least one network device of the plurality of network devices of the computer network.
- the computer terminal may execute the program code of the following steps in the verification code-based verification processing method: the client obtains the verification code parameter required to generate the verification code; and the client uses the verification code parameter as the three-dimensional model Inputting, generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the client displays the three-dimensional three-dimensional pattern as a verification code.
- Embodiments of the present invention also provide another storage medium.
- the foregoing storage medium may be used to save the program code executed by the verification code based verification processing method provided in the first embodiment.
- the foregoing storage medium may be located in any one of the computer terminal groups in the computer network, or in any one of the mobile terminal groups.
- the storage medium is configured to store program code for performing the following steps: the client obtains the verification code parameter required to generate the verification code; and the client uses the verification code parameter as the three-dimensional model Inputting, generating a three-dimensional three-dimensional pattern, wherein the three-dimensional three-dimensional pattern is embedded with identifiable content corresponding to a specified focus position of the user; and the client displays the three-dimensional three-dimensional pattern as a verification code.
- the disclosed client may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, unit or module, and may be electrical or otherwise.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or soft. The form of the functional unit is implemented.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
- a number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Geometry (AREA)
- Computer Graphics (AREA)
- Processing Or Creating Images (AREA)
- User Interface Of Digital Computer (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (23)
- 一种基于验证码的验证处理方法,其特征在于,包括:服务器获取生成验证码所需要的验证码参数;所述服务器将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;所述服务器将所述三维立体图案作为验证码发送至客户端进行显示。
- 根据权利要求1所述的方法,其特征在于,所述服务器将所述验证码参数作为三维立体模型的输入,生成三维立体图案,包括:所述服务器依据所述验证码参数生成背景图片和用户可识别的前景图片;所述服务器依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
- 根据权利要求2所述的方法,其特征在于,所述服务器依据所述验证码参数生成背景图片和用户可识别的前景图片,包括:所述服务器从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
- 根据权利要求1所述的方法,其特征在于,所述验证码参数包括以下一个参数或多个参数的组合:文字、图案、文字或图案的扭曲参数或位置、色彩。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述服务器将所述三维立体图案作为验证码发送至客户端时,所述方法还包括:所述服务器将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置发送至所述客户端。
- 根据权利要求5所述的方法,其特征在于,所述服务器将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置发送至所述客户端,包括:所述服务器将用于指示所述指定目光聚焦位置的指示信息插入所述三维立体图案中发送至所述客户端。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述服务器获取生成验证码所需要的验证码参数之前,所述方法还包括:所述服务器接收所述客户端用于获取验证码的请求。
- 一种基于验证码的验证处理装置,应用于服务器,其特征在于,包括:处理模块,用于获取生成验证码所需要的验证码参数;将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;通信模块,用于将所述三维立体图案作为验证码发送至客户端进行显示。
- 根据权利要求8所述的装置,其特征在于,所述处理模块,还用于依据所述验证码参数生成背景图片和用户可识别的前景图片;以及依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
- 根据权利要求9所述的装置,其特征在于,所述处理模块,还用于从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
- 根据权利要求8至10中任一项所述的装置,其特征在于,所述通信模块,还用于将用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置发送至所述客户端。
- 一种基于验证码的验证处理方法,其特征在于,包括:客户端获取生成验证码所需要的验证码参数;所述客户端将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;所述客户端将所述三维立体图案作为验证码进行显示。
- 根据权利要求12所述的方法,其特征在于,所述客户端获取生成验证码所需要的验证码参数,包括:所述客户端从客户端本地和/或从服务器获取所述验证码参数。
- 根据权利要求12所述的方法,其特征在于,所述客户端将所述验证码参数作为三维立体模型的输入,生成三维立体图案,包括:所述客户端依据所述验证码参数生成背景图片和用户可识别的前景图片;所述客户端依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
- 根据权利要求14所述的方法,其特征在于,所述客户端依据所述验证码参数生成背景图片和用户可识别的前景图片,包括:所述客户端从获取的生成验证码所需要的验证码参数中随机选择一个或多个验证码参数,作为生成所述背景图片和所述前景图片的验证码参数;并依据随机选择的验证码参数生成所述背景图片和所述前景图片。
- 根据权利要求12所述的方法,其特征在于,所述验证码参数包括以下一个参数或多个参数的组合:文字、图案、文字或图案的扭曲参数或位置、色彩。
- 根据权利要求12至16中任一项所述的方法,其特征在于,所述客户端将所述三维立体图案作为验证码进行显示时,所述方法还包括:所述客户端显示用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置。
- 根据权利要求17所述的方法,其特征在于,所述客户端显示用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置,包括:将用于指示所述指定目光聚焦位置的指示信息插入所述三维立体图案中进行显示。
- 根据权利要求12所述的方法,其特征在于,所述客户端将所述三维立体图案作为验证码进行显示之后,所述方法还包括:所述客户端接收用户依据所述三维立体图案输入的验证码,并对所述验证码进行验证,其中,在所述输入的验证码与所述三维立体图案中的所述可识别内容一致时,通过验证。
- 一种基于验证码的验证处理装置,应用于客户端,其特征在于,包括:处理模块,用于获取生成验证码所需要的验证码参数;以及将所述验证码参数作为三维立体模型的输入,生成三维立体图案,其中,该三维立体图案中嵌有与用户的指定目光聚焦位置对应的可识别内容;显示模块,用于将所述三维立体图案作为验证码进行显示。
- 根据权利要求20所述的装置,其特征在于,所述处理模块,用于从客户端本地和/或从服务器获取所述验证码参数。
- 根据权利要求20所述的装置,其特征在于,所述处理模块,用于依据所述验证码参数生成背景图片和用户可识别的前景图片;以及依据预设景深将位于不同层次的所述背景图片和前景图片设置于不同的目光聚焦位置上,生成所述三维立体图案。
- 根据权利要求20至22中任一项所述的装置,其特征在于,所述显示模块,还用于在显示所述三维立体图案作为验证码时,显示用于提示从所述三维立体图案中识别出所述可识别内容的所述指定目光聚焦位置。
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2018546438A JP7169720B2 (ja) | 2016-03-04 | 2017-02-21 | 検証コードに基づく検証処理方法及び装置 |
| EP17759166.6A EP3425847B1 (en) | 2016-03-04 | 2017-02-21 | Captcha-based authentication processing method and device |
| KR1020187025637A KR102763505B1 (ko) | 2016-03-04 | 2017-02-21 | 검증 코드 기반의 검증 프로세싱 방법 및 장치 |
| SG11201806933WA SG11201806933WA (en) | 2016-03-04 | 2017-02-21 | Verification code-based verification processing method and apparatus |
| US16/119,883 US11288354B2 (en) | 2016-03-04 | 2018-08-31 | Verification code-based verification processing |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610125755.3 | 2016-03-04 | ||
| CN201610125755.3A CN107154924B (zh) | 2016-03-04 | 2016-03-04 | 基于验证码的验证处理方法及装置 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/119,883 Continuation US11288354B2 (en) | 2016-03-04 | 2018-08-31 | Verification code-based verification processing |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017148315A1 true WO2017148315A1 (zh) | 2017-09-08 |
Family
ID=59742503
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/074319 Ceased WO2017148315A1 (zh) | 2016-03-04 | 2017-02-21 | 基于验证码的验证处理方法及装置 |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US11288354B2 (zh) |
| EP (1) | EP3425847B1 (zh) |
| JP (1) | JP7169720B2 (zh) |
| KR (1) | KR102763505B1 (zh) |
| CN (1) | CN107154924B (zh) |
| SG (1) | SG11201806933WA (zh) |
| TW (1) | TWI738717B (zh) |
| WO (1) | WO2017148315A1 (zh) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111652958A (zh) * | 2020-06-04 | 2020-09-11 | 通华财富(上海)基金销售有限公司 | 一种增强型图形验证码生成方法、装置及存储介质 |
| US11138306B2 (en) * | 2016-03-14 | 2021-10-05 | Amazon Technologies, Inc. | Physics-based CAPTCHA |
| CN113568794A (zh) * | 2021-07-29 | 2021-10-29 | 中国银行股份有限公司 | 前端自动化测试方法及装置 |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107154924B (zh) | 2016-03-04 | 2021-01-05 | 阿里巴巴集团控股有限公司 | 基于验证码的验证处理方法及装置 |
| CN110213205B (zh) * | 2018-03-27 | 2021-08-24 | 腾讯科技(深圳)有限公司 | 验证方法、装置及设备 |
| CN110378095B (zh) * | 2019-07-17 | 2022-02-25 | 杭州网易智企科技有限公司 | 基于验证码的交互验证方法、装置、介质和计算设备 |
| CN110321691B (zh) * | 2019-07-30 | 2022-03-11 | 东南大学 | 一种适用于脑机接口的用户鉴权装置及其鉴权方法 |
| JP7509032B2 (ja) * | 2020-12-25 | 2024-07-02 | サクサ株式会社 | 認証システム及び認証プログラム |
| CN114268430B (zh) * | 2021-12-15 | 2024-05-24 | 瀚云科技有限公司 | 一种验证码生成方法、装置、电子设备及存储介质 |
| CN114237678B (zh) * | 2021-12-22 | 2026-03-17 | 广州品唯软件有限公司 | 组件更新方法、装置、存储介质及计算机设备 |
| CN114357388A (zh) * | 2021-12-29 | 2022-04-15 | 苏州浪潮智能科技有限公司 | 参数校验方法、装置、电子设备及存储介质 |
| CN115688080B (zh) * | 2022-10-26 | 2025-08-26 | 咪咕文化科技有限公司 | 一种验证码生成方法、通信设备及计算机可读存储介质 |
| US12470556B2 (en) * | 2023-03-22 | 2025-11-11 | Microsoft Technology Licensing, Llc | Generating captchas using generative imaging models |
| CN118429757B (zh) * | 2024-03-22 | 2024-11-05 | 三峡高科信息技术有限责任公司 | 基于球体验证码的验证方法及装置 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1937500A (zh) * | 2006-10-16 | 2007-03-28 | 北京金山软件有限公司 | 网络用户身份认证的方法及系统 |
| CN102685078A (zh) * | 2011-03-17 | 2012-09-19 | 中国电信股份有限公司 | 对验证码进行验证的方法和服务器 |
| CN103220142A (zh) * | 2011-12-08 | 2013-07-24 | 果核数位股份有限公司 | 利用字元的立体图形进行验证的系统及其方法 |
| CN104298912A (zh) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | 抗破解的验证码实现方法、生成方法及装置 |
| CN104852889A (zh) * | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | 图片验证码生成方法和系统、验证方法和客户端及服务器 |
Family Cites Families (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6687836B1 (en) * | 1999-11-26 | 2004-02-03 | Hewlett-Packard Development Company, L.P. | Method and apparatus which enable a computer user to verify whether they have correctly input their password into a computer |
| US7053953B2 (en) * | 2001-12-21 | 2006-05-30 | Eastman Kodak Company | Method and camera system for blurring portions of a verification image to show out of focus areas in a captured archival image |
| US7397969B2 (en) * | 2002-08-30 | 2008-07-08 | Fujifilm Corporation | Red eye compensation method, image processing apparatus and method for implementing the red eye compensation method, as well as printing method and printer |
| US7606417B2 (en) * | 2004-08-16 | 2009-10-20 | Fotonation Vision Limited | Foreground/background segmentation in digital images with differential exposure calculations |
| US20080181507A1 (en) * | 2007-01-29 | 2008-07-31 | Intellivision Technologies Corp. | Image manipulation for videos and still images |
| US20080209223A1 (en) * | 2007-02-27 | 2008-08-28 | Ebay Inc. | Transactional visual challenge image for user verification |
| US9858712B2 (en) | 2007-04-09 | 2018-01-02 | Sam Stathis | System and method capable of navigating and/or mapping any multi-dimensional space |
| KR101089443B1 (ko) * | 2007-12-04 | 2011-12-07 | 에이.티 코뮤니케이션즈 가부시끼가이샤 | 2차원 코드 표시 시스템, 2차원 코드 표시 방법, 및 프로그램 |
| JP5400301B2 (ja) * | 2008-01-23 | 2014-01-29 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 認証サーバ装置、認証方法、及び認証プログラム |
| US9842204B2 (en) | 2008-04-01 | 2017-12-12 | Nudata Security Inc. | Systems and methods for assessing security risk |
| EP2330529A3 (en) * | 2009-08-19 | 2011-06-22 | Deutsche Telekom AG | CAPTCHAs based on visual illusions |
| CN101739720B (zh) | 2009-12-18 | 2012-02-22 | 武汉大学 | 三维动态验证码的生成方法及装置 |
| US8990959B2 (en) * | 2010-05-28 | 2015-03-24 | Microsoft Corporation | Manipulable human interactive proofs |
| EP2410450A1 (en) | 2010-07-19 | 2012-01-25 | Dan-Mihai Negrea | Method for providing a challenge based on a content |
| US8701183B2 (en) * | 2010-09-30 | 2014-04-15 | Intel Corporation | Hardware-based human presence detection |
| US20120291122A1 (en) | 2011-05-13 | 2012-11-15 | University Of Wollongong | Multi Dimensional CAPTCHA System and Method |
| US20120323700A1 (en) * | 2011-06-20 | 2012-12-20 | Prays Nikolay Aleksandrovich | Image-based captcha system |
| CN102254355B (zh) * | 2011-07-05 | 2015-07-01 | 周圣云 | 一种立体验证码的生成方法和装置 |
| US9183672B1 (en) * | 2011-11-11 | 2015-11-10 | Google Inc. | Embeddable three-dimensional (3D) image viewer |
| CN102663672B (zh) * | 2012-05-03 | 2013-12-04 | 杭州朗和科技有限公司 | 一种图片验证码生成方法和装置 |
| CN103514393A (zh) | 2012-06-20 | 2014-01-15 | 上海市上海中学 | 一种三维验证码的实现方法 |
| CN102769628B (zh) * | 2012-07-27 | 2014-03-26 | 腾讯科技(深圳)有限公司 | 页面登录方法及服务器 |
| CN102768754B (zh) * | 2012-08-03 | 2014-07-09 | 网易(杭州)网络有限公司 | 一种图片验证码的实现方法和装置 |
| CN102831568B (zh) * | 2012-08-03 | 2014-07-09 | 网易(杭州)网络有限公司 | 一种生成验证码图片的方法和装置 |
| CN103685195A (zh) * | 2012-09-21 | 2014-03-26 | 华为技术有限公司 | 用户验证处理方法、用户设备和服务器 |
| US8978121B2 (en) | 2013-01-04 | 2015-03-10 | Gary Stephen Shuster | Cognitive-based CAPTCHA system |
| US9721086B2 (en) * | 2013-03-15 | 2017-08-01 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
| CN103824107B (zh) * | 2013-11-15 | 2015-12-02 | 深圳光启智能光子技术有限公司 | 产品标识装置、终端、产品信息验证系统和方法 |
| CN103853968B (zh) * | 2014-02-28 | 2017-05-10 | 百度在线网络技术(北京)有限公司 | 验证码图片的生成方法和装置及其验证方法和装置 |
| CN104618316B (zh) * | 2014-03-17 | 2018-07-06 | 腾讯科技(深圳)有限公司 | 安全验证方法、装置和系统 |
| US9264419B1 (en) | 2014-06-26 | 2016-02-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
| CN106575166B (zh) * | 2014-08-11 | 2022-11-29 | 张锐 | 手写输入字符的处理、数据拆分和合并及编解码处理方法 |
| CN104657654B (zh) * | 2014-12-22 | 2017-05-31 | 河海大学 | 一种利用人眼视觉补偿原理的图片验证码生成方法 |
| US10331945B2 (en) | 2015-12-22 | 2019-06-25 | Intel Corporation | Fair, secured, and efficient completely automated public Turing test to tell computers and humans apart (CAPTCHA) |
| CN107154924B (zh) | 2016-03-04 | 2021-01-05 | 阿里巴巴集团控股有限公司 | 基于验证码的验证处理方法及装置 |
-
2016
- 2016-03-04 CN CN201610125755.3A patent/CN107154924B/zh active Active
-
2017
- 2017-02-13 TW TW106104649A patent/TWI738717B/zh active
- 2017-02-21 JP JP2018546438A patent/JP7169720B2/ja active Active
- 2017-02-21 SG SG11201806933WA patent/SG11201806933WA/en unknown
- 2017-02-21 WO PCT/CN2017/074319 patent/WO2017148315A1/zh not_active Ceased
- 2017-02-21 KR KR1020187025637A patent/KR102763505B1/ko active Active
- 2017-02-21 EP EP17759166.6A patent/EP3425847B1/en active Active
-
2018
- 2018-08-31 US US16/119,883 patent/US11288354B2/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1937500A (zh) * | 2006-10-16 | 2007-03-28 | 北京金山软件有限公司 | 网络用户身份认证的方法及系统 |
| CN102685078A (zh) * | 2011-03-17 | 2012-09-19 | 中国电信股份有限公司 | 对验证码进行验证的方法和服务器 |
| CN103220142A (zh) * | 2011-12-08 | 2013-07-24 | 果核数位股份有限公司 | 利用字元的立体图形进行验证的系统及其方法 |
| CN104298912A (zh) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | 抗破解的验证码实现方法、生成方法及装置 |
| CN104852889A (zh) * | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | 图片验证码生成方法和系统、验证方法和客户端及服务器 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP3425847A4 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11138306B2 (en) * | 2016-03-14 | 2021-10-05 | Amazon Technologies, Inc. | Physics-based CAPTCHA |
| CN111652958A (zh) * | 2020-06-04 | 2020-09-11 | 通华财富(上海)基金销售有限公司 | 一种增强型图形验证码生成方法、装置及存储介质 |
| CN113568794A (zh) * | 2021-07-29 | 2021-10-29 | 中国银行股份有限公司 | 前端自动化测试方法及装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107154924A (zh) | 2017-09-12 |
| JP7169720B2 (ja) | 2022-11-11 |
| EP3425847B1 (en) | 2021-04-28 |
| CN107154924B (zh) | 2021-01-05 |
| KR20180121902A (ko) | 2018-11-09 |
| US20180373860A1 (en) | 2018-12-27 |
| TW201734891A (zh) | 2017-10-01 |
| SG11201806933WA (en) | 2018-09-27 |
| KR102763505B1 (ko) | 2025-02-07 |
| EP3425847A4 (en) | 2019-08-21 |
| US11288354B2 (en) | 2022-03-29 |
| JP2019513257A (ja) | 2019-05-23 |
| EP3425847A1 (en) | 2019-01-09 |
| TWI738717B (zh) | 2021-09-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2017148315A1 (zh) | 基于验证码的验证处理方法及装置 | |
| US11551482B2 (en) | Facial recognition-based authentication | |
| CN106529512B (zh) | 活体人脸验证方法及装置 | |
| US20120291122A1 (en) | Multi Dimensional CAPTCHA System and Method | |
| CN111447207B (zh) | 验证码验证方法、电子设备及存储介质 | |
| KR102030322B1 (ko) | 비디오 프레임의 다수의 부분들에 대한 지문들을 생성함으로써 입체 비디오들을 검출하기 위한 방법들, 시스템들, 및 매체들 | |
| CN108460268A (zh) | 验证方法及装置 | |
| CN107509080A (zh) | 一种编码图像显示方法、装置和电子设备 | |
| CN113158167B (zh) | 验证码实现方法及电子设备和计算机可读存储介质 | |
| CN113033243A (zh) | 一种人脸识别方法、装置及设备 | |
| CN114648801B (zh) | 人脸活体的检测方法及装置、处理器和电子设备 | |
| CN108140080B (zh) | 一种显示的方法、装置及系统 | |
| KR102593934B1 (ko) | 증강 현실 글라스를 이용한 증강 현실 보안 키보드 제공 방법 및 그를 위한 장치 및 시스템 | |
| CN103853968B (zh) | 验证码图片的生成方法和装置及其验证方法和装置 | |
| WO2017076232A1 (zh) | 虚拟现实设备中显示屏的配置方法及装置 | |
| CN106249858B (zh) | 一种显示转换方法、装置及终端设备 | |
| HK1243843B (zh) | 基於验证码的验证处理方法及装置 | |
| HK1243843A1 (zh) | 基於验证码的验证处理方法及装置 | |
| US20240119674A1 (en) | Terminal apparatus | |
| CN107168662B (zh) | 一种信息处理方法及电子设备 | |
| CN121261935A (zh) | 基于互联网的信息安全交互方法及系统 | |
| CN106231281B (zh) | 一种显示转换方法和装置 | |
| CN121544262A (zh) | 基于增强现实技术的安全验证方法、装置及存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 11201806933W Country of ref document: SG |
|
| ENP | Entry into the national phase |
Ref document number: 2018546438 Country of ref document: JP Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 20187025637 Country of ref document: KR Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2017759166 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2017759166 Country of ref document: EP Effective date: 20181004 |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17759166 Country of ref document: EP Kind code of ref document: A1 |
|
| WWG | Wipo information: grant in national office |
Ref document number: 201817031379 Country of ref document: IN |