[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109951431A - Verification method, system, electronic equipment and computer-readable medium - Google Patents

Verification method, system, electronic equipment and computer-readable medium Download PDF

Info

Publication number
CN109951431A
CN109951431A CN201711401210.1A CN201711401210A CN109951431A CN 109951431 A CN109951431 A CN 109951431A CN 201711401210 A CN201711401210 A CN 201711401210A CN 109951431 A CN109951431 A CN 109951431A
Authority
CN
China
Prior art keywords
image
instance
different
contrast images
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711401210.1A
Other languages
Chinese (zh)
Other versions
CN109951431B (en
Inventor
王春兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201711401210.1A priority Critical patent/CN109951431B/en
Publication of CN109951431A publication Critical patent/CN109951431A/en
Application granted granted Critical
Publication of CN109951431B publication Critical patent/CN109951431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

Present disclose provides a kind of verification methods, it include: displaying candidate image, the candidate image includes at least one set of contrast images, it include at least one first image and at least one second image with second instance with first instance in every group of contrast images, wherein: the first instance and the second instance are different but similar entity, it is described it is similar include that the first instance and second instance can not be distinguished by specific pattern recognition device;And validation problem is generated, the validation problem includes at least one the first image selected in every group of contrast images.

Description

Verification method, system, electronic equipment and computer-readable medium
Technical field
This disclosure relates to Internet technical field, more particularly, to a kind of verification method, system, electronic equipment and meter Calculation machine readable medium.
Background technique
With the fast development of Internet technology, more and more network functions need user to log in various systems next real It is existing.It needs to be verified by identifying code when using various network functions, is by people to determine the use of various network function behaviors Operation non-computer program triggering.For example, current identifying code is usually multiple image superpositions by that will obtain at random, And on superimposed image plus interfering line and/or interference pixel etc. generate identifying code, the identifying code category generated by this method In the identifying code of dominant static state.
During realizing present inventive concept, at least there are the following problems in the prior art for inventor's discovery: static Identifying code can be easier to be identified by computer by certain identification technology, so that Malicious computer is tested cracking this Difficulty reduces when demonstrate,proving code, increases the risk of system data loss.
Summary of the invention
In view of this, present disclose provides it is a kind of need user and identifying code carry out deeper interaction, be not easy by Computer identifies verification method, system, electronic equipment and the computer-readable medium cracked.
An aspect of this disclosure provides a kind of proof method, comprising: shows that candidate image, the candidate image include extremely Lack one group of contrast images, includes at least one first image and at least one tool with first instance in every group of contrast images There is the second image of second instance, in which: the first instance and the second instance are different but similar entity, the phase It can not be distinguished by specific pattern recognition device like including the first instance and second instance;And it generates verifying and asks Topic, the validation problem includes at least one the first image selected in every group of contrast images.
In accordance with an embodiment of the present disclosure, the candidate image includes multiple groups contrast images, includes two in every group of contrast images A the first image, described at least one the first image selected in every group of contrast images, comprising: select every group Two the first images in contrast images.
In accordance with an embodiment of the present disclosure, the method also includes: reach the first thresholding in the accuracy of user input selection When value, it is verified;And/or when the error rate of user input selection reaches the second threshold value, identifying code is updated.
In accordance with an embodiment of the present disclosure, the background of the first instance in different the first images is different, posture is different And/or show that angle is different;And/or the background of the second instance in different second images is different, posture is different and/or Show that angle is different.
In accordance with an embodiment of the present disclosure, before showing candidate image, further includes: obtain the of at least one first instance Second original image of one original image and at least one second instance;To first original image and described second original Image is respectively processed, and the processing includes rotation, superposition and/or random combine;And based on that treated is first original Image and treated that the second original image generates the first image and second image respectively.
In accordance with an embodiment of the present disclosure, the method also includes the usage scenarios and/or contrast images group according to identifying code Number determine the value range of first threshold value and second threshold value.
Another aspect of the disclosure provides a kind of verifying system, including display module and the first generation module.It shows Module includes at least one set of contrast images for showing candidate image, the candidate image, includes at least in every group of contrast images One the first image and at least one second image with second instance with first instance, in which: the first instance Be different but similar entity with the second instance, it is described it is similar include the first instance and second instance can not be special Fixed pattern recognition device is distinguished.First generation module includes selecting institute for generating validation problem, the validation problem State at least one the first image in every group of contrast images.
In accordance with an embodiment of the present disclosure, the candidate image includes multiple groups contrast images, includes two in every group of contrast images A the first image, described at least one the first image selected in every group of contrast images, including select every group Two the first images in contrast images.
In accordance with an embodiment of the present disclosure, the system also includes authentication module and/or update modules.Authentication module is used for When the accuracy of user input selection reaches the first threshold value, it is verified.Update module is used for the mistake in user input selection When accidentally rate reaches the second threshold value, identifying code is updated.
In accordance with an embodiment of the present disclosure, the background of the first instance in different the first images is different, posture is different And/or show that angle is different;And/or the background of the second instance in different second images is different, posture is different and/or Show that angle is different.
In accordance with an embodiment of the present disclosure, the system also includes obtain module, processing module and the second generation module.It obtains Module is used to obtain the first original image of at least one first instance and the second original image of at least one second instance. For processing module for being respectively processed to first original image and second original image, the processing includes rotation Turn, superposition and/or random combine.Second generation module is used for based on treated the first original image and treated second Original image generates the first image and second image respectively.
In accordance with an embodiment of the present disclosure, the system also includes determining modules.Determining module according to identifying code for making The value range of first threshold value and second threshold value is determined with the number of scene and/or contrast images group.
The another aspect of the embodiment of the present disclosure provides a kind of electronic equipment, comprising: one or more processors;And one Or multiple memories, it is stored with executable instruction, described instruction is when being executed by processor, so that for real when processor executes Now method as described above.
Another aspect of the present disclosure provides a kind of computer-readable medium, is stored with computer executable instructions, described Instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing method as described above.
In accordance with an embodiment of the present disclosure, the difficulty that Malicious computer cracks system identifying code can at least partly be increased, It solves the problems, such as to partial extent that Malicious computer cracks system identifying code, and increase system attack resistance energy therefore may be implemented The technical effect of power.
Detailed description of the invention
By referring to the drawings to the description of the embodiment of the present disclosure, the above-mentioned and other purposes of the disclosure, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 diagrammatically illustrates the verification method and systematic difference scene according to the embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the flow chart of the verification method according to the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure;
Fig. 4 A diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure;
Fig. 4 B diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure;
Fig. 6 diagrammatically illustrates the application schematic diagram of the identifying code according to the embodiment of the present disclosure;
Fig. 7 diagrammatically illustrates the block diagram of the verifying system according to the embodiment of the present disclosure;
Fig. 8 diagrammatically illustrates the block diagram of the verifying system according to another embodiment of the disclosure;And
Fig. 9 diagrammatically illustrate according to the embodiment of the present disclosure can be with the exemplary system architecture of application verification method.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In addition, in the following description, descriptions of well-known structures and technologies are omitted, with Avoid unnecessarily obscuring the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to using " making, at least one in B and C etc. " such statement is similar to Those skilled in the art are generally understood the meaning of the statement to make an explanation (for example, " what it is at least one in A, B and C is System " should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C and/ Or system with A, B, C etc.).Using " being, at least one in B or C etc. " such statement is similar to, generally For the meaning of the statement should be generally understood according to those skilled in the art come make an explanation (for example, " have A, B or C in extremely Few one system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, tool There are B and C, and/or the system with A, B, C etc.).It should also be understood by those skilled in the art that substantially any indicate two or more The adversative conjunction and/or phrase of more optional projects, either in specification, claims or attached drawing, all it is understood that A possibility that give including one of these projects, either one or two projects of these projects.For example, " short or B is short for phrase Be understood to include " when by or " " by or " with B or a possibility that.
Embodiment of the disclosure provides a kind of verification method and system.This method includes showing candidate image, the time Selecting image includes at least one set of contrast images, include in every group of contrast images at least one first image with first instance, With at least one the second image with second instance, in which: first instance and second instance are different but similar entity, institute Stating similar includes that the first instance and second instance can not be distinguished by specific pattern recognition device;And generate verifying Problem, the validation problem include selecting the first image of at least one of every group of contrast images.
It include with different but similar according in embodiment of the present disclosure verification method and system, in the candidate image of displaying Entity is formed by contrast images, so that user is needed to distinguish and select in contrast images when replying validation problem, To make user and identifying code image carry out deeper interaction.Also, the first instance in every group of contrast images and Two entities can not be distinguished through the test of specific pattern recognition device, at least recognition capability can be made specific with this Pattern recognition device is suitable or lower computer can not identify the difference of every group of contrast images.By this method, effectively increase Add Malicious computer to crack the difficulty of system identifying code, solves to partial extent Malicious computer and crack asking for system identifying code Topic, and the technical effect of increase system anti-attack ability therefore may be implemented.
Fig. 1 diagrammatically illustrate according to the embodiment of the present disclosure can be with the exemplary system frame of application verification method and system Structure 100.It should be noted that being only the example that can apply the system architecture of the embodiment of the present disclosure shown in Fig. 1, to help ability Field technique personnel understand the technology contents of the disclosure, but are not meant to that the embodiment of the present disclosure may not be usable for other equipment, be System, environment or scene.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network according to this embodiment 104 and server 105.Network 104 between terminal device 101,102,103 and server 105 to provide communication link Medium.Network 104 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 101,102,103 (merely illustrative) such as the application of page browsing device, searching class application, instant messaging tools, mailbox client, social platform softwares.
Terminal device 101,102,103 can be the various electronic equipments with display screen and supported web page browsing, packet Include but be not limited to smart phone, tablet computer, pocket computer on knee and desktop computer etc..
Server 105 can be to provide the server of various services, such as utilize terminal device 101,102,103 to user The website browsed provides the back-stage management server (merely illustrative) supported.Back-stage management server can be to the use received The data such as family request analyze etc. processing, and by processing result (such as according to user's request or the webpage of generation, believe Breath or data etc.) feed back to terminal device.
In some embodiments, during user uses various network functions by terminal device 101,102,103, When needing to carry out user identity authentication, server 105 can be requested according to the user received to terminal device 101,102, 103 send the candidate image and validation problem for identifying code.User can verify in terminal device 101,102,103 Operation.In some embodiments, server 105 is available and handles the verifying that user passes through terminal device 101,102,103 Operation, to judge verification result.
It should be noted that verification method provided by the embodiment of the present disclosure can generally be executed by server 105.Accordingly Ground, verifying system provided by the embodiment of the present disclosure generally can be set in server 105.Provided by the embodiment of the present disclosure Verification method can also be by being different from server 105 and can communicate with terminal device 101,102,103 and/or server 105 Server or server cluster execute.Correspondingly, verifying system provided by the embodiment of the present disclosure also can be set in difference In server 105 and the server or server cluster that can be communicated with terminal device 101,102,103 and/or server 105 In.
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.
Fig. 2 diagrammatically illustrates the flow chart of the verification method according to the embodiment of the present disclosure.
As shown in Fig. 2, the verification method includes operation S201 and operation S202.
In operation S201, candidate image is shown, which includes at least one set of contrast images, in every group of contrast images The first image and at least one second image with second instance including at least one with first instance, in which: first Entity and second instance are different but similar entity, it is described it is similar include the first instance and second instance can not be special Fixed pattern recognition device is distinguished.
In accordance with an embodiment of the present disclosure, which can be selected currently known or energy The highest pattern recognition device of the image recognition precision enough got.
In operation S202, validation problem is generated, which includes selecting at least one of every group of contrast images The first image.
In accordance with an embodiment of the present disclosure, user by answer above-mentioned validation problem login system (for example, ticket-booking system, Banking system or communication system etc.) when, user can be by the way that relatively deeply observation and thinking identify every group of contrast images Difference.For example, the first image is true man's image, the second image is the image of waxen imagen, and user can choose out every group of comparison diagram True man's image of picture.But computer (for example, hacker) is often difficult to distinguish first instance and second instance (for example, first Entity is true man, and second instance is waxen imagen) the true and false.This is because computer is usually to go out entity in image according to contour detecting It is which kind of entity (for example, the profile that only will detect that first instance and second instance is all people), and sensory perception cannot be utilized The expression of personage in image, to be difficult to differentiate between personage's true and false in image.
Moreover, because the first instance and second instance in every group of contrast images are tested through specific pattern recognition device It can not distinguish, to can at least make recognition capability computer suitable or lower with the specific image identification device It can not identify the difference of every group of contrast images.
In this manner it is possible to the difficulty that computer cracks above-mentioned validation problem be increased, so as to avoid system data It is lost, and enhances the safety coefficient of system.
In accordance with an embodiment of the present disclosure, the background of the first instance in the first different images is different, posture is different and/or Show that angle is different;And/or the background of the second instance in the second different images is different, posture is different and/or shows angle It is different.The identifying code safety that first image and the second image different with background, posture is different and/or displaying angle is different generates Property is higher, while also improving the safety coefficient of whole system.
Be personage with first instance, second instance be the personage waxen imagen for illustrate.
The posture of first instance is different specifically to be can be, in the first different images, the posture difference of personage (such as one Stand, be seated in another first image) or the expression difference of personage etc..
The displaying angle of first instance is different specifically to be can be, and the displaying angle of personage is not in the first different images Together.It is personage shown in another first image for example, be the direct picture of personage shown in first image Image of leaning to one side.
The background of first instance is different specifically to be can be, and background environment locating for personage is not in the first different images Together.
The background of second instance in the second different images is different, posture is different and/or shows that angle is different from first Image is similar, repeats no more.
In this way, it is possible to increase the difficulty that user interacted with the depth of identifying code and increased computer identification identifying code Degree.
Fig. 3 diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure.
In accordance with an embodiment of the present disclosure, which includes multiple groups contrast images, includes two in every group of contrast images First image, selecting the first image of at least one of every group of contrast images includes two selected in every group of contrast images The first image, with specific reference to Fig. 3.
As shown in figure 3, operating S202 in the verification method specifically can be operation S302.
In operation S201, candidate image is shown, which includes at least one set of contrast images, in every group of contrast images The first image and at least one second image with second instance including at least one with first instance, in which: first Entity and second instance are different but similar entity, it is described it is similar include the first instance and second instance can not be special Fixed pattern recognition device is distinguished.
In operation S302, validation problem is generated, which includes two first selected in every group of contrast images Image.
In accordance with an embodiment of the present disclosure, user can be by way of selecting two the first images in every group of contrast images Login system.For example, candidate image includes six groups of contrast images, every group of contrast images include two the first images and two second Image, wherein the picture of the first image in six groups of contrast images can be same or different, second in six groups of contrast images The picture of image can be same or different.
It is said by taking the waxen imagen that the first instance in six groups of contrast images is true man, second instance is the true man as an example below It is bright.The validation problem generated in operation S302 in this case, which can be, " please successively to be selected every in six groups of contrast images Are two true man's images of group contrast images to match? " the validation problem requires user to carry out the pairing selection of true man's image, from And the safety of identifying code is further enhanced, while also further improving the safety coefficient of whole system.Because of needle The true and false of the first image and the second image is not only detected to the validation problem Malicious computer, also to be detected and one first Image has another first image of identical first instance, further enhances the difficulty for cracking the identifying code.
In accordance with an embodiment of the present disclosure, every group of contrast images can also include in addition to it may include two the first images More first images such as three or four etc., with specific reference to for using the application scenarios of identifying code to determine the first image Number.
Fig. 4 A diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure.
As shown in Figure 4 A, the verification method is other than operation S201 and operation S202 that Fig. 2 embodiment describes, this method It further include operation S401.
It is verified in operation S401 when the accuracy of user input selection reaches the first threshold value;And/or with When the error rate that family inputs selection reaches the second threshold value, identifying code is updated.
In accordance with an embodiment of the present disclosure, the accuracy of user input selection can be the number of the first image of user's selection With the ratio of the number of the first images whole in identifying code.The error rate of user input selection can be user's selection except first Except the ratio of the number of the residual image of the first image in the number of image and identifying code except image.
Fig. 4 B diagrammatically illustrates two the first figures in every group of contrast images of selection according to another embodiment of the disclosure The flow chart of the verification method of picture.
As shown in Figure 4 B, other than the operation S201 of Fig. 3 embodiment description and operation S302, this method further includes operation S402。
It is verified in operation S402 when the accuracy of user input selection reaches the first threshold value;And/or with When the error rate that family inputs selection reaches the second threshold value, identifying code is updated.
In accordance with an embodiment of the present disclosure, the accuracy of user input selection can be the logarithm of the first image of user's selection With the ratio of the logarithm of the first images whole in identifying code.The error rate of user input selection can be user's selection except first Except the ratio of the logarithm of the residual image of the first image in the logarithm and identifying code of image except image.
In accordance with an embodiment of the present disclosure, when the error rate of user input selection reaches the second threshold value, identifying code is updated. Because the rate of capacity of the processing data of Malicious computer is very fast, if not setting the second threshold value, the Malicious computer is continuous It attempts, may can crack the identifying code within several seconds.In this case, the second threshold value of setting is necessary, and in this way may be used To increase by one layer of protection to the identifying code, to enhance the difficulty that Malicious computer cracks the identifying code.
In accordance with an embodiment of the present disclosure, when the first image in user's comparative selection image, there can be selecting partys in more Formula.
For example, system can be with the selection operation of real-time response user, in the accuracy for the selection operation that user continuously inputs When reaching the first threshold value, it is verified;Or the error rate of the selection operation continuously inputted in user reaches the second threshold value When, identifying code is updated, then user reselects for updated identifying code.It is just calculated for example, user clicks an image Accuracy or error rate, and judge whether the accuracy or the error rate reach the first threshold value or the second threshold value.
For another example system can be selected in response to user after multiple or multipair first image determine operation (such as with Clicked after the completion of the selection of family and determine option), when the accuracy for determining operation of user's input reaches the first threshold value, verifying is logical It crosses, or when the error rate for determining operation of user's input reaches the second threshold value, updates identifying code, then user is for more Identifying code after new reselects.
In accordance with an embodiment of the present disclosure, by can be with according to the number of the usage scenario of identifying code and/or contrast images group Determine the value range of the first threshold value and the second threshold value.For example, if identifying code is used in government system or bank When system, the number of contrast images group can be increased, the first threshold value can achieve 100% or 90% at this time, the second threshold value It can achieve 20% or 10%.For another example if when identifying code is used in game system or ticket-booking system, contrast images The number of group can be two groups or three groups, and the first threshold value can achieve 75% or 85% and test at this time, and the second threshold value can be with Reach 25% or 15%.Determine that the value range of the first threshold value and the second threshold value is conducive to difference and answers in this way With the extension of scene.
Fig. 5 diagrammatically illustrates the flow chart of the verification method according to another embodiment of the disclosure.
As shown in figure 5, in addition to Fig. 2 description operation S201 and operation S202 other than, this method further include operation S501~ Operate S503.
In operation S501, obtain at least one first instance the first original image and at least one second instance the Two original images.
In operation S502, the first original image and the second original image are respectively processed, the processing includes rotation Turn, superposition and/or random combine.
In operation S503, based on treated the first original image and treated that the second original image generates respectively the One image and the second image.
In accordance with an embodiment of the present disclosure, by being rotated, being superimposed respectively to the first original image and the second original image And/or random combine is based on first image and the second figure so that the first image and the second image that generate more are difficult to The safety of verification code that picture generates is higher, is not easy to crack.
Fig. 6 diagrammatically illustrates the application schematic diagram of the identifying code according to the embodiment of the present disclosure.
As shown in fig. 6, candidate image include two groups of contrast images, every group of contrast images respectively include four true man's images, Or four waxen imagen images or four Barbie doll images, the validation problem generated based on four groups of contrast images is " please to select True man's image in following comparative's image out? ".
In this case, user can be by simply observing and thinking deeply the rapid true man's image for selecting Fig. 6 (for example, image of the image of Liu Dehua and spadger) and login system, and Malicious computer is difficult to distinguish true man's image, wax As the true and false of image and Barbie doll image, to increase the difficulty for cracking the identifying code, the stream of system data is avoided It loses, improves the safety coefficient of system.
Fig. 7 diagrammatically illustrates the block diagram of the verifying system according to the embodiment of the present disclosure.
As shown in fig. 7, system 700 includes display module 710 and the first generation module 720.
Display module 710, for showing candidate image, which includes at least one set of contrast images, every group of comparison In image include at least one first image and at least one second image with second instance with first instance, In: first instance and second instance are different but similar entity, it is described it is similar include the first instance and second instance not It can be distinguished by specific pattern recognition device.
First generation module 720, for generating validation problem, which includes selecting in every group of contrast images At least one first image.
In accordance with an embodiment of the present disclosure, system 700 can be used to implement the method flow described with reference to Fig. 2.
Fig. 8 diagrammatically illustrates the block diagram of the verifying system according to another embodiment of the disclosure.
As shown in figure 8, system 800 is in addition to display module 710 and the first generation module 720, it further include authentication module 810, update module 820, acquisition module 830, processing module 840, the second generation module 850 and determining module 860.
System 800 can be used to implement the method described with reference to Fig. 2~Fig. 6.
Authentication module 810, for being verified when the accuracy of user input selection reaches the first threshold value.
Update module 820, for updating identifying code when the error rate of user input selection reaches the second threshold value.
Module 830 is obtained, for obtaining the first original image and at least one second instance of at least one first instance The second original image.
Processing module 840, for being respectively processed to first original image and second original image, institute Stating processing includes rotation, superposition and/or random combine.
Second generation module 850, for based on treated the first original image and treated the second original image point It Sheng Cheng not the first image and second image.
Determining module 860, for determining described first according to the usage scenario of identifying code and/or the number of contrast images group The value range of threshold value and second threshold value.
It is understood that display module 710, the first generation module 720, authentication module 810, update module 820, acquisition Module 830, processing module 840, the second generation module 850 and determining module 860, which may be incorporated in a module, to be realized, Or any one module therein can be split into multiple modules.Alternatively, one or more modules in these modules At least partly function can be combined at least partly function of other modules, and be realized in a module.According to the present invention Embodiment, display module 710, the first generation module 720, authentication module 810, update module 820, obtain module 830, processing At least one of module 840, the second generation module 850 and determining module 860 can at least be implemented partly as hardware Circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, envelope The system loaded onto, specific integrated circuit (ASIC), or can be to carry out any other reasonable side that is integrated or encapsulating to circuit The hardware such as formula or firmware realize, or is realized with software, the appropriately combined of three kinds of implementations of hardware and firmware.Alternatively, Display module 710, the first generation module 720, authentication module 810, update module 820, obtain module 830, processing module 840, At least one of second generation module 850 and determining module 860 can at least be implemented partly as computer program mould Block can execute the function of corresponding module when the program is run by computer.
Fig. 9 diagrammatically illustrate according to the embodiment of the present disclosure can be with the exemplary system architecture of application verification method.Fig. 9 The computer system shown is only an example, should not function to the embodiment of the present disclosure and use scope bring any limit System.
As shown in figure 9, include processor 901 according to the computer system 900 of the embodiment of the present disclosure, it can be according to storage It is loaded into random access storage device (RAM) 903 in the program in read-only memory (ROM) 902 or from storage section 908 Program and execute various movements appropriate and processing.Processor 901 for example may include general purpose microprocessor (such as CPU), refer to Enable set processor and/or related chip group and/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processing Device 901 can also include the onboard storage device for caching purposes.Processor 901 may include for executing with reference to Fig. 2~Fig. 5 Single treatment unit either multiple processing units of the different movements of the method flow according to the embodiment of the present disclosure of description.
In RAM 903, it is stored with system 900 and operates required various programs and data.Processor 901, ROM 902 with And RAM 903 is connected with each other by bus 904.Processor 901 is held by executing the program in ROM 902 and/or RAM 903 Various operations of the row above with reference to Fig. 2~Fig. 5 verification method described.It is being removed it is noted that described program also can store In one or more memories other than ROM902 and RAM 903.Processor 901 can also be stored in one by execution Or the program in multiple memories come execute above with reference to Fig. 2~Fig. 5 describe verification method various operations.
In accordance with an embodiment of the present disclosure, system 900 can also include input/output (I/O) interface 905, input/output (I/O) interface 905 is also connected to bus 904.System 900 can also include be connected to I/O interface 905 with one in lower component Item is multinomial: the importation 906 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD) Deng and loudspeaker etc. output par, c 907;Storage section 908 including hard disk etc.;And including such as LAN card, modulatedemodulate Adjust the communications portion 909 of the network interface card of device etc..Communications portion 909 executes communication process via the network of such as internet. Driver 910 is also connected to I/O interface 905 as needed.Detachable media 911, such as disk, CD, magneto-optic disk, semiconductor Memory etc. is mounted on as needed on driver 910, in order to be pacified as needed from the computer program read thereon It is packed into storage section 908.
In accordance with an embodiment of the present disclosure, it may be implemented as computer software journey above with reference to the method for flow chart description Sequence.For example, embodiment of the disclosure includes a kind of computer program product comprising carry meter on a computer-readable medium Calculation machine program, the computer program include the program code for method shown in execution flow chart.In such embodiments, The computer program can be downloaded and installed from network by communications portion 909, and/or be pacified from detachable media 911 Dress.When the computer program is executed by processor 901, the above-mentioned function of limiting in the system of the embodiment of the present disclosure is executed.Root According to embodiment of the disclosure, system as described above, unit, module, unit etc. can by computer program module come It realizes.
It should be noted that computer-readable medium shown in the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.In accordance with an embodiment of the present disclosure, computer-readable medium may include above-described ROM 902 And/or one or more memories other than RAM 903 and/or ROM 902 and RAM 903.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, which can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes The equipment executes: show that candidate image, the candidate image include at least one set of contrast images, include extremely in every group of contrast images Few first image and at least one second image with second instance with first instance, in which: first instance with Second instance is different but similar entity, it is described it is similar include that the first instance and second instance can not specifically be schemed As identification device is distinguished;And validation problem is generated, which includes selecting in every group of contrast images extremely Few first image.
Embodiment of the disclosure is described above.But the purpose that these embodiments are merely to illustrate that, and It is not intended to limit the scope of the present disclosure.Although respectively describing each embodiment above, but it is not intended that each reality Use cannot be advantageously combined by applying the measure in example.The scope of the present disclosure is defined by the appended claims and the equivalents thereof.It does not take off From the scope of the present disclosure, those skilled in the art can make a variety of alternatives and modifications, these alternatives and modifications should all fall in this Within scope of disclosure.

Claims (14)

1. a kind of verification method, comprising:
It shows that candidate image, the candidate image include at least one set of contrast images, includes at least one in every group of contrast images The first image and at least one second image with second instance with first instance, in which: the first instance and institute Second instance is stated as different but similar entity, it is described it is similar include the first instance and second instance can not be specific Pattern recognition device is distinguished;And
Validation problem is generated, the validation problem includes selecting the first figure described at least one of described every group of contrast images Picture.
2. according to the method described in claim 1, wherein, the candidate image includes multiple groups contrast images, every group of contrast images In include two the first images, described at least one the first image selected in every group of contrast images, comprising:
Select two the first images in every group of contrast images.
3. method according to claim 1 or 2, the method also includes:
When the accuracy of user input selection reaches the first threshold value, it is verified;And/or
When the error rate of user input selection reaches the second threshold value, identifying code is updated.
4. according to the method described in claim 1, wherein:
The background of first instance in different the first images is different, posture is different and/or shows that angle is different;And/or
The background of second instance in different second images is different, posture is different and/or shows that angle is different.
5. according to the method described in claim 1, before showing candidate image, further includes:
Obtain the first original image of at least one first instance and the second original image of at least one second instance;
First original image and second original image are respectively processed, the processing includes rotation, superposition And/or random combine;And
Based on treated the first original image and treated the second original image generates respectively the first image and described Second image.
6. according to the method described in claim 3, further include:
First threshold value and second thresholding are determined according to the number of the usage scenario of identifying code and/or contrast images group The value range of value.
7. a kind of verifying system, comprising:
Display module, for showing candidate image, the candidate image includes at least one set of contrast images, in every group of contrast images The first image and at least one second image with second instance including at least one with first instance, in which: described First instance and the second instance are different but similar entity, it is described it is similar include the first instance and second instance not It can be distinguished by specific pattern recognition device;And
First generation module, for generating validation problem, the validation problem includes selecting in every group of contrast images At least one the first image.
8. system according to claim 7, wherein the candidate image includes multiple groups contrast images, every group of contrast images In include two the first images, described at least one the first image selected in every group of contrast images, comprising:
Select two the first images in every group of contrast images.
9. system according to claim 7 or 8, the system also includes:
Authentication module, for being verified when the accuracy of user input selection reaches the first threshold value;And/or
Update module, for updating identifying code when the error rate of user input selection reaches the second threshold value.
10. system according to claim 7, in which:
The background of first instance in different the first images is different, posture is different and/or shows that angle is different;And/or
The background of second instance in different second images is different, posture is different and/or shows that angle is different.
11. system according to claim 7, before showing candidate image, further includes:
Obtain module, for obtain at least one first instance the first original image and at least one second instance second Original image;
Processing module, for being respectively processed to first original image and second original image, the processing packet Include rotation, superposition and/or random combine;And
Second generation module, for based on treated the first original image and treated that the second original image generates respectively The first image and second image.
12. system according to claim 9, further includes:
Determining module, for determining first threshold value according to the usage scenario of identifying code and/or the number of contrast images group With the value range of second threshold value.
13. a kind of electronic equipment, comprising:
One or more processors;And
One or more memories are stored with executable instruction, and described instruction is when being executed by processor, so that processor executes Method described according to claim 1~any one of 6.
14. a kind of computer-readable medium is stored thereon with for described in execution according to claim 1~any one of 6 The instruction of method.
CN201711401210.1A 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium Active CN109951431B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711401210.1A CN109951431B (en) 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711401210.1A CN109951431B (en) 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium

Publications (2)

Publication Number Publication Date
CN109951431A true CN109951431A (en) 2019-06-28
CN109951431B CN109951431B (en) 2021-12-14

Family

ID=67006214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711401210.1A Active CN109951431B (en) 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium

Country Status (1)

Country Link
CN (1) CN109951431B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103670A (en) * 2009-12-22 2011-06-22 迪斯尼实业公司 Human verification by contextually iconic visual public turing test
US20130007875A1 (en) * 2011-06-30 2013-01-03 Ebay, Inc. Interactive CAPTCHA
CN103854031A (en) * 2012-11-28 2014-06-11 伊姆西公司 Method and device for identifying image content
CN104468101A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 User identity authentication method and device and authentication service system
CN105354481A (en) * 2015-10-23 2016-02-24 中国联合网络通信集团有限公司 Network verification method and network verification server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103670A (en) * 2009-12-22 2011-06-22 迪斯尼实业公司 Human verification by contextually iconic visual public turing test
US20130007875A1 (en) * 2011-06-30 2013-01-03 Ebay, Inc. Interactive CAPTCHA
CN103854031A (en) * 2012-11-28 2014-06-11 伊姆西公司 Method and device for identifying image content
CN104468101A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 User identity authentication method and device and authentication service system
CN105354481A (en) * 2015-10-23 2016-02-24 中国联合网络通信集团有限公司 Network verification method and network verification server

Also Published As

Publication number Publication date
CN109951431B (en) 2021-12-14

Similar Documents

Publication Publication Date Title
US10601866B2 (en) Discovering website phishing attacks
CN104823198B (en) Security identification device and security identification method for computing device
CN107872772B (en) Method and device for detecting fraud short messages
US20180374097A1 (en) A distributed user profile identity verification system for e-commerce transaction security
CN112313653A (en) Hiding sensitive information in text
WO2015074496A1 (en) Identity authentication method and device and storage medium
US9747434B1 (en) Authenticating with an external device by providing a message having message fields arranged in a particular message field order
CN109146490A (en) block generation method, device and system
CN109063653A (en) Image processing method and device
CN108090351A (en) For handling the method and apparatus of request message
US11537694B2 (en) Motion-based challenge-response authentication mechanism
US20140045596A1 (en) Methods and systems for determining the location of online gaming clients
CN107766106B (en) The method and apparatus for generating configuration file
US9124570B1 (en) Providing an assessment of authentication requests
CN108882025A (en) Video frame treating method and apparatus
CN114363896A (en) Verifying trusted communications using an established communication channel
CN109614327A (en) Method and apparatus for output information
CN109783359A (en) The method, apparatus and computer equipment that automatic detection interface effectively identifies
CN108900562A (en) Sharing method, device, electronic equipment and the medium of logging state
CN109284584B (en) Verification method and device
CN109194776A (en) A kind of detection method, system, electronic equipment and medium
CN108985421A (en) The generation method and recognition methods of encoded information
CN104699619B (en) The method and apparatus tested on line
CN107924514A (en) Apparatus and method for performing payment transactions using dynamic MST configuration
CN109150898A (en) Method and apparatus for handling information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant