CN108446083B - Verification information display method and mobile terminal - Google Patents

Verification information display method and mobile terminal Download PDF

Info

Publication number
CN108446083B
CN108446083B CN201810157632.7A CN201810157632A CN108446083B CN 108446083 B CN108446083 B CN 108446083B CN 201810157632 A CN201810157632 A CN 201810157632A CN 108446083 B CN108446083 B CN 108446083B
Authority
CN
China
Prior art keywords
shading
image
target
target verification
verification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810157632.7A
Other languages
Chinese (zh)
Other versions
CN108446083A (en
Inventor
陈剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810157632.7A priority Critical patent/CN108446083B/en
Publication of CN108446083A publication Critical patent/CN108446083A/en
Application granted granted Critical
Publication of CN108446083B publication Critical patent/CN108446083B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/40Filling a planar surface by adding surface attributes, e.g. colour or texture
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The invention discloses a verification information display method and a mobile terminal. The method comprises the following steps: determining target verification information; generating a target verification image, which is an image generated by adding a shading on a target area containing the target verification information; displaying the target verification image and a first image, the first image being an image for overlaying on the target verification image to make visible the target verification information in the target verification image. The method and the device for generating the target verification image carry invisible target verification information by adding the shading on the target verification information; and displaying the target authentication image to the user together with the pre-constructed first image, since the first image is in a role of acting as a "decryption card", the user can make the target authentication information visible by overlaying the first image on the target authentication image.

Description

Verification information display method and mobile terminal
Technical Field
The invention relates to the field of terminals, in particular to a verification information display method and a mobile terminal.
Background
Verification code (CAPTCHA) is an abbreviation for Turing test that fully automatically distinguishes Computers from Humans, a common fully Automated program that distinguishes users as Computers or Humans. The method can be used for preventing malicious password cracking, ticket swiping, forum water filling, and the like, and a certain hacker makes continuous login attempts on a certain specific registered user in a specific program brute force cracking mode.
Currently, a generic verification code, such as: the verification code based on the limited picture library can be automatically identified after sufficient samples are subjected to machine learning; for another example, a verification code picture added with noise and interference can also be recognized by an increasingly mature Optical Character Recognition technology (OCR).
Therefore, a display scheme of authentication information such as an authentication code that can prevent automatic computer recognition is required.
Disclosure of Invention
The embodiment of the invention provides a verification information display method, which aims to solve the problems of ticket robbery, ticket buying, password brute force cracking and the like of a machine caused by the fact that the existing verification information can be identified by a computer.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, a method for verifying information display is provided, the method comprising:
determining target verification information;
generating a target verification image, which is an image generated by adding a shading on a target area containing the target verification information;
displaying the target verification image and a first image, the first image being an image for overlaying on the target verification image to make visible the target verification information in the target verification image.
In a second aspect, a mobile terminal is provided, which includes:
the determining module is used for determining target verification information;
a generation module configured to generate a target verification image, which is an image generated by adding a shading to a target area containing the target verification information;
and the display module is used for displaying the target verification image and a first image, wherein the first image is used for being covered on the target verification image so as to enable the target verification information in the target verification image to be visible.
In a third aspect, a mobile terminal is provided, comprising a processor, a memory and a computer program stored on the memory and being executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method according to the first aspect.
In the embodiment of the invention, a target verification image carrying invisible target verification information is generated by adding shading on the target verification information; and displaying the target verification image to the user together with the pre-constructed first image. Since the first image is in a role of "decryption card", the user can make the target authentication information visible by overlaying the first image on the target authentication image. Moreover, because the target verification information is covered by the shading, the shading of the target verification information and the shading of the target verification information are interwoven together, and therefore, the target verification information can be prevented from being automatically identified by a computer.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1a and 1b are application scene diagrams of a verification information display method provided by the invention;
fig. 2 is a schematic flowchart of a verification information display method according to embodiment 1 of the present invention;
fig. 3 is a flowchart illustrating a step of displaying a first image in the verification information display method according to embodiment 1 of the present invention;
fig. 4 is a schematic flowchart of a verification information display method according to embodiment 2 of the present invention;
fig. 5 is a schematic flowchart of a verification information display method according to embodiment 3 of the present invention;
fig. 6 is a schematic diagram of a picture evolution process in a verification information display method according to embodiment 3 of the present invention;
fig. 7 is a schematic structural diagram of a mobile terminal according to embodiment 4 of the present invention;
fig. 8 is a schematic structural diagram of a mobile terminal according to embodiment 5 of the present invention;
fig. 9 is a schematic structural diagram of a mobile terminal according to embodiment 6 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As stated in the background section, in order to allow a user to visually view authentication information (taking an authentication code as an example), the prior art requires that the authentication code be presented in clear. Regardless of how the prior art adds background noise, interference and the like to the picture carrying the verification code, the computer can identify the verification code therein by the increasingly sophisticated OCR technology. Further, the problems of ticket robbery and ticket purchase of the machine, violent password cracking and the like can occur.
Based on the above, the invention provides a verification information display method, which comprises the steps of adding shading on target verification information to generate a target verification image carrying invisible target verification information; and displaying the target authentication image to the user together with the pre-constructed first image, since the first image is in a role of acting as a "decryption card", the user can make the target authentication information visible by overlaying the first image on the target authentication image.
The verification code may be a character verification code, an image verification code, or the like.
The following describes an exemplary application scenario of the present invention with reference to fig. 1a and 1 b:
and based on the user operation, the terminal jumps to an interface for displaying verification information and waiting for inputting the verification information by the user.
Referring to fig. 1a, the initial interface may include: the suspended frame 11, the verification image 12 and the verification code input frame 13, the verification image 12 carries verification information (taking the verification code as an example), but because the lines of the verification code are completely covered or partially covered by the preset shading, the user cannot clearly know the specific content of the verification code. Moreover, because the lines of the verification code and the preset shading are interwoven together, the lines and the preset shading are integrated on the levels of gray values, boundaries and the like, the possibility of character segmentation is reduced, and the difficulty of computer identification is further increased.
Referring to fig. 1b, the user drags the suspension frame 11 to cover the verification image 12, and since the suspension frame 11 is embedded with the semitransparent shading picture, and the semitransparent shading picture carries the decrypted shading corresponding to the preset shading, when the user views the verification image 12 through the semitransparent shading picture, the user can clearly view the covered verification code, for example: "NU" shown in FIG. 1 b.
It is understood that, based on the degree of transparency of the pictures, the transparency refers to the degree of transparency and translucency of one picture, which affects the effect of overlapping with another picture (or background). The picture and the colorless and transparent stage are divided into 100 points, and the transparency is expressed by percentage.
The terminal may be, for example, a mobile terminal or a PC terminal, and the mobile terminal refers to a computer device that can be used in mobile, and broadly includes a mobile phone, a notebook, a tablet computer, a POS machine, and even a vehicle-mounted computer. But most of the cases refer to mobile phones or smart phones and tablet computers with multiple application functions; the PC terminal is exemplified by a desktop computer. The interface for displaying verification information and waiting for input may specifically be: a registration interface, a login and login abnormity verification interface, a business interface for purchasing, confirming payment and the like.
Example 1
Fig. 2 is a schematic flowchart of a verification information display method provided in embodiment 1 of the present invention, and referring to fig. 2, the method may be executed by a processor of a mobile terminal, and specifically may include the following steps:
step 22, determining target verification information;
step 24, generating a target verification image, wherein the target verification image is an image generated by adding a shading on a target area containing the target verification information;
it should be noted that, the steps 22 and 24 are generally steps executed in the background of the processor, and are not visible to the user, and the first implementation manner may be:
when detecting that the mobile terminal is adjusted to the interface needing to input the verification information, acquiring target verification information based on a random algorithm, for example: a combination of letters + numbers; then, a target verification image carrying the target verification information is constructed, and a preset shading is added to a target area containing the target verification information in the target verification image so as to enable the target verification information to be invisible.
The second implementation manner may be:
when detecting that the mobile terminal is adjusted to the interface needing to input the verification information, acquiring target verification information based on a random algorithm, for example: a combination of letters + numbers; then, generating image data of the target verification information to determine the lines of the target verification information; then, constructing image data corresponding to the preset shading, wherein the range of the second image data can cover the texture of the target verification information; then, adding the shading on the texture of the target verification information; it is understood that, because the preset shading and the texture of the target verification information are interwoven, the target verification information in the preset shading and the texture of the target verification information cannot be basically segmented by the computer, and the aim that the computer cannot identify the target verification information can be further achieved.
In the two implementation manners of step 22 and step 24, a specific implementation manner of the step of adding the preset shading may be:
adding a first shading on the target area based on a predetermined first shading adding rule; adding a second shading on the target area based on a predetermined second shading adding rule;
taking an image containing the target area to which the first ground tint and the second ground tint are added as a target verification image; wherein the first ground tint and the second ground tint are used for forming moire fringes so as to make the target verification information invisible.
It is understood that moire is the visual result of interference between two lines or objects at a constant angle and frequency, and that when the human eye cannot distinguish between the two lines or objects, only the interfering pattern is visible. From this, through rationally setting up first shading and adding rule and second shading and adding the rule, can make first shading and second shading produce moire fringe, and then make target verification information invisible. For example: the first shading adding rule is a linear function with a plurality of slopes as first slopes and different intercepts; the second shading adding rule is a linear function with a plurality of slopes as second slopes and different intercepts; wherein the first slope and the second slope are not equal.
And 26, displaying the target verification image and a first image, wherein the first image is used for being covered on the target verification image so as to enable the target verification information in the target verification image to be visible.
It should be noted that, the first implementation manner of step 26 may be:
generally, the interface for inputting the verification information sets a fixed position for the target verification image, for example: the position of the verification image 12 in fig. 1a and 1 b. Based on this fixed position, the processor may also set another fixed position for the first image that is different from the fixed position of the target verification image, such as: the position of the suspension frame 11 in fig. 1a and 1 b.
Based on this, the user can move the first image to overlay the first image on the target verification image, so as to view the target verification information overlaid by the preset shading through the first image.
A second implementation of step 26 may be:
different from the first implementation manner, the implementation manner sets a random position for the first image through a random algorithm, and with reference to fig. 3, may specifically include the following steps:
step 32, determining a first area occupied by the target verification image in a preset display interface;
step 34, determining target coordinates in a second area of the display interface, wherein the second area is an area except the first area in the display interface;
and step 36, displaying the first image in the display interface based on the target coordinate.
Examples are as follows: when jumping to a verification information display interface (simply referred to as a display interface), in general, a target verification image is fixed in a display area of the display interface and is marked as a first area (see fig. 1 a). Then, the remaining area is recorded as a second area, and target coordinates for displaying the first image, which are movable, are selected from the second area based on the size of the target verification image. Therefore, the first area and the second area are not overlapped, and the first image is further ensured not to be displayed on the target verification image.
Of course, the first region may be movable, but it is necessary to maintain a relative position with respect to the second region occupied by the first image so that the two do not completely overlap.
In order to improve the security of the verification information, a random algorithm may be used to obtain random coordinates in the second area, and the random coordinates may be used as target coordinates. Therefore, the machine cannot know the position of the target coordinate, the defect that the verification information is identified due to the fact that the machine uses software to 'drag' the first image to the target verification image which may occur is avoided, and the purpose of further improving the safety of the verification information is achieved.
For the two implementation manners of the step 26, it should be noted that the principle that the user can see the target verification information through the first image can be exemplified by:
the first image is an image with preset transparency generated according to the first shading and/or the second shading, for example: the first image carries the shading identical to the first shading, and therefore when a user views the target verification image through the first image, the shading on the first image is identical to the first shading on the target verification image, interference of interference patterns can be avoided, and further target verification information can be viewed.
In addition, in order to provide the definition for the user to view the target verification information through the first image, before the target verification image is displayed, the following steps may be optionally performed:
step 1 can be selected, the texture to be displayed of the target verification information is converted into a different texture from the texture on the first image, so that the difference with the background is increased. For example: when the first shading is on the first image, converting the first shading into shading corresponding to the second shading adding rule; or when the second shading is on the first image, the second shading is converted into the shading corresponding to the first shading adding rule.
Step 2 may be selected, and the gray value of the overlapping portion of the third shading and the first shading and the second shading is adjusted based on the gray values of the first shading and the second shading, so as to highlight the difference between the texture of the target verification information and the background.
Therefore, in the embodiment, the target verification image carrying invisible target verification information is generated by adding the shading on the target verification information; and displaying the target authentication image to the user together with the pre-constructed first image, since the first image is in a role of acting as a "decryption card", the user can make the target authentication information visible by overlaying the first image on the target authentication image. Moreover, the verification information is covered by the shading and is interwoven, so that the aim that the computer cannot automatically recognize the verification information can be fulfilled.
Example 2
Fig. 4 is a schematic flowchart of a verification information display method according to embodiment 2 of the present invention, and referring to fig. 4, the method may be executed by a processor of a mobile terminal, and specifically may include the following steps:
step 42, acquiring a first picture, wherein the first picture carries a verification code;
it should be noted that, the first implementation manner of step 42 may be:
based on user operation, in the process that the mobile terminal jumps to the verification code display interface, the processor determines the verification code to be displayed based on a random algorithm, for example: and combining the letters and the numbers, and displaying the combination on the first picture so as to obtain the first picture carrying the verification code.
A second implementation of step 42 may be:
based on user operation, the terminal initiates requests such as login and payment to the server, the server responds to the requests and returns verification codes generated by the server to the terminal, and the terminal processor acquires the verification codes and displays the verification codes on the first picture so as to acquire the first picture carrying the verification codes.
Step 44, adding a first preset shading and a second preset shading in the first picture to generate a second picture, wherein the verification code in the second picture is covered by the first shading and the second shading and is invisible;
it should be noted that, one implementation manner of step 44 may be:
and taking the acquired first picture as a trigger condition, and adding the first shading and the second shading in the first picture by the processor based on a preset first shading adding rule and a preset second shading adding rule.
The first shading and the second shading can be regular shading or irregular shading. To reduce the amount of data to be processed by the processor, a regular shading is preferred here. In addition, the first ground tint or the second ground tint alone can be a combination of a plurality of regular ground tint, and is not limited herein.
A second implementation of step 44 may be:
on the basis of the first implementation manner, the implementation manner further includes:
converting the shading of the verification code in the first picture into a third shading corresponding to the second shading adding rule;
the step of converting the shading of the identifying code into a third shading comprises the following steps: and converting the shading color of the verification code. For example: the shading color of the verification code is converted into the color of the first shading or the second shading or the similar color, so that the situation that the verification code can still be identified by the computer after the first shading and the second shading are added due to the fact that the color of the verification code is different from the colors of the first shading and the second shading is avoided.
A third implementation of step 44 may be:
on the basis of the first implementation manner and/or the second implementation manner, the gray value of the overlapping part of the third shading and the first shading and the second shading is adjusted based on the gray values of the first shading and the second shading.
It is understood that, because the gray value of the overlapped part is different from the gray value of the non-overlapped part or the gray value of other departments to a certain extent, when the user views the second picture through the semitransparent shading picture, the user can view the verification code more clearly.
In addition, for the shading rendering rules in the three implementations of step 44, the following conditions need to be satisfied:
the combination of the condition 1, the first shading and the second shading can cover the verification code; for example: the superposition of the two of the examples in embodiment 1 may produce moire fringes;
at least one of condition 2, the first shading, and the second shading is reproducible; thus, the processor may record its shading rules and then provide the possibility to build the semi-transparent shading picture in step 46.
Specific examples are: the first shading is a group of straight lines inclined to the right, and the second shading is a group of straight lines inclined to the left. When the density of the first shading and the second shading reaches a certain degree, the grains of the verification code, the first shading and the second shading become lines which are interwoven together, even moire fringes are generated, and then the computer cannot identify the verification code.
Of course, the shading adding rule can also be exemplified by other functions, such as quadratic function, etc., which are not listed here. In addition, the technology of adding shading is a mature prior art, and therefore, the detailed description thereof is omitted.
And step 46, displaying the second picture and a pre-constructed suspension frame, wherein a semi-transparent shading picture carrying the first shading or the second shading is embedded in the suspension frame, and the semi-transparent shading picture is used for covering the second picture so as to enable the verification code to be visible.
It should be noted that, at the same time or after the shading rendering rule is determined, the processor determines the shading to be carried by the semi-transparent shading picture based on the shading rendering rule, for example: when the shading adding rule comprises a first shading adding rule and a second shading adding rule, determining that the semitransparent shading picture needs to carry a first shading corresponding to the first shading adding rule or a second shading corresponding to the second shading adding rule.
As for a method of selecting whether to carry the first shading or the second shading, for example, there may be mentioned:
if the verification code is converted into the shading corresponding to the second shading adding rule in the step 44, the first shading is selected to be carried; if the verification code is converted into the shading corresponding to the first shading adding rule in step 44, the second shading is selected to be carried here. If the verification code is not converted in step 44, the conversion to any of the first shading and the second shading can be selected.
Based on this, in conjunction with fig. 1a and fig. 3, one implementation of step 46 may be as follows:
when jumping to a verification code display interface (referred to as a display interface for short), in general, the first picture is fixed in a display area of the display interface and is marked as a first area (see fig. 1 a). Then, the remaining area is designated as a second area, and target coordinates for displaying the floating frame, which are movable, are selected from the second area based on a predetermined size of the floating frame. Therefore, the first area and the second area cannot be overlapped, and the floating frame cannot be displayed on the first picture.
Of course, the first area may also be active, but it is also feasible that a certain relative position of the first picture and the floating frame needs to be maintained, so that the two do not completely overlap.
In order to improve the security of the verification code, a random algorithm may be used to obtain random coordinates in the second area, and the random coordinates may be used as target coordinates. Therefore, the machine cannot know the position of the target coordinate, the defect that the verification code is identified due to the fact that the machine drags the floating frame to the first picture by using software which is possibly generated is avoided, and the purpose of further improving the safety of the verification code is achieved.
Therefore, in the embodiment, the verification code is invisible by adding the first shading and the second shading to the picture carrying the verification code; and constructing a semitransparent shading picture carrying the first shading or the second shading to serve as a role of a decryption card, so that the verification code can be viewed through the semitransparent shading picture when a user drags and moves the semitransparent shading picture to the verification code. And because the verification code is covered by the first shading and the second shading, the first shading, the second shading and the third shading are interwoven together, so that the aim that a computer cannot automatically identify the verification code and a user can check the verification code through a semitransparent shading picture can be fulfilled.
Example 3
Fig. 5 is a schematic flow chart of a verification information display method provided in embodiment 3 of the present invention, and referring to fig. 5, the present invention is described in detail below from an exemplary perspective:
step 52, determining a first shading and a second shading
It should be noted that, for the rule for setting the first shading and the second shading, the terminal is generally stored locally; and then, the dynamic update is carried out by the server side. Thus, the processor of the terminal may determine the first shading and the second shading based on locally stored rules. For example:
slope (first slope) is the same as the set of primary mathematical functions with different intercepts: k1x + ib1(a1 function) to realize an equal density curve group in the same shading direction, and obtain a first shading picture 61;
a second shading picture 62 is obtained by implementing a certain shading-direction equal-density curve group by using a primary mathematical function group y (k 2x + ib 2) with a slope (second slope) different from that of the a1 function (a2 function).
Step 54, determine the verification code
It should be noted that there are various ways of generating the verification code, and here, a scheme of generating the verification code based on a random algorithm is exemplified, for example:
a random function is used to generate a random alphanumeric combination of four digits, each of which can be a-Z, a-z, 0-9 for a total of 58 possible cases. For example: the randomly derived authentication code is "Vy 1H" and a first picture 63 carrying the randomly derived authentication code can be constructed.
Step 56, synthesize the second picture
The first shading picture 61 and the second shading picture 62 are combined into the first picture 63, or the first shading and the second shading are combined into the first picture 63, or the same shading as the first shading and the second shading is added to the first picture 53, so that the second picture 64 is generated.
It will be appreciated that the verification code in the second picture 64 is not visible because the first and second shading can obscure the verification code "Vy 1H".
In addition, in order to ensure that the verification code is invisible, the color of the verification code can be converted into the same color as that of the second shading or the first shading.
Step 58, constructing a suspension frame
It should be noted that, one implementation of step 58 may be:
and determining the size of the semitransparent shading picture and the size of the suspension frame based on the size of the second picture, then constructing the semitransparent shading picture, and embedding the semitransparent shading picture into the suspension frame capable of being dragged to form an auxiliary identification tool.
The step of constructing the semitransparent shading picture can be as follows:
filling the first shading or the second shading in a picture, and then adjusting the transparency of the picture to obtain the semi-transparent shading picture 65. Taking the shading in the translucent shading picture 65 as an example of the first shading, when it coincides with the shading in the second picture, the difference between the background shading (the second shading) and the text shading (the verification code shading) can cause different shadows due to the absence of the first shading, and the user can see the verification code.
Step 510, displaying the floating frame and the second picture
It should be noted that the position of the displayed suspension frame and the position of the second picture need to satisfy:
the floating frame and the second picture can not be overlapped so as to prevent the verification code from being directly viewed. For example:
the random algorithm x0 ═ rand ()/getWindowWidth (), y0 ═ rand ()/getWindowHeight () is used to obtain the coordinates of any random position other than the position of the second picture, for example: (x0, y0), and the suspension frame is placed at (x0, y 0). Therefore, when the floating frame is not positioned right above the verification code, the user can not recognize the content under the verification code by naked eyes.
Step 512, drag the floating frame to coincide with the second picture
It will be appreciated that when the user drags the floating frame over the second picture 64, and the covered authentication code segment is visually identified (64/65) when it coincides with the first shading in the second picture, the user can enter the visible authentication code and wait for background identification verification.
Therefore, in the embodiment, the verification code is invisible by adding the first shading and the second shading to the picture carrying the verification code; and constructing a semitransparent shading picture carrying the first shading to serve as a role of a decryption card, so that when a user drags and moves the semitransparent shading picture to the verification code, the verification code can be viewed through the semitransparent shading picture. The verification code is covered by the first shading and the second shading, and the first shading, the second shading and the third shading are interwoven, so that the aim that a computer cannot automatically recognize the verification code and a person can recognize the verification code through simple operation can be achieved. Under the condition that the verification codes of various kinds of software are widely used at present, the safety can be ensured, and the operation complexity of a user can be reduced.
In addition, for simplicity of explanation, the above-described method embodiments are described as a series of acts or combinations, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts or steps described, as some steps may be performed in other orders or simultaneously according to the present invention. Furthermore, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Example 4
Fig. 7 is a schematic structural diagram of a mobile terminal according to embodiment 4 of the present invention, and referring to fig. 7, the mobile terminal may specifically include: a determination module 71, a generation module 72 and a display module 73, wherein,
a determination module 71, configured to determine target authentication information;
a generation module 72 for generating a target verification image, which is an image generated by adding a shading on a target area containing the target verification information;
a display module 73, configured to display the target verification image and a first image, where the first image is an image used to be overlaid on the target verification image so as to make the target verification information in the target verification image visible.
Wherein, the generating module 72 includes:
a first adding unit configured to add a first shading on the target area based on a predetermined first shading addition rule;
a second adding unit configured to add a second ground tint on the target area based on a predetermined second ground tint addition rule, and to take an image containing the target area to which the first ground tint and the second ground tint are added as a target verification image
Wherein the first shading and the second shading are used for forming Moire stripes so as to make the target verification information invisible.
In a possible implementation, the method further includes: conversion and adjustment modules (not shown)
The conversion module is used for converting the lines to be displayed of the target verification information into third shading corresponding to the second shading adding rule;
and the adjusting module is used for adjusting the gray value of the part, overlapped with the first shading and the second shading, of the third shading based on the gray values of the first shading and the second shading.
Wherein the first image is an image with preset transparency generated according to the first shading and/or the second shading, and the first image is used for being overlaid on the target verification image so as to make the target verification information visible.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the mobile terminal in the method embodiments of fig. 2 to fig. 3, and is not described herein again to avoid repetition. Moreover, the present embodiment adds a shading to the verification information to generate a target verification image carrying invisible verification information; and displaying the target authentication image to the user together with the pre-constructed first image, since the first image is in a role of acting as a "decryption card", the user can make the authentication information visible by overlaying the first image on the target authentication image. Moreover, the verification information is covered by the shading and is interwoven, so that the aim that the computer cannot automatically recognize the verification information can be fulfilled.
Example 5
Fig. 8 is a schematic structural diagram of a mobile terminal according to embodiment 5 of the present invention, and referring to fig. 8, the mobile terminal may specifically include: an acquisition module 81, an addition module 82, and a presentation module 83, wherein,
an obtaining module 81, configured to obtain a first picture, where the first picture carries a verification code;
an adding module 82, configured to add a predetermined first shading and a predetermined second shading in the first picture, and generate a second picture, where a verification code in the second picture is covered by the first shading and the second shading and is invisible;
and the display module 83 is used for displaying the second picture and a pre-constructed suspension frame, the suspension frame is embedded with a semitransparent shading picture carrying the first shading, and the semitransparent shading picture is used for covering the second picture so as to enable the verification code to be visible.
Optionally, the mobile terminal further includes:
the system comprises a first determining module, a second determining module and a third determining module, wherein the first determining module is used for determining shading drawing rules which comprise a first shading adding rule and a second shading adding rule;
then, the adding module 82 includes:
a first adding unit, configured to add a first shading to the first picture based on the first shading adding rule;
a second adding unit, configured to add a second shading to the first picture based on the second shading adding rule;
wherein the first shading and the second shading can be regular shading.
Optionally, the adding module 82 further includes:
the conversion unit is used for converting the shading of the verification code in the first picture into a third shading corresponding to the second rule;
and the adjusting unit is used for adjusting the gray value of the part, overlapped with the first shading and the second shading, of the third shading based on the gray values of the first shading and the second shading.
The first shading adding rule is a linear function with a plurality of slopes as first slopes and different intercepts;
the second rule is a linear function with a plurality of slopes as second slopes and different intercepts;
wherein the first slope and the second slope are not equal.
Optionally, the mobile terminal further includes:
the second determining module is used for determining a first area occupied by the first picture in a display interface;
then, the display module 83 includes:
the determining unit is used for determining target coordinates in a second area of the display interface;
a display unit for displaying the suspension frame in the display interface based on the target coordinates;
wherein the second region is a region of the display interface other than the first region.
The determination unit includes: and the random determining subunit acquires the random coordinate in the second area by adopting a random algorithm and takes the random coordinate as a target coordinate.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the mobile terminal in the method embodiments of fig. 3 to fig. 5, and is not described herein again to avoid repetition. In the embodiment, the verification code is invisible by adding the first shading and the second shading on the picture carrying the verification code; and constructing a semitransparent shading picture carrying the first shading to serve as a role of a decryption card, so that when a user drags and moves the semitransparent shading picture to the verification code, the verification code can be viewed through the semitransparent shading picture. And because the verification code is covered by the first shading and the second shading, the first shading, the second shading and the third shading are interwoven together, so that the aim that a computer cannot automatically identify the verification code and a user can check the verification code through a semitransparent shading picture can be fulfilled.
In addition, as for the device and system embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
It should be noted that, in the respective components of the apparatus of the present invention, the components therein are logically divided according to the functions to be implemented thereof, but the present invention is not limited thereto, and the respective components may be newly divided or combined as necessary.
Example 6
Fig. 9 is a schematic structural diagram of a mobile terminal according to embodiment 6 of the present invention, and referring to fig. 9, the mobile terminal 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 7 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 110 is configured to obtain a first picture, where the first picture carries a verification code; adding a first preset shading and a second preset shading in the first picture to generate a second picture, wherein the verification code in the second picture is covered by the first shading and the second shading and is invisible; and displaying the second picture and a pre-constructed suspension frame, wherein a semitransparent shading picture carrying the first shading is embedded in the suspension frame, and the semitransparent shading picture is used for covering the second picture so as to enable the verification code to be visible.
Alternatively, the first and second electrodes may be,
a processor 110 for determining target authentication information; generating a target verification image, which is an image generated by adding a shading on a target area containing the target verification information; displaying the target verification image and a first image, the first image being an image for overlaying on the target verification image to make visible the target verification information in the target verification image.
Therefore, the mobile terminal generates a target verification image carrying invisible verification information by adding the shading on the verification information; and displaying the target authentication image to the user together with the pre-constructed first image, since the first image is in a role of acting as a "decryption card", the user can make the authentication information visible by overlaying the first image on the target authentication image.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 7, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 is an interface through which an external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
In addition, the mobile terminal 100 includes some functional modules that are not shown, and thus, the detailed description thereof is omitted.
Preferably, an embodiment of the present invention further provides a mobile terminal, which includes a processor 110, a memory 109, and a computer program stored in the memory 109 and capable of running on the processor 110, where the computer program, when executed by the processor 110, implements each process of the above-mentioned verification information display method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned verification information display method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (11)

1. A verification information display method, comprising:
determining target verification information and generating image data of the target verification information so as to determine the texture of the target verification information;
generating a target verification image, wherein the target verification image is an image generated by adding a shading on a target area containing the target verification information, and the shading of the target verification information is completely covered or partially covered by the shading;
displaying the target verification image and a first image, the first image being an image for overlaying on the target verification image to make visible the target verification information in the target verification image;
wherein the first image is an image with preset transparency generated according to the shading.
2. The method of claim 1, wherein generating the target verification image comprises:
adding a first shading on the target area based on a predetermined first shading adding rule;
adding a second shading on the target area based on a predetermined second shading adding rule;
taking an image containing the target area to which the first ground tint and the second ground tint are added as a target verification image;
wherein the first ground tint and the second ground tint are used for forming moire fringes so as to make the target verification information invisible.
3. The method of claim 2, further comprising, prior to generating the target verification image:
converting the lines to be displayed of the target verification information into third shading corresponding to the second shading adding rule;
and adjusting the gray value of the part, overlapped with the first shading and the second shading, of the third shading based on the gray values of the first shading and the second shading.
4. A method according to claim 3, characterized in that said first image is an image with a preset transparency generated from said first shading and/or said second shading.
5. The method of any of claims 1-4, wherein the displaying the first image comprises:
determining a first area occupied by the target verification image in a preset display interface;
determining target coordinates in a second region of the display interface;
displaying the first image in the display interface based on the target coordinates;
the second area is an area except the first area in the display interface.
6. The method of claim 5, wherein the determining target coordinates in the second region of the display interface comprises:
and acquiring a random coordinate in the second area by adopting a random algorithm, and taking the random coordinate as a target coordinate.
7. A mobile terminal, comprising:
the determining module is used for determining target verification information and generating image data of the target verification information so as to determine the texture of the target verification information;
a generation module, configured to generate a target verification image, where the target verification image is an image generated by adding a ground tint to a target area containing the target verification information, and a grain of the target verification information is completely or partially covered by the ground tint;
a display module configured to display the target verification image and a first image, where the first image is an image to be overlaid on the target verification image so that the target verification information in the target verification image is visible;
wherein the first image is an image with preset transparency generated according to the shading.
8. The mobile terminal of claim 7, wherein the generating module comprises:
a first adding unit configured to add a first shading on the target area based on a predetermined first shading addition rule;
a second adding unit configured to add a second ground tint on the target area based on a predetermined second ground tint addition rule, and to take an image of the target area to which the first ground tint and the second ground tint are added as a target verification image;
wherein the first shading and the second shading are used for forming Moire stripes so as to make the target verification information invisible.
9. The mobile terminal of claim 8, further comprising:
the conversion module is used for converting the lines to be displayed of the target verification information into third shading corresponding to the second shading adding rule;
and the adjusting module is used for adjusting the gray value of the part, overlapped with the first shading and the second shading, of the third shading based on the gray values of the first shading and the second shading.
10. The mobile terminal according to claim 8, wherein the first image is an image with a preset transparency generated according to the first shading and/or the second shading.
11. A mobile terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 6.
CN201810157632.7A 2018-02-24 2018-02-24 Verification information display method and mobile terminal Active CN108446083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810157632.7A CN108446083B (en) 2018-02-24 2018-02-24 Verification information display method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810157632.7A CN108446083B (en) 2018-02-24 2018-02-24 Verification information display method and mobile terminal

Publications (2)

Publication Number Publication Date
CN108446083A CN108446083A (en) 2018-08-24
CN108446083B true CN108446083B (en) 2022-02-01

Family

ID=63192884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810157632.7A Active CN108446083B (en) 2018-02-24 2018-02-24 Verification information display method and mobile terminal

Country Status (1)

Country Link
CN (1) CN108446083B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN85100700A (en) * 1985-04-01 1987-01-31 陆伯祥 Computing machine Moire fringe certificate and recognition system thereof
JP2004078620A (en) * 2002-08-20 2004-03-11 Dainippon Printing Co Ltd Method and device for discriminating authenticity
CN102831567A (en) * 2012-07-02 2012-12-19 湖北联合天诚防伪技术股份有限公司 Multilayer Moire encryption method for anti-counterfeiting images

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10395022B2 (en) * 2014-03-07 2019-08-27 British Telecommunications Public Limited Company Access control for a resource
CN104200150B (en) * 2014-09-01 2017-01-18 湖北盛天网络技术股份有限公司 Method and device for processing verification codes
CN105574399A (en) * 2015-12-22 2016-05-11 安徽一拓通信科技集团股份有限公司 Graphic verification code generation method
CN106650395B (en) * 2016-12-21 2019-10-25 广东顺德中山大学卡内基梅隆大学国际联合研究院 A kind of confidential information display methods based on Morie fringe

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN85100700A (en) * 1985-04-01 1987-01-31 陆伯祥 Computing machine Moire fringe certificate and recognition system thereof
JP2004078620A (en) * 2002-08-20 2004-03-11 Dainippon Printing Co Ltd Method and device for discriminating authenticity
CN102831567A (en) * 2012-07-02 2012-12-19 湖北联合天诚防伪技术股份有限公司 Multilayer Moire encryption method for anti-counterfeiting images

Also Published As

Publication number Publication date
CN108446083A (en) 2018-08-24

Similar Documents

Publication Publication Date Title
CN109710132B (en) Operation control method and terminal
CN108595946B (en) Privacy protection method and terminal
CN107784232B (en) Picture processing method and mobile terminal
CN109993010B (en) Information display method and mobile terminal
CN108459788B (en) Picture display method and terminal
CN108319873B (en) Flexible screen terminal security authentication control method, terminal and computer storage medium
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN109544172B (en) Display method and terminal equipment
EP3454191B1 (en) Electronic device including display and method of providing private information
CN108710806B (en) Terminal unlocking method and mobile terminal
CN111125800B (en) Icon display method and electronic equipment
CN110933307A (en) Electronic equipment and image processing method
CN110826438A (en) Display method and electronic equipment
CN108109188B (en) Image processing method and mobile terminal
CN111090529A (en) Method for sharing information and electronic equipment
CN111144876A (en) Payment method and electronic equipment
CN111651105B (en) Parameter setting method and device and electronic equipment
CN111159687B (en) Account information processing method, electronic equipment and server
CN109992939B (en) Login method and terminal equipment
CN110677537B (en) Note information display method, note information sending method and electronic equipment
CN109446794B (en) Password input method and mobile terminal thereof
CN111444737A (en) Graphic code identification method and electronic equipment
CN111443796A (en) Information processing method and device
CN111460537A (en) Method for hiding page content and electronic equipment
CN110969434A (en) Payment method, server, terminal and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant