CN110795719A - Data configuration method and device for click verification - Google Patents

Data configuration method and device for click verification Download PDF

Info

Publication number
CN110795719A
CN110795719A CN201910985962.XA CN201910985962A CN110795719A CN 110795719 A CN110795719 A CN 110795719A CN 201910985962 A CN201910985962 A CN 201910985962A CN 110795719 A CN110795719 A CN 110795719A
Authority
CN
China
Prior art keywords
click
verification
verification code
user
user interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910985962.XA
Other languages
Chinese (zh)
Inventor
王熙
吴峰
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yidianshikong Network Co Ltd
Original Assignee
Shanghai Yidianshikong Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yidianshikong Network Co Ltd filed Critical Shanghai Yidianshikong Network Co Ltd
Priority to CN201910985962.XA priority Critical patent/CN110795719A/en
Publication of CN110795719A publication Critical patent/CN110795719A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The application discloses a data configuration method and device for click verification. The method comprises the following steps: setting the distribution position of the verification code on the user interface; displaying the verification code on the user interface according to a click verification request of a user; acquiring a first click result of the user on the verification code on the user interface; and adjusting the distribution position of the verification code on the user interface according to the first click result. The method and the device solve the technical problem that the safety of the verification mode is reduced due to the fact that the safety verification method in the related technology is easy to be simulated by the program. By the method and the device, the aim of increasing the difficulty of program simulation of the verification method is fulfilled, and the technical effect of improving the safety of the verification mode is achieved.

Description

Data configuration method and device for click verification
Technical Field
The application relates to the technical field of internet, in particular to a data configuration method and device for click verification.
Background
The security verification means that network operation is verified through various different channels or means, and the current security verification is performed through mobile phone short messages, mails, graphics and other modes. In the field of behavior verification, there are many solutions, such as click verification, slider verification, and the like.
The click verification method in the related technology mainly comprises the following steps: (1) determining target patterns and click orders, such as "specials", "benefits", "applications", "please"; (2) determining a click area with the length of X and the width of Y and a background image of the area; (3) setting random distribution logic, and distributing the target file randomly in the click area after disassembling the target file; (4) and setting judgment logic to judge whether the user clicks the target file in sequence. With the continuous progress of Optical Character Recognition (OCR) technology and the advent of deep learning technology that mimics the human neural network, the security of traditional captchas based on character (numbers, letters, etc.) recognition is also decreasing and is easily broken by hackers. In addition, the verification methods of click verification and slider verification in the related art also have the risk of being manually clicked by program simulation, which leads to the reduction of the security of the verification methods.
Aiming at the problem that the security verification method in the related art is easy to be simulated by a program to cause the security of a verification mode to be reduced, an effective solution is not provided at present.
Disclosure of Invention
The present application mainly aims to provide a data configuration method and apparatus for click verification, so as to solve the problem that a security verification method in the related art is prone to be simulated by a program, which results in a reduction in security of a verification method.
To achieve the above object, according to one aspect of the present application, there is provided a data configuration method for click verification.
The data configuration method for click verification according to the application comprises the following steps: setting the distribution position of the verification code on the user interface; displaying the verification code on the user interface according to a click verification request of a user; acquiring a first click result of the user on the verification code on the user interface; and adjusting the distribution position of the verification code on the user interface according to the first click result.
Further, before displaying the verification code on the user interface according to the click verification request of the user, the method further includes: acquiring a target verification case, wherein the target verification case comprises a text or a picture; disassembling the target verification case to obtain the verification code; and determining a click area on the user interface according to the distribution position of the verification code so that a user can click the verification code in the click area.
Further, the obtaining the result of the first click of the verification code by the user on the user interface comprises: adjusting the distribution position of the verification code on the user interface for M times according to the first click result, wherein M is not less than 1; judging whether a second click result of the verification code obtained after the user adjusts the verification code for M times can be obtained or not; and if the verification code cannot be acquired, adjusting the distribution position of the verification code after the M times of adjustment for N times, wherein N is not less than 1.
Further, the adjusting the distribution position of the verification code in the user interface according to the first click result comprises: setting the click sequence of the verification codes; judging whether the first click result of the user on the verification code accords with the click sequence or not; and if not, prompting the user to perform the clicking operation again.
Further, the adjusting the distribution position of the verification code on the user interface according to the first click result includes: judging the security level of the current network environment; and determining the adjustment times of the distribution positions of the verification codes according to the security level.
In order to achieve the above object, according to another aspect of the present application, there is provided a data configuration apparatus for click verification.
The data configuration device for click verification according to the application comprises: the first setting module is used for setting the distribution positions of the verification codes on the user interface; the display module is used for displaying the verification code on the user interface according to the click verification request of the user; the first acquisition module is used for acquiring a first click result of the user on the verification code on the user interface; and the first adjusting module is used for adjusting the distribution position of the verification code on the user interface according to the first click result.
Further, the device further comprises: the second acquisition module is used for acquiring a target verification scheme, wherein the target verification scheme comprises a text or a picture; the disassembling module is used for disassembling the target verification case to obtain the verification code; and the determining module is used for determining a clicking area on the user interface according to the distribution position of the verification code so that a user can click the verification code in the clicking area.
Further, the apparatus further comprises: the second adjusting module is used for adjusting the distribution position of the verification code on the user interface for M times according to the first clicking result, wherein M is not less than 1; the first judgment module is used for judging whether a second click result of the verification code obtained after the user adjusts the verification code for M times can be obtained or not; and the third adjusting module is used for adjusting the distribution position of the verification code after the M times of adjustment for N times if the verification code cannot be obtained, wherein N is not less than 1.
Further, the apparatus further comprises: the first setting module is used for setting the clicking sequence of the verification codes; the second judgment module is used for judging whether the first click result of the user on the verification code conforms to the click sequence or not;
and the prompting module is used for prompting the user to perform the clicking operation again if the clicking operation is not met.
Further, the adjustment module includes: the judging unit is used for judging the security level of the current network environment; and the determining unit is used for determining the adjustment times of the distribution positions of the verification codes according to the security level.
In the embodiment of the application, the distribution position of the verification code on the user interface is set; displaying the verification code on the user interface according to a click verification request of a user; the method for acquiring the first click result of the user on the verification code on the user interface achieves the aim of increasing the difficulty of program simulation of the verification method by adjusting the distribution position of the verification code on the user interface according to the first click result, thereby achieving the technical effect of improving the safety of the verification method and further solving the technical problem that the safety of the verification method is reduced due to the fact that the safety verification method in the related technology is easy to be simulated by the program.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic flow chart diagram of a data configuration method for click verification according to a first embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a data configuration method for click verification according to a second embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a data configuration method for click verification according to a third embodiment of the present application;
FIG. 4 is a schematic flow chart diagram of a data configuration method for click verification according to a fourth embodiment of the present application;
FIG. 5 is a schematic flow chart diagram of a data configuration method for click verification according to a fifth embodiment of the present application; and
FIG. 6 is a schematic diagram of a data configuration apparatus for click verification according to a first embodiment of the present application; and
fig. 7 is a schematic structural diagram of a data configuration device for click verification according to a second embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
According to an embodiment of the present invention, there is provided a data configuration method for click verification, as shown in fig. 1, the method includes steps S101 to S104 as follows:
and step S101, setting the distribution positions of the verification codes on the user interface.
In specific implementation, a verification code database may be pre-constructed for storing various types of verification codes, and then specific distribution positions of the verification codes on the user interface need to be set and stored in the verification code database, for example, display positions of four characters of the verification code "special", "benefit", "application", and "please" on the terminal device of the user are randomly set, and through the random distribution of each character or picture position in the verification code, the user may subsequently click the verification codes according to a preset sequence to complete the verification process.
And step S102, displaying the verification code on the user interface according to the click verification request of the user.
In specific implementation, the click verification request sent by the user mainly refers to a security verification request sent when the user wants to access a certain website or log in a certain application program on a user interface, and the identity of the user is identified and verified through the verification result so as to determine whether the user can access the target website or log in the target application program, and the like. After receiving a click verification request sent by a user, the verification code can be randomly called from the verification code database and displayed on the user interface according to the corresponding verification code distribution position.
Step S103, acquiring a first click result of the user on the verification code on the user interface.
During specific implementation, a user needs to click each character or picture in the verification code one by one according to a prompt sequence on a graphical user interface, and after the user finishes the first click, the first click result of the user is obtained.
And step S104, adjusting the distribution position of the verification code on the user interface according to the first click result.
In specific implementation, the first click result of the user mainly includes two results, i.e., correct click or incorrect click, for example, the prompt sequence on the user interface is that four characters are clicked one by one according to the sequence of "special", "benefit", "application", and "please", if the user clicks the "special" character for the first time, the result is correct click, and if the user clicks any one of the characters of "benefit", "application", and "please" for the first time, the result is incorrect click. And if the first click result of the user is that the click is correct, further randomly adjusting the distribution positions of all characters in the verification code on the user interface. According to the click verification method, after the user clicks every time correctly, the position of each character or picture in the verification code changes randomly, the difficulty of program simulation in the verification process is increased, and the safety of the click verification method is improved.
As a preferred implementation manner of the embodiment of the present application, as shown in fig. 2, before displaying the verification code on the user interface according to the click verification request of the user, the following steps S201 to S203 are further included:
step S201, a target verification scheme is obtained, wherein the target verification scheme comprises a text or a picture.
In specific implementation, a large amount of target verification documents are collected, and the target verification documents can be material resources such as texts or pictures in various fields or scenes.
Step S202, disassembling the target verification pattern to obtain the verification code.
In specific implementation, after the target verification document is obtained, a series of processing needs to be performed on the original sample, including unified conversion of data formats, data cleaning, and the like, and characters of the target verification document obtained after the processing, such as a text document, are disassembled, for example, a patent application is disassembled into four characters, namely, a special character, a benefit character, a claim character, and a please character, which are used as verification codes for subsequent click verification by a user.
Step S203, determining a click area on the user interface according to the distribution position of the verification code, so that a user can click the verification code in the click area.
In specific implementation, after the verification code is obtained through disassembly, the distribution position of each character in the verification code needs to be randomly set, and the size of the clicking area on the user interface is determined according to the distribution condition of the verification code. For example, a rectangular clicking area with a length of X and a width of Y may further determine a background picture of the clicking area according to the target verification pattern.
As a preferred implementation manner of the embodiment of the present application, as shown in fig. 3, after the obtaining of the first click result of the user on the verification code at the user interface, the method includes steps S301 to S303 as follows:
step S301, adjusting the distribution position of the verification code on the user interface M times according to the first click result, wherein M is not less than 1.
In specific implementation, the first click result of the user mainly includes two results, i.e., correct click or incorrect click, for example, the prompt sequence on the user interface is that four characters are clicked one by one according to the sequence of "special", "benefit", "application", and "please", if the user clicks the "special" character for the first time, the result is correct click, and if the user clicks any one of the characters of "benefit", "application", and "please" for the first time, the result is incorrect click. If the first click result of the user is correct click, the distribution positions of all the characters on the user interface are adjusted once or more according to a certain time interval, for example, the adjustment is performed once every 10 milliseconds, the adjustment times and the time interval of each adjustment can be flexibly set according to actual requirements, and no specific limitation is made herein.
Step S302, determining whether a second click result of the verification code obtained after the M-time adjustment by the user can be obtained.
In specific implementation, when the user finishes the first click and the click is correct, the specific distribution position of the verification code on the user interface is adjusted for a preset number of times, after the adjustment, whether a second click result of the verification code by the user can be obtained within a preset time period is further judged, and the second click result also comprises two results of correct click or wrong click.
Step S303, if the verification code cannot be obtained, adjusting the distribution position of the verification code after M times of adjustment for N times, wherein N is not less than 1.
In specific implementation, if the second click result of the user on the verification code cannot be obtained within the preset time, the step of adjusting the position of the verification code is repeated. Preferably, if the second click result of the verification code by the user can be acquired within the preset time period, and when the click is correct, the step of performing the position adjustment on the verification code is also repeated.
As a preferred implementation manner of the embodiment of the present application, as shown in fig. 4, before adjusting the distribution position of the verification code in the user interface according to the first click result, the method includes steps S401 to S403 as follows:
step S401, setting the click sequence of the verification codes.
In specific implementation, before receiving a click verification request from a user, a click order of each character or picture in a verification code needs to be configured, for example, the click orders of the verification code "specialization", "benefit", "application", and "request" are set to "specialization", "benefit", "application", and "request" in sequence.
Step S402, judging whether the first click result of the verification code by the user accords with the click sequence.
In specific implementation, the first click result of the verification code by the user mainly includes two results of correct click or wrong click, so that it is necessary to determine whether the first click result of the verification code by the user conforms to a preset click sequence, and if the click sequence of the verification code "proper", "good", "claim", and "please" is preset as "proper", "good", "claim", and "please", it is determined whether the character "proper" is clicked by the first click of the user.
And step S403, if the current click point does not meet the preset click point, prompting the user to perform click operation again.
In specific implementation, if the first click result of the verification code by the user does not conform to the preset click sequence, if the character clicked for the first time by the user is 'good', the user is prompted to click wrongly, and the user is prompted to click again after the distribution position of the verification code is changed. And if the user still does not click correctly within the preset time or the preset times, locking the verification interface.
As a preferred implementation manner of the embodiment of the present application, as shown in fig. 5, the adjusting the distribution position of the verification code on the user interface according to the first click result includes steps S501 to S502 as follows:
step S501, judging the security level of the current network environment.
In specific implementation, the number of times of adjusting the distribution position of the verification code on the user interface can be determined by the aid of the security level of the network environment currently used by the user, the division of the security level of the current network environment can be flexibly set according to actual conditions, for example, the security level is set to be a high security level, a medium security level and a low security level, different levels correspond to different adjustment times, and therefore the security level corresponding to the current network environment needs to be judged at first.
Step S502, determining the adjustment times of the distribution positions of the verification codes according to the security level.
In specific implementation, the higher the security level is, the less the adjustment times are, otherwise, the higher the adjustment times are, and the corresponding adjustment times for the distribution positions of the verification codes are determined according to the security level of the current network environment.
From the above description, it can be seen that the present invention achieves the following technical effects: setting the distribution position of the verification code on the user interface; displaying the verification code on the user interface according to a click verification request of a user; and the method for acquiring the first click result of the user on the verification code on the user interface realizes the technical effect of improving the safety of the verification method by adjusting the distribution position of the verification code on the user interface according to the first click result. According to the method and the device, the difficulty degree of simulating the cracking program is remarkably improved by increasing random links including random time intervals, random times and the like, so that the ecological contents of the website are effectively prevented from being damaged by junk information, core content resources are maliciously stolen, meanwhile, invalid junk registration is reduced, and behaviors such as machine screen swiping are avoided.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
According to an embodiment of the present invention, there is also provided an apparatus for implementing the data configuration method for click verification, as shown in fig. 6, the apparatus includes: the device comprises a first setting module 1, a display module 2, a first obtaining module 3 and a first adjusting module 4.
The first setting module 1 of the embodiment of the application is used for setting the distribution positions of the verification codes on the user interface.
In specific implementation, a verification code database may be pre-constructed for storing various types of verification codes, and then specific distribution positions of the verification codes on the user interface need to be set by the first setting module and stored in the verification code database, for example, display positions of four characters of the verification codes, namely 'special', 'benefit', 'application', 'please' on the terminal device of the user are randomly set, and the user can subsequently click the verification codes according to a preset sequence to complete the verification process through the random distribution of the positions of each character or picture in the verification codes.
The display module 2 of the embodiment of the application is configured to display the verification code on the user interface according to a click verification request of a user.
In specific implementation, the click verification request sent by the user mainly refers to a security verification request sent when the user wants to access a certain website or log in a certain application program on a user interface, and the identity of the user is identified and verified through the verification result so as to determine whether the user can access the target website or log in the target application program, and the like. After receiving a click verification request sent by a user, the verification code can be randomly called from the verification code database through the display module and displayed on the user interface according to the corresponding verification code distribution position.
The first obtaining module 3 in the embodiment of the application is configured to obtain a first click result of the user on the verification code on the user interface.
During specific implementation, a user needs to click each character or picture in the verification code one by one according to a prompt sequence on a graphical user interface, and after the user finishes the first click, the first click result of the user is acquired through the first acquisition module.
The first adjusting module 4 of the embodiment of the application is configured to adjust the distribution position of the verification code on the user interface according to the first click result.
In specific implementation, the first click result of the user mainly includes two results, i.e., correct click or incorrect click, for example, the prompt sequence on the user interface is that four characters are clicked one by one according to the sequence of "special", "benefit", "application", and "please", if the user clicks the "special" character for the first time, the result is correct click, and if the user clicks any one of the characters of "benefit", "application", and "please" for the first time, the result is incorrect click. If the first click result of the user is correct click, the distribution positions of all characters in the verification code on the user interface are further randomly adjusted through the first adjusting module.
As a preferred implementation of the embodiment of the present application, as shown in fig. 7, the apparatus further includes: a second acquisition module 5, a decommissioning module 6 and a determination module 7.
The second obtaining module 5 of the embodiment of the application is configured to obtain a target verification document, where the target verification document includes a text or a picture.
In specific implementation, a second acquisition module is required to collect a large amount of target verification documents, and the target verification documents can be material resources such as texts or pictures in various fields or scenes.
The disassembling module 6 of the embodiment of the application is configured to disassemble the target verification document to obtain the verification code.
In specific implementation, after the target verification document is obtained, a series of processing needs to be performed on the original sample, including unified conversion of data formats, data cleaning, and the like, and the character disassembling is performed on the target verification document obtained after the processing, such as a text document, through a disassembling module, for example, a patent application is disassembled into four characters, namely, a special character, a benefit character, a claim character, and a please character, which are used as verification codes for subsequent click verification by a user.
The determining module 7 in the embodiment of the application is configured to determine a click area on the user interface according to the distribution position of the verification code, so that a user performs a click operation on the verification code in the click area.
In specific implementation, after the verification code is obtained through disassembly, the distribution position of each character in the verification code needs to be randomly set, and the size of the clicking area on the user interface is determined through the determining module according to the distribution condition of the verification code. For example, a rectangular clicking area with a length of X and a width of Y may further determine a background picture of the clicking area according to the target verification pattern.
As a preferred implementation of the embodiment of the present application, the apparatus further includes: the device comprises a second adjusting module, a first judging module and a third adjusting module.
The second adjusting module of the embodiment of the application is configured to adjust the distribution position of the verification code on the user interface M times according to the first click result, where M is not less than 1.
In specific implementation, the first click result of the user mainly includes two results, i.e., correct click or incorrect click, for example, the prompt sequence on the user interface is that four characters are clicked one by one according to the sequence of "special", "benefit", "application", and "please", if the user clicks the "special" character for the first time, the result is correct click, and if the user clicks any one of the characters of "benefit", "application", and "please" for the first time, the result is incorrect click. If the first click result of the user is correct click, the second adjustment module adjusts the distribution positions of all the characters on the user interface once or more according to a certain time interval, for example, the adjustment is performed once every 10 milliseconds, the adjustment times and the time interval of each adjustment can be flexibly set according to actual requirements, and no specific limitation is made herein.
The first determining module of the embodiment of the application is configured to determine whether a second click result of the verification code obtained after the M-time adjustment by the user can be obtained.
During specific implementation, when the user finishes the first click and the click is correct, the specific distribution position of the verification code on the user interface is adjusted for preset times, after the adjustment, the first judgment module further judges whether a second click result of the verification code by the user can be obtained within a preset time period, and the second click result also comprises two results of correct click or wrong click.
The third adjusting module of the embodiment of the application is configured to, if the verification code cannot be obtained, adjust the distribution position of the verification code after the M-time adjustment N times, where N is not less than 1.
In specific implementation, if the second click result of the user on the verification code cannot be obtained within the preset time, the step of adjusting the position of the verification code is repeated through the third adjusting module. Preferably, if the second click result of the verification code by the user can be acquired within the preset time period, and when the click is correct, the step of performing the position adjustment on the verification code is also repeated.
As a preferred implementation of the embodiment of the present application, the apparatus further includes: the device comprises a first setting module, a second judging module and a prompting module.
The first setting module of the embodiment of the application is used for setting the click sequence of the verification codes.
In specific implementation, before receiving a click verification request of a user, a first setting module needs to configure a click order of each character or picture in a verification code, for example, the click order of the verification code "special", "benefit", "claim", and "please" is set to "special", "benefit", "claim", and "please" in sequence.
The second judging module of the embodiment of the application is configured to judge whether the first click result of the verification code by the user meets the click sequence.
In specific implementation, the first click result of the verification code by the user mainly includes two results of correct click or wrong click, and therefore, the second determination module needs to determine whether the first click result of the verification code by the user conforms to a preset click sequence, and if the click sequence of the verification code "proper", "benefit", "claim" and "please" is preset as "proper", "benefit", "claim" and "please", it is determined whether the character "proper" is clicked by the first click of the user.
The prompt module of the embodiment of the application is used for prompting the user to perform the click operation again if the click operation is not met.
In specific implementation, if the first click result of the verification code by the user does not conform to the preset click sequence, if the character clicked for the first time by the user is 'good', the user is prompted to click wrongly, and the user is prompted to click again through the prompting module after the distribution position of the verification code is changed. And if the user still does not click correctly within the preset time or the preset times, locking the verification interface.
As a preferred implementation manner of the embodiment of the present application, the adjusting module includes: a judging unit and a determining unit.
The judging unit of the embodiment of the application is used for judging the security level of the current network environment.
In specific implementation, the number of times of adjusting the distribution position of the verification code on the user interface can be determined by the aid of the security level of the network environment currently used by the user, the division of the security level of the current network environment can be flexibly set according to actual conditions, for example, the security level is set to be a high security level, a medium security level and a low security level, different levels correspond to different adjustment times, and therefore the size of the security level corresponding to the current network environment needs to be judged through the judging unit at first.
The determining unit is used for determining the adjusting times of the distribution positions of the verification codes according to the security levels.
In specific implementation, the higher the security level is, the less the adjustment times are, otherwise, the higher the adjustment times are, and the adjustment times of the distribution positions of the verification codes are determined by the determining unit according to the security level of the current network environment.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A data configuration method for click verification, comprising:
setting the distribution position of the verification code on the user interface;
displaying the verification code on the user interface according to a click verification request of a user;
acquiring a first click result of the user on the verification code on the user interface;
and adjusting the distribution position of the verification code on the user interface according to the first click result.
2. The data configuration method for click verification according to claim 1, wherein before displaying the verification code on the user interface according to a click verification request of a user, the method further comprises:
acquiring a target verification case, wherein the target verification case comprises a text or a picture;
disassembling the target verification case to obtain the verification code;
and determining a click area on the user interface according to the distribution position of the verification code so that a user can click the verification code in the click area.
3. The data configuration method for click verification according to claim 1, wherein the obtaining of the first click result of the user on the verification code at the user interface comprises:
adjusting the distribution position of the verification code on the user interface for M times according to the first click result, wherein M is not less than 1;
judging whether a second click result of the verification code obtained after the user adjusts the verification code for M times can be obtained or not;
and if the verification code cannot be acquired, adjusting the distribution position of the verification code after the M times of adjustment for N times, wherein N is not less than 1.
4. The data configuration method for click verification according to claim 1, wherein the adjusting the distribution position of the verification code in the user interface according to the first click result comprises:
setting the click sequence of the verification codes;
judging whether the first click result of the user on the verification code accords with the click sequence or not;
and if not, prompting the user to perform the clicking operation again.
5. The data configuration method for click verification according to claim 1, wherein the adjusting the distribution position of the verification code on the user interface according to the first click result comprises:
judging the security level of the current network environment;
and determining the adjustment times of the distribution positions of the verification codes according to the security level.
6. A data configuration apparatus for click verification, comprising:
the first setting module is used for setting the distribution positions of the verification codes on the user interface;
the display module is used for displaying the verification code on the user interface according to the click verification request of the user;
the first acquisition module is used for acquiring a first click result of the user on the verification code on the user interface;
and the first adjusting module is used for adjusting the distribution position of the verification code on the user interface according to the first click result.
7. The data configuration device for click verification according to claim 6, further comprising:
the second acquisition module is used for acquiring a target verification scheme, wherein the target verification scheme comprises a text or a picture;
the disassembling module is used for disassembling the target verification case to obtain the verification code;
and the determining module is used for determining a clicking area on the user interface according to the distribution position of the verification code so that a user can click the verification code in the clicking area.
8. The data configuration device for click verification according to claim 6, further comprising:
the second adjusting module is used for adjusting the distribution position of the verification code on the user interface for M times according to the first clicking result, wherein M is not less than 1;
the first judgment module is used for judging whether a second click result of the verification code obtained after the user adjusts the verification code for M times can be obtained or not;
and the third adjusting module is used for adjusting the distribution position of the verification code after the M times of adjustment for N times if the verification code cannot be obtained, wherein N is not less than 1.
9. The data configuration device for click verification according to claim 6, further comprising:
the first setting module is used for setting the clicking sequence of the verification codes;
the second judgment module is used for judging whether the first click result of the user on the verification code conforms to the click sequence or not;
and the prompting module is used for prompting the user to perform the clicking operation again if the clicking operation is not met.
10. The data configuration device for click verification according to claim 6, wherein the adjustment module comprises:
the judging unit is used for judging the security level of the current network environment;
and the determining unit is used for determining the adjustment times of the distribution positions of the verification codes according to the security level.
CN201910985962.XA 2019-10-16 2019-10-16 Data configuration method and device for click verification Pending CN110795719A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910985962.XA CN110795719A (en) 2019-10-16 2019-10-16 Data configuration method and device for click verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910985962.XA CN110795719A (en) 2019-10-16 2019-10-16 Data configuration method and device for click verification

Publications (1)

Publication Number Publication Date
CN110795719A true CN110795719A (en) 2020-02-14

Family

ID=69440295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910985962.XA Pending CN110795719A (en) 2019-10-16 2019-10-16 Data configuration method and device for click verification

Country Status (1)

Country Link
CN (1) CN110795719A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965369A (en) * 2021-10-19 2022-01-21 北京顶象技术有限公司 Verification graph obtaining method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1856782A (en) * 2003-09-25 2006-11-01 索尔玛泽株式会社 The method of safe certification service
CN103975325A (en) * 2011-11-30 2014-08-06 帕特里克·韦尔施 Secure authorization
CN104135365A (en) * 2013-05-03 2014-11-05 阿里巴巴集团控股有限公司 A method, a server, and a client for verifying an access request
US8997177B2 (en) * 2006-05-24 2015-03-31 Confident Technologies, Inc. Graphical encryption and display of codes and text
CN104657653A (en) * 2013-11-19 2015-05-27 博雅网络游戏开发(深圳)有限公司 Image verification code verification method and device
CN105160236A (en) * 2015-08-31 2015-12-16 小米科技有限责任公司 Method and device for inputting verification code

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1856782A (en) * 2003-09-25 2006-11-01 索尔玛泽株式会社 The method of safe certification service
US8997177B2 (en) * 2006-05-24 2015-03-31 Confident Technologies, Inc. Graphical encryption and display of codes and text
CN103975325A (en) * 2011-11-30 2014-08-06 帕特里克·韦尔施 Secure authorization
CN104135365A (en) * 2013-05-03 2014-11-05 阿里巴巴集团控股有限公司 A method, a server, and a client for verifying an access request
CN104657653A (en) * 2013-11-19 2015-05-27 博雅网络游戏开发(深圳)有限公司 Image verification code verification method and device
CN105160236A (en) * 2015-08-31 2015-12-16 小米科技有限责任公司 Method and device for inputting verification code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965369A (en) * 2021-10-19 2022-01-21 北京顶象技术有限公司 Verification graph obtaining method and device

Similar Documents

Publication Publication Date Title
US8607331B2 (en) Captcha image authentication method and system
Serra et al. Accessibility evaluation of e-government mobile applications in Brazil
CN109918892B (en) Verification code generation method and device, storage medium and computer equipment
US9369468B2 (en) Generation of a visually obfuscated representation of an alphanumeric message that indicates availability of a proposed identifier
CN106157344B (en) Verification picture generation method and device
CN105049421A (en) Authentication method based on use behavior characteristic of user, server, terminal, and system
CN103312512A (en) Image verification code generating method, image verification code generating device, identity verification method and identity verification device
CN104038502A (en) Verification method and system
EP2892003A1 (en) Method and apparatus for input verification
CN104283682A (en) Method, device and system conducting verification through verification codes
CN101261669A (en) A method for visual validation system based on mouse operation
CN103873432A (en) Verification code implementation method and system thereof and verification code server end
CN104618350A (en) Generation method of image checking code
CN108366052A (en) Verify the processing method and system of short message
CN109784738B (en) Approval method and approval device
CN103731403A (en) Verification code generating system and method
Goswami et al. FR-CAPTCHA: CAPTCHA based on recognizing human faces
Ali et al. Development of CAPTCHA system based on puzzle
CN112381570A (en) Target user-oriented advertisement delivery method and device
CN107393044A (en) Intelligence is registered management method, apparatus and system
CN110795719A (en) Data configuration method and device for click verification
CN110634095A (en) Watermark adding method, watermark identifying method, watermark adding device, watermark identifying device and electronic equipment
CN113761514A (en) Cloud desktop multi-factor security authentication method and system
WO2015116473A1 (en) Systems and methods for generating a video collection
CN113392356A (en) File adaptation method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200214

RJ01 Rejection of invention patent application after publication