CN117851997A - Identity verification method, device, electronic equipment and storage medium - Google Patents

Identity verification method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117851997A
CN117851997A CN202311591923.4A CN202311591923A CN117851997A CN 117851997 A CN117851997 A CN 117851997A CN 202311591923 A CN202311591923 A CN 202311591923A CN 117851997 A CN117851997 A CN 117851997A
Authority
CN
China
Prior art keywords
verification
user
verification code
slider
identity verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311591923.4A
Other languages
Chinese (zh)
Inventor
陈永宏
张超
胡定贵
王治国
齐磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qingmo Internet Technology Co ltd
Original Assignee
Beijing Qingmo Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qingmo Internet Technology Co ltd filed Critical Beijing Qingmo Internet Technology Co ltd
Priority to CN202311591923.4A priority Critical patent/CN117851997A/en
Publication of CN117851997A publication Critical patent/CN117851997A/en
Pending legal-status Critical Current

Links

Abstract

The disclosure relates to an identity verification method, an identity verification device, electronic equipment and a storage medium. The identity verification method comprises the following steps: receiving an identity verification request sent by a user terminal, wherein the identity verification request comprises attribute characteristics of a user; responding to the identity verification request, acquiring a verification code base diagram and a slide block template based on the attribute characteristics of the user, generating a slide block verification code based on the verification code base diagram and the slide block template, transmitting the slide block verification code to the user side, displaying the slide block verification code after the user side receives the slide block verification code, and generating verification parameters based on the identity verification operation of the user; the verification parameters sent by the user side are received, and the identity verification result is determined based on the verification parameters, so that the slide block verification code can be randomly generated, the identity verification is performed in a slide block verification code mode, the security of the identity verification is further improved, and meanwhile, the slide block verification code corresponding to the attribute characteristics of the user is generated based on the attribute characteristics of the user, and the user experience is further improved.

Description

Identity verification method, device, electronic equipment and storage medium
Technical Field
The disclosure relates to the field of computer technology, and in particular, to an identity verification method, an identity verification device, electronic equipment and a storage medium.
Background
In recent years, along with the rapid development of electronic products, verification codes are widely applied to various program interaction interfaces, such as interfaces of registration, login, transaction and the like of application websites, and play an important role in identity verification, risk prevention and the like of human-computer interaction interfaces, and currently, the most commonly used verification codes in the process of identity verification are usually short message verification codes and graphic verification codes, however, due to the fact that the operation of the existing verification codes (such as short message verification codes and image verification codes) is simpler, along with the continuous development of related technologies such as optical character recognition (Optical Character Recognition and OCR) and the like, the capability of the existing verification codes for resisting risks is reduced, so that the security of identity verification is reduced, and user experience is further reduced.
Disclosure of Invention
In order to solve the technical problems, the disclosure provides an identity verification method, an identity verification device, electronic equipment and a storage medium.
A first aspect of an embodiment of the present disclosure provides an identity verification method, including:
receiving an identity verification request sent by a user terminal, wherein the identity verification request comprises attribute characteristics of a user;
responding to the identity verification request, acquiring a verification code base diagram and a slide block template based on the attribute characteristics of the user, generating a slide block verification code based on the verification code base diagram and the slide block template, transmitting the slide block verification code to the user side, displaying the slide block verification code after the user side receives the slide block verification code, and generating verification parameters based on the identity verification operation of the user;
and receiving verification parameters sent by the user terminal, and determining an identity verification result based on the verification parameters.
A second aspect of an embodiment of the present disclosure provides an authentication method, including:
sending an identity verification request to a server;
receiving a slider verification code sent by a server, displaying the slider verification code, and generating verification parameters in response to an identity verification operation executed by a user on the slider verification code;
and sending the verification parameters to the server so that the server can determine the identity verification result based on the verification parameters.
A third aspect of an embodiment of the present disclosure provides an authentication apparatus, including:
the request receiving module is used for receiving an identity verification request sent by a user terminal, wherein the identity verification request comprises attribute characteristics of a user;
the verification code sending module is used for responding to the identity verification request, acquiring a verification code base diagram and a sliding block template based on the attribute characteristics of the user, generating a sliding block verification code based on the verification code base diagram and the sliding block template, sending the sliding block verification code to the user side, displaying the sliding block verification code after the user side receives the sliding block verification code, and generating verification parameters based on the identity verification operation of the user;
and the parameter receiving module is used for receiving the verification parameters sent by the user terminal and determining an identity verification result based on the verification parameters.
A fourth aspect of the embodiments of the present disclosure provides an authentication apparatus, comprising:
the request sending module is used for sending an identity verification request to the server;
the verification code receiving module is used for receiving the sliding block verification code sent by the server side, displaying the sliding block verification code and generating verification parameters in response to the identity verification operation executed by the user on the sliding block verification code;
and the parameter sending module is used for sending the verification parameters to the server so that the server can determine the identity verification result based on the verification parameters.
A fifth aspect of the disclosed embodiments provides an electronic device, comprising:
a processor;
a memory for storing executable instructions;
the processor is configured to read the executable instructions from the memory, and execute the executable instructions to implement the authentication method provided in the first aspect or the second aspect.
A sixth aspect of the embodiments of the present disclosure provides a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the authentication method provided in the first aspect or the second aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
the identity verification method, the device, the electronic equipment and the storage medium provided by the embodiment of the disclosure can receive an identity verification request sent by a user side, the identity verification request comprises attribute characteristics of a user, the identity verification request is responded, a verification code base diagram and a slide template are obtained based on the attribute characteristics of the user, a slide verification code is generated based on the verification code base diagram and the slide template, the slide verification code is sent to the user side, after the user side receives the slide verification code, the slide verification code is displayed, verification parameters are generated based on the identity verification operation of the user, verification parameters sent by the user side are received, and an identity verification result is determined based on the verification parameters.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a flowchart of an authentication method provided by an embodiment of the present disclosure;
FIG. 2 is a flowchart of a method for generating a slider verification code according to an embodiment of the present disclosure;
FIG. 3 is a flow chart of another authentication method provided by an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an authentication device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of another identity verification device according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
Fig. 1 is a flowchart of an authentication method provided in an embodiment of the present disclosure, which may be performed by an authentication device, which may be implemented in software and/or hardware, and which may be configured in an electronic device, such as a server.
As shown in fig. 1, the authentication method provided in this embodiment includes the following steps.
S110, receiving an authentication request sent by a user terminal, wherein the authentication request comprises attribute characteristics of a user.
In the embodiment of the present disclosure, the authentication request may be a request for authentication generated by a user terminal based on an operation of the user, such as an account login operation, an account registration operation, a payment operation, and the like. The authentication request may be used to request an authentication code from the server.
Optionally, the attribute features of the user may include age features, gender features, occupation features, behavior features, etc. of the user for characterizing the user's attributes. A representative user role may be abstracted by a user's attribute features.
Specifically, the server side communicates with the terminal through the network, and the server side can receive the authentication request sent by the user side in real time.
S120, responding to the identity verification request, acquiring a verification code base diagram and a slide block template based on the attribute characteristics of the user, generating a slide block verification code based on the verification code base diagram and the slide block template, and sending the slide block verification code to the user side, so that the user side displays the slide block verification code after receiving the slide block verification code, and generating verification parameters based on the identity verification operation of the user.
In the embodiment of the disclosure, the slider verification code comprises a slider base map and a slider picture, and whether the identity verification is passed or not is determined by the position of the slider picture in the slider base map.
A slider template may be understood as a template having a pattern, size, and orientation of sliders, each of which is different in pattern, size, and orientation, and the corresponding slider verification code is different.
According to different attribute characteristics of users, the acquired verification code base map and the slider template are different.
The authentication operation may include an operation of sliding or dragging a slider corresponding to the slider authentication code.
The authentication parameter may be understood as a parameter for determining whether authentication is passed.
Specifically, after receiving an authentication request sent by a user terminal, the server terminal responds to the authentication request, randomly selects a picture from a plurality of pictures stored in advance in a preset database as an authentication code base map, simultaneously selects one picture from a plurality of slide block templates stored in advance in the preset database as a slide block template, generates a slide block authentication code according to the authentication code base map and the slide block template after acquiring the authentication code base map and the slide block template, and sends the generated slide block authentication code to the user terminal, so that the user terminal receives the slide block authentication code, then displays the slide block authentication code, and generates authentication parameters based on authentication operation of the user.
S130, receiving verification parameters sent by the user terminal, and determining an identity verification result based on the verification parameters.
In the embodiment of the disclosure, after the server side sends the slider verification code to the user side, the server side receives the verification parameter sent by the user side, compares the verification parameter with the preset parameter corresponding to the slider verification code after receiving the verification parameter to determine whether the identity verification is passed, determines that the identity verification is passed when the verification parameter is consistent with the preset parameter comparison result, and determines that the identity verification is not passed when the verification parameter is inconsistent with the preset parameter comparison result.
In the embodiment of the disclosure, an authentication request sent by a user terminal can be received, the authentication request comprises attribute characteristics of a user, an authentication code base map and a slider template are obtained based on the attribute characteristics of the user in response to the authentication request, a slider authentication code is generated based on the authentication code base map and the slider template, the slider authentication code is sent to the user terminal, so that the user terminal receives the slider authentication code, then the slider authentication code is displayed, authentication parameters are generated based on authentication operation of the user, the authentication parameters sent by the user terminal are received, an authentication result is determined based on the authentication parameters, therefore, the slider authentication code can be randomly generated, the authentication is performed in a mode of the slider authentication code, the security of the authentication is further improved, and meanwhile, the slider authentication code corresponding to the attribute characteristics of the user is generated based on the attribute characteristics of the user, so that user experience is further improved.
In the embodiment of the present disclosure, acquiring the verification code base map and the slider template based on the attribute features of the user may specifically include: and selecting the verification code base map and the slide block template corresponding to the patterns of the age characteristics and/or the sex characteristics based on the age characteristics and/or the sex characteristics in the attribute characteristics of the user.
Illustratively, when the age characteristic and the sex characteristic of the user characterize that the user is a young female, beautiful scenery, lovely pet pictures and the like are selected from the database to serve as verification code base drawings and slide block templates with moderate sizes, so that the experience of the user is optimized.
When the age characteristic of the user characterizes that the user is an old person, at the moment, images liked by the old person are selected from the database to serve as verification code base diagrams and large-size slider templates, so that the old person can conveniently verify and operate, and the user experience is improved.
In some embodiments of the present disclosure, after the user slider template is obtained, the size of the slider template may be further enlarged or reduced, so that the size of the slider template is adapted to the attribute characteristics of the user (such as young, old, etc.).
Alternatively, the verification code base map and the slider template may also be obtained based on professional characteristics, behavioral characteristics, and the like of the user, which are not limited herein.
Meanwhile, the verification fault-tolerant proportion can be adjusted according to the attribute characteristics of the user, for example, when the attribute characteristics of the user represent the old, the verification fault-tolerant proportion is increased, and the old can conveniently improve the verification passing rate.
In the embodiment of the disclosure, the verification code base map and the slider template can be acquired according to the attribute characteristics of the user, so that the user experience and the convenience of user operation are further improved.
In some embodiments of the present disclosure, the authentication request may further include a device identification code of the user side. Determining whether the user is a registered user or not based on the equipment identification code of the user side, and acquiring an identity authentication token and identity information of the user when the user is the registered user; and acquiring a verification code base map and a sliding block template based on the identity authentication token and the identity information of the user.
On the basis of the above embodiment of the present disclosure, before generating the slider verification code based on the verification code base map and the slider template, the identity verification method may further include: and inputting the pixel coordinates of the verification code base map into a preset random function to generate jigsaw coordinates.
In the embodiment of the present disclosure, the preset random function is a preset function for generating random coordinates.
The jigsaw coordinates can be understood as coordinates corresponding to the splicing of the slider picture in the slider verification code with the verification code base map.
The tile coordinates may be any one of the pixel coordinates in the verification code base map, including X-axis coordinates and Y-axis coordinates.
Further, as illustrated in fig. 2, the method for generating the slider verification code based on the verification code base map and the slider template may include the following steps:
s210, generating a mask picture based on a preset tool and the verification code base map, wherein the size of the mask picture is the same as that of the verification code base map, and the mask picture is a background-free picture.
In the embodiment of the present disclosure, the preset tool may be a preset tool for generating a background-free picture.
The mask picture is a background-free picture, i.e. a transparent picture.
Specifically, the server acquires the pixel coordinates of the verification code base map, inputs the pixel coordinates of the verification code base map into a preset tool, and generates a transparent picture with the same size as the verification code base map according to the pixel coordinates of the verification code base map by the preset tool.
S220, determining the position information of the slider template in the mask picture based on the jigsaw coordinates and the slider template.
Specifically, the server side firstly determines the center position of the sliding block template, determines the jigsaw coordinates as coordinates of the center position of the sliding block template in the mask picture, and then can determine the position information of the sliding block template in the mask picture according to the shape and the size of the sliding block template, wherein the position information can comprise the corresponding pixel coordinates of the sliding block template in the mask picture.
S230, carrying out matting processing on the mask picture based on the position information and the sliding block template to obtain the matted mask picture.
In the embodiment of the present disclosure, the matting processing may be processing by existing image processing software, such as PS, and may be an existing matting tool, which is not described herein.
Specifically, after determining the position information of the slider template in the mask picture, the server performs matting processing on the mask picture according to the position information, for example, pixel coordinates corresponding to the slider template in the mask picture, deducts an area corresponding to the slider template in the mask picture, and further obtains the mask picture after matting.
S240, overlapping the mask picture after the matting with the verification code base picture to determine a slider picture.
Specifically, after obtaining the mask picture after the matting, the server overlaps the mask picture after the matting with the verification code base map, and determines an image corresponding to an area which is not blocked in the overlapped verification code base map as a slider picture.
S250, carrying out the matting processing on the verification code base map according to the coordinate information of the slider picture, deducting the slider picture from the verification code base map to obtain a matted verification code base map, and determining the slider picture and the matted verification code base map as a slider verification code.
Specifically, after obtaining the slider picture, the server performs the matting processing on the verification code base map according to the coordinate information of the slider picture, deducts the region where the slider picture is located in the verification code base map, obtains the verification code base map after matting, and determines the slider picture and the verification code base map after matting as the slider verification code.
In the embodiment of the disclosure, the slide verification code can be generated according to the jigsaw coordinates, the slide template and the verification code base map, so that the accuracy of generating the slide verification code is improved, meanwhile, the generated slide verification codes are different each time due to the randomness of the jigsaw coordinates, the slide template and the verification code base map, and the safety of identity verification is improved.
In some embodiments of the present disclosure, the verification parameters may include target position coordinates in a verification code base map of the slider picture obtained by the user terminal based on the user authentication operation after the drawing, and may further include an equipment identification code of the user terminal.
In the embodiment of the present disclosure, the device identifier of the user terminal may be a unique identifier of the user terminal, such as a MAC address.
The target position coordinate may be a position coordinate of a central position of the slider picture in the scratched verification code base map after the slider picture is finally remained in the scratched verification code base map based on an authentication operation of a user, such as a sliding or dragging operation of the slider picture.
Further, determining the authentication result based on the authentication parameter may specifically include: matching the target position coordinate with the jigsaw coordinate, determining that the identity verification passes when the target position coordinate and the jigsaw coordinate are successfully matched, and feeding back the result of the passing identity verification to the user side; when the matching of the target position coordinate and the jigsaw coordinate fails, the identity verification failure is determined, and the result of the identity verification failure is fed back to the user side.
In some embodiments of the present disclosure, after receiving the verification parameter sent by the user side, the identity verification method may further include: acquiring current position information of a user side and frequency of an identity verification request sent by the user side based on an identification code of the user side; and when the current position information is inconsistent with the historical position information and/or the frequency of sending the authentication request is greater than a preset threshold value, sending reminding information to the user side.
In the embodiment of the present disclosure, the current location information is the location information where the user terminal is currently located, for example, the province a, and the historical location information is the location information where the user terminal is located before the current authentication request.
The frequency of the user side sending out the authentication request may include the number of times the user side sends out the same authentication request in a preset time period, for example, the number of times the user side sends out the authentication request for the same account login of the same application program in the preset time period; the number of times of the authentication requests sent by the user side for the same event in the preset time period, for example, the number of times of the authentication requests sent by the user side for different account registration of the same application program in the preset time period, may also be the number of times of the authentication requests sent by the user side for the same event in the preset time period.
Specifically, when the server determines that the current location information is inconsistent with the historical location information, for example, the historical location information is province B for the identity verification request of the same account login, the current location information is province a, which indicates that the user logs in different places, so that reminding information of the different places is sent to the user, and similarly, when the frequency of sending the identity verification request is greater than a preset threshold value, the fact that the user has improper operation or incorrect operation is indicated, at the moment, frequent reminding information is sent to the user, further, after the reminding information is sent, the identity verification request sent by the user is continuously received, and the server can execute fusing, limiting operation and other processing according to specific conditions.
In the embodiment of the disclosure, the current position information of the user terminal and the frequency of the user terminal sending the authentication request can be obtained through the identification code of the user terminal, so that the current position information of the user terminal and the frequency of the user terminal sending the authentication request are analyzed, corresponding response processing, such as reminding and the like, is executed based on the analysis result, and the user experience and the security of user authentication are improved.
Fig. 3 is a flowchart of another authentication method provided by an embodiment of the present disclosure, which may be performed by an authentication device, which may be implemented in software and/or hardware, and which may be configured in an electronic device, such as a terminal.
As shown in fig. 3, the authentication method is applied to a user terminal, and specifically includes the following steps:
s310, sending an identity verification request to the server.
In the embodiment of the disclosure, when a user side responds to a preset operation of a user, an authentication request corresponding to the preset operation is generated, and the authentication request is sent to a server side, wherein the preset operation may include an account login operation, an account registration operation, a payment operation and other operations required for performing authentication.
S320, receiving the slider verification code sent by the server side, displaying the slider verification code, and generating verification parameters in response to the authentication operation executed by the user on the slider verification code.
In the embodiment of the disclosure, after an authentication request is sent to a server by a user side, the server generates a slider authentication code according to the authentication request, further receives the slider authentication code sent by the server and displays the slider authentication code, so that the user side performs an authentication operation on a display interface, after the authentication operation performed on the slider authentication code by a user is responded, according to the authentication operation of the user, the position information of the slider in the slider authentication code, which is slid to the position information in the bottom diagram of the authentication code by the user, is determined as one of the authentication parameters, and meanwhile, the identification code is determined as the authentication parameter.
S330, the verification parameters are sent to the server side, so that the server side determines an identity verification result based on the verification parameters.
In the embodiment of the disclosure, after generating the verification parameter, the user terminal sends the verification parameter to the server terminal, so that the server terminal determines the identity verification result based on the verification parameter.
In the embodiment of the disclosure, an authentication request can be sent to a server, a slide block authentication code sent by the server is received and displayed, authentication parameters are generated in response to authentication operations performed on the slide block authentication code by a user, and the authentication parameters are sent to the server, so that the server determines an authentication result based on the authentication parameters, and therefore the slide block authentication code sent by the server can be displayed, and authentication is performed in a slide block authentication code mode, so that the security and user experience of authentication are improved.
In some embodiments of the present disclosure, the sending the verification parameter to the server may specifically include: encrypting the verification parameters; and sending the encrypted verification parameters to the server.
Specifically, after generating the verification parameter, the user side may encrypt the verification parameter based on a preset encryption algorithm, send the encrypted verification parameter to the server side, decrypt the encrypted verification parameter based on a preset decryption algorithm after the server side receives the encrypted verification parameter, and then determine an identity verification result and/or send out a reminding message based on the decryption result.
The preset encryption algorithm may include a symmetric encryption algorithm, an asymmetric encryption algorithm, and the like, the symmetric encryption algorithm may include an algorithm such as AES, DES, blowfish, the asymmetric encryption algorithm may include an RSA algorithm, and the like, and the preset decryption algorithm corresponds to the preset encryption algorithm one by one.
It should be noted that, the specific implementation manner of encrypting the verification parameter based on the preset encryption algorithm and decrypting the encrypted verification parameter based on the preset decryption algorithm is similar to the implementation manner of the existing encryption and decryption algorithm, and will not be described herein.
In the embodiment of the disclosure, when the verification parameter is sent to the server, the verification parameter can be encrypted, so that the safety in the verification parameter transmission process is ensured, and the safety in the identity verification process is further improved.
Fig. 4 is a schematic structural diagram of an authentication device according to an embodiment of the present disclosure.
In the embodiment of the disclosure, the authentication device may be disposed in an electronic device, which is understood as a part of functional modules in the electronic device. In particular, the electronic device may be a server.
As shown in fig. 4, the authentication apparatus 400 may include a request receiving module 410, an authentication code transmitting module 420, and a parameter receiving module 430.
The request receiving module 410 may be configured to receive an authentication request sent by a user terminal, where the authentication request includes an attribute feature of the user.
The verification code sending module 420 may be configured to obtain a verification code base map and a slider template based on attribute features of a user in response to an authentication request, generate a slider verification code based on the verification code base map and the slider template, send the slider verification code to a user terminal, display the slider verification code after the user terminal receives the slider verification code, and generate verification parameters based on an authentication operation of the user.
The parameter receiving module 430 may be configured to receive a verification parameter sent by the user terminal, and determine an identity verification result based on the verification parameter.
In the embodiment of the disclosure, an authentication request sent by a user terminal can be received, the authentication request comprises attribute characteristics of a user, an authentication code base map and a slider template are obtained based on the attribute characteristics of the user in response to the authentication request, a slider authentication code is generated based on the authentication code base map and the slider template, the slider authentication code is sent to the user terminal, so that the user terminal receives the slider authentication code, then the slider authentication code is displayed, authentication parameters are generated based on authentication operation of the user, the authentication parameters sent by the user terminal are received, an authentication result is determined based on the authentication parameters, therefore, the slider authentication code can be randomly generated, the authentication is performed in a mode of the slider authentication code, the security of the authentication is further improved, and meanwhile, the slider authentication code corresponding to the attribute characteristics of the user is generated based on the attribute characteristics of the user, so that user experience is further improved.
In some embodiments of the present disclosure, the verification code sending module 420 may be specifically configured to select a verification code base map and a slider template corresponding to the age feature and/or the gender feature based on the age feature and/or the gender feature in the attribute features of the user.
In some embodiments of the present disclosure, the authentication apparatus 400 may further include a tile coordinate generation module.
The jigsaw coordinate generating module may be configured to input pixel coordinates of the verification code base map to a preset random function to generate jigsaw coordinates before generating the slider verification code based on the verification code base map and the slider template.
In some embodiments of the present disclosure, the verification code sending module 420 may be specifically configured to generate a mask picture based on a preset tool and a verification code base map, where the size of the mask picture is the same as the size of the verification code base map, and the mask picture is a background-free picture; determining position information of the slider template in the mask picture based on the jigsaw coordinates and the slider template; carrying out matting processing on the mask picture based on the position information and the sliding block template to obtain a matted mask picture; overlapping the mask picture after the picture is scratched with the verification code base picture to determine a slider picture; according to the coordinate information of the slider picture, carrying out the matting processing on the verification code base map, deducting the slider picture from the verification code base map to obtain a matted verification code base map, and determining the slider picture and the matted verification code base map as the slider verification code.
In some embodiments of the present disclosure, the verification parameters include target position coordinates in a verification code base map of a slider picture obtained by a user terminal based on user authentication operation after matting.
In some embodiments of the present disclosure, the parameter receiving module 430 may be specifically configured to match the target position coordinate with the jigsaw coordinate, determine that the identity verification passes when the target position coordinate and the jigsaw coordinate are successfully matched, and feed back a result of the passing identity verification to the user side; when the matching of the target position coordinate and the jigsaw coordinate fails, the identity verification failure is determined, and the result of the identity verification failure is fed back to the user side.
In some embodiments of the present disclosure, the authentication device 400 may further include a reminder module.
The reminding module can be used for acquiring the current position information of the user side and the frequency of the user side sending an identity verification request based on the identification code of the user side after receiving the verification parameter sent by the user side; and when the current position information is inconsistent with the historical position information and/or the frequency of sending the authentication request is greater than a preset threshold value, sending reminding information to the user side.
It should be noted that, the authentication device 400 shown in fig. 4 may perform the steps in the method embodiments shown in fig. 1 to 2, and implement the processes and effects in the method embodiments, which are not described herein.
Fig. 5 is a schematic structural diagram of another authentication device according to an embodiment of the present disclosure.
In the embodiment of the disclosure, the authentication device may be disposed in an electronic device, which is understood as a part of functional modules in the electronic device. Specifically, the electronic device may be a terminal.
As shown in fig. 5, the authentication apparatus 500 may include a request transmitting module 510, an authentication code receiving module 520, and a parameter transmitting module 530.
The request sending module 510 may be configured to send an authentication request to a server.
The verification code receiving module 520 may be configured to receive the slider verification code sent by the server and display the slider verification code, and generate verification parameters in response to an authentication operation performed on the slider verification code by the user.
The parameter sending module 530 may be configured to send the authentication parameter to the server, so that the server determines the authentication result based on the authentication parameter.
In the embodiment of the disclosure, an authentication request can be sent to a server, a slide block authentication code sent by the server is received and displayed, authentication parameters are generated in response to authentication operations performed on the slide block authentication code by a user, and the authentication parameters are sent to the server, so that the server determines an authentication result based on the authentication parameters, and therefore the slide block authentication code sent by the server can be displayed, and authentication is performed in a slide block authentication code mode, so that the security and user experience of authentication are improved.
In some embodiments of the present disclosure, the parameter sending module 530 may be specifically configured to encrypt the verification parameter; and sending the encrypted verification parameters to the server.
It should be noted that, the authentication device 500 shown in fig. 5 may perform the steps in the method embodiment shown in fig. 3 and implement the processes and effects in the method embodiment described above, which are not described herein.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
In the embodiment of the present disclosure, the electronic device shown in fig. 6 may be a server or a terminal, where the terminal specifically includes a mobile phone, a computer, a tablet computer, or the like, which is not limited herein.
As shown in fig. 6, the electronic device may include a processor 610 and a memory 620 storing computer program instructions.
In particular, the processor 610 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured as one or more integrated circuits that implement embodiments of the present disclosure.
Memory 620 may include mass storage for information or instructions. By way of example, and not limitation, memory 620 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of these. Memory 620 may include removable or non-removable (or fixed) media, where appropriate. The memory 620 may be internal or external to the integrated gateway device, where appropriate. In a particular embodiment, the memory 620 is a non-volatile solid state memory. In a particular embodiment, the Memory 620 includes Read-Only Memory (ROM). The ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (Electrical Programmable ROM, EPROM), electrically erasable PROM (Electrically Erasable Programmable ROM, EEPROM), electrically rewritable ROM (Electrically Alterable ROM, EAROM), or flash memory, or a combination of two or more of these, where appropriate.
The processor 610 reads and executes the computer program instructions stored in the memory 620 to perform the steps of the authentication method provided by the embodiments of the present disclosure.
In one example, the electronic device may also include a transceiver 630 and a bus 640. In which, as shown in fig. 6, processor 610, memory 620, and transceiver 630 are connected and communicate with each other via bus 640.
Bus 640 includes hardware, software, or both. By way of example, and not limitation, the buses may include an accelerated graphics port (Accelerated Graphics Port, AGP) or other graphics BUS, an enhanced industry standard architecture (Extended Industry Standard Architecture, EISA) BUS, a Front Side BUS (FSB), a HyperTransport (HT) interconnect, an industry standard architecture (Industrial Standard Architecture, ISA) BUS, an InfiniBand interconnect, a Low Pin Count (LPC) BUS, a memory BUS, a micro channel architecture (Micro Channel Architecture, MCa) BUS, a peripheral control interconnect (Peripheral Component Interconnect, PCI) BUS, a PCI-Express (PCI-X) BUS, a serial advanced technology attachment (Serial Advanced Technology Attachment, SATA) BUS, a video electronics standards association local (Video Electronics Standards Association Local Bus, VLB) BUS, or other suitable BUS, or a combination of two or more of these. Bus 640 may include one or more buses, where appropriate.
The present disclosure also provides a computer-readable storage medium, which may store a computer program that, when executed by a processor, causes the processor to implement the authentication method provided by the embodiments of the present disclosure.
The storage medium may, for example, include a memory 620 of computer program instructions executable by the processor 610 of the electronic device to perform the authentication method provided by embodiments of the present disclosure. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, a ROM, a random access memory (Random Access Memory, RAM), a Compact disc-read only memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
The foregoing is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown and described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The identity verification method is characterized by being applied to a server and comprising the following steps:
receiving an identity verification request sent by a user side, wherein the identity verification request comprises attribute characteristics of a user;
responding to the identity verification request, acquiring a verification code base diagram and a slide block template based on the attribute characteristics of the user, generating a slide block verification code based on the verification code base diagram and the slide block template, transmitting the slide block verification code to the user side, displaying the slide block verification code after the user side receives the slide block verification code, and generating verification parameters based on the identity verification operation of the user;
and receiving verification parameters sent by the user side, and determining an identity verification result based on the verification parameters.
2. The method of claim 1, wherein the obtaining a verification code base map and a slider template based on the user's attribute features comprises:
and selecting a verification code base map and a sliding block template of a pattern corresponding to the age characteristic and/or the sex characteristic based on the age characteristic and/or the sex characteristic in the attribute characteristics of the user.
3. The method of claim 1, wherein prior to the generating a slider verification code based on the verification code base map and the slider template, the method further comprises:
inputting the pixel coordinates of the verification code base map to a preset random function to generate jigsaw coordinates;
the generating the slider verification code based on the verification code base map and the slider template comprises the following steps:
generating a mask picture based on a preset tool and the verification code base map, wherein the size of the mask picture is the same as that of the verification code base map, and the mask picture is a background-free picture;
determining position information of the slider template in the mask picture based on the jigsaw coordinates and the slider template;
carrying out matting processing on the mask picture based on the position information and the sliding block template to obtain a matted mask picture;
overlapping the mask picture after the matting with the verification code base picture to determine a slider picture;
and according to the coordinate information of the slider picture, carrying out the matting processing on the verification code base map, deducting the slider picture from the verification code base map to obtain a verification code base map after matting, and determining the slider picture and the verification code base map after matting as the slider verification code.
4. The method of claim 3, wherein the verification parameters include target position coordinates of the slider picture in the key-punched verification code base map, which are acquired by the user terminal based on an authentication operation of the user;
the determining the identity verification result based on the verification parameters comprises the following steps:
matching the target position coordinate with the jigsaw coordinate, determining that the identity verification passes when the target position coordinate and the jigsaw coordinate are successfully matched, and feeding back the result of the passing identity verification to the user side;
and when the matching of the target position coordinate and the jigsaw coordinate fails, determining that the identity verification fails, and feeding back the result of the identity verification failure to the user side.
5. The method of claim 4, wherein after said receiving the authentication parameters sent by the client, the method further comprises:
acquiring current position information of the user side and frequency of the user side sending the identity verification request based on the identification code of the user side;
and when the current position information is inconsistent with the historical position information and/or the frequency of sending the identity verification request is greater than a preset threshold value, sending reminding information to the user terminal.
6. The identity verification method is characterized by being applied to a user side and comprising the following steps of:
sending an identity verification request to a server;
receiving a slider verification code sent by the server, displaying the slider verification code, and generating verification parameters in response to an identity verification operation executed by a user on the slider verification code;
and sending the verification parameters to the server so that the server determines an identity verification result based on the verification parameters.
7. An authentication apparatus, comprising:
the request receiving module is used for receiving an identity verification request sent by a user terminal, wherein the identity verification request comprises attribute characteristics of a user;
the verification code sending module is used for responding to the identity verification request, acquiring a verification code base diagram and a sliding block template based on the attribute characteristics of the user, generating a sliding block verification code based on the verification code base diagram and the sliding block template, sending the sliding block verification code to the user side, displaying the sliding block verification code after the user side receives the sliding block verification code, and generating verification parameters based on the identity verification operation of the user;
and the parameter receiving module is used for receiving the verification parameters sent by the user terminal and determining an identity verification result based on the verification parameters.
8. An authentication apparatus, comprising:
the request sending module is used for sending an identity verification request to the server;
the verification code receiving module is used for receiving the sliding block verification code sent by the server side, displaying the sliding block verification code and generating verification parameters in response to the identity verification operation executed by the user on the sliding block verification code;
and the parameter sending module is used for sending the verification parameters to the server so that the server can determine an identity verification result based on the verification parameters.
9. An electronic device, comprising:
a processor;
a memory for storing executable instructions;
wherein the processor is configured to read the executable instructions from the memory and execute the executable instructions to implement the authentication method of any one of the preceding claims 1-5 or claim 6.
10. A computer readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, causes the processor to implement the authentication method of any one of the preceding claims 1-5 or claim 6.
CN202311591923.4A 2023-11-27 2023-11-27 Identity verification method, device, electronic equipment and storage medium Pending CN117851997A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311591923.4A CN117851997A (en) 2023-11-27 2023-11-27 Identity verification method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311591923.4A CN117851997A (en) 2023-11-27 2023-11-27 Identity verification method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117851997A true CN117851997A (en) 2024-04-09

Family

ID=90547057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311591923.4A Pending CN117851997A (en) 2023-11-27 2023-11-27 Identity verification method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117851997A (en)

Similar Documents

Publication Publication Date Title
CN109165940B (en) Anti-theft method and device and electronic equipment
US10657243B2 (en) Variation analysis-based public turing test to tell computers and humans apart
WO2020135095A1 (en) Fixed-point authorization identity recognition method and apparatus, and server
CN105323065B (en) Security verification method and device
EP3926920A1 (en) Method and device for allocating augmented reality-based virtual objects
US11972428B2 (en) Information transmission method, apparatus and system
CN110968855B (en) Occlusion detection during a facial recognition process
EP3693878A1 (en) Wireless biometric authentication system and method
CN113366487A (en) Operation determination method and device based on expression group and electronic equipment
TWI616821B (en) Bar code generation method, bar code based authentication method and related terminal
CN109460732B (en) Image recognition-based application information processing method and device and readable storage medium
JP6743319B1 (en) Fraud estimation system, fraud estimation method, and program
CN106548338B (en) Method and system for transferring resource numerical value
TW201426593A (en) Method and apparatus for information verification
WO2020038094A1 (en) Intelligent device authorization control method and system
JP2008217187A (en) Commodity purchase system
CN114612986A (en) Detection method, detection device, electronic equipment and storage medium
CN107742344B (en) Access control method, system and storage medium
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN111917728A (en) Password verification method and device
JP7180869B2 (en) Vending machine payment system, vending machine, face authentication server, vending machine payment method and program
CN109325333B (en) Double-identification login and payment method and device
CN110598421B (en) Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CA3046835C (en) Methods and apparatuses for identity authentication
JP2003162511A (en) Authentication system, pen-type input device and authentication processing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination