CN105187206B - Auth method and device - Google Patents
Auth method and device Download PDFInfo
- Publication number
- CN105187206B CN105187206B CN201410230588.XA CN201410230588A CN105187206B CN 105187206 B CN105187206 B CN 105187206B CN 201410230588 A CN201410230588 A CN 201410230588A CN 105187206 B CN105187206 B CN 105187206B
- Authority
- CN
- China
- Prior art keywords
- pictures
- sub
- picture
- identifying code
- absence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention proposes the auth method and device that a kind of cost is relatively low and anti-crack ability is strong, safe.This method includes:Server receives the identifying code that user terminal is sent and pulls request;Randomly select the picture in picture database, feature enhancing element is added in picture to form feature enhancing picture, strengthened by feature in picture and cut out an at least sub-pictures, feature enhancing picture after being cut forms identifying code background picture, and the region being cut in identifying code background picture forms area of absence corresponding with an at least sub-pictures;Identifying code background picture and corresponding sub-pictures are handed down to user terminal;And receive the splicing result of identifying code background picture and sub-pictures that user terminal returns, being spliced according to the instruction of user, according to splicing result, judge sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation identifying code background picture area of absence.
Description
Technical field
The present invention relates to technical field of the computer network, more particularly to a kind of auth method and device.
Background technology
With becoming increasingly popular for computer and computer network, internet has been deep into people's work, studying and living
Every field.The development of network also brings various challenges while providing convenient for people.Some can utilize robot
Program is improper in large quantities to use Internet resources, such as mass-sending spam etc., is greatly lowered server efficiency.Also someone utilizes
Program constantly sends service request response, and progress " saturation attack " makes the purpose of servers go down to reach.Even somebody tastes
Examination the means such as cracks using sudden huge profits and carries out the behaviors such as malice decryption.To avoid above-mentioned malicious act, design is a set of to be allowed
The automatic resolution information of computer is the instrument from reasonable user or the improper robot program used, is just seemed very heavy
Will.
The use of image authentication code is present relatively more current mode, the main purpose of image authentication code is to differentiate network service
User is program or the mankind.Image authentication code is the picture containing character string, and user inputs character string is required in checking
Content.Character string is generally made up of upper and lower case letter and numeral, and part identifying code includes Chinese character or mathematical formulae, the length of character string
Degree can be random or fixed.In order to avoid by machine automatic identification, it will usually the background of picture is improved, such as increased
Add various textured patterns etc., so as to disturb machine automatic identification.
However, as shown in figure 1, the existing auth method based on identifying code picture is, it is necessary to which user is defeated in identifying code
Enter and character shown in identifying code picture 2 is manually entered in frame 1, need to complete by keyboard due to being manually entered, therefore
Determine that the character in identifying code picture must be easily understood.The content in identifying code picture is typically all using letter or number at present
Word, selectable range is small, as long as collecting enough samples, carries out machine learning and training, can develop to break soon
Solve the automatic machine program of identifying code., still can be by if context vault is not huge enough even if being the increase in the identifying code picture of background
Automatic machine cracks.Therefore, the anti-crack ability of the entirety of identifying code picture is poor, and security is than relatively low.
In order to improve the anti-crack ability of identifying code, research staff, which develops, clicks identifying code, clicks identifying code and is using
When would generally to user show include multiple pictures comprising natural forms and the prompt message related to these image contents,
These pictures are selected according to prompt message by user, the identity of user verified according to the selection of user, by
Very big difficulty all be present in the understanding to prompt message and the classification these two aspects to object in machine, therefore can be significantly
Increase machine cracks the difficulty of identifying code.
But clicking identifying code when in use, picture resource requires very high, and needs artificial screening classification storage, into
This is higher.
The content of the invention
The purpose of the embodiment of the present invention is, there is provided the identity that a kind of cost is relatively low and anti-crack ability is strong, safe
Verification method and device.
In order to solve the above problems, the embodiment of the present invention provides a kind of auth method, and methods described includes:Server
Receive the identifying code that user terminal is sent and pull request;The picture in picture database is randomly selected, is added in the picture
Feature strengthens element to form feature enhancing picture, is strengthened by the feature in picture and cuts out an at least sub-pictures, is cut
Feature enhancing picture after cutting forms identifying code background picture, and the region being cut in the identifying code background picture is formed
Area of absence corresponding with an at least sub-pictures;The identifying code background picture and corresponding sub-pictures are handed down to
The user terminal, so that the identifying code background picture and sub-pictures are showed user by the user terminal;And connect
Receive the user terminal returns, the identifying code background picture being spliced according to the instruction of the user and the subgraph
The splicing result of piece, according to the splicing result, judge the sub-pictures whether by according to precalculated position and the predetermined anglec of rotation
Degree splices the area of absence in the identifying code background picture, if it is, the result is by the way that otherwise, the result is not
Pass through.
Accordingly, the embodiment of the present invention also provides a kind of authentication means, and described device can run on server, institute
Stating device can include:Request receiving module, the identifying code for receiving user terminal transmission pull request;Identifying code generates mould
Block, for randomly selecting the picture in picture database, feature enhancing element is added in the picture to form feature enhancing
Picture, strengthened by the feature in picture and cut out an at least sub-pictures, the feature enhancing picture after being cut is formed
Identifying code background picture, the region being cut in the identifying code background picture form corresponding with an at least sub-pictures
Area of absence;Picture issues module, for the identifying code background picture and corresponding sub-pictures to be handed down into the user
Terminal, so that the identifying code background picture and sub-pictures are showed user by the user terminal;And authentication mould
Block, for receiving the identifying code background picture that the user terminal returns, being spliced according to the instruction of the user
With the splicing result of the sub-pictures, according to the splicing result, judge the sub-pictures whether by according to precalculated position and
The predetermined anglec of rotation splices the area of absence in the identifying code background picture, if it is, the result is by otherwise, testing
Card result is not pass through.
Relative to prior art, in the embodiment of the present invention, the particular content of identifying code background picture need not have very strong
Classification identification, can directly be obtained by server from internet, resource is very abundant, it is not necessary to manually classified,
Cost can be reduced, can also increase artificially collect picture as the difficulty for cracking exam pool in addition;The mankind are taken full advantage of to figure
The innate advantage of piece content understanding, user is according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures
Sub-pictures are correctly put, due to machine after the understanding to image content and sub-pictures are rotated with background picture
Between the understanding these two aspects of incidence relation very big difficulty all be present, therefore considerably increase the difficulty that machine cracks identifying code
Degree, it is safe;For identifying code is clicked, it is not necessary to which user carries out classification identification according to problem to picture, there is provided
Area of absence selects for user, and reduce user uses threshold.That is the present invention is not influenceing the premise of Consumer's Experience
The anti-breaking force of identifying code can be greatly improved down, effectively raise the security of user's checking;Cut to picture
Before, strengthen element by increasing feature in picture, thus it is possible to vary continuously there is the region of the view data of similar features originally
Discrimination, user is easier to distinguish area of absence corresponding to sub-pictures and the mode put, so as to improve
User is by the success rate of checking, in addition, the randomness of feature enhancing element can also increase the difficulty that automatic machine cracks in addition.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow the above and other objects, features and advantages of the present invention can
Become apparent, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, describe in detail as follows.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other
Accompanying drawing.
Interactive interface schematic diagram when Fig. 1 is the existing progress authentication using identifying code picture.
Fig. 2 is a kind of applied environment figure of the embodiment of the present invention.
Fig. 3 is a kind of structured flowchart for the user terminal that can be applied to the embodiment of the present invention.
Fig. 4 is a kind of structured flowchart for the server that can be applied to the embodiment of the present invention.
Fig. 5 is another applied environment figure of the embodiment of the present invention.
Fig. 6 is a kind of flow chart for auth method that first embodiment of the invention provides.
Fig. 7 is the particular flow sheet of split flow in the middle part of first embodiment of the invention.
Fig. 8 is the example schematic of the identifying code background picture and corresponding sub-pictures that do not increase feature enhancing element.
Fig. 9 is the increase in the example schematic of the identifying code background picture after feature enhancing element and corresponding sub-pictures.
Figure 10 is a kind of flow chart for auth method that second embodiment of the invention provides.
Figure 11 is a kind of flow chart for auth method that third embodiment of the invention provides.
Figure 12 is a kind of flow chart for auth method that fourth embodiment of the invention provides.
Figure 13 is a kind of structural representation for authentication means that fifth embodiment of the invention provides.
Figure 14 is that the structure of identifying code generation module in a kind of authentication means that fifth embodiment of the invention provides is shown
It is intended to.
Figure 15 is the structural representation of feature enhancement unit in a kind of authentication means that fifth embodiment of the invention provides
Figure.
Figure 16 is a kind of structure of authentication module in a kind of authentication means that fifth embodiment of the invention provides
Schematic diagram.
Figure 17 is another knot of authentication module in a kind of authentication means that fifth embodiment of the invention provides
Structure schematic diagram.
Figure 18 is a kind of structural representation for authentication means that sixth embodiment of the invention provides.
Figure 19 is a kind of structural representation for authentication system that seventh embodiment of the invention provides.
Embodiment
Further to illustrate the present invention to reach the technological means and effect that predetermined goal of the invention is taken, below in conjunction with
Accompanying drawing and preferred embodiment, to the embodiment according to auth method proposed by the present invention and authentication means,
Method, step, structure, feature and its effect, describe in detail as follows.
For the present invention foregoing and other technology contents, feature and effect, in the following preferable reality coordinated with reference to schema
Applying in the detailed description of example to clearly appear from.By the explanation of embodiment, when predetermined mesh can be reached to the present invention
The technological means taken and effect be able to more deeply and it is specific understand, but institute's accompanying drawings are only to provide with reference to saying
It is bright to be used, not it is used for being any limitation as the present invention.
Referring to Fig. 2, it show a kind of applied environment figure of auth method provided in an embodiment of the present invention.Such as Fig. 2
Shown, user terminal 100 and server 200 are in wirelessly or non-wirelessly network 300, by wirelessly or non-wirelessly network 300,
User terminal 100 and server 200 are in communication with each other.
User terminal 100 can specifically include smart mobile phone, tablet personal computer, E-book reader, MP3 player
(Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio aspect 3),
MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect
4) player, pocket computer on knee, car-mounted terminal, wearable device etc..Browser can be installed in user terminal 100
Or the client of various applications (including system application and third-party application).
Fig. 3 shows a kind of structured flowchart for the user terminal that can be applied in the embodiment of the present invention.As shown in figure 3, with
Family terminal 100 includes memory 102, storage control 104, one or more (one is only shown in figure) processors 106, peripheral hardware
Interface 108, radio-frequency module 110, locating module 112, image capture module 114, audio-frequency module 116, Touch Screen 118 and press
Key module 120.These components are mutually communicated by one or more communication bus/signal wire 122.
It is appreciated that structure shown in Fig. 3 is only to illustrate, user terminal 100 may also include it is more more than shown in Fig. 3 or
Less component, or there is the configuration different from shown in Fig. 3.Each component shown in Fig. 3 can use hardware, software or its
Combination is realized.
Memory 102 can be used for storage software program and module, such as the auth method in the embodiment of the present invention and
Programmed instruction/module corresponding to device, processor 106 are stored in software program and module in memory 102 by operation,
So as to perform various function application and data processing, such as auth method provided in an embodiment of the present invention.
Memory 102 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 102 can further comprise
Relative to the remotely located memory of processor 106, these remote memories can pass through network connection to user terminal 100.
The example of above-mentioned network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor
106 and access of other possible components to memory 102 can be carried out under the control of storage control 104.
Various input/output devices are coupled to CPU and memory 102 by Peripheral Interface 108.The operation of processor 106 is deposited
Various softwares in reservoir 102, instruction are to perform the various functions of user terminal 100 and carry out data processing.
In certain embodiments, Peripheral Interface 108, processor 106 and storage control 104 can be in one single chips
Realize.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 110 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with
Communication network or other equipment are communicated.Radio-frequency module 110 may include the various existing electricity for being used to perform these functions
Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card,
Memory etc..Radio-frequency module 110 can be communicated or led to various networks such as internet, intranet, wireless network
Wireless network is crossed to be communicated with other equipment.Above-mentioned wireless network may include cellular telephone networks, WLAN or
Metropolitan Area Network (MAN).Above-mentioned wireless network can use various communication standards, agreement and technology, and including but not limited to the whole world is mobile logical
Letter system (Global System for Mobile Communication, GSM), enhanced mobile communication technology
(Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code division
Multiple access, W-CDMA), CDMA (Code division access, CDMA), TDMA
(time division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity,
WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE802.11b, IEEE802.11g and/or
IEEE802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses
(Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, IMU
The agreement of news and short message, and any other suitable communications protocol, or even may include that those are not developed currently yet
Agreement.
Locating module 112 is used for the current location for obtaining user terminal 100.The example of locating module 112 includes but unlimited
In GPS (GPS), the location technology based on WLAN or mobile radio communication.
Image capture module 114 is used to shoot photo or video.The photo or video of shooting can be stored to storage
In device 102, and it can be sent by radio-frequency module 110.
Audio-frequency module 116 provides a user COBBAIF, and it may include one or more microphones, one or more raises
Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface 108, and voice data is converted into power information,
Power information is transmitted to loudspeaker.Loudspeaker is converted to power information the sound wave that human ear can hear.Voicefrequency circuit is also from microphone
Place receives power information, converts electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface 108 to enter traveling one
The processing of step.Voice data can obtain at memory 102 or by radio-frequency module 110.In addition, voice data can also
Store into memory 102 or be transmitted by radio-frequency module 110.In some instances, audio-frequency module 116 may also include
One earphone broadcasts hole, for providing COBBAIF to earphone or other equipment.
Touch Screen 118 provides an output and inputting interface simultaneously between user terminal 100 and user.Specifically,
Touch Screen 118 shows video frequency output to user, and the contents of these video frequency outputs may include word, figure, video and its any
Combination.Some output results correspond to some user interface objects.Touch Screen 118 also receives the input of user, such as with
The gesture operations such as the click at family, slip, so that input of the user interface object to these users responds.Detect user's input
Technology can be based on resistance-type, condenser type or other any possible touch control detection technologies.Touch Screen 118 shows list
The instantiation of member includes but is not limited to liquid crystal display or light emitting polymer displays.
Key-press module 120 equally provides user's interface inputted to user terminal 100, and user can be by pressing not
Same button is so that user terminal 100 performs different functions.
Fig. 4 is a kind of structured flowchart for the server that can be applied in the embodiment of the present invention.As shown in figure 4, server
200 include:Memory 201, processor 202 and mixed-media network modules mixed-media 203.It is appreciated that the structure shown in Fig. 4 is only to illustrate, its
The structure of server in the embodiment of the present invention is not caused to limit.For example, the server in the embodiment of the present invention can also wrap
Include more either less components than shown in Fig. 4 or there is the configuration different from shown in Fig. 4.Memory 201 can be used for depositing
Store up software program and module, programmed instruction/module as corresponding to auth method and device in the embodiment of the present invention, place
Reason device 202 is stored in software program and module in memory 201 by operation, so as to perform various function application and number
According to processing, that is, realize the auth method in the embodiment of the present invention.Memory 201 may include high speed random access memory, may be used also
Stored including nonvolatile memory, such as one or more magnetic storage device, flash memory or other nonvolatile solid states
Device.In some instances, memory 201 can further comprise that these are long-range relative to the remotely located memory of processor 202
Memory can pass through network connection to server 200.
Mixed-media network modules mixed-media 203 is used to receiving and sending network signal.Above-mentioned network signal may include wireless signal or have
Line signal.In an example, above-mentioned network signal is cable network signal.Now, mixed-media network modules mixed-media 203 may include processor,
The elements such as random access memory, converter, crystal oscillator.
Above-mentioned software program and module also include operating system, such as can be LINUX, UNIX, WINDOWS, and it can
Including the various component softwares for management system task (such as memory management, storage device control, power management etc.) and/or
Driving, and can mutually be communicated with various hardware or component software, so as to provide the running environment of other software component.
In addition, the server in the embodiment of the present invention can also include the server of multiple specific difference in functionalitys, shown in Fig. 5
For another application environment schematic diagram of the embodiment of the present invention, as shown in figure 5, the client in user terminal 100 (such as browses
Device client, instant messaging application client, pay applications client etc.) web server 301, web can be accessed by url
Server 301 returns to the identifying code background picture pulled from identifying code generation server 302 and sub-pictures are presented to user.Test
Card server 303 can pull identifying code background picture from identifying code generation server 302 and sub-pictures are transmitted to web services
Device 301, the splicing answer that authentication server 303 can also return to user terminal 100 verifies, so as to whether judge user
Pass through checking.It is various to picture progress again that identifying code generation server 302 can choose picture from picture storage server 304
Processing forms identifying code background picture and corresponding sub-pictures and preserves the information of the corresponding relation between them and correlation,
Then authentication server 303 is waited to pull.Picture storage server 304 can store the figure that magnanimity is used as identifying code background picture
Piece resource.User terminal 100, web server 301, identifying code generation server 302, authentication server 303 and picture storage
Server 304 is in wirelessly or non-wirelessly network, by the wirelessly or non-wirelessly network, user terminal 100 and each server phase
Mutual communication.
It should be noted that the setting of the quantity and function of server can be according to specific implement scene and implementation
Condition is changed, and such change has no effect on protection scope of the present invention.
Below in conjunction with accompanying drawing, detailed Jie is carried out to auth method provided in an embodiment of the present invention, device, system
Continue.
First embodiment
Referring to Fig. 6, it show a kind of flow chart of auth method of first embodiment of the invention offer.With reference to figure
2, the present embodiment describes the handling process of server, and the auth method that the present embodiment provides comprises the following steps:
Step S11, server receive the identifying code that user terminal is sent and pull request.
When the browser in user terminal 100 or the client monitors of various applications carry out the needs such as initiation transaction to user
Verify the sensitive operation of identity or log in that certain number of applications is excessive within certain period or strange land log in certain application or
When logging in situations such as certain applied cryptography input error number is excessive and occurring, it is possible to determine that authentication request is triggered, and user is whole
End 100 can send identifying code to server 200 and pull request.
It for example, user terminal 100 can be to the server 200 being pre-configured with, such as can be a web page address, send
Identifying code pulls request, to obtain identifying code.Specifically, identifying code, which is pulled in request, can carry page iden-tity (check
Code), page iden-tity is used to identify a unique page, such as can be a numeral, page mark during each refresh page
Knowledge can all change, and pulling request with identifying code has corresponding relation.
Step S12, the picture in picture database is randomly selected, feature enhancing element is added in the picture to be formed
Feature strengthens picture, is strengthened by the feature in picture and cuts out an at least sub-pictures, the feature enhancing after being cut
Picture forms identifying code background picture, and the region being cut in the identifying code background picture is formed and an at least subgraph
Area of absence corresponding to piece.
Server 200, can be from authentication code database after the identifying code for receiving the transmission of user terminal 100 pulls request
In randomly select an identifying code background picture and sub-pictures corresponding with selected identifying code background picture.
Storage has identifying code background picture and sub-pictures in authentication code database.Each identifying code background picture have with
One or more sub-pictures corresponding to it, there is area of absence corresponding with sub-pictures in each identifying code background picture, when
Sub-pictures, in the area of absence of identifying code background picture, may be constructed one according to precalculated position and the splicing of the predetermined anglec of rotation
Individual complete picture.
It refer to Fig. 7, the generating process of identifying code background picture and sub-pictures may comprise steps of:
Step S101, choose the picture in picture database.
Picture database can establish in advance, be stored in server 200.In the embodiment of the present invention, identifying code background
The particular content of picture need not have very strong classification identification, can directly use the figure of the contents such as landscape, animal, building
Piece.Picture in picture database can be by server 200 directly by being captured on internet, and interconnection internet resource is very abundant,
Therefore, the picture number of picture database easily reaches certain scale, and picture is artificially collected as broken so as to increase
The difficulty of exam pool is solved, prevents from manually cracking.
In addition, the picture in picture database can also be the advertising pictures by being obtained on advertising pictures publisher server,
Thus, when user according to precalculated position and the predetermined anglec of rotation splices sub-pictures the area of absence in identifying code background picture
When, it can be seen that a complete advertising pictures, so as to carry out the service such as product promotion using identifying code.
Step S102, feature enhancing element is added in the picture to form feature enhancing picture.
The position of the sub-pictures cut in the picture selected is random, therefore, when larger area in picture being present
The continuous view data with similar features region (such as sky, ocean, meadow) when, sub-pictures very maximum probability can be by
Cut out in the region, because the details difference in the region is very small, even without, therefore user is located at the region in splicing
Sub-pictures when be difficult to judge how to rotate sub-pictures and just can correctly be spliced by naked eyes.As shown in figure 8, due to Fig. 8
In presence larger area sky, therefore the region discrimination of two sub-pictures cut out by sky areas is very low, and
And the element around two sub-pictures is also all approximate, user is difficult that sub-pictures are moved into correct area of absence, let alone is revolved
Turn correct angle.Before being cut to picture, increase feature enhancing element in picture, thus it is possible to vary continuously have originally
The discrimination in the region of the view data of similar features, make user be easier to distinguish area of absence corresponding to sub-pictures and
The mode put, so as to improve the success rate of checking.
In the embodiment of the present invention, feature enhancing element can include one or more lines, and lines can be with
For straight line, sinusoidal line, circular arc line etc..Feature enhancing element can also be other simple patterns, such as triangle pattern, circle
Pattern, feature enhancing element can also be various watermark recoveries.It is understood that the present invention embodiment not with
The specific manifestation form of feature enhancing element is limited.
Feature enhancing element can be plotted in the picture to form the feature enhancing picture at random, can also be incited somebody to action
The picture that only drawing has feature enhancing element is synthesized in the picture to form the feature enhancing picture.Closed relative to picture
Into method, feature is strengthened into element random being plotted in the mode of feature enhancing picture is formed in the picture and realize speed more
It hurry up, do not interfere with the speed of identifying code background picture and sub-pictures generation substantially, nor influence the quality of original picture,
Too big change will not also occur for the data volume of picture.
Further, the addition that feature enhancing element can be random can also be added in any region of the picture
Continuously there is the region of the view data of similar features in the picture.
Further, the size of feature enhancing element and color can also be random, so can further increase certainly
The difficulty that motivation cracks.
Fig. 9 is refer to, Fig. 9 is that the original picture in Fig. 8 increases the schematic diagram after Random line, as shown in figure 9, by scheming
Continuously the random lines of region (sky) addition of the view data with similar features increase the discrimination in the region in piece, make
Progress can be determined how according to the tendency of the lines in the lines in sub-pictures and identifying code background picture correctly by obtaining user
Splicing.
Further, picture can also be strengthened the feature and carries out interference processing, such as strengthen picture in the feature
Middle addition noise, the processing such as edge blurry is carried out, the sub-pictures of some interference splicings can also be increased, it is anti-to further enhance it
Crack ability.
Step S103, strengthened by the feature in picture and cut out an at least sub-pictures, the feature after being cut
Enhancing picture forms the identifying code background picture, and the identifying code is by cutting out an at least sub-pictures, quilt in the picture
The picture after cutting forms the identifying code background picture, and the region being cut in the identifying code background picture forms institute
State area of absence.
When cutting out multiple sub-pictures by feature enhancing picture, multiple described sub-pictures preferably have identical big
Small and shape, it can so prevent machine from being cracked according to the size and shape of sub-pictures.
Cut picture can since the optional position that feature strengthens picture, the shape of cutting can include it is circular, square,
Polygon etc. has the shape of multiple symmetry axis, does not allow so by machine or manually maliciously to crack.
Step S104, the sub-pictures cut out are carried out to the rotation of random angles, according to the angle calculation and institute rotated
State the predetermined anglec of rotation corresponding to sub-pictures.
The rotation of the sub-pictures cut out progress random angles can further be increased and crack difficulty.With existing calculating
Machine development level, it is relatively difficult directly to recognize the target location of picture and angle, cracks difficulty and optional area of absence
Number a it is related to the anglec of rotation b of sub-pictures, crack difficulty=1/ (a!*ba).Due to the position of cutting picture and angle all
It is random, wants the position by artificially collecting identifying code background picture and sub-pictures and angle is used as that to crack exam pool be very
Difficult, therefore there is very strong anti-crack ability.
The angle rotated according to sub-pictures can calculate the predetermined anglec of rotation corresponding with sub-pictures.Assuming that sub-pictures
For circular picture, be rotated by 50 degree, only when its by opposite direction rotate 50 degree or rotate 310 degree again just can be by sub-pictures
Correctly splicing is in identifying code background picture.That is, it is assumed that certain sub-pictures is rotated by x degree in generation, and it is predetermined
The anglec of rotation can be that (- x ± n*360) degree or (360-x ± n*360) spend, wherein, n is natural number.
Step S105, preserve the identifying code background picture, postrotational sub-pictures, corresponding with the sub-pictures predetermined
The anglec of rotation and precalculated position corresponding with the sub-pictures.
Wherein, precalculated position corresponding with the sub-pictures is area of absence corresponding with the sub-pictures in the checking
Position in code background picture, or position of the area of absence corresponding with the sub-pictures in the identifying code background picture
Between error within a predetermined range.Precalculated position corresponding with the sub-pictures, that is, the sub-pictures are in the identifying code
Precalculated position in background picture, that is to say, that can be with precalculated position of the sub-pictures in the identifying code background picture
Position consistency of the area of absence corresponding with the sub-pictures in the identifying code background picture or with the sub-pictures pair
The position of error within a predetermined range between position of the area of absence answered in the identifying code background picture.
It should be noted that above-mentioned identifying code background picture and sub-pictures can be before step S11 the step of generation
Perform, repeat step S101 to step S103 can generate some identifying code background pictures and corresponding sub-pictures.Above-mentioned step
Suddenly can also be performed between step S11 and step S12, that is to say, that can be regenerated after receiving identifying code and pulling request
Corresponding identifying code background picture and sub-pictures, embodiment of the invention are not limited thereto.
Step S13, the identifying code background picture and corresponding sub-pictures are handed down to the user terminal, so that institute
State user terminal and the identifying code background picture and sub-pictures are showed into user.
Further, verification tip information can also be handed down to the user terminal 100 by the server 200, to
Prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.Certainly, the prompting
Information can also be generated and shown by user terminal 100, and embodiment of the invention is not limited thereto.
Step S14, receive identifying code background that the user terminal returns, being spliced according to the instruction of the user
The splicing result of picture and sub-pictures, according to the splicing result, judge the sub-pictures whether by according to precalculated position and
The predetermined anglec of rotation splices the area of absence in the identifying code background picture, if it is, the result is by otherwise, testing
Card result is not pass through.
If sub-pictures corresponding to the identifying code background picture issued only have one, the splicing result includes the son
The actual position being spliced in the identifying code background picture of picture and the angle that each sub-pictures are rotated in splicing,
Server 200 by compare be stored in the predetermined anglec of rotation corresponding with the sub-pictures in server 200 and with every height
Precalculated position corresponding to picture, confirms whether the sub-pictures are tested according to precalculated position and the splicing of the predetermined anglec of rotation described
Demonstrate,prove the area of absence of code background picture.It is spliced if the sub-pictures of the return of user terminal 100 are actual in identifying code Background
Position in piece is identical with precalculated position corresponding to the sub-pictures, and the sub-pictures angle that is rotated and the son in splicing
The predetermined anglec of rotation is identical corresponding to picture, then can be determined that the sub-pictures by according to precalculated position and the spelling of the predetermined anglec of rotation
The area of absence of the identifying code background picture is connected on, is verified, otherwise, checking does not pass through.
If the number of sub-pictures corresponding to the identifying code background picture issued is multiple, the splicing result is included often
The individual sub-pictures actual position being spliced in the identifying code background picture and each sub-pictures are rotated in splicing
Angle, server 200 by compare be stored in the predetermined anglec of rotation corresponding with each sub-pictures in server 200 and with
Precalculated position corresponding to each sub-pictures, confirm each sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation
In the area of absence of the identifying code background picture, if actual be spliced of each sub-pictures that user terminal 100 returns is being tested
The position demonstrate,proved in code background picture is identical with corresponding precalculated position, and the angle that each sub-pictures are rotated in splicing
Degree it is identical with the corresponding predetermined anglec of rotation, then can be determined that the plurality of sub-pictures by according to precalculated position and make a reservation for
The anglec of rotation splices the area of absence in the identifying code background picture, is verified, and otherwise, checking does not pass through.
Further, the result can also be returned to user terminal 100 and show user by server 200.
In the embodiment of the present invention, the particular content of identifying code background picture need not have very strong classification identification, can
Directly to be obtained by server from internet, resource is very abundant, it is not necessary to is manually classified, can reduce cost, separately
It can also increase outside and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital
Advantage, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures
Put, due to incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture
All there is very big difficulty in understanding these two aspects, therefore considerably increase the difficulty that machine cracks identifying code, safe;Relatively
In clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence is for user's choosing
Select, reduce user uses threshold.That is the present invention can greatly improve on the premise of Consumer's Experience is not influenceed tests
The anti-breaking force of code is demonstrate,proved, effectively raises the security of user's checking;Before being cut to picture, by increasing in picture
Feature is added to strengthen element, thus it is possible to vary continuously there is the discrimination in the region of the view data of similar features originally, make user more
Area of absence corresponding to sub-pictures and the mode put easily are distinguished, so as to improve success of the user by checking
Rate, in addition, the randomness of feature enhancing element can also increase the difficulty that automatic machine cracks in addition.
Second embodiment
Referring to Fig. 10, it show a kind of flow chart of auth method of second embodiment of the invention offer.With reference to
Fig. 2, the present embodiment describe the handling process of user terminal, and auth method can include following step in the present embodiment
Suddenly:
Step S21, user terminal send identifying code to server and pull request.
Step S22, receive and show identifying code background picture and sub-pictures that the server issues, the identifying code
Background picture includes area of absence corresponding with the sub-pictures.
The user terminal can also receive and show the verification tip information that the server issues, to prompt user
By sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
Step S23, the sub-pictures and the identifying code background picture are spliced simultaneously according to the instruction of the user
The splicing picture of the identifying code background picture and the sub-pictures is obtained, the instruction of the user includes the sub-pictures rotation
The target location in the path or movement of the angle turned and sub-pictures movement.
The instruction of the user can be inputted including the user by mouse, gesture input, phonetic entry or character string
The modes such as input input to the instruction of the user terminal.
By taking gesture input as an example, user terminal can in response to the user to the drag operation of the sub-pictures or
In response to dragging of the user to the sub-pictures and rotation process, the sub-pictures are spliced in the identifying code background
In picture.User terminal can obtain sub-pictures rotation during dragging and rotation process of the response user to sub-pictures
The target location in the path or movement of angle and sub-pictures movement.
By taking phonetic entry as an example, user can be with the angle of phonetic entry picture rotation and the path of sub-pictures movement
Or mobile target location, such as rotated ninety degrees clockwise, first area of absence etc. is moved to, user terminal receives
Data signal, and the operation responded according to digital information to sub-pictures are transformed into after predicate sound signal.
User can also directly input the instruction such as " rotated ninety degrees clockwise, being moved to first area of absence ".
Step S24, splicing result is obtained according to the splicing picture, and the splicing result is sent to the service
Device, so that whether the server judges the sub-pictures by according to precalculated position and predetermined rotation according to the splicing result
Angle splices the area of absence in the identifying code background picture, if it is, the result is by the way that otherwise, the result is
Do not pass through.
User terminal 100 is spliced in the identifying code Background according to the splicing picture acquisition sub-pictures are actual
Position in piece and the angle that the sub-pictures are rotated in splicing.For example, user terminal 100 can be according to it
The relative position relation of identifying code background picture and Touch Screen 118 obtain sub-pictures of the splicing in identifying code background picture
With the relative position of Touch Screen 118, carried on the back so as to obtain sub-pictures of the splicing in identifying code background picture in the identifying code
Position in scape picture.User terminal 100 can be according to the sub-pictures and touch-control being spliced in the identifying code background picture
The relative angular relationship of sub-pictures shown by screen 118, obtain the angle that the sub-pictures are rotated in splicing.
User terminal 100 can also obtain actual be spliced of the sub-pictures according to the instruction of user and be carried on the back in the identifying code
Position in scape picture and the angle that the sub-pictures are rotated in splicing.For example, the subgraph in the instruction of user
The angle of piece rotation obtains the angle that sub-pictures are rotated, and the path moved according to the sub-pictures or the target location of movement are obtained
Obtain the actual position being spliced in the identifying code background picture of sub-pictures.
In the embodiment of the present invention, the particular content of identifying code background picture need not have very strong classification identification, can
Directly to be obtained by server from internet, resource is very abundant, it is not necessary to is manually classified, can reduce cost, separately
It can also increase outside and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital
Advantage, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures
Put, due to incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture
All there is very big difficulty in understanding these two aspects, therefore considerably increase the difficulty that machine cracks identifying code, safe;Relatively
In clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence is for user's choosing
Select, reduce user uses threshold.That is the present invention can greatly improve on the premise of Consumer's Experience is not influenceed tests
The anti-breaking force of code is demonstrate,proved, effectively raises the security of user's checking.
3rd embodiment
Figure 11 is referred to, Figure 11 show a kind of flow chart of auth method of third embodiment of the invention offer.
With reference to Fig. 2, the embodiment describes a kind of interaction process flow between user terminal and server.Body in the present embodiment
Part verification method can include:
Step S301, server randomly select the picture in picture database, and feature enhancing member is added in the picture
Element is described after being cut by cutting out an at least sub-pictures in feature enhancing picture to form feature enhancing picture
Feature enhancing picture forms identifying code background picture, the region being cut in the identifying code background picture formed with it is described at least
Area of absence corresponding to one sub-pictures, the identifying code background picture and sub-pictures of generation are stored in authentication code database,
And generate the first mapping table, first mapping table include the numbering of the sub-pictures, the predetermined anglec of rotation and
Corresponding relation in the identifying code background picture between the sequence number of area of absence, wherein, the position where area of absence is institute
State the precalculated position of sub-pictures.
Specifically, the flow of server generation identifying code background picture and sub-pictures may be referred to first embodiment, this
In repeat no more.
Step S302, user terminal send identifying code to server and pull request.
Step S303, server pull request according to the identifying code, are tested by randomly selecting one in authentication code database
Card code background picture and sub-pictures corresponding with selected identifying code background picture, the identifying code background picture include
Area of absence corresponding with the sub-pictures.
The identifying code background picture and corresponding sub-pictures are handed down to user's end by step S304, server
End, so that the identifying code background picture and sub-pictures are showed user by the user terminal.
Step S305, user terminal receive and shown the identifying code background picture and sub-pictures that the server issues,
And prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
Step S306, user terminal enter the sub-pictures and the identifying code background picture according to the instruction of the user
Row, which splices, simultaneously obtains the splicing picture of the identifying code background picture and the sub-pictures, described in the instruction of the user includes
The angle of sub-pictures rotation and the path of sub-pictures movement or the target location of movement.
Step S307, user terminal obtain splicing result according to the splicing picture, and the splicing result includes described
The numbering of sub-pictures, the sequence number of the actual area of absence being spliced in the identifying code background picture of the sub-pictures and
The angle that the sub-pictures are rotated during splicing.
The splicing result is sent to the server by step S308, user terminal.
Step S309, the numbering of sub-pictures of the server in the splicing result, search first corresponding relation
Table, the predetermined anglec of rotation and vacancy corresponding with the numbering of the sub-pictures are obtained according to first mapping table
Sequence number, when the sequence number of area of absence corresponding with the numbering of each sub-pictures in the splicing result and the angle rotated with
When the sequence number of the area of absence found in the mapping table and the consistent predetermined anglec of rotation, the sub-pictures are judged
By according to precalculated position and the splicing of the predetermined anglec of rotation, in the area of absence, the result is by otherwise, it is determined that institute
Sub-pictures are stated not by, in the area of absence, the result is obstructed according to precalculated position and the splicing of the predetermined anglec of rotation
Cross.
The result return user terminal is showed user by step S310, server.
In this embodiment, it is assumed that an identifying code background picture corresponds to multiple sub-pictures, and multiple sub-pictures are each right
The numbering s=(s1, s2 ..., sn) answered, predetermined anglec of rotation a=(a1, a2 ..., an) corresponding to multiple sub-pictures, identifying code
Serial number t1, the t2 of area of absence in background picture ... tn.Correct identifying code answer can be specify order (s, a)
Combination, specified order refer to that sub-pictures correctly splice and are followed successively by t1, the order of t2 ..tn area of absence in sequence number.For example,
Sub-pictures are s1, s2, s3, and the predetermined anglec of rotation corresponding to s4, s1 is a1, and the predetermined anglec of rotation corresponding to s2 is a2, and s3 is corresponding
The predetermined anglec of rotation be a3, the predetermined anglec of rotation corresponding to s4 is a4, the sequence number of the area of absence in identifying code background picture
For t1, t2, t3, t4.Assuming that according to correct answer, it is s2 to splice the sub-pictures in t1 positions, splices the subgraph in t2 positions
Piece is s1, and the sub-pictures spliced in t3 positions are s4, and it is s3 to splice the sub-pictures in t4 positions, then correct corresponding relation is
(s2, a2, t1), (s1, a1, t2), (s4, a4, t3), (s3, a3, t4), and these corresponding relations are stored in the first correspondence
In relation table.If that is, user terminal 100 return splicing result include (s2, a2, t1), (s1, a1, t2),
(s4, a4, t3), (s3, a3, t4) array, because these arrays are consistent with the first mapping table, server
200 can be determined that the result to pass through.
It should be noted that with having the part of same steps can be according to above-mentioned implementation in previous embodiment in the present embodiment
Method specific implementation in example, its specific implementation process are referred to the associated description of above method embodiment, will not be described here.
Fourth embodiment
Figure 12 is referred to, a kind of flow chart of auth method of fourth embodiment of the invention offer is provided.With reference to
Fig. 2, the embodiment describe the interaction process flow between user terminal and server.Authentication side in the present embodiment
Method can include:
Step S401, server randomly select the picture in picture database, and feature enhancing member is added in the picture
Element is described after being cut by cutting out an at least sub-pictures in feature enhancing picture to form feature enhancing picture
Feature enhancing picture forms identifying code background picture, the region being cut in the identifying code background picture formed with it is described at least
Area of absence corresponding to one sub-pictures, the identifying code background picture and sub-pictures of generation are stored in authentication code database,
And the second mapping table is generated, second mapping table includes the precalculated position of the sub-pictures, the predetermined anglec of rotation
And the corresponding relation in the identifying code background picture between the sequence number of area of absence, wherein, it is corresponding with the sub-pictures
Error between position of the precalculated position area of absence corresponding with the sub-pictures in the identifying code background picture is pre-
Determine in scope.
Specifically, the flow of server generation identifying code background picture and sub-pictures may be referred to first embodiment, this
In repeat no more.
Step S402, user terminal send identifying code to server and pull request.
Step S403, server pull request according to the identifying code, are tested by randomly selecting one in authentication code database
Card code background picture and sub-pictures corresponding with selected identifying code background picture, the identifying code background picture include
Area of absence corresponding with the sub-pictures.
The identifying code background picture and corresponding sub-pictures are handed down to user's end by step S404, server
End, so that the identifying code background picture and sub-pictures are showed user by the user terminal.
Step S405, user terminal receive and shown the identifying code background picture and sub-pictures that the server issues,
And prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
Step S406, user terminal enter the sub-pictures and the identifying code background picture according to the instruction of the user
Row, which splices, simultaneously obtains the splicing picture of the identifying code background picture and the sub-pictures, described in the instruction of the user includes
The angle of sub-pictures rotation and the path of sub-pictures movement or the target location of movement.
Step S407, user terminal obtain splicing result according to the splicing picture, and the splicing result includes described
The precalculated position of sub-pictures, the actual area of absence being spliced in the identifying code background picture of the sub-pictures sequence number with
And the angle that the sub-pictures are rotated in splicing.
The splicing result is sent to the server by step S408, user terminal.
Step S409, the precalculated position of sub-pictures of the server in the splicing result, search first correspondence
Relation table, according to second mapping table obtain the predetermined anglec of rotation corresponding with the precalculated position of the sub-pictures with
And the sequence number of vacancy, when the sequence number of area of absence corresponding with the precalculated position of each sub-pictures in the splicing result and by
When the angle of rotation is with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table, sentence
The fixed sub-pictures are by according to precalculated position and the splicing of the predetermined anglec of rotation, in the area of absence, the result is logical
Cross, otherwise, it is determined that the sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation, test
Card result is not pass through.
The result return user terminal is showed user by step S410, server.
In this embodiment, precalculated position corresponding with sub-pictures area of absence institute corresponding with the sub-pictures
Position between allow certain error, its error range for example can with but be not limited to 5%.With pre- corresponding to sub-pictures
The numbering instead of sub-pictures is put in positioning, can improve the threshold cracked, because in an identifying code, the quantity of sub-pictures is that have
Limit, that is, numbering be it is limited, still, the possibility of position of the sub-pictures in identifying code background picture be it is a lot,
So that a resolution ratio is 400*500 picture as an example, if the error allowed is 5%, just there is 19W kinds possibility, therefore can be big
Amplitude improves anti-crack ability.
In this embodiment, it is assumed that an identifying code background picture corresponds to multiple sub-pictures, corresponding with each sub-pictures
Precalculated position p=((x1, y1), (x2, y2) ..., (xn, yn)), predetermined anglec of rotation a=corresponding to multiple sub-pictures (a1,
A2 ..., an), serial number t1, t2 ... the tn of the area of absence in identifying code background picture, wherein, x, y can be each sub-pictures
In coordinate of the specified point of some in identifying code background picture, such as can be sub-pictures Central Symmetry point identifying code carry on the back
Coordinate in scape picture, etc..In such a embodiment, correct identifying code answer can be (p, t, a) array.For example,
Precalculated position corresponding to sub-pictures is p1, p2, p3, and the predetermined anglec of rotation corresponding to p4, p1 is a1, the predetermined anglec of rotation corresponding to p2
Spend for a2, the predetermined anglec of rotation corresponding to p3 is a3, and the predetermined anglec of rotation corresponding to p4 is a4, the sky in identifying code background picture
The serial number t1, t2, t3, t4 in missing plot domain.Assuming that according to correct answer, it is s2 to splice the sub-pictures in t1 positions, is spliced
The sub-pictures of t2 positions are s1, and the sub-pictures spliced in t3 positions are s4, and it is s3 to splice the sub-pictures in t4 positions, then correctly
Corresponding relation is (p2, t1, a2), (p1, t2, a1), (p4, t3, a4), (p3, t4, a3), and these arrays are stored in
In second mapping table.If that is, user terminal 100 return splicing result include (p2, t1, a2), (p1,
T2, a1), (p4, t3, a4), the array of (p3, t4, a3), therefore these arrays are consistent with the second mapping table, so
Server 200 can be determined that the result to pass through.
It should be noted that other in the present embodiment are with having the part of same steps can be according to above-mentioned in previous embodiment
Method specific implementation in embodiment, its specific implementation process are referred to the associated description of above method embodiment, herein not
Repeat.
5th embodiment
Figure 13 is a kind of structural representation for authentication means that fifth embodiment of the invention provides.It refer to Figure 13,
The device that the present embodiment proposes can run on server, the auth method proposed for above-described embodiment, in the present embodiment
Device 50 can include:
Request receiving module 51, the identifying code for receiving user terminal transmission pull request;
Identifying code generation module 52, for randomly selecting the picture in picture database, feature is added in the picture
Enhancing element is strengthened in picture by the feature to form feature enhancing picture and cuts out an at least sub-pictures, after being cut
Feature enhancing picture form identifying code background picture, the region being cut in the identifying code background picture is formed and institute
State area of absence at least corresponding to a sub-pictures;
Picture issues module 53, for the identifying code background picture and corresponding sub-pictures to be handed down into the user
Terminal, so that the identifying code background picture and sub-pictures are showed user by the user terminal;And
Authentication module 54, for receive it is that the user terminal returns, spliced according to the instruction of the user
The identifying code background picture and the sub-pictures splicing result, according to the splicing result, judge that the sub-pictures are
It is no by according to precalculated position and the predetermined anglec of rotation splicing the identifying code background picture area of absence, if it is, testing
It is by the way that otherwise, the result is not pass through to demonstrate,prove result.
Further, Figure 14 is refer to, the identifying code generation module 52 can include:
Feature enhancement unit 521, for randomly selecting the picture in picture database, feature increasing is added in the picture
Strong element is strengthened in picture by the feature to form feature enhancing picture and cuts out an at least sub-pictures;
Computing unit 522, for the sub-pictures cut out to be carried out to the rotation of random angles, according to the goniometer rotated
Calculate the predetermined anglec of rotation corresponding with the sub-pictures;
Storage unit 523, for preserving the identifying code background picture, postrotational sub-pictures and the sub-pictures pair
The predetermined anglec of rotation answered and precalculated position corresponding with the sub-pictures, wherein, pre-determined bit corresponding with the sub-pictures
Be set to position of the area of absence corresponding with the sub-pictures in the identifying code background picture, or with the sub-pictures pair
Error between position of the area of absence answered in the identifying code background picture is within a predetermined range.
Figure 15 is refer to, in the present embodiment, the feature enhancement unit 521 can include:
Picture chooses subelement 5211, for randomly selecting the picture in picture database;
Feature enhanson 5212, strengthen element for adding feature in the picture to form feature enhancing figure
Piece;And
Identifying code generates subelement 5213, and an at least sub-pictures, quilt are cut out for being strengthened by the feature in picture
Feature enhancing picture after cutting forms the identifying code background picture, the area being cut in the identifying code background picture
Domain forms area of absence corresponding with an at least sub-pictures.
Feature enhancement unit 521 can be also used for feature enhancing element being plotted at random in the picture with described in formation
Feature strengthens picture.
Feature enhancement unit 521 can be also used for synthesizing feature enhancing picture in the picture to form the feature
Strengthen picture.
In the embodiment of the present invention, feature enhancing element can include one or more lines, and lines can be with
For straight line, sinusoidal line, circular arc line etc..Feature enhancing element can also be other simple patterns, such as triangle pattern, circle
Pattern, feature enhancing element can also be various watermark recoveries.It is understood that the present invention embodiment not with
The specific manifestation form of feature enhancing element is limited.
The feature enhancement unit 521 is additionally operable to the region of view data of the connection with similar characteristic in the picture
Addition feature enhancing element strengthens picture to form the feature.
The feature enhancement unit 521 can be cut multiple sub-pictures by the picture, and multiple described sub-pictures have phase
Same size and shape.
Picture database can establish in advance, be stored in server 200.In the embodiment of the present invention, identifying code background
The particular content of picture need not have very strong classification identification, can directly use the figure of the contents such as landscape, animal, building
Piece.Picture in picture database can be by server 200 directly by being captured on internet, and interconnection internet resource is very abundant,
Therefore, the picture number of picture database easily reaches certain scale, and picture is artificially collected as broken so as to increase
The difficulty of exam pool is solved, prevents from manually cracking.
Picture in the picture database can also include the advertising pictures by being obtained on advertising pictures publisher server.
Further, in the present invention an embodiment in, precalculated position corresponding with the sub-pictures for institute
Position of the area of absence corresponding to sub-pictures in the identifying code background picture is stated, the storage unit 523 is additionally operable to generate
First mapping table, first mapping table include:The numbering of the sub-pictures, the predetermined anglec of rotation and vacancy area
Corresponding relation between the sequence number in domain.
In the embodiment, the picture issues module 53 by under selected identifying code background picture and sub-pictures
The numbering of the sub-pictures is also handed down to the user terminal 100, the user terminal when issuing the user terminal 100
100 splicing results returned include the numbering of the sub-pictures, the sub-pictures are actual is spliced in the identifying code Background
The sequence number of area of absence in piece and the angle that the sub-pictures are rotated in splicing.
Figure 16 is referred to, in the embodiment, the authentication module 54 can include:
First searching unit 541a, for the numbering according to the sub-pictures, first mapping table is searched, according to
First mapping table obtains the sequence of the predetermined anglec of rotation and area of absence corresponding with the numbering of the sub-pictures
Number;
First judging unit 542a, when the sequence of area of absence corresponding with the numbering of each sub-pictures in the splicing result
Number and the angle that is rotated and the sequence number of area of absence found in first mapping table and the predetermined anglec of rotation
When spending consistent, judge that the sub-pictures are spliced in the area of absence according to precalculated position and the predetermined anglec of rotation,
Otherwise, it is determined that the sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
In another embodiment of the present invention, precalculated position is corresponding with the sub-pictures corresponding to the sub-pictures
Position of the area of absence in the identifying code background picture between error within a predetermined range, the storage unit 523
It is additionally operable to generate the second mapping table, second mapping table includes:The precalculated position of the sub-pictures, predetermined rotation
Corresponding relation between angle and the sequence number of area of absence.
In the embodiment, the picture issues module 53 by under selected identifying code background picture and sub-pictures
The user terminal 100 also is handed down in the precalculated position of the sub-pictures when issuing the user terminal 100, the user is whole
The precalculated positions for the splicing results including the sub-pictures that end 100 returns, the sub-pictures are actual is spliced in the identifying code
The sequence number of area of absence in background picture and the angle that the sub-pictures are rotated in splicing;
Figure 17 is referred to, the authentication module 54 can include:
Second searching unit 541b, for the precalculated position according to the sub-pictures, second mapping table is searched,
The predetermined anglec of rotation and vacancy corresponding with the precalculated position of the sub-pictures are obtained according to second mapping table
The sequence number in region;
Second judging unit 542b, when area of absence corresponding with the precalculated position of each sub-pictures in the splicing result
Sequence number and the angle that is rotated and the sequence number of area of absence found in second mapping table and predetermined rotation
When gyration is consistent, judge that the sub-pictures are spliced in the vacancy area according to precalculated position and the predetermined anglec of rotation
Domain, otherwise, it is determined that the sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
Further, the picture issues module 53 and can be also used for issuing verification tip information to the user terminal,
To prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
The picture issue module 53 be additionally operable to selected identifying code background picture and sub-pictures being handed down to it is described
Precalculated position during user terminal also by the numbering of the sub-pictures or the sub-pictures in the identifying code background picture
It is handed down to the user terminal.
Each module can be that now, above-mentioned each module can be stored in depositing for server 200 by software code realization above
In reservoir 201.Each module can equally be realized by hardware such as IC chip above.
It should be noted that the function of each functional module of the server of the embodiment of the present invention can be implemented according to the above method
Method specific implementation in example, its specific implementation process are referred to the associated description of above method embodiment, will not be described here.
It should be noted that the module in above-described embodiment can run on a total server can also run on it is more
Individual server, as shown in figure 5, the setting of the quantity and function of server can be according to specific implement scene and implementation bar
Part is changed, and such change has no effect on protection scope of the present invention.
In the embodiment of the present invention, the particular content of identifying code background picture need not have very strong classification identification, can
Directly to be obtained by server from internet, resource is very abundant, it is not necessary to is manually classified, can reduce cost, separately
It can also increase outside and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital
Advantage, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures
Put, due to incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture
All there is very big difficulty in understanding these two aspects, therefore considerably increase the difficulty that machine cracks identifying code, safe;Relatively
In clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence is for user's choosing
Select, reduce user uses threshold.That is the present invention can greatly improve on the premise of Consumer's Experience is not influenceed tests
The anti-breaking force of code is demonstrate,proved, effectively raises the security of user's checking;Before being cut to picture, by increasing in picture
Feature is added to strengthen element, thus it is possible to vary continuously there is the discrimination in the region of the view data of similar features originally, make user more
Area of absence corresponding to sub-pictures and the mode put easily are distinguished, so as to improve success of the user by checking
Rate, in addition, the randomness of feature enhancing element can also increase the difficulty that automatic machine cracks in addition.
Sixth embodiment
Figure 18 is a kind of structural representation for authentication means that sixth embodiment of the invention provides.It refer to Figure 18,
The device that the present embodiment proposes can run on user terminal, can be used for the auth method for realizing that above-described embodiment proposes,
Including:Described device 60 can include:
Request sending module 61, request is pulled for sending identifying code to server;
Picture presentation module 62, the identifying code background picture and subgraph issued for receiving and showing the server
Piece, the identifying code background picture include area of absence corresponding with the sub-pictures;
Picture concatenation module 63, for the instruction according to the user by the sub-pictures and the identifying code background picture
Spliced and obtain the splicing picture of the identifying code background picture and the sub-pictures, the instruction of the user includes institute
State angle and the path of sub-pictures movement or the target location of movement of sub-pictures rotation;And
As a result sending module 64, for obtaining splicing result according to the splicing picture, and the splicing result is sent
To the server so that the server according to the splicing result judge the sub-pictures whether by according to precalculated position with
And the splicing of the predetermined anglec of rotation is in the area of absence of the identifying code background picture, if it is, the result be by, otherwise,
The result is not pass through.
Wherein, the instruction of the user can be inputted including the user by mouse, gesture input, phonetic entry or
Character string input mode inputs to the instruction of the user terminal.
Further, the picture concatenation module 63 can include response unit 631, be used for:In response to the user couple
The drag operation of the sub-pictures splices the sub-pictures in the identifying code background picture;Or in response to the user
Dragging and rotation process to the sub-pictures, by sub-pictures splicing in the identifying code background picture.
Each module can be that now, above-mentioned each module can be stored in user terminal 100 by software code realization above
In memory 102.Each module can equally be realized by hardware such as IC chip above.
It should be noted that the function of each functional module of the server of the embodiment of the present invention can be implemented according to the above method
Method specific implementation in example, its specific implementation process are referred to the associated description of above method embodiment, will not be described here.
In the present embodiment, the particular content of identifying code background picture need not have very strong classification identification, Ke Yiyou
Server directly obtains from internet, and resource is very abundant, it is not necessary to is manually classified, can reduce cost, in addition
It can increase and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital excellent
Gesture, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures
Put, due to recognizing for incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture
Know these two aspects and very big difficulty all be present, therefore considerably increase the difficulty that machine cracks identifying code, it is safe;Relative to
Clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence selects for user,
Reduce user uses threshold.That is the present invention can greatly improve identifying code on the premise of Consumer's Experience is not influenceed
Anti-breaking force, effectively raise the security of user's checking.
7th embodiment
Figure 19 is the structured flowchart of the authentication system in the embodiment of the present invention.Figure 19 is refer to, the present embodiment proposes
Authentication system 70 can be used for realizing the auth method that above-described embodiment proposes, the authentication in the present embodiment
System 70 can include:User terminal 71 and server 72.
User terminal 71 can be used for pulling request to the transmission identifying code of server 72;Receive and show the server 72
The identifying code background picture and sub-pictures issued, the identifying code background picture include vacancy area corresponding with the sub-pictures
Domain;The sub-pictures and the identifying code background picture are spliced according to the instruction of the user, the instruction of the user
Include angle and the path of sub-pictures movement or the target location of movement of the sub-pictures rotation;And it will test
The splicing result of card code background picture and sub-pictures is sent to the server and verified, when the sub-pictures are according to pre-determined bit
Put and the splicing of the predetermined anglec of rotation is in the area of absence, the result is to pass through.
The identifying code that server 72 can be used for receiving the transmission of user terminal 71 pulls request;Randomly select picture database
In picture, in the picture add feature enhancing element with formed feature enhancing picture, by the feature strengthen picture in
An at least sub-pictures are cut out, the feature enhancing picture after being cut forms identifying code background picture, the identifying code
The region being cut in background picture forms area of absence corresponding with an at least sub-pictures;By selected identifying code
Background picture and sub-pictures are handed down to the user terminal 71, so that the user terminal 71 is by the identifying code background picture
And sub-pictures show user;And receive that the user terminal returns, spliced according to the instruction of the user
The splicing result of identifying code background picture and sub-pictures, according to the splicing result, judge the sub-pictures whether by according to pre-
Positioning put and the predetermined anglec of rotation splicing the identifying code background picture area of absence, if it is, the result is logical
Cross, otherwise, the result is not pass through.
Wherein, the user terminal 71 can be to run the user terminal for having sixth embodiment shown device, the service
Device 72 can be the server that operation has the 5th embodiment shown device, and its concrete function and realization can be found in above-described embodiment,
Here repeat no more.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined
See the part explanation of embodiment of the method.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment
To complete, by program the hardware of correlation can also be instructed to complete, the program being somebody's turn to do can be stored in a kind of computer-readable deposit
In storage media, storage medium mentioned above can be read-only storage, disk or CD etc..
The above described is only a preferred embodiment of the present invention, any formal limitation not is made to the present invention, though
So the present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any to be familiar with this professional technology people
Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification
For the equivalent embodiment of equivalent variations, as long as being the technical spirit pair according to the present invention without departing from technical solution of the present invention content
Any simple modification, equivalent change and modification that above example is made, in the range of still falling within technical solution of the present invention.
Claims (16)
1. a kind of auth method, it is characterised in that methods described includes:
Server receives the identifying code that user terminal is sent and pulls request;
The picture in picture database is randomly selected, continuously the region of the view data with similar characteristic adds in the picture
Add feature enhancing element to form feature enhancing picture, strengthened by the feature in picture and cut out an at least sub-pictures, quilt
Feature enhancing picture after cutting forms identifying code background picture, the region shape being cut in the identifying code background picture
Into area of absence corresponding with an at least sub-pictures;
The identifying code background picture and corresponding sub-pictures are handed down to the user terminal, so that the user terminal will
The identifying code background picture and sub-pictures show user;And
Receive the identifying code background picture that the user terminal returns, being spliced according to the instruction of the user and institute
The splicing result of sub-pictures is stated, according to the splicing result, judges the sub-pictures whether by according to precalculated position and predetermined
The anglec of rotation splices the area of absence in the identifying code background picture, if it is, the result is by the way that otherwise, checking is tied
Fruit is not pass through.
2. the method as described in claim 1, it is characterised in that described by the identifying code background picture and corresponding subgraph
Before piece is handed down to the step of user terminal, in addition to:
The sub-pictures cut out are carried out to the rotation of random angles, it is corresponding with the sub-pictures according to the angle calculation rotated
The predetermined anglec of rotation;
Preserve the identifying code background picture, postrotational sub-pictures, the predetermined anglec of rotation corresponding with the sub-pictures and
Precalculated position corresponding with the sub-pictures, wherein, with the sub-pictures corresponding to precalculated position be with the sub-pictures it is corresponding
Position of the area of absence in the identifying code background picture, or area of absence corresponding with the sub-pictures tests described
The error between position in card code background picture is within a predetermined range.
3. the method as described in claim 1, it is characterised in that it is described to be formed that feature enhancing element is added in the picture
The step of feature enhancing picture, also includes:
Feature enhancing element is plotted in the picture at random to form the feature enhancing picture.
4. the method as described in claim 1, it is characterised in that it is described to be formed that feature enhancing element is added in the picture
The step of feature enhancing picture, also includes:
The picture synthesis for having feature enhancing element will be drawn in the picture to form the feature enhancing picture.
5. the method as described in claim 3 or 4, it is characterised in that the feature enhancing element includes one or more lines.
6. the method as any one of Claims 1-4, it is characterised in that multiple sub-pictures, institute are cut by the picture
Stating multiple sub-pictures has formed objects and shape.
7. method as claimed in claim 2, it is characterised in that:Precalculated position corresponding with the sub-pictures is and the subgraph
Position of the area of absence corresponding to piece in the identifying code background picture, it is described to preserve the identifying code background picture, rotation
Sub-pictures, the predetermined anglec of rotation corresponding with the sub-pictures and the step in precalculated position corresponding with the sub-pictures afterwards
Suddenly, in addition to:Mapping table is generated, the mapping table includes:The numbering of the sub-pictures, the predetermined anglec of rotation and
Corresponding relation between the sequence number of area of absence;
When selected identifying code background picture and sub-pictures are handed down to the user terminal by the server also by described in
The numbering of sub-pictures is handed down to the user terminal, and the splicing result that the user terminal returns includes the volume of the sub-pictures
Number, the sequence number of the actual area of absence being spliced in the identifying code background picture of the sub-pictures and described in splicing
The angle that sub-pictures are rotated;
It is described according to the splicing result, judge the sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation
The area of absence of the identifying code background picture the step of, including:
According to the numbering of the sub-pictures, the mapping table is searched, is obtained and the subgraph according to the mapping table
The sequence number for numbering the corresponding predetermined anglec of rotation and area of absence of piece;
When the sequence number of area of absence corresponding with the numbering of each sub-pictures in the splicing result and the angle rotated with
When the sequence number of the area of absence found in the mapping table and the consistent predetermined anglec of rotation, the sub-pictures are judged
By according to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence, otherwise, it is determined that the sub-pictures not by
According to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence.
8. method as claimed in claim 2, it is characterised in that:Precalculated position corresponding with the sub-pictures and the sub-pictures
Error between position of the corresponding area of absence in the identifying code background picture within a predetermined range, described in the preservation
Identifying code background picture, postrotational sub-pictures, the predetermined anglec of rotation corresponding with the sub-pictures and with the sub-pictures
The step of corresponding precalculated position, in addition to:Mapping table is generated, the mapping table includes:The sub-pictures it is pre-
Positioning is put, the corresponding relation between the sequence number of the predetermined anglec of rotation and area of absence;
When selected identifying code background picture and sub-pictures are handed down to the user terminal by the server also by described in
The user terminal is handed down in the precalculated position of sub-pictures, and the splicing result that the user terminal returns includes the sub-pictures
Precalculated position, the actual area of absence being spliced in the identifying code background picture of the sub-pictures sequence number and splicing
The angle that Shi Suoshu sub-pictures are rotated;
It is described according to the splicing result, judge the sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation
The area of absence of the identifying code background picture the step of, including:
According to the precalculated position of the sub-pictures, search the mapping table, according to the mapping table obtain with it is described
The sequence number of the precalculated positions of the sub-pictures corresponding predetermined anglec of rotation and area of absence;
When the sequence number of area of absence corresponding with the precalculated position of each sub-pictures in the splicing result and the angle rotated
When degree is with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table, the son is judged
Picture is spliced in the area of absence according to precalculated position and the predetermined anglec of rotation, otherwise, it is determined that the sub-pictures do not have
Have and spliced according to precalculated position and the predetermined anglec of rotation in the area of absence.
9. a kind of authentication means, run on server, it is characterised in that described device includes:
Request receiving module, the identifying code for receiving user terminal transmission pull request;
Identifying code generation module, for randomly selecting the picture in picture database, continuously there is similar spy in the picture
Property view data region addition feature enhancing element with formed feature enhancing picture, by the feature strengthen picture in cut
Go out an at least sub-pictures, the feature enhancing picture after being cut forms identifying code background picture, the identifying code background
The region being cut in picture forms area of absence corresponding with an at least sub-pictures;
Picture issues module, for the identifying code background picture and corresponding sub-pictures to be handed down into the user terminal,
So that the identifying code background picture and sub-pictures are showed user by the user terminal;And
Authentication module, for receive it is that the user terminal returns, according to splicing the instruction of the user
The splicing result of identifying code background picture and the sub-pictures, according to the splicing result, judge the sub-pictures whether by by
Splice the area of absence in the identifying code background picture according to precalculated position and the predetermined anglec of rotation, if it is, the result
For by the way that otherwise, the result is not pass through.
10. device as claimed in claim 9, it is characterised in that the identifying code generation module includes:
Feature enhancement unit, for randomly selecting the picture in picture database, feature enhancing element is added in the picture
To form feature enhancing picture, strengthened by the feature in picture and cut out an at least sub-pictures;
Computing unit, for the sub-pictures cut out to be carried out to the rotation of random angles, according to the angle calculation and institute rotated
State the predetermined anglec of rotation corresponding to sub-pictures;
Storage unit, for preserving the identifying code background picture, postrotational sub-pictures, corresponding with the sub-pictures predetermined
The anglec of rotation and precalculated position corresponding with the sub-pictures, wherein, precalculated position corresponding with the sub-pictures for institute
State position of the area of absence corresponding to sub-pictures in the identifying code background picture, or vacancy corresponding with the sub-pictures
Error between position of the region in the identifying code background picture is within a predetermined range.
11. device as claimed in claim 9, it is characterised in that the identifying code generation module is additionally operable to feature strengthening member
Element is plotted in the picture to form the feature enhancing picture at random.
12. device as claimed in claim 9, it is characterised in that the identifying code generation module is additionally operable to drafting having feature
The picture of enhancing element is synthesized in the picture to form the feature enhancing picture.
13. the device as described in claim 11 or 12, it is characterised in that the feature enhancing element includes one or more lines
Bar.
14. the device as described in any one of claim 9 to 12, it is characterised in that the identifying code generation module is by the figure
Piece cuts multiple sub-pictures, and multiple described sub-pictures have formed objects and shape.
15. device as claimed in claim 10, it is characterised in that precalculated position corresponding with the sub-pictures is and the son
Position of the area of absence corresponding to picture in the identifying code background picture, the storage unit are additionally operable to generate corresponding relation
Table, the mapping table include:Pair between the sequence number of the numbering of the sub-pictures, the predetermined anglec of rotation and area of absence
It should be related to;
The picture is issued when selected identifying code background picture and sub-pictures are handed down to the user terminal by module and gone back
The numbering of the sub-pictures is handed down to the user terminal, the splicing result that the user terminal returns includes the sub-pictures
Number, the sequence number of the actual area of absence being spliced in the identifying code background picture of the sub-pictures and splicing when
The angle that the sub-pictures are rotated;
The authentication module includes:
Searching unit, for the numbering according to the sub-pictures, the mapping table is searched, is obtained according to the mapping table
Take the sequence number of the predetermined anglec of rotation and area of absence corresponding with the numbering of the sub-pictures;
Judging unit, when the sequence number of area of absence corresponding with the numbering of each sub-pictures in the splicing result and rotated
Angle with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table when, judge institute
State sub-pictures by according to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence, otherwise, it is determined that the subgraph
Piece is not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
16. device as claimed in claim 10, it is characterised in that precalculated position corresponding to the sub-pictures and the sub-pictures
Error between position of the corresponding area of absence in the identifying code background picture within a predetermined range, the storage unit
It is additionally operable to generate mapping table, the mapping table includes:The precalculated position of the sub-pictures, the predetermined anglec of rotation and
Corresponding relation between the sequence number of area of absence;
The picture is issued when selected identifying code background picture and sub-pictures are handed down to the user terminal by module and gone back
The user terminal is handed down in the precalculated position of the sub-pictures, the splicing result that the user terminal returns includes the son
The precalculated position of picture, the actual area of absence being spliced in the identifying code background picture of the sub-pictures sequence number and
The angle that the sub-pictures are rotated in splicing;
The authentication module includes:
Searching unit, for the precalculated position according to the sub-pictures, the mapping table is searched, according to the corresponding relation
Table obtains the sequence number of the predetermined anglec of rotation and area of absence corresponding with the precalculated position of the sub-pictures;
Judging unit, when the sequence number of area of absence corresponding with the precalculated position of each sub-pictures in the splicing result and by
When the angle of rotation is with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table, sentence
The fixed sub-pictures by according to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence, otherwise, it is determined that described
Sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410230588.XA CN105187206B (en) | 2014-05-28 | 2014-05-28 | Auth method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410230588.XA CN105187206B (en) | 2014-05-28 | 2014-05-28 | Auth method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105187206A CN105187206A (en) | 2015-12-23 |
CN105187206B true CN105187206B (en) | 2018-02-27 |
Family
ID=54909061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410230588.XA Active CN105187206B (en) | 2014-05-28 | 2014-05-28 | Auth method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105187206B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454049A (en) * | 2016-06-01 | 2017-12-08 | 腾讯科技(深圳)有限公司 | Safe verification method and relevant apparatus |
CN107066189A (en) * | 2017-05-15 | 2017-08-18 | 惠州Tcl移动通信有限公司 | A kind of jigsaw unlocking method and system based on mobile terminal |
CN107369016B (en) * | 2017-06-14 | 2021-02-02 | 维沃移动通信有限公司 | Payment method and device |
CN107577934A (en) * | 2017-10-15 | 2018-01-12 | 杨礼帆 | A kind of method and apparatus for realizing man-machine checking |
CN108154019A (en) * | 2017-11-30 | 2018-06-12 | 天脉聚源(北京)科技有限公司 | A kind of method and device of image authentication |
CN108828599B (en) * | 2018-04-06 | 2021-11-16 | 东莞市华睿电子科技有限公司 | Disaster-stricken person searching method based on rescue unmanned aerial vehicle |
CN108846274B (en) * | 2018-04-09 | 2020-08-18 | 腾讯科技(深圳)有限公司 | Security verification method, device and terminal |
CN108920932A (en) * | 2018-07-16 | 2018-11-30 | 佛山市影腾科技有限公司 | A kind of verification code generation method, device and server |
CN109800559B (en) * | 2019-01-02 | 2024-01-16 | 平安科技(深圳)有限公司 | Method and device for generating slider verification code, computer equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103069455A (en) * | 2010-07-30 | 2013-04-24 | 皇家飞利浦电子股份有限公司 | Organ-specific enhancement filter for robust segmentation of medical images |
CN103312512A (en) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | Image verification code generating method, image verification code generating device, identity verification method and identity verification device |
-
2014
- 2014-05-28 CN CN201410230588.XA patent/CN105187206B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103069455A (en) * | 2010-07-30 | 2013-04-24 | 皇家飞利浦电子股份有限公司 | Organ-specific enhancement filter for robust segmentation of medical images |
CN103312512A (en) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | Image verification code generating method, image verification code generating device, identity verification method and identity verification device |
Also Published As
Publication number | Publication date |
---|---|
CN105187206A (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105187206B (en) | Auth method and device | |
CN104702406B (en) | Auth method and device | |
CN104243517B (en) | Content share method and device between different terminals | |
CN104660549B (en) | Auth method and device | |
US11025665B2 (en) | Detection and identification of targeted attacks on a computing system | |
CN105306208A (en) | Identity verification method and identity verification device | |
CN104601641B (en) | Application link sharing method, apparatus and system | |
CN105323066B (en) | Identity verification method and device | |
CN104917612B (en) | Auth method and device | |
CN105323218A (en) | Identity verifying method and device | |
US20130262687A1 (en) | Connecting a mobile device as a remote control | |
CN104363226B (en) | Method, device and system for logging in operating system | |
CN106131707A (en) | Barrage information processing method and processing means | |
CN104917724A (en) | Identity verification method and apparatus | |
CN109688147A (en) | Using login method, device, terminal, server, system and storage medium | |
CN104424241B (en) | Web site url processing method based on two dimensional code, apparatus and system | |
CN104104657A (en) | Information validation method, server, terminal and system | |
CN105306202B (en) | Auth method, device and server | |
CN106255102A (en) | The authentication method of a kind of terminal unit and relevant device | |
US20130014009A1 (en) | Electronic document preparing apparatus, electronic document preparing system comprising same and control method thereof and electronic document reading system and control method thereof | |
CN104811304B (en) | Identity verification method and device | |
CN108092947A (en) | A kind of method and device that identity discriminating is carried out to third-party application | |
CN105100005A (en) | Identity verification method and device | |
CN105373715A (en) | Wearable device based data access method and apparatus | |
CN105574115B (en) | The method and system of search result are directly displayed on searched page |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190729 Address after: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403 Co-patentee after: Tencent cloud computing (Beijing) limited liability company Patentee after: Tencent Technology (Shenzhen) Co., Ltd. Address before: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403 Patentee before: Tencent Technology (Shenzhen) Co., Ltd. |