CN105187206B - Auth method and device - Google Patents

Auth method and device Download PDF

Info

Publication number
CN105187206B
CN105187206B CN201410230588.XA CN201410230588A CN105187206B CN 105187206 B CN105187206 B CN 105187206B CN 201410230588 A CN201410230588 A CN 201410230588A CN 105187206 B CN105187206 B CN 105187206B
Authority
CN
China
Prior art keywords
pictures
sub
picture
identifying code
absence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410230588.XA
Other languages
Chinese (zh)
Other versions
CN105187206A (en
Inventor
王玉叶
刘金星
张彦玲
孙淑芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410230588.XA priority Critical patent/CN105187206B/en
Publication of CN105187206A publication Critical patent/CN105187206A/en
Application granted granted Critical
Publication of CN105187206B publication Critical patent/CN105187206B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention proposes the auth method and device that a kind of cost is relatively low and anti-crack ability is strong, safe.This method includes:Server receives the identifying code that user terminal is sent and pulls request;Randomly select the picture in picture database, feature enhancing element is added in picture to form feature enhancing picture, strengthened by feature in picture and cut out an at least sub-pictures, feature enhancing picture after being cut forms identifying code background picture, and the region being cut in identifying code background picture forms area of absence corresponding with an at least sub-pictures;Identifying code background picture and corresponding sub-pictures are handed down to user terminal;And receive the splicing result of identifying code background picture and sub-pictures that user terminal returns, being spliced according to the instruction of user, according to splicing result, judge sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation identifying code background picture area of absence.

Description

Auth method and device
Technical field
The present invention relates to technical field of the computer network, more particularly to a kind of auth method and device.
Background technology
With becoming increasingly popular for computer and computer network, internet has been deep into people's work, studying and living Every field.The development of network also brings various challenges while providing convenient for people.Some can utilize robot Program is improper in large quantities to use Internet resources, such as mass-sending spam etc., is greatly lowered server efficiency.Also someone utilizes Program constantly sends service request response, and progress " saturation attack " makes the purpose of servers go down to reach.Even somebody tastes Examination the means such as cracks using sudden huge profits and carries out the behaviors such as malice decryption.To avoid above-mentioned malicious act, design is a set of to be allowed The automatic resolution information of computer is the instrument from reasonable user or the improper robot program used, is just seemed very heavy Will.
The use of image authentication code is present relatively more current mode, the main purpose of image authentication code is to differentiate network service User is program or the mankind.Image authentication code is the picture containing character string, and user inputs character string is required in checking Content.Character string is generally made up of upper and lower case letter and numeral, and part identifying code includes Chinese character or mathematical formulae, the length of character string Degree can be random or fixed.In order to avoid by machine automatic identification, it will usually the background of picture is improved, such as increased Add various textured patterns etc., so as to disturb machine automatic identification.
However, as shown in figure 1, the existing auth method based on identifying code picture is, it is necessary to which user is defeated in identifying code Enter and character shown in identifying code picture 2 is manually entered in frame 1, need to complete by keyboard due to being manually entered, therefore Determine that the character in identifying code picture must be easily understood.The content in identifying code picture is typically all using letter or number at present Word, selectable range is small, as long as collecting enough samples, carries out machine learning and training, can develop to break soon Solve the automatic machine program of identifying code., still can be by if context vault is not huge enough even if being the increase in the identifying code picture of background Automatic machine cracks.Therefore, the anti-crack ability of the entirety of identifying code picture is poor, and security is than relatively low.
In order to improve the anti-crack ability of identifying code, research staff, which develops, clicks identifying code, clicks identifying code and is using When would generally to user show include multiple pictures comprising natural forms and the prompt message related to these image contents, These pictures are selected according to prompt message by user, the identity of user verified according to the selection of user, by Very big difficulty all be present in the understanding to prompt message and the classification these two aspects to object in machine, therefore can be significantly Increase machine cracks the difficulty of identifying code.
But clicking identifying code when in use, picture resource requires very high, and needs artificial screening classification storage, into This is higher.
The content of the invention
The purpose of the embodiment of the present invention is, there is provided the identity that a kind of cost is relatively low and anti-crack ability is strong, safe Verification method and device.
In order to solve the above problems, the embodiment of the present invention provides a kind of auth method, and methods described includes:Server Receive the identifying code that user terminal is sent and pull request;The picture in picture database is randomly selected, is added in the picture Feature strengthens element to form feature enhancing picture, is strengthened by the feature in picture and cuts out an at least sub-pictures, is cut Feature enhancing picture after cutting forms identifying code background picture, and the region being cut in the identifying code background picture is formed Area of absence corresponding with an at least sub-pictures;The identifying code background picture and corresponding sub-pictures are handed down to The user terminal, so that the identifying code background picture and sub-pictures are showed user by the user terminal;And connect Receive the user terminal returns, the identifying code background picture being spliced according to the instruction of the user and the subgraph The splicing result of piece, according to the splicing result, judge the sub-pictures whether by according to precalculated position and the predetermined anglec of rotation Degree splices the area of absence in the identifying code background picture, if it is, the result is by the way that otherwise, the result is not Pass through.
Accordingly, the embodiment of the present invention also provides a kind of authentication means, and described device can run on server, institute Stating device can include:Request receiving module, the identifying code for receiving user terminal transmission pull request;Identifying code generates mould Block, for randomly selecting the picture in picture database, feature enhancing element is added in the picture to form feature enhancing Picture, strengthened by the feature in picture and cut out an at least sub-pictures, the feature enhancing picture after being cut is formed Identifying code background picture, the region being cut in the identifying code background picture form corresponding with an at least sub-pictures Area of absence;Picture issues module, for the identifying code background picture and corresponding sub-pictures to be handed down into the user Terminal, so that the identifying code background picture and sub-pictures are showed user by the user terminal;And authentication mould Block, for receiving the identifying code background picture that the user terminal returns, being spliced according to the instruction of the user With the splicing result of the sub-pictures, according to the splicing result, judge the sub-pictures whether by according to precalculated position and The predetermined anglec of rotation splices the area of absence in the identifying code background picture, if it is, the result is by otherwise, testing Card result is not pass through.
Relative to prior art, in the embodiment of the present invention, the particular content of identifying code background picture need not have very strong Classification identification, can directly be obtained by server from internet, resource is very abundant, it is not necessary to manually classified, Cost can be reduced, can also increase artificially collect picture as the difficulty for cracking exam pool in addition;The mankind are taken full advantage of to figure The innate advantage of piece content understanding, user is according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures Sub-pictures are correctly put, due to machine after the understanding to image content and sub-pictures are rotated with background picture Between the understanding these two aspects of incidence relation very big difficulty all be present, therefore considerably increase the difficulty that machine cracks identifying code Degree, it is safe;For identifying code is clicked, it is not necessary to which user carries out classification identification according to problem to picture, there is provided Area of absence selects for user, and reduce user uses threshold.That is the present invention is not influenceing the premise of Consumer's Experience The anti-breaking force of identifying code can be greatly improved down, effectively raise the security of user's checking;Cut to picture Before, strengthen element by increasing feature in picture, thus it is possible to vary continuously there is the region of the view data of similar features originally Discrimination, user is easier to distinguish area of absence corresponding to sub-pictures and the mode put, so as to improve User is by the success rate of checking, in addition, the randomness of feature enhancing element can also increase the difficulty that automatic machine cracks in addition.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow the above and other objects, features and advantages of the present invention can Become apparent, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, describe in detail as follows.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other Accompanying drawing.
Interactive interface schematic diagram when Fig. 1 is the existing progress authentication using identifying code picture.
Fig. 2 is a kind of applied environment figure of the embodiment of the present invention.
Fig. 3 is a kind of structured flowchart for the user terminal that can be applied to the embodiment of the present invention.
Fig. 4 is a kind of structured flowchart for the server that can be applied to the embodiment of the present invention.
Fig. 5 is another applied environment figure of the embodiment of the present invention.
Fig. 6 is a kind of flow chart for auth method that first embodiment of the invention provides.
Fig. 7 is the particular flow sheet of split flow in the middle part of first embodiment of the invention.
Fig. 8 is the example schematic of the identifying code background picture and corresponding sub-pictures that do not increase feature enhancing element.
Fig. 9 is the increase in the example schematic of the identifying code background picture after feature enhancing element and corresponding sub-pictures.
Figure 10 is a kind of flow chart for auth method that second embodiment of the invention provides.
Figure 11 is a kind of flow chart for auth method that third embodiment of the invention provides.
Figure 12 is a kind of flow chart for auth method that fourth embodiment of the invention provides.
Figure 13 is a kind of structural representation for authentication means that fifth embodiment of the invention provides.
Figure 14 is that the structure of identifying code generation module in a kind of authentication means that fifth embodiment of the invention provides is shown It is intended to.
Figure 15 is the structural representation of feature enhancement unit in a kind of authentication means that fifth embodiment of the invention provides Figure.
Figure 16 is a kind of structure of authentication module in a kind of authentication means that fifth embodiment of the invention provides Schematic diagram.
Figure 17 is another knot of authentication module in a kind of authentication means that fifth embodiment of the invention provides Structure schematic diagram.
Figure 18 is a kind of structural representation for authentication means that sixth embodiment of the invention provides.
Figure 19 is a kind of structural representation for authentication system that seventh embodiment of the invention provides.
Embodiment
Further to illustrate the present invention to reach the technological means and effect that predetermined goal of the invention is taken, below in conjunction with Accompanying drawing and preferred embodiment, to the embodiment according to auth method proposed by the present invention and authentication means, Method, step, structure, feature and its effect, describe in detail as follows.
For the present invention foregoing and other technology contents, feature and effect, in the following preferable reality coordinated with reference to schema Applying in the detailed description of example to clearly appear from.By the explanation of embodiment, when predetermined mesh can be reached to the present invention The technological means taken and effect be able to more deeply and it is specific understand, but institute's accompanying drawings are only to provide with reference to saying It is bright to be used, not it is used for being any limitation as the present invention.
Referring to Fig. 2, it show a kind of applied environment figure of auth method provided in an embodiment of the present invention.Such as Fig. 2 Shown, user terminal 100 and server 200 are in wirelessly or non-wirelessly network 300, by wirelessly or non-wirelessly network 300, User terminal 100 and server 200 are in communication with each other.
User terminal 100 can specifically include smart mobile phone, tablet personal computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio aspect 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect 4) player, pocket computer on knee, car-mounted terminal, wearable device etc..Browser can be installed in user terminal 100 Or the client of various applications (including system application and third-party application).
Fig. 3 shows a kind of structured flowchart for the user terminal that can be applied in the embodiment of the present invention.As shown in figure 3, with Family terminal 100 includes memory 102, storage control 104, one or more (one is only shown in figure) processors 106, peripheral hardware Interface 108, radio-frequency module 110, locating module 112, image capture module 114, audio-frequency module 116, Touch Screen 118 and press Key module 120.These components are mutually communicated by one or more communication bus/signal wire 122.
It is appreciated that structure shown in Fig. 3 is only to illustrate, user terminal 100 may also include it is more more than shown in Fig. 3 or Less component, or there is the configuration different from shown in Fig. 3.Each component shown in Fig. 3 can use hardware, software or its Combination is realized.
Memory 102 can be used for storage software program and module, such as the auth method in the embodiment of the present invention and Programmed instruction/module corresponding to device, processor 106 are stored in software program and module in memory 102 by operation, So as to perform various function application and data processing, such as auth method provided in an embodiment of the present invention.
Memory 102 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 102 can further comprise Relative to the remotely located memory of processor 106, these remote memories can pass through network connection to user terminal 100. The example of above-mentioned network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 106 and access of other possible components to memory 102 can be carried out under the control of storage control 104.
Various input/output devices are coupled to CPU and memory 102 by Peripheral Interface 108.The operation of processor 106 is deposited Various softwares in reservoir 102, instruction are to perform the various functions of user terminal 100 and carry out data processing.
In certain embodiments, Peripheral Interface 108, processor 106 and storage control 104 can be in one single chips Realize.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 110 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with Communication network or other equipment are communicated.Radio-frequency module 110 may include the various existing electricity for being used to perform these functions Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, Memory etc..Radio-frequency module 110 can be communicated or led to various networks such as internet, intranet, wireless network Wireless network is crossed to be communicated with other equipment.Above-mentioned wireless network may include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).Above-mentioned wireless network can use various communication standards, agreement and technology, and including but not limited to the whole world is mobile logical Letter system (Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code division Multiple access, W-CDMA), CDMA (Code division access, CDMA), TDMA (time division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE802.11b, IEEE802.11g and/or IEEE802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, IMU The agreement of news and short message, and any other suitable communications protocol, or even may include that those are not developed currently yet Agreement.
Locating module 112 is used for the current location for obtaining user terminal 100.The example of locating module 112 includes but unlimited In GPS (GPS), the location technology based on WLAN or mobile radio communication.
Image capture module 114 is used to shoot photo or video.The photo or video of shooting can be stored to storage In device 102, and it can be sent by radio-frequency module 110.
Audio-frequency module 116 provides a user COBBAIF, and it may include one or more microphones, one or more raises Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface 108, and voice data is converted into power information, Power information is transmitted to loudspeaker.Loudspeaker is converted to power information the sound wave that human ear can hear.Voicefrequency circuit is also from microphone Place receives power information, converts electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface 108 to enter traveling one The processing of step.Voice data can obtain at memory 102 or by radio-frequency module 110.In addition, voice data can also Store into memory 102 or be transmitted by radio-frequency module 110.In some instances, audio-frequency module 116 may also include One earphone broadcasts hole, for providing COBBAIF to earphone or other equipment.
Touch Screen 118 provides an output and inputting interface simultaneously between user terminal 100 and user.Specifically, Touch Screen 118 shows video frequency output to user, and the contents of these video frequency outputs may include word, figure, video and its any Combination.Some output results correspond to some user interface objects.Touch Screen 118 also receives the input of user, such as with The gesture operations such as the click at family, slip, so that input of the user interface object to these users responds.Detect user's input Technology can be based on resistance-type, condenser type or other any possible touch control detection technologies.Touch Screen 118 shows list The instantiation of member includes but is not limited to liquid crystal display or light emitting polymer displays.
Key-press module 120 equally provides user's interface inputted to user terminal 100, and user can be by pressing not Same button is so that user terminal 100 performs different functions.
Fig. 4 is a kind of structured flowchart for the server that can be applied in the embodiment of the present invention.As shown in figure 4, server 200 include:Memory 201, processor 202 and mixed-media network modules mixed-media 203.It is appreciated that the structure shown in Fig. 4 is only to illustrate, its The structure of server in the embodiment of the present invention is not caused to limit.For example, the server in the embodiment of the present invention can also wrap Include more either less components than shown in Fig. 4 or there is the configuration different from shown in Fig. 4.Memory 201 can be used for depositing Store up software program and module, programmed instruction/module as corresponding to auth method and device in the embodiment of the present invention, place Reason device 202 is stored in software program and module in memory 201 by operation, so as to perform various function application and number According to processing, that is, realize the auth method in the embodiment of the present invention.Memory 201 may include high speed random access memory, may be used also Stored including nonvolatile memory, such as one or more magnetic storage device, flash memory or other nonvolatile solid states Device.In some instances, memory 201 can further comprise that these are long-range relative to the remotely located memory of processor 202 Memory can pass through network connection to server 200.
Mixed-media network modules mixed-media 203 is used to receiving and sending network signal.Above-mentioned network signal may include wireless signal or have Line signal.In an example, above-mentioned network signal is cable network signal.Now, mixed-media network modules mixed-media 203 may include processor, The elements such as random access memory, converter, crystal oscillator.
Above-mentioned software program and module also include operating system, such as can be LINUX, UNIX, WINDOWS, and it can Including the various component softwares for management system task (such as memory management, storage device control, power management etc.) and/or Driving, and can mutually be communicated with various hardware or component software, so as to provide the running environment of other software component.
In addition, the server in the embodiment of the present invention can also include the server of multiple specific difference in functionalitys, shown in Fig. 5 For another application environment schematic diagram of the embodiment of the present invention, as shown in figure 5, the client in user terminal 100 (such as browses Device client, instant messaging application client, pay applications client etc.) web server 301, web can be accessed by url Server 301 returns to the identifying code background picture pulled from identifying code generation server 302 and sub-pictures are presented to user.Test Card server 303 can pull identifying code background picture from identifying code generation server 302 and sub-pictures are transmitted to web services Device 301, the splicing answer that authentication server 303 can also return to user terminal 100 verifies, so as to whether judge user Pass through checking.It is various to picture progress again that identifying code generation server 302 can choose picture from picture storage server 304 Processing forms identifying code background picture and corresponding sub-pictures and preserves the information of the corresponding relation between them and correlation, Then authentication server 303 is waited to pull.Picture storage server 304 can store the figure that magnanimity is used as identifying code background picture Piece resource.User terminal 100, web server 301, identifying code generation server 302, authentication server 303 and picture storage Server 304 is in wirelessly or non-wirelessly network, by the wirelessly or non-wirelessly network, user terminal 100 and each server phase Mutual communication.
It should be noted that the setting of the quantity and function of server can be according to specific implement scene and implementation Condition is changed, and such change has no effect on protection scope of the present invention.
Below in conjunction with accompanying drawing, detailed Jie is carried out to auth method provided in an embodiment of the present invention, device, system Continue.
First embodiment
Referring to Fig. 6, it show a kind of flow chart of auth method of first embodiment of the invention offer.With reference to figure 2, the present embodiment describes the handling process of server, and the auth method that the present embodiment provides comprises the following steps:
Step S11, server receive the identifying code that user terminal is sent and pull request.
When the browser in user terminal 100 or the client monitors of various applications carry out the needs such as initiation transaction to user Verify the sensitive operation of identity or log in that certain number of applications is excessive within certain period or strange land log in certain application or When logging in situations such as certain applied cryptography input error number is excessive and occurring, it is possible to determine that authentication request is triggered, and user is whole End 100 can send identifying code to server 200 and pull request.
It for example, user terminal 100 can be to the server 200 being pre-configured with, such as can be a web page address, send Identifying code pulls request, to obtain identifying code.Specifically, identifying code, which is pulled in request, can carry page iden-tity (check Code), page iden-tity is used to identify a unique page, such as can be a numeral, page mark during each refresh page Knowledge can all change, and pulling request with identifying code has corresponding relation.
Step S12, the picture in picture database is randomly selected, feature enhancing element is added in the picture to be formed Feature strengthens picture, is strengthened by the feature in picture and cuts out an at least sub-pictures, the feature enhancing after being cut Picture forms identifying code background picture, and the region being cut in the identifying code background picture is formed and an at least subgraph Area of absence corresponding to piece.
Server 200, can be from authentication code database after the identifying code for receiving the transmission of user terminal 100 pulls request In randomly select an identifying code background picture and sub-pictures corresponding with selected identifying code background picture.
Storage has identifying code background picture and sub-pictures in authentication code database.Each identifying code background picture have with One or more sub-pictures corresponding to it, there is area of absence corresponding with sub-pictures in each identifying code background picture, when Sub-pictures, in the area of absence of identifying code background picture, may be constructed one according to precalculated position and the splicing of the predetermined anglec of rotation Individual complete picture.
It refer to Fig. 7, the generating process of identifying code background picture and sub-pictures may comprise steps of:
Step S101, choose the picture in picture database.
Picture database can establish in advance, be stored in server 200.In the embodiment of the present invention, identifying code background The particular content of picture need not have very strong classification identification, can directly use the figure of the contents such as landscape, animal, building Piece.Picture in picture database can be by server 200 directly by being captured on internet, and interconnection internet resource is very abundant, Therefore, the picture number of picture database easily reaches certain scale, and picture is artificially collected as broken so as to increase The difficulty of exam pool is solved, prevents from manually cracking.
In addition, the picture in picture database can also be the advertising pictures by being obtained on advertising pictures publisher server, Thus, when user according to precalculated position and the predetermined anglec of rotation splices sub-pictures the area of absence in identifying code background picture When, it can be seen that a complete advertising pictures, so as to carry out the service such as product promotion using identifying code.
Step S102, feature enhancing element is added in the picture to form feature enhancing picture.
The position of the sub-pictures cut in the picture selected is random, therefore, when larger area in picture being present The continuous view data with similar features region (such as sky, ocean, meadow) when, sub-pictures very maximum probability can be by Cut out in the region, because the details difference in the region is very small, even without, therefore user is located at the region in splicing Sub-pictures when be difficult to judge how to rotate sub-pictures and just can correctly be spliced by naked eyes.As shown in figure 8, due to Fig. 8 In presence larger area sky, therefore the region discrimination of two sub-pictures cut out by sky areas is very low, and And the element around two sub-pictures is also all approximate, user is difficult that sub-pictures are moved into correct area of absence, let alone is revolved Turn correct angle.Before being cut to picture, increase feature enhancing element in picture, thus it is possible to vary continuously have originally The discrimination in the region of the view data of similar features, make user be easier to distinguish area of absence corresponding to sub-pictures and The mode put, so as to improve the success rate of checking.
In the embodiment of the present invention, feature enhancing element can include one or more lines, and lines can be with For straight line, sinusoidal line, circular arc line etc..Feature enhancing element can also be other simple patterns, such as triangle pattern, circle Pattern, feature enhancing element can also be various watermark recoveries.It is understood that the present invention embodiment not with The specific manifestation form of feature enhancing element is limited.
Feature enhancing element can be plotted in the picture to form the feature enhancing picture at random, can also be incited somebody to action The picture that only drawing has feature enhancing element is synthesized in the picture to form the feature enhancing picture.Closed relative to picture Into method, feature is strengthened into element random being plotted in the mode of feature enhancing picture is formed in the picture and realize speed more It hurry up, do not interfere with the speed of identifying code background picture and sub-pictures generation substantially, nor influence the quality of original picture, Too big change will not also occur for the data volume of picture.
Further, the addition that feature enhancing element can be random can also be added in any region of the picture Continuously there is the region of the view data of similar features in the picture.
Further, the size of feature enhancing element and color can also be random, so can further increase certainly The difficulty that motivation cracks.
Fig. 9 is refer to, Fig. 9 is that the original picture in Fig. 8 increases the schematic diagram after Random line, as shown in figure 9, by scheming Continuously the random lines of region (sky) addition of the view data with similar features increase the discrimination in the region in piece, make Progress can be determined how according to the tendency of the lines in the lines in sub-pictures and identifying code background picture correctly by obtaining user Splicing.
Further, picture can also be strengthened the feature and carries out interference processing, such as strengthen picture in the feature Middle addition noise, the processing such as edge blurry is carried out, the sub-pictures of some interference splicings can also be increased, it is anti-to further enhance it Crack ability.
Step S103, strengthened by the feature in picture and cut out an at least sub-pictures, the feature after being cut Enhancing picture forms the identifying code background picture, and the identifying code is by cutting out an at least sub-pictures, quilt in the picture The picture after cutting forms the identifying code background picture, and the region being cut in the identifying code background picture forms institute State area of absence.
When cutting out multiple sub-pictures by feature enhancing picture, multiple described sub-pictures preferably have identical big Small and shape, it can so prevent machine from being cracked according to the size and shape of sub-pictures.
Cut picture can since the optional position that feature strengthens picture, the shape of cutting can include it is circular, square, Polygon etc. has the shape of multiple symmetry axis, does not allow so by machine or manually maliciously to crack.
Step S104, the sub-pictures cut out are carried out to the rotation of random angles, according to the angle calculation and institute rotated State the predetermined anglec of rotation corresponding to sub-pictures.
The rotation of the sub-pictures cut out progress random angles can further be increased and crack difficulty.With existing calculating Machine development level, it is relatively difficult directly to recognize the target location of picture and angle, cracks difficulty and optional area of absence Number a it is related to the anglec of rotation b of sub-pictures, crack difficulty=1/ (a!*ba).Due to the position of cutting picture and angle all It is random, wants the position by artificially collecting identifying code background picture and sub-pictures and angle is used as that to crack exam pool be very Difficult, therefore there is very strong anti-crack ability.
The angle rotated according to sub-pictures can calculate the predetermined anglec of rotation corresponding with sub-pictures.Assuming that sub-pictures For circular picture, be rotated by 50 degree, only when its by opposite direction rotate 50 degree or rotate 310 degree again just can be by sub-pictures Correctly splicing is in identifying code background picture.That is, it is assumed that certain sub-pictures is rotated by x degree in generation, and it is predetermined The anglec of rotation can be that (- x ± n*360) degree or (360-x ± n*360) spend, wherein, n is natural number.
Step S105, preserve the identifying code background picture, postrotational sub-pictures, corresponding with the sub-pictures predetermined The anglec of rotation and precalculated position corresponding with the sub-pictures.
Wherein, precalculated position corresponding with the sub-pictures is area of absence corresponding with the sub-pictures in the checking Position in code background picture, or position of the area of absence corresponding with the sub-pictures in the identifying code background picture Between error within a predetermined range.Precalculated position corresponding with the sub-pictures, that is, the sub-pictures are in the identifying code Precalculated position in background picture, that is to say, that can be with precalculated position of the sub-pictures in the identifying code background picture Position consistency of the area of absence corresponding with the sub-pictures in the identifying code background picture or with the sub-pictures pair The position of error within a predetermined range between position of the area of absence answered in the identifying code background picture.
It should be noted that above-mentioned identifying code background picture and sub-pictures can be before step S11 the step of generation Perform, repeat step S101 to step S103 can generate some identifying code background pictures and corresponding sub-pictures.Above-mentioned step Suddenly can also be performed between step S11 and step S12, that is to say, that can be regenerated after receiving identifying code and pulling request Corresponding identifying code background picture and sub-pictures, embodiment of the invention are not limited thereto.
Step S13, the identifying code background picture and corresponding sub-pictures are handed down to the user terminal, so that institute State user terminal and the identifying code background picture and sub-pictures are showed into user.
Further, verification tip information can also be handed down to the user terminal 100 by the server 200, to Prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.Certainly, the prompting Information can also be generated and shown by user terminal 100, and embodiment of the invention is not limited thereto.
Step S14, receive identifying code background that the user terminal returns, being spliced according to the instruction of the user The splicing result of picture and sub-pictures, according to the splicing result, judge the sub-pictures whether by according to precalculated position and The predetermined anglec of rotation splices the area of absence in the identifying code background picture, if it is, the result is by otherwise, testing Card result is not pass through.
If sub-pictures corresponding to the identifying code background picture issued only have one, the splicing result includes the son The actual position being spliced in the identifying code background picture of picture and the angle that each sub-pictures are rotated in splicing, Server 200 by compare be stored in the predetermined anglec of rotation corresponding with the sub-pictures in server 200 and with every height Precalculated position corresponding to picture, confirms whether the sub-pictures are tested according to precalculated position and the splicing of the predetermined anglec of rotation described Demonstrate,prove the area of absence of code background picture.It is spliced if the sub-pictures of the return of user terminal 100 are actual in identifying code Background Position in piece is identical with precalculated position corresponding to the sub-pictures, and the sub-pictures angle that is rotated and the son in splicing The predetermined anglec of rotation is identical corresponding to picture, then can be determined that the sub-pictures by according to precalculated position and the spelling of the predetermined anglec of rotation The area of absence of the identifying code background picture is connected on, is verified, otherwise, checking does not pass through.
If the number of sub-pictures corresponding to the identifying code background picture issued is multiple, the splicing result is included often The individual sub-pictures actual position being spliced in the identifying code background picture and each sub-pictures are rotated in splicing Angle, server 200 by compare be stored in the predetermined anglec of rotation corresponding with each sub-pictures in server 200 and with Precalculated position corresponding to each sub-pictures, confirm each sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation In the area of absence of the identifying code background picture, if actual be spliced of each sub-pictures that user terminal 100 returns is being tested The position demonstrate,proved in code background picture is identical with corresponding precalculated position, and the angle that each sub-pictures are rotated in splicing Degree it is identical with the corresponding predetermined anglec of rotation, then can be determined that the plurality of sub-pictures by according to precalculated position and make a reservation for The anglec of rotation splices the area of absence in the identifying code background picture, is verified, and otherwise, checking does not pass through.
Further, the result can also be returned to user terminal 100 and show user by server 200.
In the embodiment of the present invention, the particular content of identifying code background picture need not have very strong classification identification, can Directly to be obtained by server from internet, resource is very abundant, it is not necessary to is manually classified, can reduce cost, separately It can also increase outside and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital Advantage, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures Put, due to incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture All there is very big difficulty in understanding these two aspects, therefore considerably increase the difficulty that machine cracks identifying code, safe;Relatively In clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence is for user's choosing Select, reduce user uses threshold.That is the present invention can greatly improve on the premise of Consumer's Experience is not influenceed tests The anti-breaking force of code is demonstrate,proved, effectively raises the security of user's checking;Before being cut to picture, by increasing in picture Feature is added to strengthen element, thus it is possible to vary continuously there is the discrimination in the region of the view data of similar features originally, make user more Area of absence corresponding to sub-pictures and the mode put easily are distinguished, so as to improve success of the user by checking Rate, in addition, the randomness of feature enhancing element can also increase the difficulty that automatic machine cracks in addition.
Second embodiment
Referring to Fig. 10, it show a kind of flow chart of auth method of second embodiment of the invention offer.With reference to Fig. 2, the present embodiment describe the handling process of user terminal, and auth method can include following step in the present embodiment Suddenly:
Step S21, user terminal send identifying code to server and pull request.
Step S22, receive and show identifying code background picture and sub-pictures that the server issues, the identifying code Background picture includes area of absence corresponding with the sub-pictures.
The user terminal can also receive and show the verification tip information that the server issues, to prompt user By sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
Step S23, the sub-pictures and the identifying code background picture are spliced simultaneously according to the instruction of the user The splicing picture of the identifying code background picture and the sub-pictures is obtained, the instruction of the user includes the sub-pictures rotation The target location in the path or movement of the angle turned and sub-pictures movement.
The instruction of the user can be inputted including the user by mouse, gesture input, phonetic entry or character string The modes such as input input to the instruction of the user terminal.
By taking gesture input as an example, user terminal can in response to the user to the drag operation of the sub-pictures or In response to dragging of the user to the sub-pictures and rotation process, the sub-pictures are spliced in the identifying code background In picture.User terminal can obtain sub-pictures rotation during dragging and rotation process of the response user to sub-pictures The target location in the path or movement of angle and sub-pictures movement.
By taking phonetic entry as an example, user can be with the angle of phonetic entry picture rotation and the path of sub-pictures movement Or mobile target location, such as rotated ninety degrees clockwise, first area of absence etc. is moved to, user terminal receives Data signal, and the operation responded according to digital information to sub-pictures are transformed into after predicate sound signal.
User can also directly input the instruction such as " rotated ninety degrees clockwise, being moved to first area of absence ".
Step S24, splicing result is obtained according to the splicing picture, and the splicing result is sent to the service Device, so that whether the server judges the sub-pictures by according to precalculated position and predetermined rotation according to the splicing result Angle splices the area of absence in the identifying code background picture, if it is, the result is by the way that otherwise, the result is Do not pass through.
User terminal 100 is spliced in the identifying code Background according to the splicing picture acquisition sub-pictures are actual Position in piece and the angle that the sub-pictures are rotated in splicing.For example, user terminal 100 can be according to it The relative position relation of identifying code background picture and Touch Screen 118 obtain sub-pictures of the splicing in identifying code background picture With the relative position of Touch Screen 118, carried on the back so as to obtain sub-pictures of the splicing in identifying code background picture in the identifying code Position in scape picture.User terminal 100 can be according to the sub-pictures and touch-control being spliced in the identifying code background picture The relative angular relationship of sub-pictures shown by screen 118, obtain the angle that the sub-pictures are rotated in splicing.
User terminal 100 can also obtain actual be spliced of the sub-pictures according to the instruction of user and be carried on the back in the identifying code Position in scape picture and the angle that the sub-pictures are rotated in splicing.For example, the subgraph in the instruction of user The angle of piece rotation obtains the angle that sub-pictures are rotated, and the path moved according to the sub-pictures or the target location of movement are obtained Obtain the actual position being spliced in the identifying code background picture of sub-pictures.
In the embodiment of the present invention, the particular content of identifying code background picture need not have very strong classification identification, can Directly to be obtained by server from internet, resource is very abundant, it is not necessary to is manually classified, can reduce cost, separately It can also increase outside and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital Advantage, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures Put, due to incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture All there is very big difficulty in understanding these two aspects, therefore considerably increase the difficulty that machine cracks identifying code, safe;Relatively In clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence is for user's choosing Select, reduce user uses threshold.That is the present invention can greatly improve on the premise of Consumer's Experience is not influenceed tests The anti-breaking force of code is demonstrate,proved, effectively raises the security of user's checking.
3rd embodiment
Figure 11 is referred to, Figure 11 show a kind of flow chart of auth method of third embodiment of the invention offer. With reference to Fig. 2, the embodiment describes a kind of interaction process flow between user terminal and server.Body in the present embodiment Part verification method can include:
Step S301, server randomly select the picture in picture database, and feature enhancing member is added in the picture Element is described after being cut by cutting out an at least sub-pictures in feature enhancing picture to form feature enhancing picture Feature enhancing picture forms identifying code background picture, the region being cut in the identifying code background picture formed with it is described at least Area of absence corresponding to one sub-pictures, the identifying code background picture and sub-pictures of generation are stored in authentication code database, And generate the first mapping table, first mapping table include the numbering of the sub-pictures, the predetermined anglec of rotation and Corresponding relation in the identifying code background picture between the sequence number of area of absence, wherein, the position where area of absence is institute State the precalculated position of sub-pictures.
Specifically, the flow of server generation identifying code background picture and sub-pictures may be referred to first embodiment, this In repeat no more.
Step S302, user terminal send identifying code to server and pull request.
Step S303, server pull request according to the identifying code, are tested by randomly selecting one in authentication code database Card code background picture and sub-pictures corresponding with selected identifying code background picture, the identifying code background picture include Area of absence corresponding with the sub-pictures.
The identifying code background picture and corresponding sub-pictures are handed down to user's end by step S304, server End, so that the identifying code background picture and sub-pictures are showed user by the user terminal.
Step S305, user terminal receive and shown the identifying code background picture and sub-pictures that the server issues, And prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
Step S306, user terminal enter the sub-pictures and the identifying code background picture according to the instruction of the user Row, which splices, simultaneously obtains the splicing picture of the identifying code background picture and the sub-pictures, described in the instruction of the user includes The angle of sub-pictures rotation and the path of sub-pictures movement or the target location of movement.
Step S307, user terminal obtain splicing result according to the splicing picture, and the splicing result includes described The numbering of sub-pictures, the sequence number of the actual area of absence being spliced in the identifying code background picture of the sub-pictures and The angle that the sub-pictures are rotated during splicing.
The splicing result is sent to the server by step S308, user terminal.
Step S309, the numbering of sub-pictures of the server in the splicing result, search first corresponding relation Table, the predetermined anglec of rotation and vacancy corresponding with the numbering of the sub-pictures are obtained according to first mapping table Sequence number, when the sequence number of area of absence corresponding with the numbering of each sub-pictures in the splicing result and the angle rotated with When the sequence number of the area of absence found in the mapping table and the consistent predetermined anglec of rotation, the sub-pictures are judged By according to precalculated position and the splicing of the predetermined anglec of rotation, in the area of absence, the result is by otherwise, it is determined that institute Sub-pictures are stated not by, in the area of absence, the result is obstructed according to precalculated position and the splicing of the predetermined anglec of rotation Cross.
The result return user terminal is showed user by step S310, server.
In this embodiment, it is assumed that an identifying code background picture corresponds to multiple sub-pictures, and multiple sub-pictures are each right The numbering s=(s1, s2 ..., sn) answered, predetermined anglec of rotation a=(a1, a2 ..., an) corresponding to multiple sub-pictures, identifying code Serial number t1, the t2 of area of absence in background picture ... tn.Correct identifying code answer can be specify order (s, a) Combination, specified order refer to that sub-pictures correctly splice and are followed successively by t1, the order of t2 ..tn area of absence in sequence number.For example, Sub-pictures are s1, s2, s3, and the predetermined anglec of rotation corresponding to s4, s1 is a1, and the predetermined anglec of rotation corresponding to s2 is a2, and s3 is corresponding The predetermined anglec of rotation be a3, the predetermined anglec of rotation corresponding to s4 is a4, the sequence number of the area of absence in identifying code background picture For t1, t2, t3, t4.Assuming that according to correct answer, it is s2 to splice the sub-pictures in t1 positions, splices the subgraph in t2 positions Piece is s1, and the sub-pictures spliced in t3 positions are s4, and it is s3 to splice the sub-pictures in t4 positions, then correct corresponding relation is (s2, a2, t1), (s1, a1, t2), (s4, a4, t3), (s3, a3, t4), and these corresponding relations are stored in the first correspondence In relation table.If that is, user terminal 100 return splicing result include (s2, a2, t1), (s1, a1, t2), (s4, a4, t3), (s3, a3, t4) array, because these arrays are consistent with the first mapping table, server 200 can be determined that the result to pass through.
It should be noted that with having the part of same steps can be according to above-mentioned implementation in previous embodiment in the present embodiment Method specific implementation in example, its specific implementation process are referred to the associated description of above method embodiment, will not be described here.
Fourth embodiment
Figure 12 is referred to, a kind of flow chart of auth method of fourth embodiment of the invention offer is provided.With reference to Fig. 2, the embodiment describe the interaction process flow between user terminal and server.Authentication side in the present embodiment Method can include:
Step S401, server randomly select the picture in picture database, and feature enhancing member is added in the picture Element is described after being cut by cutting out an at least sub-pictures in feature enhancing picture to form feature enhancing picture Feature enhancing picture forms identifying code background picture, the region being cut in the identifying code background picture formed with it is described at least Area of absence corresponding to one sub-pictures, the identifying code background picture and sub-pictures of generation are stored in authentication code database, And the second mapping table is generated, second mapping table includes the precalculated position of the sub-pictures, the predetermined anglec of rotation And the corresponding relation in the identifying code background picture between the sequence number of area of absence, wherein, it is corresponding with the sub-pictures Error between position of the precalculated position area of absence corresponding with the sub-pictures in the identifying code background picture is pre- Determine in scope.
Specifically, the flow of server generation identifying code background picture and sub-pictures may be referred to first embodiment, this In repeat no more.
Step S402, user terminal send identifying code to server and pull request.
Step S403, server pull request according to the identifying code, are tested by randomly selecting one in authentication code database Card code background picture and sub-pictures corresponding with selected identifying code background picture, the identifying code background picture include Area of absence corresponding with the sub-pictures.
The identifying code background picture and corresponding sub-pictures are handed down to user's end by step S404, server End, so that the identifying code background picture and sub-pictures are showed user by the user terminal.
Step S405, user terminal receive and shown the identifying code background picture and sub-pictures that the server issues, And prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
Step S406, user terminal enter the sub-pictures and the identifying code background picture according to the instruction of the user Row, which splices, simultaneously obtains the splicing picture of the identifying code background picture and the sub-pictures, described in the instruction of the user includes The angle of sub-pictures rotation and the path of sub-pictures movement or the target location of movement.
Step S407, user terminal obtain splicing result according to the splicing picture, and the splicing result includes described The precalculated position of sub-pictures, the actual area of absence being spliced in the identifying code background picture of the sub-pictures sequence number with And the angle that the sub-pictures are rotated in splicing.
The splicing result is sent to the server by step S408, user terminal.
Step S409, the precalculated position of sub-pictures of the server in the splicing result, search first correspondence Relation table, according to second mapping table obtain the predetermined anglec of rotation corresponding with the precalculated position of the sub-pictures with And the sequence number of vacancy, when the sequence number of area of absence corresponding with the precalculated position of each sub-pictures in the splicing result and by When the angle of rotation is with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table, sentence The fixed sub-pictures are by according to precalculated position and the splicing of the predetermined anglec of rotation, in the area of absence, the result is logical Cross, otherwise, it is determined that the sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation, test Card result is not pass through.
The result return user terminal is showed user by step S410, server.
In this embodiment, precalculated position corresponding with sub-pictures area of absence institute corresponding with the sub-pictures Position between allow certain error, its error range for example can with but be not limited to 5%.With pre- corresponding to sub-pictures The numbering instead of sub-pictures is put in positioning, can improve the threshold cracked, because in an identifying code, the quantity of sub-pictures is that have Limit, that is, numbering be it is limited, still, the possibility of position of the sub-pictures in identifying code background picture be it is a lot, So that a resolution ratio is 400*500 picture as an example, if the error allowed is 5%, just there is 19W kinds possibility, therefore can be big Amplitude improves anti-crack ability.
In this embodiment, it is assumed that an identifying code background picture corresponds to multiple sub-pictures, corresponding with each sub-pictures Precalculated position p=((x1, y1), (x2, y2) ..., (xn, yn)), predetermined anglec of rotation a=corresponding to multiple sub-pictures (a1, A2 ..., an), serial number t1, t2 ... the tn of the area of absence in identifying code background picture, wherein, x, y can be each sub-pictures In coordinate of the specified point of some in identifying code background picture, such as can be sub-pictures Central Symmetry point identifying code carry on the back Coordinate in scape picture, etc..In such a embodiment, correct identifying code answer can be (p, t, a) array.For example, Precalculated position corresponding to sub-pictures is p1, p2, p3, and the predetermined anglec of rotation corresponding to p4, p1 is a1, the predetermined anglec of rotation corresponding to p2 Spend for a2, the predetermined anglec of rotation corresponding to p3 is a3, and the predetermined anglec of rotation corresponding to p4 is a4, the sky in identifying code background picture The serial number t1, t2, t3, t4 in missing plot domain.Assuming that according to correct answer, it is s2 to splice the sub-pictures in t1 positions, is spliced The sub-pictures of t2 positions are s1, and the sub-pictures spliced in t3 positions are s4, and it is s3 to splice the sub-pictures in t4 positions, then correctly Corresponding relation is (p2, t1, a2), (p1, t2, a1), (p4, t3, a4), (p3, t4, a3), and these arrays are stored in In second mapping table.If that is, user terminal 100 return splicing result include (p2, t1, a2), (p1, T2, a1), (p4, t3, a4), the array of (p3, t4, a3), therefore these arrays are consistent with the second mapping table, so Server 200 can be determined that the result to pass through.
It should be noted that other in the present embodiment are with having the part of same steps can be according to above-mentioned in previous embodiment Method specific implementation in embodiment, its specific implementation process are referred to the associated description of above method embodiment, herein not Repeat.
5th embodiment
Figure 13 is a kind of structural representation for authentication means that fifth embodiment of the invention provides.It refer to Figure 13, The device that the present embodiment proposes can run on server, the auth method proposed for above-described embodiment, in the present embodiment Device 50 can include:
Request receiving module 51, the identifying code for receiving user terminal transmission pull request;
Identifying code generation module 52, for randomly selecting the picture in picture database, feature is added in the picture Enhancing element is strengthened in picture by the feature to form feature enhancing picture and cuts out an at least sub-pictures, after being cut Feature enhancing picture form identifying code background picture, the region being cut in the identifying code background picture is formed and institute State area of absence at least corresponding to a sub-pictures;
Picture issues module 53, for the identifying code background picture and corresponding sub-pictures to be handed down into the user Terminal, so that the identifying code background picture and sub-pictures are showed user by the user terminal;And
Authentication module 54, for receive it is that the user terminal returns, spliced according to the instruction of the user The identifying code background picture and the sub-pictures splicing result, according to the splicing result, judge that the sub-pictures are It is no by according to precalculated position and the predetermined anglec of rotation splicing the identifying code background picture area of absence, if it is, testing It is by the way that otherwise, the result is not pass through to demonstrate,prove result.
Further, Figure 14 is refer to, the identifying code generation module 52 can include:
Feature enhancement unit 521, for randomly selecting the picture in picture database, feature increasing is added in the picture Strong element is strengthened in picture by the feature to form feature enhancing picture and cuts out an at least sub-pictures;
Computing unit 522, for the sub-pictures cut out to be carried out to the rotation of random angles, according to the goniometer rotated Calculate the predetermined anglec of rotation corresponding with the sub-pictures;
Storage unit 523, for preserving the identifying code background picture, postrotational sub-pictures and the sub-pictures pair The predetermined anglec of rotation answered and precalculated position corresponding with the sub-pictures, wherein, pre-determined bit corresponding with the sub-pictures Be set to position of the area of absence corresponding with the sub-pictures in the identifying code background picture, or with the sub-pictures pair Error between position of the area of absence answered in the identifying code background picture is within a predetermined range.
Figure 15 is refer to, in the present embodiment, the feature enhancement unit 521 can include:
Picture chooses subelement 5211, for randomly selecting the picture in picture database;
Feature enhanson 5212, strengthen element for adding feature in the picture to form feature enhancing figure Piece;And
Identifying code generates subelement 5213, and an at least sub-pictures, quilt are cut out for being strengthened by the feature in picture Feature enhancing picture after cutting forms the identifying code background picture, the area being cut in the identifying code background picture Domain forms area of absence corresponding with an at least sub-pictures.
Feature enhancement unit 521 can be also used for feature enhancing element being plotted at random in the picture with described in formation Feature strengthens picture.
Feature enhancement unit 521 can be also used for synthesizing feature enhancing picture in the picture to form the feature Strengthen picture.
In the embodiment of the present invention, feature enhancing element can include one or more lines, and lines can be with For straight line, sinusoidal line, circular arc line etc..Feature enhancing element can also be other simple patterns, such as triangle pattern, circle Pattern, feature enhancing element can also be various watermark recoveries.It is understood that the present invention embodiment not with The specific manifestation form of feature enhancing element is limited.
The feature enhancement unit 521 is additionally operable to the region of view data of the connection with similar characteristic in the picture Addition feature enhancing element strengthens picture to form the feature.
The feature enhancement unit 521 can be cut multiple sub-pictures by the picture, and multiple described sub-pictures have phase Same size and shape.
Picture database can establish in advance, be stored in server 200.In the embodiment of the present invention, identifying code background The particular content of picture need not have very strong classification identification, can directly use the figure of the contents such as landscape, animal, building Piece.Picture in picture database can be by server 200 directly by being captured on internet, and interconnection internet resource is very abundant, Therefore, the picture number of picture database easily reaches certain scale, and picture is artificially collected as broken so as to increase The difficulty of exam pool is solved, prevents from manually cracking.
Picture in the picture database can also include the advertising pictures by being obtained on advertising pictures publisher server.
Further, in the present invention an embodiment in, precalculated position corresponding with the sub-pictures for institute Position of the area of absence corresponding to sub-pictures in the identifying code background picture is stated, the storage unit 523 is additionally operable to generate First mapping table, first mapping table include:The numbering of the sub-pictures, the predetermined anglec of rotation and vacancy area Corresponding relation between the sequence number in domain.
In the embodiment, the picture issues module 53 by under selected identifying code background picture and sub-pictures The numbering of the sub-pictures is also handed down to the user terminal 100, the user terminal when issuing the user terminal 100 100 splicing results returned include the numbering of the sub-pictures, the sub-pictures are actual is spliced in the identifying code Background The sequence number of area of absence in piece and the angle that the sub-pictures are rotated in splicing.
Figure 16 is referred to, in the embodiment, the authentication module 54 can include:
First searching unit 541a, for the numbering according to the sub-pictures, first mapping table is searched, according to First mapping table obtains the sequence of the predetermined anglec of rotation and area of absence corresponding with the numbering of the sub-pictures Number;
First judging unit 542a, when the sequence of area of absence corresponding with the numbering of each sub-pictures in the splicing result Number and the angle that is rotated and the sequence number of area of absence found in first mapping table and the predetermined anglec of rotation When spending consistent, judge that the sub-pictures are spliced in the area of absence according to precalculated position and the predetermined anglec of rotation, Otherwise, it is determined that the sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
In another embodiment of the present invention, precalculated position is corresponding with the sub-pictures corresponding to the sub-pictures Position of the area of absence in the identifying code background picture between error within a predetermined range, the storage unit 523 It is additionally operable to generate the second mapping table, second mapping table includes:The precalculated position of the sub-pictures, predetermined rotation Corresponding relation between angle and the sequence number of area of absence.
In the embodiment, the picture issues module 53 by under selected identifying code background picture and sub-pictures The user terminal 100 also is handed down in the precalculated position of the sub-pictures when issuing the user terminal 100, the user is whole The precalculated positions for the splicing results including the sub-pictures that end 100 returns, the sub-pictures are actual is spliced in the identifying code The sequence number of area of absence in background picture and the angle that the sub-pictures are rotated in splicing;
Figure 17 is referred to, the authentication module 54 can include:
Second searching unit 541b, for the precalculated position according to the sub-pictures, second mapping table is searched, The predetermined anglec of rotation and vacancy corresponding with the precalculated position of the sub-pictures are obtained according to second mapping table The sequence number in region;
Second judging unit 542b, when area of absence corresponding with the precalculated position of each sub-pictures in the splicing result Sequence number and the angle that is rotated and the sequence number of area of absence found in second mapping table and predetermined rotation When gyration is consistent, judge that the sub-pictures are spliced in the vacancy area according to precalculated position and the predetermined anglec of rotation Domain, otherwise, it is determined that the sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
Further, the picture issues module 53 and can be also used for issuing verification tip information to the user terminal, To prompt user by sub-pictures by moving the area of absence with rotary splicing in the identifying code background picture.
The picture issue module 53 be additionally operable to selected identifying code background picture and sub-pictures being handed down to it is described Precalculated position during user terminal also by the numbering of the sub-pictures or the sub-pictures in the identifying code background picture It is handed down to the user terminal.
Each module can be that now, above-mentioned each module can be stored in depositing for server 200 by software code realization above In reservoir 201.Each module can equally be realized by hardware such as IC chip above.
It should be noted that the function of each functional module of the server of the embodiment of the present invention can be implemented according to the above method Method specific implementation in example, its specific implementation process are referred to the associated description of above method embodiment, will not be described here.
It should be noted that the module in above-described embodiment can run on a total server can also run on it is more Individual server, as shown in figure 5, the setting of the quantity and function of server can be according to specific implement scene and implementation bar Part is changed, and such change has no effect on protection scope of the present invention.
In the embodiment of the present invention, the particular content of identifying code background picture need not have very strong classification identification, can Directly to be obtained by server from internet, resource is very abundant, it is not necessary to is manually classified, can reduce cost, separately It can also increase outside and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital Advantage, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures Put, due to incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture All there is very big difficulty in understanding these two aspects, therefore considerably increase the difficulty that machine cracks identifying code, safe;Relatively In clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence is for user's choosing Select, reduce user uses threshold.That is the present invention can greatly improve on the premise of Consumer's Experience is not influenceed tests The anti-breaking force of code is demonstrate,proved, effectively raises the security of user's checking;Before being cut to picture, by increasing in picture Feature is added to strengthen element, thus it is possible to vary continuously there is the discrimination in the region of the view data of similar features originally, make user more Area of absence corresponding to sub-pictures and the mode put easily are distinguished, so as to improve success of the user by checking Rate, in addition, the randomness of feature enhancing element can also increase the difficulty that automatic machine cracks in addition.
Sixth embodiment
Figure 18 is a kind of structural representation for authentication means that sixth embodiment of the invention provides.It refer to Figure 18, The device that the present embodiment proposes can run on user terminal, can be used for the auth method for realizing that above-described embodiment proposes, Including:Described device 60 can include:
Request sending module 61, request is pulled for sending identifying code to server;
Picture presentation module 62, the identifying code background picture and subgraph issued for receiving and showing the server Piece, the identifying code background picture include area of absence corresponding with the sub-pictures;
Picture concatenation module 63, for the instruction according to the user by the sub-pictures and the identifying code background picture Spliced and obtain the splicing picture of the identifying code background picture and the sub-pictures, the instruction of the user includes institute State angle and the path of sub-pictures movement or the target location of movement of sub-pictures rotation;And
As a result sending module 64, for obtaining splicing result according to the splicing picture, and the splicing result is sent To the server so that the server according to the splicing result judge the sub-pictures whether by according to precalculated position with And the splicing of the predetermined anglec of rotation is in the area of absence of the identifying code background picture, if it is, the result be by, otherwise, The result is not pass through.
Wherein, the instruction of the user can be inputted including the user by mouse, gesture input, phonetic entry or Character string input mode inputs to the instruction of the user terminal.
Further, the picture concatenation module 63 can include response unit 631, be used for:In response to the user couple The drag operation of the sub-pictures splices the sub-pictures in the identifying code background picture;Or in response to the user Dragging and rotation process to the sub-pictures, by sub-pictures splicing in the identifying code background picture.
Each module can be that now, above-mentioned each module can be stored in user terminal 100 by software code realization above In memory 102.Each module can equally be realized by hardware such as IC chip above.
It should be noted that the function of each functional module of the server of the embodiment of the present invention can be implemented according to the above method Method specific implementation in example, its specific implementation process are referred to the associated description of above method embodiment, will not be described here.
In the present embodiment, the particular content of identifying code background picture need not have very strong classification identification, Ke Yiyou Server directly obtains from internet, and resource is very abundant, it is not necessary to is manually classified, can reduce cost, in addition It can increase and artificially collect picture as the difficulty for cracking exam pool;Take full advantage of the mankind image content is understood it is congenital excellent Gesture, user carry out correct according to the understanding to the incidence relation of content in identifying code background picture and sub-pictures to sub-pictures Put, due to recognizing for incidence relation of the machine after the understanding to image content and sub-pictures are rotated between background picture Know these two aspects and very big difficulty all be present, therefore considerably increase the difficulty that machine cracks identifying code, it is safe;Relative to Clicking for identifying code, it is not necessary to which user carries out classification identification according to problem to picture, there is provided area of absence selects for user, Reduce user uses threshold.That is the present invention can greatly improve identifying code on the premise of Consumer's Experience is not influenceed Anti-breaking force, effectively raise the security of user's checking.
7th embodiment
Figure 19 is the structured flowchart of the authentication system in the embodiment of the present invention.Figure 19 is refer to, the present embodiment proposes Authentication system 70 can be used for realizing the auth method that above-described embodiment proposes, the authentication in the present embodiment System 70 can include:User terminal 71 and server 72.
User terminal 71 can be used for pulling request to the transmission identifying code of server 72;Receive and show the server 72 The identifying code background picture and sub-pictures issued, the identifying code background picture include vacancy area corresponding with the sub-pictures Domain;The sub-pictures and the identifying code background picture are spliced according to the instruction of the user, the instruction of the user Include angle and the path of sub-pictures movement or the target location of movement of the sub-pictures rotation;And it will test The splicing result of card code background picture and sub-pictures is sent to the server and verified, when the sub-pictures are according to pre-determined bit Put and the splicing of the predetermined anglec of rotation is in the area of absence, the result is to pass through.
The identifying code that server 72 can be used for receiving the transmission of user terminal 71 pulls request;Randomly select picture database In picture, in the picture add feature enhancing element with formed feature enhancing picture, by the feature strengthen picture in An at least sub-pictures are cut out, the feature enhancing picture after being cut forms identifying code background picture, the identifying code The region being cut in background picture forms area of absence corresponding with an at least sub-pictures;By selected identifying code Background picture and sub-pictures are handed down to the user terminal 71, so that the user terminal 71 is by the identifying code background picture And sub-pictures show user;And receive that the user terminal returns, spliced according to the instruction of the user The splicing result of identifying code background picture and sub-pictures, according to the splicing result, judge the sub-pictures whether by according to pre- Positioning put and the predetermined anglec of rotation splicing the identifying code background picture area of absence, if it is, the result is logical Cross, otherwise, the result is not pass through.
Wherein, the user terminal 71 can be to run the user terminal for having sixth embodiment shown device, the service Device 72 can be the server that operation has the 5th embodiment shown device, and its concrete function and realization can be found in above-described embodiment, Here repeat no more.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment To complete, by program the hardware of correlation can also be instructed to complete, the program being somebody's turn to do can be stored in a kind of computer-readable deposit In storage media, storage medium mentioned above can be read-only storage, disk or CD etc..
The above described is only a preferred embodiment of the present invention, any formal limitation not is made to the present invention, though So the present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any to be familiar with this professional technology people Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification For the equivalent embodiment of equivalent variations, as long as being the technical spirit pair according to the present invention without departing from technical solution of the present invention content Any simple modification, equivalent change and modification that above example is made, in the range of still falling within technical solution of the present invention.

Claims (16)

1. a kind of auth method, it is characterised in that methods described includes:
Server receives the identifying code that user terminal is sent and pulls request;
The picture in picture database is randomly selected, continuously the region of the view data with similar characteristic adds in the picture Add feature enhancing element to form feature enhancing picture, strengthened by the feature in picture and cut out an at least sub-pictures, quilt Feature enhancing picture after cutting forms identifying code background picture, the region shape being cut in the identifying code background picture Into area of absence corresponding with an at least sub-pictures;
The identifying code background picture and corresponding sub-pictures are handed down to the user terminal, so that the user terminal will The identifying code background picture and sub-pictures show user;And
Receive the identifying code background picture that the user terminal returns, being spliced according to the instruction of the user and institute The splicing result of sub-pictures is stated, according to the splicing result, judges the sub-pictures whether by according to precalculated position and predetermined The anglec of rotation splices the area of absence in the identifying code background picture, if it is, the result is by the way that otherwise, checking is tied Fruit is not pass through.
2. the method as described in claim 1, it is characterised in that described by the identifying code background picture and corresponding subgraph Before piece is handed down to the step of user terminal, in addition to:
The sub-pictures cut out are carried out to the rotation of random angles, it is corresponding with the sub-pictures according to the angle calculation rotated The predetermined anglec of rotation;
Preserve the identifying code background picture, postrotational sub-pictures, the predetermined anglec of rotation corresponding with the sub-pictures and Precalculated position corresponding with the sub-pictures, wherein, with the sub-pictures corresponding to precalculated position be with the sub-pictures it is corresponding Position of the area of absence in the identifying code background picture, or area of absence corresponding with the sub-pictures tests described The error between position in card code background picture is within a predetermined range.
3. the method as described in claim 1, it is characterised in that it is described to be formed that feature enhancing element is added in the picture The step of feature enhancing picture, also includes:
Feature enhancing element is plotted in the picture at random to form the feature enhancing picture.
4. the method as described in claim 1, it is characterised in that it is described to be formed that feature enhancing element is added in the picture The step of feature enhancing picture, also includes:
The picture synthesis for having feature enhancing element will be drawn in the picture to form the feature enhancing picture.
5. the method as described in claim 3 or 4, it is characterised in that the feature enhancing element includes one or more lines.
6. the method as any one of Claims 1-4, it is characterised in that multiple sub-pictures, institute are cut by the picture Stating multiple sub-pictures has formed objects and shape.
7. method as claimed in claim 2, it is characterised in that:Precalculated position corresponding with the sub-pictures is and the subgraph Position of the area of absence corresponding to piece in the identifying code background picture, it is described to preserve the identifying code background picture, rotation Sub-pictures, the predetermined anglec of rotation corresponding with the sub-pictures and the step in precalculated position corresponding with the sub-pictures afterwards Suddenly, in addition to:Mapping table is generated, the mapping table includes:The numbering of the sub-pictures, the predetermined anglec of rotation and Corresponding relation between the sequence number of area of absence;
When selected identifying code background picture and sub-pictures are handed down to the user terminal by the server also by described in The numbering of sub-pictures is handed down to the user terminal, and the splicing result that the user terminal returns includes the volume of the sub-pictures Number, the sequence number of the actual area of absence being spliced in the identifying code background picture of the sub-pictures and described in splicing The angle that sub-pictures are rotated;
It is described according to the splicing result, judge the sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation The area of absence of the identifying code background picture the step of, including:
According to the numbering of the sub-pictures, the mapping table is searched, is obtained and the subgraph according to the mapping table The sequence number for numbering the corresponding predetermined anglec of rotation and area of absence of piece;
When the sequence number of area of absence corresponding with the numbering of each sub-pictures in the splicing result and the angle rotated with When the sequence number of the area of absence found in the mapping table and the consistent predetermined anglec of rotation, the sub-pictures are judged By according to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence, otherwise, it is determined that the sub-pictures not by According to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence.
8. method as claimed in claim 2, it is characterised in that:Precalculated position corresponding with the sub-pictures and the sub-pictures Error between position of the corresponding area of absence in the identifying code background picture within a predetermined range, described in the preservation Identifying code background picture, postrotational sub-pictures, the predetermined anglec of rotation corresponding with the sub-pictures and with the sub-pictures The step of corresponding precalculated position, in addition to:Mapping table is generated, the mapping table includes:The sub-pictures it is pre- Positioning is put, the corresponding relation between the sequence number of the predetermined anglec of rotation and area of absence;
When selected identifying code background picture and sub-pictures are handed down to the user terminal by the server also by described in The user terminal is handed down in the precalculated position of sub-pictures, and the splicing result that the user terminal returns includes the sub-pictures Precalculated position, the actual area of absence being spliced in the identifying code background picture of the sub-pictures sequence number and splicing The angle that Shi Suoshu sub-pictures are rotated;
It is described according to the splicing result, judge the sub-pictures whether by according to precalculated position and the splicing of the predetermined anglec of rotation The area of absence of the identifying code background picture the step of, including:
According to the precalculated position of the sub-pictures, search the mapping table, according to the mapping table obtain with it is described The sequence number of the precalculated positions of the sub-pictures corresponding predetermined anglec of rotation and area of absence;
When the sequence number of area of absence corresponding with the precalculated position of each sub-pictures in the splicing result and the angle rotated When degree is with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table, the son is judged Picture is spliced in the area of absence according to precalculated position and the predetermined anglec of rotation, otherwise, it is determined that the sub-pictures do not have Have and spliced according to precalculated position and the predetermined anglec of rotation in the area of absence.
9. a kind of authentication means, run on server, it is characterised in that described device includes:
Request receiving module, the identifying code for receiving user terminal transmission pull request;
Identifying code generation module, for randomly selecting the picture in picture database, continuously there is similar spy in the picture Property view data region addition feature enhancing element with formed feature enhancing picture, by the feature strengthen picture in cut Go out an at least sub-pictures, the feature enhancing picture after being cut forms identifying code background picture, the identifying code background The region being cut in picture forms area of absence corresponding with an at least sub-pictures;
Picture issues module, for the identifying code background picture and corresponding sub-pictures to be handed down into the user terminal, So that the identifying code background picture and sub-pictures are showed user by the user terminal;And
Authentication module, for receive it is that the user terminal returns, according to splicing the instruction of the user The splicing result of identifying code background picture and the sub-pictures, according to the splicing result, judge the sub-pictures whether by by Splice the area of absence in the identifying code background picture according to precalculated position and the predetermined anglec of rotation, if it is, the result For by the way that otherwise, the result is not pass through.
10. device as claimed in claim 9, it is characterised in that the identifying code generation module includes:
Feature enhancement unit, for randomly selecting the picture in picture database, feature enhancing element is added in the picture To form feature enhancing picture, strengthened by the feature in picture and cut out an at least sub-pictures;
Computing unit, for the sub-pictures cut out to be carried out to the rotation of random angles, according to the angle calculation and institute rotated State the predetermined anglec of rotation corresponding to sub-pictures;
Storage unit, for preserving the identifying code background picture, postrotational sub-pictures, corresponding with the sub-pictures predetermined The anglec of rotation and precalculated position corresponding with the sub-pictures, wherein, precalculated position corresponding with the sub-pictures for institute State position of the area of absence corresponding to sub-pictures in the identifying code background picture, or vacancy corresponding with the sub-pictures Error between position of the region in the identifying code background picture is within a predetermined range.
11. device as claimed in claim 9, it is characterised in that the identifying code generation module is additionally operable to feature strengthening member Element is plotted in the picture to form the feature enhancing picture at random.
12. device as claimed in claim 9, it is characterised in that the identifying code generation module is additionally operable to drafting having feature The picture of enhancing element is synthesized in the picture to form the feature enhancing picture.
13. the device as described in claim 11 or 12, it is characterised in that the feature enhancing element includes one or more lines Bar.
14. the device as described in any one of claim 9 to 12, it is characterised in that the identifying code generation module is by the figure Piece cuts multiple sub-pictures, and multiple described sub-pictures have formed objects and shape.
15. device as claimed in claim 10, it is characterised in that precalculated position corresponding with the sub-pictures is and the son Position of the area of absence corresponding to picture in the identifying code background picture, the storage unit are additionally operable to generate corresponding relation Table, the mapping table include:Pair between the sequence number of the numbering of the sub-pictures, the predetermined anglec of rotation and area of absence It should be related to;
The picture is issued when selected identifying code background picture and sub-pictures are handed down to the user terminal by module and gone back The numbering of the sub-pictures is handed down to the user terminal, the splicing result that the user terminal returns includes the sub-pictures Number, the sequence number of the actual area of absence being spliced in the identifying code background picture of the sub-pictures and splicing when The angle that the sub-pictures are rotated;
The authentication module includes:
Searching unit, for the numbering according to the sub-pictures, the mapping table is searched, is obtained according to the mapping table Take the sequence number of the predetermined anglec of rotation and area of absence corresponding with the numbering of the sub-pictures;
Judging unit, when the sequence number of area of absence corresponding with the numbering of each sub-pictures in the splicing result and rotated Angle with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table when, judge institute State sub-pictures by according to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence, otherwise, it is determined that the subgraph Piece is not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
16. device as claimed in claim 10, it is characterised in that precalculated position corresponding to the sub-pictures and the sub-pictures Error between position of the corresponding area of absence in the identifying code background picture within a predetermined range, the storage unit It is additionally operable to generate mapping table, the mapping table includes:The precalculated position of the sub-pictures, the predetermined anglec of rotation and Corresponding relation between the sequence number of area of absence;
The picture is issued when selected identifying code background picture and sub-pictures are handed down to the user terminal by module and gone back The user terminal is handed down in the precalculated position of the sub-pictures, the splicing result that the user terminal returns includes the son The precalculated position of picture, the actual area of absence being spliced in the identifying code background picture of the sub-pictures sequence number and The angle that the sub-pictures are rotated in splicing;
The authentication module includes:
Searching unit, for the precalculated position according to the sub-pictures, the mapping table is searched, according to the corresponding relation Table obtains the sequence number of the predetermined anglec of rotation and area of absence corresponding with the precalculated position of the sub-pictures;
Judging unit, when the sequence number of area of absence corresponding with the precalculated position of each sub-pictures in the splicing result and by When the angle of rotation is with the sequence number and the consistent predetermined anglec of rotation of the area of absence found in the mapping table, sentence The fixed sub-pictures by according to precalculated position and the splicing of the predetermined anglec of rotation in the area of absence, otherwise, it is determined that described Sub-pictures are not spliced in the area of absence according to precalculated position and the predetermined anglec of rotation.
CN201410230588.XA 2014-05-28 2014-05-28 Auth method and device Active CN105187206B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410230588.XA CN105187206B (en) 2014-05-28 2014-05-28 Auth method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410230588.XA CN105187206B (en) 2014-05-28 2014-05-28 Auth method and device

Publications (2)

Publication Number Publication Date
CN105187206A CN105187206A (en) 2015-12-23
CN105187206B true CN105187206B (en) 2018-02-27

Family

ID=54909061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410230588.XA Active CN105187206B (en) 2014-05-28 2014-05-28 Auth method and device

Country Status (1)

Country Link
CN (1) CN105187206B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454049A (en) * 2016-06-01 2017-12-08 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN107066189A (en) * 2017-05-15 2017-08-18 惠州Tcl移动通信有限公司 A kind of jigsaw unlocking method and system based on mobile terminal
CN107369016B (en) * 2017-06-14 2021-02-02 维沃移动通信有限公司 Payment method and device
CN107577934A (en) * 2017-10-15 2018-01-12 杨礼帆 A kind of method and apparatus for realizing man-machine checking
CN108154019A (en) * 2017-11-30 2018-06-12 天脉聚源(北京)科技有限公司 A kind of method and device of image authentication
CN108828599B (en) * 2018-04-06 2021-11-16 东莞市华睿电子科技有限公司 Disaster-stricken person searching method based on rescue unmanned aerial vehicle
CN108846274B (en) * 2018-04-09 2020-08-18 腾讯科技(深圳)有限公司 Security verification method, device and terminal
CN108920932A (en) * 2018-07-16 2018-11-30 佛山市影腾科技有限公司 A kind of verification code generation method, device and server
CN109800559B (en) * 2019-01-02 2024-01-16 平安科技(深圳)有限公司 Method and device for generating slider verification code, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103069455A (en) * 2010-07-30 2013-04-24 皇家飞利浦电子股份有限公司 Organ-specific enhancement filter for robust segmentation of medical images
CN103312512A (en) * 2013-06-07 2013-09-18 深圳第七大道网络技术有限公司 Image verification code generating method, image verification code generating device, identity verification method and identity verification device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103069455A (en) * 2010-07-30 2013-04-24 皇家飞利浦电子股份有限公司 Organ-specific enhancement filter for robust segmentation of medical images
CN103312512A (en) * 2013-06-07 2013-09-18 深圳第七大道网络技术有限公司 Image verification code generating method, image verification code generating device, identity verification method and identity verification device

Also Published As

Publication number Publication date
CN105187206A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
CN105187206B (en) Auth method and device
CN104702406B (en) Auth method and device
CN104243517B (en) Content share method and device between different terminals
CN104660549B (en) Auth method and device
US11025665B2 (en) Detection and identification of targeted attacks on a computing system
CN105306208A (en) Identity verification method and identity verification device
CN104601641B (en) Application link sharing method, apparatus and system
CN105323066B (en) Identity verification method and device
CN104917612B (en) Auth method and device
CN105323218A (en) Identity verifying method and device
US20130262687A1 (en) Connecting a mobile device as a remote control
CN104363226B (en) Method, device and system for logging in operating system
CN106131707A (en) Barrage information processing method and processing means
CN104917724A (en) Identity verification method and apparatus
CN109688147A (en) Using login method, device, terminal, server, system and storage medium
CN104424241B (en) Web site url processing method based on two dimensional code, apparatus and system
CN104104657A (en) Information validation method, server, terminal and system
CN105306202B (en) Auth method, device and server
CN106255102A (en) The authentication method of a kind of terminal unit and relevant device
US20130014009A1 (en) Electronic document preparing apparatus, electronic document preparing system comprising same and control method thereof and electronic document reading system and control method thereof
CN104811304B (en) Identity verification method and device
CN108092947A (en) A kind of method and device that identity discriminating is carried out to third-party application
CN105100005A (en) Identity verification method and device
CN105373715A (en) Wearable device based data access method and apparatus
CN105574115B (en) The method and system of search result are directly displayed on searched page

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190729

Address after: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.