CN105357008A - Identity verification method and device - Google Patents
Identity verification method and device Download PDFInfo
- Publication number
- CN105357008A CN105357008A CN201410417696.8A CN201410417696A CN105357008A CN 105357008 A CN105357008 A CN 105357008A CN 201410417696 A CN201410417696 A CN 201410417696A CN 105357008 A CN105357008 A CN 105357008A
- Authority
- CN
- China
- Prior art keywords
- picture
- option
- terminal
- verified
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an identity verification method and device, belonging to the technical field of networks. The method comprises the following steps: receiving an identity verification request of a terminal; generating a verification prompt picture and a plurality of option picture groups according to an original picture, wherein each option picture group comprises at least one verification answer picture and at least one interference picture; and the verification answer picture is determined by the original picture and the verification prompt picture; sending the verification prompt picture to the terminal, and sending the plurality of option picture groups to the terminal in batches; every time a picture to be verified is received, judging whether the picture selected by the terminal from the current option picture group is the verification answer picture or not; and, while determining that any one of the pictures selected by the terminal from the current option picture group is not the verification answer picture according to the received picture to be verified, refusing to pass identity verification of the terminal, and stopping sending the next option picture group to the terminal. According to the invention, the problem that the existing identity verification scheme is relatively poor in safety performance can be effectively solved.
Description
Technical field
The present invention relates to networking technology area, particularly a kind of auth method and device.
Background technology
Along with the development of network technology, network is while providing abundant service for people, himself is also faced with increasing challenge.In the scenes such as some registrations, login and network interdynamic; webpage or forum etc. often can be subject to the attack of some malicious users; these malicious users, by using automaton, carry out malicious registration to webpage, community or forum etc., malice log in, maliciously decryption, forum pour water and issue the attacks such as aggressive information.In view of the situation, can by verifying the identity of operation user, in case class malicious act here.
At present, the mode that prior art can be verified by picture mosaic, protects the network operation of user.The implementation method of this picture mosaic checking comprises: (1) intercepts at least one sub-pictures in former picture, alternatively picture, is set to blank by former picture by the part intercepted, and obtains the verification tip picture comprising multiple white space.(2) below verification tip picture, show with the sub-pictures of random order arrangement.(3) by carrying out identification to sub-pictures and verification tip picture, each sub-pictures moves in each white space in this verification tip picture by user, obtains picture to be verified.(4) if server determines that this picture to be verified is identical with former picture, then network operator is thought really for there being the natural person of certain recognition capability, instead of automaton, be namely verified.
Realizing in process of the present invention, inventor finds that prior art at least exists following problem:
On the one hand, for the authentication scheme that prior art provides, each sub-pictures at random by each sub-pictures and each white space one_to_one corresponding, and can move in corresponding white space by automaton at every turn, obtains picture to be verified with device decision verification result to be serviced.Owing to intercepting the sub-pictures limited amount obtained to former picture, then automaton operates through the accidental validation of limited number of times, also can be verified very soon.On the other hand, along with the development of science and technology, automaton technology have also been obtained very much progress.Because the picture at this sub-pictures and this white space edge has certain relevance in terms of content, therefore, the automaton with edge detecting technology can the corresponding relation of recognin picture and white space automatically, thus can be verified very soon.
Based on above-mentioned two aspects, there is the poor problem of security performance in the authentication scheme that prior art provides.
Summary of the invention
In order to solve the poor problem of security performance, embodiments provide a kind of auth method and device.Described technical scheme is as follows:
On the one hand, provide a kind of auth method, described method comprises:
The authentication request of receiving terminal; According to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture; Send described verification tip picture to described terminal, and send described multiple option picture group to described terminal in batches; Often receive a picture to be verified, judge whether the picture of described terminal selected in present option picture group is Validation Answer Key picture; When the picture to be verified that basis receives, when determining have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stops sending next option picture group to described terminal; When according to the picture to be verified received, when determining that the picture that described terminal is selected at every turn is described Validation Answer Key picture, the authentication of described terminal is passed through.
Another aspect, provides a kind of auth method, and described method comprises:
Receipt Validation prompting picture and at least one option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture; According to the operation trace of choosing instruction and user of user to arbitrary option picture in described option picture group, generate picture to be verified; Send described picture to be verified to server, make described server carry out authentication to described terminal.
On the other hand, provide a kind of authentication means, described device comprises:
Receiver module, for the authentication request of receiving terminal;
Generation module, for according to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Sending module, for sending described verification tip picture to described terminal, and sends described multiple option picture group to described terminal in batches;
Judge module, for often receiving a picture to be verified, judges whether the picture of described terminal selected in present option picture group is Validation Answer Key picture;
Authentication module, for the picture to be verified received when basis, when determining have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stop sending next option picture group to described terminal;
Described authentication module, also for when according to the picture to be verified received, when determining that the picture that described terminal is selected at every turn is described Validation Answer Key picture, passes through the authentication of described terminal.
Again on the one hand, provide a kind of authentication means, described device comprises:
Receiver module, for Receipt Validation prompting picture and at least one option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Checking image generating module, for terminal according to user from the option picture selected in this option picture group and operation trace, generate picture to be verified;
Sending module, for sending described picture to be verified to server, makes described server carry out authentication to described terminal.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
Auth method provided by the invention, effectively can solve the problem that existing authentication Scheme Security performance is poor, the form successively verified not only increases automaton and cracks difficulty to authentication, also effectively reduce the efficiency that artificial stamp cracks operation simultaneously, avoid the malicious attack of malicious user to network.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of auth method flow chart that the embodiment of the present invention provides;
Fig. 2 is a kind of auth method flow chart that the embodiment of the present invention provides;
Fig. 3 be the embodiment of the present invention provide the process obtaining prompting picture to be verified and sub-pictures is intercepted to a certain original image;
Fig. 4 is the one interference Picture Generation Method schematic diagram that the embodiment of the present invention provides;
Fig. 5 is the flow chart of a kind of auth method that the embodiment of the present invention provides;
Fig. 6 is the display exemplary plot of the verification tip picture that provides of the embodiment of the present invention and option picture group;
Fig. 7 is a kind of authentication means structural representation that the embodiment of the present invention provides;
Fig. 8 is a kind of authentication means structural representation that the embodiment of the present invention provides.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Fig. 1 is a kind of auth method flow chart that the embodiment of the present invention provides.The executive agent of this embodiment is server, and this server can be the server for verifying, can also be the server comprising authentication module, and see Fig. 1, method flow comprises:
101, the authentication request of server receiving terminal.
In embodiments of the present invention, this authentication request is the request for verifying terminal use or terminal itself, this request not only can trigger when end user logs server, can also trigger under multiple different scene, as, terminal on the server downloaded resources, terminal is posted in forum etc. by server, and can also be other operations that terminal is carried out on the server, therefore not to repeat here.
102, server is according to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and this Validation Answer Key picture is determined by this original image and this verification tip picture.
Wherein, this original image can be any picture of random selecting in a picture database.This verification tip picture refers to the picture to be operated in each authentication process itself, through carrying out to this verification tip picture the object that corresponding operating can complete authentication.This option picture group refers to a set comprising multiple option pictures, in authentication process itself, chooses the option picture of specified quantity, carry out corresponding operating can complete this authentication process itself to this option picture from this option picture group.
It should be noted that, the Validation Answer Key picture in this verification tip picture and total Options picture group can form original image, that is to say, verification tip picture be from original image, intercepted multiple Validation Answer Key picture by server after the picture that obtains.
103, server sends this verification tip picture to this terminal, sends the plurality of option picture group in batches to this terminal.
In above-mentioned steps 103, this refers to for the plurality of option picture group in batches, and each transmission option picture group, after have sent an option picture group, then sends another option picture group.Certainly, the transmission of option picture group also can be more random, as first sent two option picture groups, then sends an option picture group.
104, often receive a picture to be verified, judge whether the picture of described terminal selected in present option picture group is Validation Answer Key picture.
105, received after sending according to arbitrary batch picture to be verified, when server determines have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stops sending next option picture group to described terminal.
106, when according to the picture to be verified received at every turn, when server determines that the picture that described terminal is selected at every turn is described Validation Answer Key picture, the authentication of described terminal is passed through.
In step 104-106, after server sends an option picture group to terminal, terminal selects picture from option picture group, terminal is according to the picture selected and verification tip picture, generate and send picture to be verified, thus receive at server the picture to be verified that terminal returns, can determine that whether picture that terminal selects is the Validation Answer Key picture in this option picture group according to returned picture to be verified, the picture selected when terminal is Validation Answer Key picture in this option picture group, that is to say, when the picture to be verified of current generation is identical with original image when not intercepting this Validation Answer Key picture, continue to send lower set of option picture group to terminal, if and the picture to be verified of current generation is different from original image when not intercepting this Validation Answer Key picture, then stop to terminal delivery option picture, that is to say, the authentication of described terminal is not passed through.
Auth method provided by the invention, effectively can solve the problem that existing authentication Scheme Security performance is poor, the form successively verified not only increases automaton and cracks difficulty to authentication, also effectively reduce the efficiency that artificial stamp cracks operation simultaneously, avoid the malicious attack of malicious user to network.
In another embodiment provided by the invention, this verification tip picture in above-mentioned steps can carry out intercepting process to this original image and generate.Particularly, concrete generation step has the step of following (1)-(3):
(1) in this original image, intercept the sub-pictures of predetermined number.
It should be noted that, in this step (1), the arbitrary region in this original image all can intercept, and e.g., can intercept in the region, center of this original image, also can intercept in the region, the lower left corner of this original image.Intercepting to this original image the sub-pictures obtained can be any rule or irregular shape, as being circle, rhombus, rectangle or triangle etc.The present embodiment is not specifically limited the intercepting region of this original image and the shape of sub-pictures.
(2) using the sub-pictures of this predetermined number as Validation Answer Key picture.
(3) part intercepted in this original image is set to white space, obtains this verification tip picture of the white space comprising predetermined number.
Particularly, this Validation Answer Key picture is determined by this original image and this verification tip picture, according to the relative discern to this original image and this verification tip picture, the white space that this Validation Answer Key picture and each Validation Answer Key picture are corresponding on this verification tip picture can be determined.
Such as, Figure 3 shows that the process obtaining prompting picture to be verified and sub-pictures is intercepted to a certain original image.As shown in Figure 3, this original image is intercepted, obtain the picture to be verified that four sub-pictures and comprise four white spaces, the one_to_one corresponding respectively of four white spaces in these four sub-pictures and this verification tip picture, such as, sub-pictures 1 in Fig. 3 is corresponding with white space 1, other sub-pictures and white space also one_to_one corresponding.
It should be noted that, in this step 302, in multiple option picture group, the quantity of this Validation Answer Key picture comprised in each option picture group can be the same or different, and the quantity of this Validation Answer Key picture comprised in each option picture group is less than the quantity of sub-pictures.As, original image is intercepted and obtains four sub-pictures, namely this Validation Answer Key picture is sub-pictures 1, sub-pictures 2, sub-pictures 3 and sub-pictures 4, three option picture groups are respectively A, B and C, a Validation Answer Key picture sub-pictures 1 is comprised in A option picture group, comprise in B option picture group in two Validation Answer Key picture sub-pictures 2, sub-pictures 3, C option picture group and comprise sub-pictures 4.
In embodiment provided by the invention, interference picture can be obtained by following steps: random selecting but picture that content different corresponding from white space size is as disturbing picture.The present embodiment is not specifically limited the method obtaining this interference picture.And preferably, in another embodiment provided by the invention, this interference picture can be obtained by following steps: add foreground picture in this sub-pictures, obtain disturbing picture.
Such as, as shown in Figure 4, based on Fig. 4 left hand view, add foreground picture wherein, namely obtain an interference picture, the background of this interference picture is still for there being the background patterns of two rectangular patterns.The acquisition methods of this interference picture, can make the image edge of the interference picture acquired identical with the image edge of this sub-pictures, can effectively avoid the automaton with rim detection ability automatically to crack authentication process itself like this.
In another embodiment provided by the invention, according to the picture to be verified received at every turn, judge that the picture that described terminal is selected at every turn is that described Validation Answer Key picture comprises: when have sent the first option picture group to this terminal, if receive the first picture to be verified, judge that whether this first picture to be verified is identical with the first designated pictures, this first designated pictures is made up of the Validation Answer Key picture in this first option picture group and this original image; If this first picture to be verified is identical with this first designated pictures, the picture determining selected by this terminal is the Validation Answer Key picture in this first option picture group; If this first picture to be verified is not identical with this first designated pictures, the picture determining selected by this terminal is not the Validation Answer Key picture in this first option picture group.
In embodiments of the present invention, the first option picture group is any one option picture group, for each option picture group, its concrete proof procedure all with the first option picture group described in this embodiment in like manner, do not repeat them here.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation optional embodiment of the present invention, this is no longer going to repeat them.
Fig. 2 is a kind of auth method flow chart that the embodiment of the present invention provides.See Fig. 2, method flow comprises:
201, terminal Receipt Validation prompting picture and at least one option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture.
202, terminal is according to user from the option picture selected in this option picture group and operation trace, generates picture to be verified.
This operation trace produces being moved in the operating process in a certain region by this option picture chosen, and namely the end point of this operation trace represents the regional location that this option picture is moved to.As, first choose an option picture, then click any one white space to be filled in verification tip picture, make this option picture be filled to white space, now, the operation trace of this user is two contact points; Or, by long by an option picture, then be drawn to any one white space to be filled in verification tip picture, this option picture is made to be filled to white space, now, the operation trace of this user is a starting point is option picture, and end point is the track of white space.
203, terminal to server sends this picture to be verified, makes this server carry out authentication to this terminal.
Auth method provided by the invention, effectively can solve the problem that existing authentication Scheme Security performance is poor, the form successively verified not only increases automaton and cracks difficulty to authentication, also effectively reduce the efficiency that artificial stamp cracks operation simultaneously, avoid the malicious attack of malicious user to network.
In another embodiment provided by the invention, terminal according to user from the option picture selected in this option picture group and operation trace, generate picture to be verified: when receive to the second option picture in this option picture group choose instruction time, and the end point of this operation trace is arranged in the white space of this verification tip picture, this the second option picture is filled to the white space that this end point is positioned at, generates picture to be verified.
Wherein, this second option picture refers to arbitrary the option picture of user selected in present option picture group, and this second option picture may be answer checking picture or also may be interference picture.No matter which picture chosen is, all with the region to be filled (being called white space in the present embodiment) at the end point place of this selected option picture and operation trace, generates picture to be verified.It should be noted that, if present option picture group is not last option picture group, then server is when verifying, that the picture be made up of the Validation Answer Key picture in this option picture group and verification tip picture and the picture to be verified generated are compared, to determine whether selected option picture is Validation Answer Key picture.
In another embodiment provided by the invention, described method also comprises: according to this operation trace and this second option picture, show the animation effect of this second option picture according to this operation trace movement.Certainly, there is animation effect can reach the object enriching visual effect, in order to save computational resource, can not also animation effect be shown, but the white space directly the second option picture Filling power end point is positioned at.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation optional embodiment of the present invention, this is no longer going to repeat them.
Fig. 5 is the flow chart of a kind of auth method that the embodiment of the present invention provides.See Fig. 5, method flow comprises:
501, the authentication request of server receiving terminal.
502, server intercepts the sub-pictures of predetermined number in original image.
503, using the sub-pictures of this predetermined number as Validation Answer Key picture, in sub-pictures, add foreground picture, obtain disturb picture.
504, the part intercepted in this original image is set to white space, obtains this verification tip picture of the white space comprising predetermined number.
505, send this verification tip picture to this terminal, send the plurality of option picture group to this terminal in batches.
506, when terminal receives verification tip picture and at least one option picture group, according to user from the option picture selected in this option picture group and operation trace, picture to be verified is generated.
As, Figure 6 shows that the display exemplary plot of verification tip picture and option picture group.For the option picture in Fig. 6, verification tip picture has four white spaces, and in these four option pictures, only there is the picture of the rightmost side can be corresponding with white space 2, then when terminal use chooses the 4th option picture, 4th option picture is filled to white space 2 by terminal, generates the picture to be verified of this sub-proof procedure.
It should be noted that, transmission in step 505 can be first send verification tip picture and one of them option picture group, select in option picture group for terminal use, when in a reciprocal process, when the picture that server determination terminal is chosen is Validation Answer Key picture, then send next option picture group, now, the picture to be verified that terminal demonstration is generated by the Validation Answer Key picture in verification tip picture and a upper option picture group, when terminal use chooses an option picture from the option picture group again received, and by with server determine that the option picture that this is chosen is Validation Answer Key picture alternately time, shown by terminal is the picture to be verified having the Validation Answer Key picture in verification tip picture and front two groups of option picture groups to generate.That is to say, in authentication process itself, comprise multiple sub-proof procedure, verification tip picture shown in every second son proof procedure, for a upper sub-proof procedure by time the picture to be verified that generates.
507, terminal to server sends this picture to be verified.
508, server often receives a picture to be verified, judges whether the picture of this terminal selected in present option picture group is Validation Answer Key picture.
509, when the picture to be verified that basis receives, when server determines have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stops sending next option picture group to described terminal.
510, when according to the picture to be verified received, when server determines that the picture that described terminal is selected at every turn is described Validation Answer Key picture, the authentication of described terminal is passed through.
When the picture to be verified that basis receives, when server determines that the picture selected by described terminal is the Validation Answer Key picture in the option picture group of current transmission, from remaining option picture group, optional set of option picture group sends to terminal to proceed checking, until when the picture that terminal described in server is selected is described Validation Answer Key picture at every turn, the authentication of described terminal is passed through.
The present invention is by the authentication request of receiving terminal; According to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and this Validation Answer Key picture is determined by this original image and this verification tip picture; Send this verification tip picture to this terminal, and send the plurality of option picture group to this terminal in batches; When according to the picture to be verified received, when determining that the picture that this terminal is selected at every turn is this Validation Answer Key picture, the authentication of this terminal is passed through; When according to the picture to be verified received, when determining have arbitrary not to be this Validation Answer Key picture in the picture that this terminal is selected at every turn, the authentication of this terminal is not passed through.Auth method provided by the invention, effectively can solve the problem that existing authentication Scheme Security performance is poor, the form successively verified not only increases automaton and cracks difficulty to authentication, also effectively reduce the efficiency that artificial stamp cracks operation simultaneously, avoid the malicious attack of malicious user to network.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation optional embodiment of the present invention, this is no longer going to repeat them.
Fig. 7 is a kind of authentication means structural representation that the embodiment of the present invention provides.See Fig. 7, this device comprises: receiver module 701, generation module 702, sending module 703, judge module 704 and authentication module 705.
Receiver module 701, for the authentication request of receiving terminal;
Generation module 702, for according to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Sending module 703, for sending described verification tip picture to described terminal, sends described multiple option picture group to described terminal in batches;
Judge module 704, for often receiving a picture to be verified, judges whether the picture of described terminal selected in present option picture group is Validation Answer Key picture;
Authentication module 705, for the picture to be verified received when basis, when determining have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stop sending next option picture group to described terminal;
Described authentication module 705, also for when according to the picture to be verified received, when determining that the picture that described terminal is selected at every turn is described Validation Answer Key picture, passes through the authentication of described terminal.
Alternatively, described generation module 702 comprises:
Sub-pictures interception unit, for intercepting the sub-pictures of predetermined number in described original image;
Answer picture generation unit, for using the sub-pictures of described predetermined number as Validation Answer Key picture;
Verification tip picture generation unit, for the part intercepted in described original image is set to white space, obtains the described verification tip picture of the white space comprising predetermined number.
Alternatively, described generation module 702 also comprises:
Interference picture generation unit, for adding foreground picture in described sub-pictures, obtains disturbing picture.
Alternatively, described judge module 705, for when have sent the first option picture group to described terminal, if receive the first picture to be verified, judge that whether described first picture to be verified is identical with the first designated pictures, described first designated pictures is made up of the Validation Answer Key picture in described first option picture group and described original image; And if described first picture to be verified is identical with described first designated pictures, the picture determining selected by described terminal is the Validation Answer Key picture in described first option picture group; And if described first picture to be verified is not identical with described first designated pictures, the picture determining selected by described terminal is not the Validation Answer Key picture in described first option picture group.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation optional embodiment of the present invention, this is no longer going to repeat them.
Fig. 8 is a kind of authentication means structural representation that the embodiment of the present invention provides.See Fig. 8, this device comprises: receiver module 801, checking image generating module 802 and sending module 803.
Receiver module 801, for Receipt Validation prompting picture and at least one option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Checking image generating module 802, for terminal according to user from the option picture selected in this option picture group and operation trace, generate picture to be verified;
Sending module 803, for sending described picture to be verified to server, makes described server carry out authentication to described terminal.
Alternatively, described checking image generating module 802 for when receive the second option picture in described option picture group choose instruction time, and the end point of described operation trace is arranged in the white space of described verification tip picture, described second option picture is filled to the white space that described end point is positioned at, generates picture to be verified.
Alternatively, described device also comprises:
Effect display module, for according to described operation trace and described second option picture, shows the animation effect of described second option picture according to described operation trace movement.
Authentication means provided by the invention, effectively can solve the problem that existing authentication Scheme Security performance is poor, the form successively verified not only increases automaton and cracks difficulty to authentication, also effectively reduce the efficiency that artificial stamp cracks operation simultaneously, avoid the malicious attack of malicious user to network.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation optional embodiment of the present invention, this is no longer going to repeat them.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (14)
1. an auth method, is characterized in that, described method comprises:
The authentication request of receiving terminal;
According to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Send described verification tip picture to described terminal, send described multiple option picture group to described terminal in batches;
Often receive a picture to be verified, judge whether the picture of described terminal selected in present option picture group is Validation Answer Key picture;
When the picture to be verified that basis receives, when determining have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stops sending next option picture group to described terminal;
When according to the picture to be verified received, when determining that the picture that described terminal is selected at every turn is described Validation Answer Key picture, the authentication of described terminal is passed through.
2. method according to claim 1, is characterized in that, according to original image, generates verification tip picture and multiple option picture group, comprising:
The sub-pictures of predetermined number is intercepted in described original image;
Using the sub-pictures of described predetermined number as Validation Answer Key picture;
The part intercepted in described original image is set to white space, obtains the described verification tip picture of the white space comprising predetermined number.
3. method according to claim 2, is characterized in that, described method also comprises:
In described sub-pictures, add foreground picture, obtain disturbing picture.
4. method according to claim 1, is characterized in that, often receives a picture to be verified, judges whether the picture of described terminal selected in present option picture group is that Validation Answer Key picture comprises:
When have sent the first option picture group to described terminal, if receive the first picture to be verified, judge that whether described first picture to be verified is identical with the first designated pictures, described first designated pictures is made up of the Validation Answer Key picture in described first option picture group and described original image;
If described first picture to be verified is identical with described first designated pictures, the picture determining selected by described terminal is the Validation Answer Key picture in described first option picture group;
If described first picture to be verified is not identical with described first designated pictures, the picture determining selected by described terminal is not the Validation Answer Key picture in described first option picture group.
5. an auth method, is characterized in that, comprising:
Receipt Validation prompting picture and at least one option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Terminal from the option picture selected in this option picture group and operation trace, generates picture to be verified according to user;
Send described picture to be verified to server, make described server carry out authentication to described terminal.
6. method according to claim 5, is characterized in that, terminal from the option picture selected in this option picture group and operation trace according to user, generates picture to be verified and comprises:
When receive the second option picture in described option picture group choose instruction time, and the end point of described operation trace is arranged in the white space of described verification tip picture, described second option picture is filled to the white space that described end point is positioned at, generates picture to be verified.
7. method according to claim 6, is characterized in that, described method also comprises:
According to described operation trace and described second option picture, show the animation effect of described second option picture according to described operation trace movement.
8. an authentication means, is characterized in that, described device comprises:
Receiver module, for the authentication request of receiving terminal;
Generation module, for according to original image, generate verification tip picture and multiple option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Sending module, for sending described verification tip picture to described terminal, sends described multiple option picture group to described terminal in batches;
Judge module, for often receiving a picture to be verified, judges whether the picture of described terminal selected in present option picture group is Validation Answer Key picture;
Authentication module, for the picture to be verified received when basis, when determining have arbitrary not to be described Validation Answer Key picture in the picture that described terminal is selected in present option picture group, the authentication of described terminal is not passed through, stop sending next option picture group to described terminal;
Described authentication module, also for when according to the picture to be verified received, when determining that the picture that described terminal is selected at every turn is described Validation Answer Key picture, passes through the authentication of described terminal.
9. device according to claim 8, is characterized in that, described generation module comprises:
Sub-pictures interception unit, for intercepting the sub-pictures of predetermined number in described original image;
Answer picture generation unit, for using the sub-pictures of described predetermined number as Validation Answer Key picture;
Verification tip picture generation unit, for the part intercepted in described original image is set to white space, obtains the described verification tip picture of the white space comprising predetermined number.
10. device according to claim 9, is characterized in that, described generation module also comprises:
Interference picture generation unit, for adding foreground picture in described sub-pictures, obtains disturbing picture.
11. devices according to claim 8, it is characterized in that, described judge module, for when have sent the first option picture group to described terminal, if receive the first picture to be verified, judge that whether described first picture to be verified is identical with the first designated pictures, described first designated pictures is made up of the Validation Answer Key picture in described first option picture group and described original image; And if described first picture to be verified is identical with described first designated pictures, the picture determining selected by described terminal is the Validation Answer Key picture in described first option picture group; And if described first picture to be verified is not identical with described first designated pictures, the picture determining selected by described terminal is not the Validation Answer Key picture in described first option picture group.
12. 1 kinds of authentication means, is characterized in that, comprising:
Receiver module, for Receipt Validation prompting picture and at least one option picture group, each option picture group comprises at least one Validation Answer Key picture and at least one interference picture, and described Validation Answer Key picture is determined by described original image and described verification tip picture;
Checking image generating module, for terminal according to user from the option picture selected in this option picture group and operation trace, generate picture to be verified;
Sending module, for sending described picture to be verified to server, makes described server carry out authentication to described terminal.
13. devices according to claim 12, it is characterized in that, described checking image generating module be used for when receive the second option picture in described option picture group choose instruction time, and the end point of described operation trace is arranged in the white space of described verification tip picture, described second option picture is filled to the white space that described end point is positioned at, generates picture to be verified.
14. devices according to claim 13, is characterized in that, described device also comprises:
Effect display module, for according to described operation trace and described second option picture, shows the animation effect of described second option picture according to described operation trace movement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410417696.8A CN105357008B (en) | 2014-08-22 | 2014-08-22 | Auth method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410417696.8A CN105357008B (en) | 2014-08-22 | 2014-08-22 | Auth method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105357008A true CN105357008A (en) | 2016-02-24 |
CN105357008B CN105357008B (en) | 2019-08-13 |
Family
ID=55332887
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410417696.8A Active CN105357008B (en) | 2014-08-22 | 2014-08-22 | Auth method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105357008B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131061A (en) * | 2016-08-22 | 2016-11-16 | 浙江宇视科技有限公司 | The method and device of authenticating user identification |
CN106485114A (en) * | 2016-11-10 | 2017-03-08 | 北京像素软件科技股份有限公司 | A kind of method and device of data verification |
CN107026842A (en) * | 2016-11-24 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of method and device of generation and the authentication of safety problem |
CN109117287A (en) * | 2018-08-14 | 2019-01-01 | 北京大米科技有限公司 | Match selection operation content synchronization system and method |
CN109522706A (en) * | 2018-10-24 | 2019-03-26 | 维沃移动通信有限公司 | A kind of information cuing method and terminal device |
CN109885179A (en) * | 2017-12-06 | 2019-06-14 | 英业达科技有限公司 | The calculating device and method thereof of control input number of characters |
CN110598421A (en) * | 2018-06-13 | 2019-12-20 | 杭州海康威视数字技术股份有限公司 | Two-dimensional code encryption method and device and two-dimensional code decryption method and device |
CN110751861A (en) * | 2019-11-28 | 2020-02-04 | 张丽丽 | Network remote education system based on cloud platform |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6829654B1 (en) * | 2000-06-23 | 2004-12-07 | Cloudshield Technologies, Inc. | Apparatus and method for virtual edge placement of web sites |
CN103312512A (en) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | Image verification code generating method, image verification code generating device, identity verification method and identity verification device |
CN103488934A (en) * | 2013-09-24 | 2014-01-01 | 刘雪英 | Method, device and system for inputting verification codes |
CN103731403A (en) * | 2012-10-12 | 2014-04-16 | 阿里巴巴集团控股有限公司 | Verification code generating system and method |
-
2014
- 2014-08-22 CN CN201410417696.8A patent/CN105357008B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6829654B1 (en) * | 2000-06-23 | 2004-12-07 | Cloudshield Technologies, Inc. | Apparatus and method for virtual edge placement of web sites |
CN103731403A (en) * | 2012-10-12 | 2014-04-16 | 阿里巴巴集团控股有限公司 | Verification code generating system and method |
CN103312512A (en) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | Image verification code generating method, image verification code generating device, identity verification method and identity verification device |
CN103488934A (en) * | 2013-09-24 | 2014-01-01 | 刘雪英 | Method, device and system for inputting verification codes |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106131061A (en) * | 2016-08-22 | 2016-11-16 | 浙江宇视科技有限公司 | The method and device of authenticating user identification |
CN106131061B (en) * | 2016-08-22 | 2021-04-20 | 浙江宇视科技有限公司 | User identity authentication method and device |
CN106485114A (en) * | 2016-11-10 | 2017-03-08 | 北京像素软件科技股份有限公司 | A kind of method and device of data verification |
CN107026842A (en) * | 2016-11-24 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of method and device of generation and the authentication of safety problem |
US10885178B2 (en) | 2016-11-24 | 2021-01-05 | Advanced New Technologies Co., Ltd. | Methods and devices for generating security questions and verifying identities |
CN109885179A (en) * | 2017-12-06 | 2019-06-14 | 英业达科技有限公司 | The calculating device and method thereof of control input number of characters |
CN109885179B (en) * | 2017-12-06 | 2022-05-27 | 英业达科技有限公司 | Computing device for controlling number of input characters and method thereof |
CN110598421A (en) * | 2018-06-13 | 2019-12-20 | 杭州海康威视数字技术股份有限公司 | Two-dimensional code encryption method and device and two-dimensional code decryption method and device |
CN110598421B (en) * | 2018-06-13 | 2021-10-15 | 杭州海康威视数字技术股份有限公司 | Two-dimensional code encryption method and device and two-dimensional code decryption method and device |
CN109117287A (en) * | 2018-08-14 | 2019-01-01 | 北京大米科技有限公司 | Match selection operation content synchronization system and method |
CN109522706A (en) * | 2018-10-24 | 2019-03-26 | 维沃移动通信有限公司 | A kind of information cuing method and terminal device |
CN110751861A (en) * | 2019-11-28 | 2020-02-04 | 张丽丽 | Network remote education system based on cloud platform |
Also Published As
Publication number | Publication date |
---|---|
CN105357008B (en) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105357008A (en) | Identity verification method and device | |
CN107612895B (en) | Internet anti-attack method and authentication server | |
CN106096343B (en) | Message access control method and equipment | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
KR101773885B1 (en) | A method and server for providing augmented reality objects using image authentication | |
CN105323065B (en) | Security verification method and device | |
CN109981653B (en) | Web vulnerability scanning method | |
CN107086979B (en) | User terminal verification login method and device | |
CN107196917B (en) | Service response method and middleware thereof | |
CN105245489B (en) | Verification method and device | |
US20170085567A1 (en) | System and method for processing task resources | |
CN105933353A (en) | Method and system for realizing secure login | |
CN105897782A (en) | Method and device for treating call request of interface | |
CN105306534A (en) | Information verification method based on open platform and open platform | |
WO2022227311A1 (en) | Access processing method for performing remote control on terminal, and device and storage medium | |
CN109698809A (en) | A kind of recognition methods of account abnormal login and device | |
CN113422687B (en) | Verification method, verification server and verification system | |
CN109407947A (en) | Interface alternation and its verification method, logging request generation and verification method and device | |
CN108390848A (en) | A kind of information witness method and device | |
CN105100093A (en) | Identity authentication method and identity authentication server | |
CN104519069A (en) | Method and device for intercepting resource requests | |
EP3334086A1 (en) | Online authentication method based on smart card, smart card and authentication server | |
CN110969474A (en) | Resource acquisition processing method, data processing system, storage medium and processor | |
CN109995821A (en) | Method and system, the client, server, object storage system of file upload | |
CN104079527A (en) | Information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |