CN108846274A - A kind of safe verification method, device and terminal - Google Patents
A kind of safe verification method, device and terminal Download PDFInfo
- Publication number
- CN108846274A CN108846274A CN201810312164.6A CN201810312164A CN108846274A CN 108846274 A CN108846274 A CN 108846274A CN 201810312164 A CN201810312164 A CN 201810312164A CN 108846274 A CN108846274 A CN 108846274A
- Authority
- CN
- China
- Prior art keywords
- picture
- verification
- information
- stylized
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Editing Of Facsimile Originals (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of safe verification method, device and terminals, belong to Internet communication technology field.This method includes:Send checking request;Receive and show image authentication code, described image identifying code includes the first picture and second picture, and the second picture is the picture cut from stylized picture, and first picture is the remaining picture after cutting off the second picture in stylized picture;The stylization picture is original image by the transformed picture of style;User is received to the verification operation of the second picture and generates verification information;The result of safety verification is shown according to the check results of the verification information.The present invention is based on the stylized pictures obtained after style transformation to generate image authentication code, improves the anti-machine crack ability of image authentication code.
Description
Technical field
The present invention relates to Internet communication technology field, in particular to a kind of safe verification method, device and terminal.
Background technique
Currently, identifying code using commonplace, being used to distinguish user is machine or the mankind, can effectively be prevented
Only malice decryption, brush ticket, the generation for phenomena such as forum pours water.
Image authentication code is a seed type of identifying code, and existing image authentication code is by being scratched on the original image except office
The identifying code that portion's block is formed, when verifying, need user that will be scratched the localized mass removed to be moved to home position from new position, thus will
Image authentication code is reduced to original image.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
In the related technology, machine with original image by being compared the image after scratching except localized mass to obtain difference
Figure can directly obtain the new position and home position for being scratched the localized mass removed, based on the disparity map so as to by that will locate
Localized mass in new position is moved to its home position and is cracked, and the anti-crack ability of identifying code is poor.Although in the prior art
Add random noise to handle original image to improve the means of the anti-crack ability of image authentication code in the presence of taking, but passes through drop
It makes an uproar etc. after processing, machine is still able to be relatively easy to obtain the new position for being scratched the localized mass removed and home position, therefore,
Its anti-attack ability is still poor.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of safe verification method, device, terminal and
Storage medium.The technical solution is as follows:
In a first aspect, a kind of safe verification method is provided, the method includes:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, second figure
Piece is the picture cut from stylized picture, and first picture is remained after cutting off the second picture in stylized picture
Remaining picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
Second aspect provides a kind of safe verification method, the method includes:
Receive checking request;
In response to the checking request to obtain image authentication code, described image identifying code includes the first picture and the second figure
Piece, the second picture are the pictures cut from stylized picture, and first picture is that institute is cut off from stylized picture
State remaining picture after second picture;The stylization picture is original image by the transformed picture of style;
Described image identifying code is sent, and receives verification information;The verification information is according to user to second figure
The verification operation of piece and generate;
Check results are generated according to the verification information, and send the check results.
The third aspect, provides a kind of safety verification device, and described device includes:
Request sending module, for sending checking request;
Identifying code receiving module, for receiving and showing image authentication code, described image identifying code include the first picture and
Second picture, the second picture are the pictures cut from stylized picture, and first picture is from stylized picture
Cut off remaining picture after the second picture;The stylization picture is original image by the transformed picture of style;
Verification information generation module, for receiving user to the verification operation of the second picture and generating verification information
Verification result display module, for showing the result of safety verification according to the check results of the verification information.
Fourth aspect, provides a kind of safety verification device, and described device includes:
Request receiving module, for receiving checking request;
Second obtains module, for obtaining image authentication code, described image identifying code packet in response to the checking request
Include the first picture and second picture, the second picture is the picture cut from stylized picture, first picture be from
Remaining picture after the second picture is cut off in stylized picture;The stylization picture is that original image is converted by style
Picture afterwards;
First sending module, for sending described image identifying code;
Second receiving module, for receiving verification information;The verification information is according to user to the second picture
Verification operation and generate;
Check results sending module for generating check results according to the verification information, and sends the check results.
5th aspect, provides a kind of terminal, including:Processor and memory;Wherein, the memory is stored with calculating
Machine program, the computer program are suitable for being loaded by the processor and executing following steps:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, second figure
Piece is the picture cut from stylized picture, and first picture is remained after cutting off the second picture in stylized picture
Remaining picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
6th aspect, provides a kind of computer storage medium, which is stored with computer program and refers to
It enables, which is performed, and realizes above-mentioned safe verification method.
Technical solution bring beneficial effect provided in an embodiment of the present invention is:
In the embodiment of the present invention, since the stylized picture that style converts is difficult to obtain original graph by inverse transformation
Therefore piece based on the image authentication code that stylized picture generates, enables to machine by comparing image authentication code and original graph
Piece obtains differentiation image to determine that position of the second picture in original image becomes relatively difficult, improves image authentication code
Anti- machine crack ability.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification
Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the
Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention
With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is the schematic diagram of implementation environment provided in an embodiment of the present invention;
Fig. 2 is the architecture diagram of server provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of safe verification method provided in an embodiment of the present invention;
Fig. 4 is the generation method flow chart of image authentication code provided in an embodiment of the present invention;
Fig. 5 be it is provided in this embodiment use depth convolutional neural networks model to original image carry out style transformation with life
At the exemplary diagram of stylized picture;
Fig. 6 is the method flow diagram provided in an embodiment of the present invention that check results are generated according to verification information;
Fig. 7 is the method flow of the check results provided in an embodiment of the present invention that verification information is generated according to pixel value difference
Figure;
Fig. 8 is the flow chart of another safe verification method provided in an embodiment of the present invention;
Fig. 9 is the flow chart of another safe verification method provided in an embodiment of the present invention;
Figure 10 is the flow chart of another safe verification method provided in an embodiment of the present invention;
Figure 11 is a kind of block diagram of safety verification device provided in an embodiment of the present invention;
Figure 12 is the block diagram of identifying code generation module provided in an embodiment of the present invention;
Figure 13 is the block diagram of check results generation module provided in an embodiment of the present invention;
Figure 14 is the block diagram of another safety verification device provided in an embodiment of the present invention;
Figure 15 is the structural schematic diagram of terminal provided in an embodiment of the present invention;
Figure 16 is the structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Referring to FIG. 1, it illustrates the schematic diagram of implementation environment provided in an embodiment of the present invention, which includes:
Terminal 01 and server 02.
It should be noted that the safe verification method of the embodiment of the present invention can be applied to the safety verification of the embodiment of the present invention
Device.Wherein, terminal 01 may include supporting network function:Smart phone, tablet computer, E-book reader, MP3 are played
Device (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level
3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio layer
Face 4) player, pocket computer on knee, vehicle-mounted computer, wearable device, desktop computer, set-top box, smart television, one
Body machine etc..
Server 02 can be a server, be also possible to the server cluster consisted of several servers.
Server 02 can be established by network and terminal 01 and be communicated to connect.The network can be wireless network, can also be with
It is cable network.
In one example, as shown in Fig. 2, server 02 may include when server 02 is aggregated structure:Webpage clothes
Business device 021, identifying code server 022, picture storage server 023, stylized server 024 and authentication server 025,
In:
Web page server 021 with terminal 01, identifying code server 022 and authentication server 025 for interacting.Example
Such as, web page server 021 receives the checking request that user is sent by terminal 01, sends image authentication code etc. to terminal 01.Net
The school that page server 021 can also receive the image authentication code of the transmission of identifying code server 022 and authentication server 025 is sent
Test result.
Identifying code server 022 is used to provide the function of generating image authentication code.Picture storage server 023 is for providing
Store the function for generating the original image of image authentication code.Stylized server 024 carries out original image for providing
The function of style transformation.Authentication server 025 is for providing the function of safety verification.
It can be established and be communicated to connect by network between above-mentioned each server.The network can be wireless network, can also be with
It is cable network.
Referring to FIG. 3, this method can it illustrates a kind of flow chart of safe verification method provided in an embodiment of the present invention
Applied in implementation environment shown in FIG. 1.As shown in figure 3, the safe verification method may include:
Step 301, checking request is sent.
When user needs to log in, checking request can be sent by terminal to server, by the checking request from clothes
Business device pulls identifying code.
Step 302, it receives and shows image authentication code.
In embodiments of the present invention, terminal receives and shows the image authentication code obtained based on above-mentioned checking request, should
Image authentication code includes the first picture and second picture, which is the picture cut from stylized picture, this first
Picture is the remaining picture after cutting off above-mentioned second picture in stylized picture.
Above-mentioned stylization picture is the picture obtained after style converts for generating the original image of image authentication code.
Style transformation can refer to through certain algorithm, and the image in original image is converted into possess certain specific style
Image, to generate stylized picture.The style of image is mainly the detail textures passed through in image, the expression way of lines
It is embodied with coloring style, so the style conversion of picture is exactly that the texture in original image is converted to certain with coloring style to refer to
The style of reference style image is transformed into another input picture by fixed style, for example, a kind of reference picture is selected,
Can will be in different illumination, different periods, the photo of Various Seasonal shooting translates into different styles art uply.
Original image obtains the stylized picture of the original image after style converts, and general machine is more difficult by the style
Change picture and carries out inverse transformation to obtain original image.
In embodiments of the present invention, the generating mode of above-mentioned image authentication code can use method shown in Fig. 4.Fig. 4 institute
It is shown as the generation method flow chart of image authentication code provided in an embodiment of the present invention, as shown in figure 4, this method includes:
Step 401, the original image for generating image authentication code is obtained.
In embodiments of the present invention, original image is pre-stored picture in database, obtains the mode of original image
It can be random acquisition, be also possible to according to preset Rule.
Step 402, stylized picture is obtained according to above-mentioned original image.
In embodiments of the present invention, above-mentioned acquisition stylization picture can be under the triggering of checking request, according to original
The stylized picture that picture generates in real time is also possible to obtain pre-generated stylized picture according to original image, this is in advance
The stylized picture of generation can store in the database.
In embodiments of the present invention, can use depth convolutional neural networks model to original image carry out style transformation with
Generate stylized picture.
For example, can include 16 using preparatory trained 19 layers of VGG network (referred to as VGG-19), the VGG network
The feature space that convolutional layer and 5 pond layers provide, the convolution kernel size of each convolutional layer is 3, step-length 1, while each
There is the nonlinear activation layer of a ReLU behind convolutional layer, treated that output is that image stylization obtains through the function
Characteristic pattern.
Style transformation will common image become the style of another style image, basic principle is:It is one given
The secondary style image S of picture X and one, finds a picture Y, so that Y is close with X in terms of content, while close with S in style.
The content and style of picture can be to be extracted by trained VGG-19 network.
It is that depth convolutional neural networks model is used to carry out style transformation to original image to generate stylization as shown in Figure 5
The exemplary diagram of picture, wherein picture pointed by arrow is original image, and the picture of arrow root is that style picture is used for wind
For the sample of case transformation with reference to figure, the picture below arrow is the stylized picture of depth convolutional neural networks model output, it is seen then that
The content of the stylization picture is close with original image, and its style is close with style picture.
VGG-19 network trained for one, using picture A as input, so that it may several groups characteristic pattern is obtained, this
The structure of a little characteristic patterns is [H, W, C], wherein H and W respectively represents the height and width of characteristic pattern, and C represents the number of characteristic pattern, should
[H, W, C] can represent the content of A, the Multidimensional numerical F (X) that structure is [H*W, C] be obtained after deformation, to the multidimensional number
Group F (X) asks gram matrix G=Gram (F (X)), the textural characteristics of available X, i.e. style.
After the extracting mode for defining content and style, image style convert the problem of can by way of optimization solution
Certainly.Assuming that Y is according to the image of the content of X and the synthesis of the style of S, the content error of Y and X are:
The style error of Y and S is:
To which global error is:
LA=α LC+β·LS
Wherein, α is content proportion in global error, and β is style proportion in global error, α and β value
The different representatives of size are different to the emphasis of content and style.
The algorithm of style transformation can be based on iteration optimization, specially:1) random initializtion image Y;2) whole mistake is found out
Poor LA;3) each point pixel value of Y is adjusted according to gradient descent algorithm;If 4) LAConvergence is less than preset threshold, then stops
Otherwise only iteration continues the 2) step.
Since depth convolutional neural networks usually have at least millions of parameters, so complicated parameter transformation to think
The stylized picture obtained after style is converted carries out inverse transformation and is difficult to realize with obtaining original image.
Step 403, local picture is cut from stylized picture as second picture.
Remaining picture is as the first picture after stylized picture cuts off above-mentioned second picture, it should be noted that second
The shapes and sizes of picture can be randomly generated, as the second picture shape can for quadrangle, pentagon, ellipse, circle,
The size of triangle and irregular figure etc., the second picture can be changed by the form parameter being randomly generated, should
The form parameter being randomly generated can be round radius, elliptical long axis and short axle, the side length of triangle etc..
In embodiments of the present invention, in order to increase the difficulty that machine cracks image authentication code, safety verification is being initiated every time
When, the shape and/or size of the second picture in image authentication code generate in a random way, so, it will be difficult to which prediction is each
In secondary safety verification, the shapes and sizes of the second picture in image authentication code shown by terminal are conducive to raising image and test
The anti-crack ability of card.
Step 404, the first location information of second picture is obtained, which is second picture in above-mentioned stylization figure
Position in piece.
Believe after cutting second picture in stylized picture, obtaining position of the second picture in stylized picture
Breath is used as first location information.It should be understood that the first location information can be used to indicate that the home position of second picture.
It should be noted that above-mentioned first location information can be the center of second picture in stylized picture
Position coordinates.
Step 405, second picture is moved to the second position from first position to generate image authentication code, the second position
For any position in the first picture.
It should be understood that the second position is the position of second picture new placement.
It should be noted that before generating image authentication code, may be used also to improve the anti-crack ability of image authentication code
The second picture for being moved to the second position is rotated by a certain angle or be overturn.It is, of course, also possible to in the first picture
Blank position (i.e. default position) carry out simple pattern or color filling, to increase the difficulty that machine searches the position.
In embodiments of the present invention, in order to increase the difficulty that machine cracks image authentication code, safety verification is being initiated every time
When, the position (i.e. the second position) of the home position (i.e. first position) of the second picture in image authentication code and new placement with
The mode of machine generates, and will so increase the difficulty of the position in the home position and new placement of machine acquisition second picture, is conducive to
Improve the anti-crack ability of image authentication code.
In embodiments of the present invention, the image authentication code generated based on the stylized picture obtained after style transformation includes upper
The first picture and second picture are stated, second picture can be mobile relative to the first picture, or operate also to second picture
It can make its overturning, or rotate by a certain angle around a certain fixed point.For example, it can be made by choosing second picture to drag it
It is mobile relative to the first picture;Its overturning can be made by clicking second picture;The certain point in second picture is clicked, its rotation can be made
Turn certain angle.
Since the transformed picture of style may have certain abstractness, the first picture and that user sees
Two pictures may be uncomfortable on visual experience, in order to improve the experience effect of user, so that the user as people is seeing
It is unlikely to generate lofty feeling when image authentication code, and ensures that the user as people can pass through safety verification, this hair
In bright embodiment, before step 302, terminal can also receive the original image for generating image authentication code and show the original
Beginning picture is so that user can first see original before seeing image authentication code (stylized second picture and the first picture)
Beginning picture.
Step 303, user is received to the verification operation of second picture and generate verification information.
In embodiments of the present invention, user includes mobile second picture to the verification operation of above-mentioned second picture, for example is selected
Middle second picture and the default position for being dragged to the first picture.It will of course be understood that, above-mentioned verification operation can also wrap
Include overturning second picture and rotation second picture.
In embodiments of the present invention, verification information includes the third place information of above-mentioned second picture, the third place letter
Breath is the location information of the second picture after the above-mentioned second picture of user's operation.
Above-mentioned the third place information can be position of the center of the second picture after movement in the first picture
Coordinate.
It should be noted that above-mentioned verification information can also include the image information and rotation angle letter of second picture
Breath.
Step 304, the result of safety verification is shown according to the check results of verification information.
Terminal obtains the check results of verification information and shows the result of this safety verification according to the check results.It can be with
Understand, the result of safety verification includes not by safety verification and by safety verification, and terminal can be by the knot of safety verification
Fruit shows user with written form, it is, of course, also possible to inform user by way of voice broadcast.
In embodiments of the present invention, the check results of verification information can be generated using method shown in fig. 6.Shown in Fig. 6
For it is provided in an embodiment of the present invention according to verification information generate check results method flow diagram, as shown in fig. 6, this method packet
It includes:
Step 601, according to the first Pixel Information of the third place acquisition of information of second picture.
Terminal generates and obtains verification information when receiving verification operation of the user to second picture, which includes
The third place information of second picture, the third place information are the positions of the second picture after user's operation second picture
Information.
Terminal further obtains the first Pixel Information according to the third place information of the second picture of acquisition, such as works as the third
When location information is position coordinates of the center of the second picture after movement in the first picture, first Pixel Information
For the pixel value of the center of the second picture after the movement.
Step 602, the second Pixel Information is obtained according to the first location information of second picture.
When generating image authentication code, the first location information of second picture is obtained, i.e. second picture is schemed in stylization
The original position-information of on piece.In the generating process for carrying out check results, terminal is according to first of the second picture of acquisition
Confidence breath further obtains the second Pixel Information, such as when the center that the first location information is second picture is schemed in stylization
When position coordinates in piece, which is the pixel value of the center of the second picture.
Step 603, pixel value difference is calculated according to above-mentioned first Pixel Information and the second Pixel Information.
Terminal calculates the first pixel value and the second pixel value after getting the first Pixel Information and the second Pixel Information
Pixel value difference.
Step 604, the check results of verification information are generated according to above-mentioned pixel value difference.
After the pixel value difference for calculating the first pixel value and the second pixel value, terminal generates phase according to the pixel value difference
The check results for the verification information answered.
In embodiments of the present invention, it can be used according to the check results that pixel value difference generates verification information shown in Fig. 7
Method.Fig. 7 show the method flow of the check results provided in an embodiment of the present invention that verification information is generated according to pixel value difference
Figure, as shown in fig. 7, this method includes:
Step 701, judge whether above-mentioned pixel value difference is greater than preset threshold.
After the pixel value difference for calculating the first pixel value and the second pixel value, terminal judges whether the pixel value difference is big
In preset threshold, which is pre-set pixel value difference, if the preset threshold can be 5 pixels.
Step 702, if above-mentioned pixel value difference is greater than preset threshold, the unsanctioned result of verification is generated.
If the pixel value difference is greater than preset threshold, for example, after the mobile second picture of user, after the movement that terminal obtains
The pixel value of the center of second picture and the difference of the pixel value of the center of the second picture in stylized picture are big
In preset threshold, can interpretation to go out to carry out the user of safety verification at present be machine, to generate the unsanctioned result of verification.?
It generates after verifying unsanctioned result, terminal shows that safety verification does not pass through to user according to the result.
Step 703, if above-mentioned pixel value difference is less than or equal to preset threshold, the result that verification passes through is generated.
If the pixel value difference is less than or equal to preset threshold, for example, after the mobile second picture of user, the shifting of terminal acquisition
The pixel value of the center of the second picture in the pixel value of the center of second picture after dynamic and stylized picture
Difference be less than or equal to preset threshold, can interpretation go out at present carry out safety verification user be not machine, to generate
Verify the result passed through.After generating the result that verification passes through, terminal shows that safety verification passes through to user according to the result.
It should be noted that can also be carried out according to pixel value difference to improve the anti-crack ability of image authentication code
On the basis of safety verification, the image information and rotation angle further progress safety verification according to second picture are considered, when
When pixel value difference, image information, rotation angle are all satisfied the requirement of setting, generation currently verifies the result passed through.
To sum up, safe verification method provided by the embodiment of the present invention, the stylized picture converted due to style is very
It is difficult that original image is obtained by inverse transformation, therefore, based on the image authentication code that stylized picture generates, machine is enabled to pass through
It compares image authentication code and obtains differentiation image with original image to determine that position of the second picture in original image becomes to compare
It is more difficult, improve the anti-machine crack ability of image authentication code.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification
Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the
Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention
With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
Referring to FIG. 8, it illustrates the flow chart of another safe verification method provided in an embodiment of the present invention, this method
It can be applied in implementation environment shown in FIG. 1.As shown in figure 8, the safe verification method may include:
Step 801, the checking request that terminal is sent is received.
The checking request for being used to pull identifying code that server receiving terminal is sent, the identifying code can be used for terminal
User carries out safety verification.
Step 802, in response to above-mentioned checking request to obtain image authentication code.
After server receives checking request, in response to the checking request to obtain image authentication code.Implement in the present invention
In example, image authentication code includes the first picture and second picture, which is the picture cut from stylized picture, should
First picture is the remaining picture after cutting off above-mentioned second picture in stylized picture.
Above-mentioned stylization picture is the picture obtained after style converts for generating the original image of image authentication code.
The generating mode of image authentication code in the step may refer to embodiment of the method shown in Fig. 4, no longer superfluous herein
It states.
Step 803, image authentication code is sent, and receives verification information.
After server generates in response to checking request and obtains image authentication code, which is sent to end
End so that the image authentication code is shown to user by terminal, and request user to above-mentioned second picture carry out verification operation with
Generate verification information.
In embodiments of the present invention, terminal user includes that user carries out second picture to the verification operation of second picture
Moving operation can also include overturning and rotation process of the user to second picture.
In embodiments of the present invention, the received verification information of server includes the third place information of second picture, this
Three location informations are the location informations of the second picture after the above-mentioned second picture of user's operation.
Above-mentioned the third place information can be position of the center of the second picture after movement in the first picture
Coordinate.
It should be noted that above-mentioned verification information can also include the image information and rotation angle letter of second picture
Breath.
In embodiments of the present invention, terminal can send above-mentioned verification information, the operation in response to the operational order of user
Instruction can be user and click submitting button, the submission instruction issued.
It should be noted that since the transformed picture of style may have certain abstractness, terminal display is given
The first picture and second picture of user may make the visual experience of user uncomfortable, in order to improve the experience effect of user,
So that the user as people is unlikely to generate lofty feeling when seeing image authentication code, and ensure that the user as people can
Pass through safety verification, in the embodiment of the present invention, before step 803, server can also will be used to generate image authentication
The original image of code is sent to terminal, so that the original image is shown to user by terminal.
In embodiments of the present invention, the request for the display image authentication code that server can be sent according to terminal is obtained above-mentioned
The image authentication code taken is sent to terminal, the image authentication code just can also be sent to end after having obtained image authentication code
End can also set directional terminals and send original image and send the time interval of image authentication code to terminal, when time interval reaches
Then, server sends the image authentication code to terminal.It will of course be understood that, which should be able to complete
The generation of above-mentioned image authentication code operates.
Step 804, check results are generated according to above-mentioned verification information, and sends the check results.
After the verification information that server receiving terminal returns, check results are generated according to the verification information, and verification
As a result it is sent to terminal, so that terminal shows the knot of safety verification according to the check results of its received verification information to user
Fruit.
In this step, the generating mode of check results may refer to Fig. 6 and embodiment of the method shown in Fig. 7, herein not
It repeats again.
In one example, when server is aggregated structure shown in Fig. 2, which can be such as Fig. 9 institute
Show and includes the following steps:
Step 901, terminal sends checking request to web page server.
When user needs login service device, terminal can send checking request to web page server 021.
Correspondingly, web page server 021 receives the checking request that terminal 01 is sent.
Step 902, web page server sends the request for pulling identifying code to identifying code server.
Web page server 021 receives user and passes through the operation requests that terminal 01 is sent, according to the operation requests, to identifying code
Server 022 sends the request for pulling identifying code, which carries out testing for safety verification for obtaining to identifying code server 022
Demonstrate,prove code.
Correspondingly, identifying code server 022 receives the request for pulling identifying code that web page server 021 is sent.
Step 903, identifying code server obtains the original image for generating image authentication code from picture storage server,
And the original image is sent to web page server.
In embodiments of the present invention, a large amount of original image is stored in picture storage server 023.Identifying code server
022 acquisition can be random acquisition for generating the mode of the original image of image authentication code, be also possible to according to scheduled rule
Then obtain.
After identifying code server 022 gets original image from picture storage server 023, which is sent
To web page server 021.
In embodiments of the present invention, above-mentioned original image can also be sent to stylized service by identifying code server 022
Device 024.
Correspondingly, web page server 021 and stylized server receive the original graph of the transmission of identifying code server 022 respectively
Piece.
Step 904, above-mentioned original image is sent to terminal by web page server.
Web page server 021 sends out the original image after the original image for receiving the transmission of identifying code server 022
Terminal 01 is given, so that the original image is shown to user by terminal 01.
Step 905, stylized server carries out style transformation to above-mentioned original image to generate stylized picture.
Stylized server 024 is after the original image for receiving the transmission of identifying code server 022, to the original image
Style transformation is carried out, the transformed picture of style is stylized picture.
In embodiments of the present invention, style can be carried out using original image of the depth convolutional neural networks model to input
Transformation.
For example, can include 16 using preparatory trained 19 layers of VGG network (referred to as VGG-19), the VGG network
The feature space that convolutional layer and 5 pond layers provide, the convolution kernel size of each convolutional layer is 3, step-length 1, while each
There is the nonlinear activation layer of a ReLU behind convolutional layer, treated that output is that image stylization obtains through the function
Characteristic pattern.
Style transformation will common image become the style of another style image, basic principle is:It is one given
The secondary style image S of picture X and one, finds a picture Y, so that Y is close with X in terms of content, while close with S in style.
The content and style of picture can be to be extracted by trained VGG-19 network.
VGG-19 network trained for one, using picture A as input, so that it may several groups characteristic pattern is obtained, this
The structure of a little characteristic patterns is [H, W, C], wherein H and W respectively represents the height and width of characteristic pattern, and C represents the number of characteristic pattern, should
[H, W, C] can represent the content of A, the Multidimensional numerical F (X) that structure is [H*W, C] be obtained after deformation, to the multidimensional number
Group F (X) asks gram matrix G=Gram (F (X)), the textural characteristics of available X, i.e. style.
After the extracting mode for defining content and style, image style convert the problem of can by way of optimization solution
Certainly.Assuming that Y is according to the image of the content of X and the synthesis of the style of S, the content error of Y and X are:
The style error of Y and S is:
To which global error is:
LA=α LC+β·LS
Wherein, α is content proportion in global error, and β is style proportion in global error, α and β value
The different representatives of size are different to the emphasis of content and style.
The algorithm of style transformation can be based on iteration optimization, specially:1) random initializtion image Y;2) whole mistake is found out
Poor LA;3) each point pixel value of Y is adjusted according to gradient descent algorithm;If 4) LAConvergence is less than preset threshold, then stops
Otherwise only iteration continues the 2) step.
Since depth convolutional neural networks usually have at least millions of parameters, so complicated parameter transformation to think
The stylized picture obtained after style is converted carries out inverse transformation and is difficult to realize with obtaining original image.
Step 906, stylized server sends above-mentioned stylized picture to identifying code server.
After stylized server 024 carries out the stylized picture of style transformation generation to original image, which is schemed
Piece is sent to identifying code server 022.
Correspondingly, identifying code server 022 receives the stylized picture that stylized server 024 is sent.
Step 907, identifying code server generates image authentication code according to above-mentioned stylized picture.
After identifying code server 022 gets stylized picture, image authentication code, the figure are generated according to the stylization picture
Picture identifying code includes the first picture and second picture, and second picture is the picture cut from above-mentioned stylized picture, the first figure
Piece is the remaining picture after cutting off above-mentioned second picture in above-mentioned stylized picture.Second picture can be relative to the first picture
Mobile, its overturning can also be made or rotate by a certain angle around a certain fixed point by perhaps operating to second picture.For example, choosing
Middle second picture, which drags it, can make it mobile relative to the first picture;Its overturning can be made by clicking second picture;Point
The certain point in second picture is selected, it can be made to rotate by a certain angle.
The generating mode of above-mentioned image authentication code may refer to embodiment of the method shown in Fig. 4, and details are not described herein.
It should be noted that identifying code server 022 can obtain above-mentioned second figure during generating image authentication code
The first location information of piece, the first position are position of the second picture in above-mentioned stylized picture.Identifying code server 022
The first location information of above-mentioned second picture is sent to authentication server 025.
Correspondingly, authentication server 025 receives the first location information for the second picture that identifying code server 022 is sent.
Step 908, above-mentioned image authentication code is sent to web page server by identifying code server.
Identifying code server 022 is sent to webpage clothes after the generation for completing image authentication code, by the image authentication code
Business device 021.
Correspondingly, web page server 021 receives the image authentication code that identifying code server 022 is sent.
Step 909, above-mentioned image authentication code is sent to terminal by web page server, and the terminal is for receiving to above-mentioned second
The verification operation of picture simultaneously generates verification information.
After web page server 021 receives image authentication code, which is sent to terminal 01, so that eventually
The image authentication code is shown to user by end 01, and is received user to the verification operation of above-mentioned second picture and generated verifying letter
Breath.
User includes mobile second picture to the verification operation of above-mentioned second picture, for example chooses second picture and dragged
Move a certain position.It will of course be understood that, above-mentioned verification operation can also include the second figure of overturning second picture and rotation
Piece.
Verification information includes the location information of above-mentioned second picture, and the location information of the second picture is that user's operation is above-mentioned
After second picture, the location information of the second picture.
Certainly, which can also include the image information and rotation angle information of second picture.
Correspondingly, terminal 01 receives the image authentication code that web page server 021 is sent.
In embodiments of the present invention, timer can be set in web page server 021, the timer is for being arranged webpage clothes
Business device 021 sends original image and sends the time interval of image authentication code, when preset time interval reaches, web service
Image authentication code is sent to terminal by 021 ability of device.
It should be understood that web page server can also receive terminal transmission image authentication code send request after,
The image authentication code is sent to terminal again.
Step 910, terminal shows above-mentioned image authentication code.
Terminal 01 shows the image authentication code after receiving image authentication code, enables a user to see
To image authentication code.
Step 911, terminal monitoring second picture receives user to the verification operation of above-mentioned second picture, generates verifying letter
Breath.
Above-mentioned verification information includes the third place information of second picture, and the third place information of the second picture is user
After operating above-mentioned second picture, the location information of the second picture.
Certainly, above-mentioned verification information can also include the image information and rotation angle information of second picture.
Step 912, the check results for sending above-mentioned verification information to web page server, and web page server being waited to send.
Terminal sends above-mentioned verification information in response to the operational order of user, such as works as terminal user and clicks submitting button, under
After hair submits instruction, the verification information of generation is sent to web page server 021 by terminal, and web page server 021 is waited to return
Check results.
Correspondingly, web page server 021 receives the verification information that terminal 01 is sent.
Step 913, above-mentioned verification information is sent to authentication server by web page server.
Correspondingly, authentication server receives above-mentioned verification information.
Step 914, authentication server carries out safety verification according to above-mentioned verification information, and check results are sent to webpage
Server.
After authentication server 025 receives verification information, safety verification is carried out to generate check results, is specifically verified
As a result generating process refers to Fig. 6 and Fig. 7, and therefore not to repeat here.
After generating check results, check results are sent to web page server 021 by authentication server 025.The verification knot
Fruit does not pass through including verification and verification passes through.
Correspondingly, web page server 021 receives check results.
Step 915, check results are sent to terminal by web page server.
Corresponding terminal receives the check results that web page server is sent.
Step 916, terminal shows the result of safety verification according to check results.
After web page server 021 receives check results, which is sent to terminal 01 so that terminal according to
The check results show the result of safety verification.Specifically, terminal is shown to user pacifies when check results are that verification does not pass through
Verify entirely unsanctioned as a result, terminal shows the result that safety verification passes through to user when check results pass through for verification.
Referring to Fig. 10, its flow chart for showing another safe verification method provided in an embodiment of the present invention.This reality
Applying example can be applied in application environment shown in Fig. 2, realize the safety verification side by terminal shown in Fig. 2 and each server
Method.As shown in Figure 10, which includes:
Step 1001, stylized server obtains original image from picture storage server.
Step 1002, stylized server carries out style transformation to original image to generate stylized picture, and will generate
Stylized picture be sent to picture storage server.Style transformation specifically is carried out to generate stylized picture to original image
Correlative detail may refer to step 905, do not repeat herein.
Correspondingly, picture storage server receives the stylized picture that stylized server is sent.
Step 1003, picture storage server stores the corresponding pass of stylized picture and original image with stylized picture
System.
After picture storage server receives stylized picture, the corresponding pass between original image and stylized picture is established
System, and stores the corresponding relationship so that it is subsequent can be found according to the original image of acquisition it is corresponding with the original image
Stylized picture.
Step 1004, terminal sends checking request to web page server.
Step 1005, web page server sends the request for pulling identifying code to identifying code server.
Step 1006, identifying code server obtains the original graph for generating image authentication code from picture storage server
Piece, and the original image is sent to web page server.
Step 1007, above-mentioned original image is sent to terminal by web page server.
It can be with it should be noted that original image can not also be sent to terminal by web page server, i.e., after step 1006
Directly execute step 1008.
Step 1008, identifying code server obtains stylization corresponding with above-mentioned original image from picture storage server
Picture.
Step 1009, identifying code server generates image authentication code according to above-mentioned stylized picture.
Step 1010, above-mentioned image authentication code is sent to web page server by identifying code server.
Step 1011, above-mentioned image authentication code is sent to terminal by web page server.
Step 1012, terminal receives and shows above-mentioned image authentication code.
Step 1013, terminal receives user to the verification operation of second picture, generates verification information.
Step 1014, terminal sends above-mentioned verification information to web page server, and the verification for waiting web page server to send
As a result.
Step 1015, above-mentioned verification information is sent to authentication server by web page server.
Step 1016, authentication server carries out safety verification according to above-mentioned verification information, and check results are sent to net
Page server.
Step 1017, check results are sent to terminal by web page server.
Step 1018, terminal shows the result of safety verification according to check results.
Specifically, step 1009 to step 1018 can be with reference to abovementioned steps 907 to step 916, therefore not to repeat here.
To sum up, safe verification method provided by the embodiment of the present invention, the stylized picture converted due to style is very
It is difficult that original image is obtained by inverse transformation, therefore, based on the image authentication code that stylized picture generates, machine is enabled to pass through
It compares image authentication code and obtains differentiation image with original image to determine that position of the second picture in original image becomes to compare
It is more difficult, improve the anti-machine crack ability of image authentication code.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification
Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the
Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention
With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
Please refer to Figure 11 which shows a kind of block diagram of safety verification device provided in an embodiment of the present invention, device tool
There is the function of realizing terminal side in above method embodiment, the function can also execute phase by hardware by hardware realization
The software realization answered.As shown in figure 11, which may include:Request sending module 1101, identifying code connects
Receive module 1102, verification information generation module 1103 and verification result display module 1104.
Request sending module 1101, for sending checking request.
Identifying code receiving module 1102, for receiving and showing image authentication code, which includes the first picture
And second picture, wherein second picture is the picture cut from stylized picture, and the first picture is cut from stylized picture
Except picture remaining after second picture;Stylized picture is original image by the transformed picture of style.
Optionally, original image can be input in depth convolutional neural networks model and carries out style transformation to obtain wind
It formats picture.
Verification information generation module 1103, for receiving user to the verification operation of second picture and generating verification information.
Above-mentioned verification information includes the third place information of second picture, which is the second figure of user's operation
After piece, the location information of second picture.
Verification result display module 1104, for showing the result of safety verification according to the check results of verification information.
Optionally, as shown in figure 11, which can also include the identifying code generation module for generating image authentication code
1105.As shown in figure 12, which may include:First obtains module 1105a, and stylized picture obtains
Module 1105b, cuts module 1105c, and first position module 1105d and first generates submodule 1105e, wherein
First obtains module 1105a, for obtaining the original image for generating image authentication code.
Stylized picture obtains module 1105b, for obtaining stylized picture according to the original image.
Module 1105c is cut, for cutting local picture from stylized picture as the second picture.
First position module 1105d, for obtaining the first location information of second picture, which is second picture
Position in above-mentioned stylized picture.
First generates submodule 1105e, for second picture to be moved to the second position from first position to generate image
Identifying code, the second position are any position in the first picture.
Optionally, as shown in figure 11, which can also include the verification knot for generating the check results of verification information
Fruit generation module 1106.As shown in figure 13, which may include:First pixel obtains module
1106a, the second pixel obtain module 1106b, and pixel value difference computing module 1106c and second generates submodule 1106d, wherein
First pixel obtains module 1106a, for the first Pixel Information of the third place acquisition of information according to second picture.
In embodiments of the present invention, the verification information that verification information generation module 1103 generates includes the third of second picture
Location information, the third place information are the location informations of the second picture after user's operation second picture.
Second pixel obtains module 1106b, for obtaining the second Pixel Information according to the first location information of second picture.
Pixel value difference computing module 1106c, for calculating pixel according to above-mentioned first Pixel Information and the second Pixel Information
Difference.
Second generates submodule 1106d, for generating the check results of verification information according to above-mentioned pixel value difference.
Optionally, as shown in figure 11, which can also include the first receiving module 1107, first receiving module 1107
For receiving and showing the original image for generating image authentication code.
Please refer to Figure 14 which shows the block diagram of another kind safety verification device provided in an embodiment of the present invention, the device
Have the function of realizing that server side in above method embodiment, the function can also be held by hardware realization by hardware
The corresponding software realization of row.As shown in figure 14, which may include:Request receiving module 1401, second
Obtain module 1402, the first sending module 1403, the second receiving module 1404 and check results sending module 1405.
Request receiving module 1401, for receiving checking request.
Second obtain module 1402, in response to above-mentioned checking request to obtain image authentication code, the image authentication code
Including the first picture and second picture, wherein second picture is the picture cut from stylized picture, and the first picture is from wind
It formats remaining picture after cutting off second picture in picture;Above-mentioned stylization picture is original image by the transformed figure of style
Piece.
First sending module 1403, for sending above-mentioned image authentication code.
Second receiving module 1404, for receiving verification information;The verification information is to be tested according to user second picture
Card is operated and is generated.
Check results sending module 1405 for generating check results according to above-mentioned verification information, and sends the verification knot
Fruit.
To sum up, safety verification device provided in an embodiment of the present invention, since the stylized picture that style converts is difficult
Original image is obtained by inverse transformation, therefore, based on the image authentication code that stylized picture generates, machine is enabled to pass through ratio
Compared with obtaining differentiation image with original image to image authentication code to determine that position of the second picture in original image becomes
Difficulty improves the anti-machine crack ability of image authentication code.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification
Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the
Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention
With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
An exemplary embodiment of the invention additionally provides a kind of security authentication systems, which includes:Terminal and server.
Terminal, for sending checking request to server;Receive and show image authentication code, which includes the
One picture and second picture, the second picture are the pictures cut from stylized picture, and the first picture is from stylized picture
Remaining picture after middle excision second picture, above-mentioned stylization picture are original images by the transformed picture of style;It receives
User is to the verification operation of above-mentioned second picture and generates verification information;Safety is shown according to the check results of above-mentioned verification information
The result of verifying.
Server, for receiving the checking request of terminal transmission;It, should in response to the checking request to obtain image authentication code
Image authentication code includes the first picture and second picture, which is the picture cut from stylized picture, the first figure
Piece is the remaining picture after cutting off above-mentioned second picture in stylized picture, and above-mentioned stylization picture is original image by wind
Picture after case transformation;Above-mentioned image authentication code is sent to terminal, and receives the verification information of terminal return, which is
The verification operation of above-mentioned second picture is generated according to user;Check results are generated according to above-mentioned verification information, and to terminal
Send the check results.
It should be noted that device provided by the above embodiment, when realizing its function, only with above-mentioned each functional module
It divides and carries out for example, can according to need in practical application and be completed by different functional modules above-mentioned function distribution,
The internal structure of equipment is divided into different functional modules, to complete all or part of the functions described above.In addition,
Apparatus and method embodiment provided by the above embodiment belongs to same design, and specific implementation process is detailed in embodiment of the method, this
In repeat no more.
Please refer to Figure 15 which shows the structural schematic diagram for the terminal that one embodiment of the invention provides, the terminal is for real
The safe verification method of the terminal side provided in above-described embodiment is provided.Specifically:
Terminal 1500 may include RF (Radio Frequency, radio frequency) circuit 1510, include one or more
Memory 1520, input unit 1530, display unit 1540, the video sensor 1550, audio of computer readable storage medium
Circuit 1560, includes one or more than one processing at WiFi (wireless fidelity, Wireless Fidelity) module 1570
The components such as the processor 1580 and power supply 150 of core.It will be understood by those skilled in the art that terminal knot shown in Figure 15
The restriction of structure not structure paired terminal may include perhaps combining certain components or not than illustrating more or fewer components
Same component layout.Wherein:
RF circuit 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 1580 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuit 1510 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillator,
It is subscriber identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), double
Work device etc..In addition, RF circuit 1510 can also be communicated with network and other equipment by wireless communication.The wireless communication can be with
Using any communication standard or agreement, including but not limited to GSM (Global System of Mobile communication,
Global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA
(Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS
(Short Messaging Service, short message service) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation
1520 software program and module, thereby executing various function application and data processing.Memory 1520 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored is created according to using for terminal 1500
Data (such as video data, phone directory etc.) built etc..In addition, memory 1520 may include high-speed random access memory,
It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited
Memory device.Correspondingly, memory 1520 can also include Memory Controller, to provide processor 1580 and input unit 1530
Access to memory 1520.
Input unit 1530 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 1530 may include figure
As input equipment 1531 and other input equipments 1532.Image input device 1531 can be camera, be also possible to photoelectricity
Scanning device.In addition to image input device 1531, input unit 1530 can also include other input equipments 1532.Specifically,
Other input equipments 1532 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 1540 can be used for showing information input by user or the information and terminal 1500 that are supplied to user
Various graphical user interface, these graphical user interface can be by figure, text, icon, video and any combination thereof come structure
At.Display unit 1540 may include display panel 1541, optionally, can using LCD (Liquid Crystal Display,
Liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, 15 Organic Light Emitting Diodes) it is aobvious to configure
Show panel 1541.
Terminal 1500 may include at least one video sensor 1550, and video sensor is used to obtain the video letter of user
Breath.Terminal 1500 can also include other sensor (not shown), such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1541, and proximity sensor can close aobvious when terminal 1500 is moved in one's ear
Show panel 1541 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect (one in all directions
As be three axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The other sensors such as the gyroscope, barometer, hygrometer, thermometer, the infrared sensor that can also configure as terminal 1500,
This is repeated no more.
Video circuit 1560, loudspeaker 1561, microphone 1562 can provide the video interface between user and terminal 1500.
Electric signal after the audio data received conversion can be transferred to loudspeaker 1561, by loudspeaker 1561 by voicefrequency circuit 1560
Be converted to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit
1560 receive after be converted to audio data, then by after the processing of audio data output processor 1580, through RF circuit 1511 to send
It exports to memory 1520 to such as another terminal, or by audio data to be further processed.Voicefrequency circuit 1560 may be used also
It can include earphone jack, to provide the communication of peripheral hardware earphone Yu terminal 1500.
WiFi belongs to short range wireless transmission technology, and terminal 1500 can help user to receive and dispatch electricity by WiFi module 1570
Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Figure 15 shows
Go out WiFi module 1570, but it is understood that, and it is not belonging to must be configured into for terminal 1500, it completely can be according to need
It to omit within the scope of not changing the essence of the invention.
Processor 1580 is the control centre of terminal 1500, utilizes each portion of various interfaces and connection whole mobile phone
Point, by running or execute the software program and/or module that are stored in memory 1520, and calls and be stored in memory
Data in 1520 execute the various functions and processing data of terminal 1500, to carry out integral monitoring to mobile phone.Optionally,
Processor 1580 may include one or more processing cores;Preferably, processor 1580 can integrate application processor and modulatedemodulate
Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor
Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Terminal 1500 further includes the power supply 150 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity
Management system and processor 1580 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 150 can also include one or more direct current or AC power source, recharging system, power supply event
Hinder the random components such as detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal 1500 can also be including bluetooth module etc., and details are not described herein.
Specifically in the present embodiment, terminal 1500 further includes having memory and one or more than one program,
In one perhaps more than one program be stored in memory and be configured to be executed by one or more than one processor.
Said one or more than one program include the instruction for executing the method for above-mentioned terminal side.
Please refer to Figure 16 which shows the structural schematic diagram of server provided in an embodiment of the present invention, the server are used for
The safe verification method of the server side provided in above-described embodiment is provided.Specifically:
The server 1600 includes central processing unit (CPU) 1601 including random access memory (RAM) 1602 and read-only
The system storage 1604 of memory (ROM) 1603, and the system of connection system storage 1604 and central processing unit 1601
Bus 1605.The server 1600 further include help computer in each device between transmit information it is basic input/it is defeated
System (I/O system) 1606 out, and for the big of storage program area 1613, application program 1614 and other program modules 1615
Capacity storage device 16 07.
The basic input/output 1606 includes display 1608 for showing information and inputs for user
The input equipment 1609 of such as mouse, keyboard etc of information.Wherein the display 1608 and input equipment 1609 all pass through
The input and output controller 1610 for being connected to system bus 1605 is connected to central processing unit 1601.The basic input/output
System 1606 can also include input and output controller 1610 for receiving and handling from keyboard, mouse or electronic touch
The input of multiple other equipment such as pen.Similarly, input and output controller 1610 also provide output to display screen, printer or its
The output equipment of his type.
The mass-memory unit 1607 (is not shown by being connected to the bulk memory controller of system bus 1605
It is connected to central processing unit 1301 out).The mass-memory unit 1607 and its associated computer-readable medium are clothes
Business device 1600 provides non-volatile memories.That is, the mass-memory unit 1607 may include such as hard disk or
The computer-readable medium (not shown) of CD-ROM drive etc.
Without loss of generality, the computer-readable medium may include computer storage media and communication media.Computer
Storage medium includes information such as computer readable instructions, data structure, program module or other data for storage
The volatile and non-volatile of any method or technique realization, removable and irremovable medium.Computer storage medium includes
RAM, ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, tape
Box, tape, disk storage or other magnetic storage devices.Certainly, skilled person will appreciate that the computer storage medium
It is not limited to above-mentioned several.Above-mentioned system storage 1604 and mass-memory unit 1607 may be collectively referred to as memory.
According to various embodiments of the present invention, the server 1600 can also be arrived by network connections such as internets
Remote computer operation on network.Namely server 1600 can be connect by the network being connected on the system bus 1605
Mouth unit 1611 is connected to network 1612, in other words, it is other kinds of to be connected to that Network Interface Unit 1611 also can be used
Network or remote computer system (not shown).
The memory further includes that one or more than one program, the one or more programs are stored in
In memory, and it is configured to be executed by one or more than one processor.Said one or more than one program include
For executing the instruction of the method for above-mentioned server side.
In embodiments of the present invention, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory of instruction, above-metioned instruction can be executed by the processor of terminal to complete terminal side in above method embodiment
Each step or above-metioned instruction are executed by the processor of server to complete each of server side in above method embodiment
Step.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM,
Tape, floppy disk and optical data storage devices etc..
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that process, method, article or device including a series of elements are not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or device
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or device including the element.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (15)
1. a kind of safe verification method, which is characterized in that the method includes:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, and the second picture is
The picture cut from stylized picture, first picture are remaining after cutting off the second picture in stylized picture
Picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
2. safe verification method according to claim 1, which is characterized in that the style, which converts, includes:
The original image is input in depth convolutional neural networks model and carries out style transformation to obtain the stylization figure
Piece.
3. safe verification method according to claim 1, which is characterized in that the generating mode packet of described image identifying code
It includes:
Obtain the original image for generating image authentication code;
Stylized picture is obtained according to the original image;
Local picture is cut as the second picture from the stylized picture;
The first location information of the second picture is obtained, the first position is the second picture in the stylized picture
In position;
The second picture is moved to the second position from the first position to generate described image identifying code, the second
It is set to any position in first picture.
4. safe verification method according to claim 3, which is characterized in that described to obtain style according to the original image
Changing picture includes:
Stylized picture is generated according to the original image, alternatively,
Pre-generated stylized picture is obtained according to the original image.
5. safe verification method according to claim 3, which is characterized in that the verification information includes the second picture
The third place information, the third place information is the position of the second picture after second picture described in user's operation
Information;
The generating mode of the check results includes:
According to the first Pixel Information of the third place acquisition of information of the second picture;
The second Pixel Information is obtained according to the first location information of the second picture;
Pixel value difference is calculated according to first Pixel Information and the second Pixel Information;
The check results of the verification information are generated according to the pixel value difference.
6. safe verification method according to claim 5, which is characterized in that described according to pixel value difference generation
The check results of verification information include:
Judge whether the pixel value difference is greater than preset threshold;
If the pixel value difference is greater than the preset threshold, the unsanctioned result of verification is generated;
If the pixel value difference is less than or equal to the preset threshold, the result that verification passes through is generated.
7. safe verification method according to claim 1, which is characterized in that before receiving and showing image authentication code,
The method also includes:It receives and shows the original image for generating image authentication code.
8. safe verification method according to claim 1, which is characterized in that in each received described image identifying code,
The shape and/or size of the second picture generate in a random way.
9. safe verification method according to claim 1, which is characterized in that in each received described image identifying code,
The home position of the second picture and the position of new placement generate in a random way.
10. a kind of safety verification device, which is characterized in that described device includes:
Request sending module, for sending checking request;
Identifying code receiving module, for receiving and showing image authentication code, described image identifying code includes the first picture and second
Picture, the second picture are the pictures cut from stylized picture, and first picture is cut off from stylized picture
Remaining picture after the second picture;The stylization picture is original image by the transformed picture of style;
Verification information generation module, for receiving user to the verification operation of the second picture and generating verification information
Verification result display module, for showing the result of safety verification according to the check results of the verification information.
11. safety verification device according to claim 10, which is characterized in that the style, which converts, includes:
The original image is input in depth convolutional neural networks model and carries out style transformation to obtain the stylization figure
Piece.
12. safety verification device according to claim 10, which is characterized in that described device further includes for generating image
The identifying code generation module of identifying code, the identifying code generation module include:
First obtains module, for obtaining the original image for generating image authentication code;
Stylized picture obtains module, for obtaining stylized picture according to the original image;
Module is cut, for cutting local picture as the second picture from the stylized picture;
First position module, for obtaining the first location information of the second picture, the first position is second figure
Position of the piece in the stylized picture;
First generates submodule, for the second picture to be moved to the second position from the first position to generate the figure
As identifying code, the second position is any position in first picture.
13. safety verification device according to claim 12, which is characterized in that the verification information includes second figure
The third place information of piece, the third place information are the positions of the second picture after second picture described in user's operation
Confidence breath;
Described device further includes check results generation module, for generating the check results of the verification information;The verification knot
Fruit generation module includes:
First pixel obtains module, for the first Pixel Information of the third place acquisition of information according to the second picture;
Second pixel obtains module, for obtaining the second Pixel Information according to the first location information of the second picture;
Pixel value difference computing module, for calculating pixel value difference according to first Pixel Information and the second Pixel Information;
Second generates submodule, for generating the check results of the verification information according to the pixel value difference.
14. safety verification device according to claim 13, which is characterized in that described to generate institute according to the pixel value difference
The check results for stating verification information include:
Judge whether the pixel value difference is greater than preset threshold;
If the pixel value difference is greater than the preset threshold, the unsanctioned result of verification is generated;
If the pixel value difference is less than or equal to the preset threshold, the result that verification passes through is generated.
15. a kind of terminal, which is characterized in that including:Processor and memory;Wherein, the memory is stored with computer journey
Sequence, the computer program are suitable for being loaded by the processor and executing following steps:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, and the second picture is
The picture cut from stylized picture, first picture are remaining after cutting off the second picture in stylized picture
Picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810312164.6A CN108846274B (en) | 2018-04-09 | 2018-04-09 | Security verification method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810312164.6A CN108846274B (en) | 2018-04-09 | 2018-04-09 | Security verification method, device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108846274A true CN108846274A (en) | 2018-11-20 |
CN108846274B CN108846274B (en) | 2020-08-18 |
Family
ID=64212064
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810312164.6A Active CN108846274B (en) | 2018-04-09 | 2018-04-09 | Security verification method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108846274B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559363A (en) * | 2018-11-23 | 2019-04-02 | 网易(杭州)网络有限公司 | Stylized processing method, device, medium and the electronic equipment of image |
CN109886010A (en) * | 2019-01-28 | 2019-06-14 | 平安科技(深圳)有限公司 | Verify picture sending method, synthetic method and device, storage medium and terminal |
CN110706221A (en) * | 2019-09-29 | 2020-01-17 | 武汉极意网络科技有限公司 | Verification method, verification device, storage medium and device for customizing pictures |
CN110942062A (en) * | 2019-11-21 | 2020-03-31 | 网易(杭州)网络有限公司 | Image verification code generation method, medium, device and computing equipment |
CN111447207A (en) * | 2020-03-24 | 2020-07-24 | 咪咕文化科技有限公司 | Verification code verification method, electronic device and storage medium |
WO2021031242A1 (en) * | 2019-08-21 | 2021-02-25 | 平安科技(深圳)有限公司 | Character verification method and apparatus, computer device, and storage medium |
CN113158167A (en) * | 2021-04-30 | 2021-07-23 | 腾讯音乐娱乐科技(深圳)有限公司 | Verification code implementation method, electronic device and computer-readable storage medium |
EP3828740A3 (en) * | 2020-07-21 | 2021-10-06 | Baidu Online Network Technology (Beijing) Co., Ltd. | Captcha based on image rotation |
CN114626047A (en) * | 2022-03-04 | 2022-06-14 | 北京百度网讯科技有限公司 | Verification method, device and equipment based on man-machine interaction |
TWI770947B (en) * | 2021-04-20 | 2022-07-11 | 國立清華大學 | Verification method and verification apparatus based on attacking image style transfer |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187206A (en) * | 2014-05-28 | 2015-12-23 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN105323065A (en) * | 2014-07-21 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Safety verification method and device |
CN105335645A (en) * | 2015-09-23 | 2016-02-17 | 北京奇虎科技有限公司 | Verification method and apparatus for picture verification code |
CN106886975A (en) * | 2016-11-29 | 2017-06-23 | 华南理工大学 | It is a kind of can real time execution image stylizing method |
-
2018
- 2018-04-09 CN CN201810312164.6A patent/CN108846274B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187206A (en) * | 2014-05-28 | 2015-12-23 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN105323065A (en) * | 2014-07-21 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Safety verification method and device |
CN105335645A (en) * | 2015-09-23 | 2016-02-17 | 北京奇虎科技有限公司 | Verification method and apparatus for picture verification code |
CN106886975A (en) * | 2016-11-29 | 2017-06-23 | 华南理工大学 | It is a kind of can real time execution image stylizing method |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559363A (en) * | 2018-11-23 | 2019-04-02 | 网易(杭州)网络有限公司 | Stylized processing method, device, medium and the electronic equipment of image |
CN109559363B (en) * | 2018-11-23 | 2023-05-23 | 杭州网易智企科技有限公司 | Image stylization processing method and device, medium and electronic equipment |
CN109886010A (en) * | 2019-01-28 | 2019-06-14 | 平安科技(深圳)有限公司 | Verify picture sending method, synthetic method and device, storage medium and terminal |
WO2020155772A1 (en) * | 2019-01-28 | 2020-08-06 | 平安科技(深圳)有限公司 | Verification image sending method, synthesis method, device, storage medium, and terminal |
CN109886010B (en) * | 2019-01-28 | 2023-10-17 | 平安科技(深圳)有限公司 | Verification picture sending method, verification picture synthesizing method and device, storage medium and terminal |
WO2021031242A1 (en) * | 2019-08-21 | 2021-02-25 | 平安科技(深圳)有限公司 | Character verification method and apparatus, computer device, and storage medium |
CN110706221A (en) * | 2019-09-29 | 2020-01-17 | 武汉极意网络科技有限公司 | Verification method, verification device, storage medium and device for customizing pictures |
CN110942062B (en) * | 2019-11-21 | 2022-12-23 | 杭州网易智企科技有限公司 | Image verification code generation method, medium, device and computing equipment |
CN110942062A (en) * | 2019-11-21 | 2020-03-31 | 网易(杭州)网络有限公司 | Image verification code generation method, medium, device and computing equipment |
CN111447207A (en) * | 2020-03-24 | 2020-07-24 | 咪咕文化科技有限公司 | Verification code verification method, electronic device and storage medium |
EP3828740A3 (en) * | 2020-07-21 | 2021-10-06 | Baidu Online Network Technology (Beijing) Co., Ltd. | Captcha based on image rotation |
US12032672B2 (en) | 2020-07-21 | 2024-07-09 | Baidu Online Network Technology (Beijing) Co., Ltd. | Image verification method and apparatus, electronic device and computer-readable storage medium |
TWI770947B (en) * | 2021-04-20 | 2022-07-11 | 國立清華大學 | Verification method and verification apparatus based on attacking image style transfer |
CN113158167A (en) * | 2021-04-30 | 2021-07-23 | 腾讯音乐娱乐科技(深圳)有限公司 | Verification code implementation method, electronic device and computer-readable storage medium |
CN113158167B (en) * | 2021-04-30 | 2024-02-23 | 腾讯音乐娱乐科技(深圳)有限公司 | Verification code implementation method, electronic equipment and computer readable storage medium |
CN114626047A (en) * | 2022-03-04 | 2022-06-14 | 北京百度网讯科技有限公司 | Verification method, device and equipment based on man-machine interaction |
Also Published As
Publication number | Publication date |
---|---|
CN108846274B (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108846274A (en) | A kind of safe verification method, device and terminal | |
CN107872623B (en) | A kind of image pickup method, mobile terminal and computer readable storage medium | |
CN107256555B (en) | Image processing method, device and storage medium | |
CN106371689B (en) | Picture joining method, apparatus and system | |
CN107977144A (en) | A kind of screenshotss processing method and mobile terminal | |
CN107817939A (en) | A kind of image processing method and mobile terminal | |
CN107977132A (en) | A kind of method for information display and mobile terminal | |
CN104021129B (en) | Show the method and terminal of group picture | |
CN109582475A (en) | A kind of sharing method and terminal | |
CN107656793A (en) | A kind of Application Program Interface switching method and mobile terminal | |
CN109146760A (en) | A kind of watermark generation method, device, terminal and storage medium | |
CN107977652A (en) | The extracting method and mobile terminal of a kind of screen display content | |
CN106204423A (en) | A kind of picture-adjusting method based on augmented reality, device and terminal | |
CN108304070A (en) | The bright screen method of mobile terminal, mobile terminal and computer readable storage medium | |
CN104991699B (en) | A kind of method and apparatus of video display control | |
CN104516624B (en) | A kind of method and device inputting account information | |
CN109871164A (en) | A kind of message method and terminal device | |
CN109814786A (en) | Image storage method and terminal device | |
US20150043312A1 (en) | Sound playing method and device thereof | |
CN109067981A (en) | Split screen application switching method, device, storage medium and electronic equipment | |
CN107908330A (en) | The management method and mobile terminal of application icon | |
CN108932086A (en) | Display methods, device and the storage medium of application interface | |
CN108227934A (en) | display area lighting method, mobile terminal and computer readable storage medium | |
CN110191426A (en) | A kind of method and terminal of information sharing | |
CN110309004A (en) | The processing method and terminal of data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |