CN108846274A - A kind of safe verification method, device and terminal - Google Patents

A kind of safe verification method, device and terminal Download PDF

Info

Publication number
CN108846274A
CN108846274A CN201810312164.6A CN201810312164A CN108846274A CN 108846274 A CN108846274 A CN 108846274A CN 201810312164 A CN201810312164 A CN 201810312164A CN 108846274 A CN108846274 A CN 108846274A
Authority
CN
China
Prior art keywords
picture
verification
information
stylized
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810312164.6A
Other languages
Chinese (zh)
Other versions
CN108846274B (en
Inventor
罗文寒
马林
刘威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810312164.6A priority Critical patent/CN108846274B/en
Publication of CN108846274A publication Critical patent/CN108846274A/en
Application granted granted Critical
Publication of CN108846274B publication Critical patent/CN108846274B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of safe verification method, device and terminals, belong to Internet communication technology field.This method includes:Send checking request;Receive and show image authentication code, described image identifying code includes the first picture and second picture, and the second picture is the picture cut from stylized picture, and first picture is the remaining picture after cutting off the second picture in stylized picture;The stylization picture is original image by the transformed picture of style;User is received to the verification operation of the second picture and generates verification information;The result of safety verification is shown according to the check results of the verification information.The present invention is based on the stylized pictures obtained after style transformation to generate image authentication code, improves the anti-machine crack ability of image authentication code.

Description

A kind of safe verification method, device and terminal
Technical field
The present invention relates to Internet communication technology field, in particular to a kind of safe verification method, device and terminal.
Background technique
Currently, identifying code using commonplace, being used to distinguish user is machine or the mankind, can effectively be prevented Only malice decryption, brush ticket, the generation for phenomena such as forum pours water.
Image authentication code is a seed type of identifying code, and existing image authentication code is by being scratched on the original image except office The identifying code that portion's block is formed, when verifying, need user that will be scratched the localized mass removed to be moved to home position from new position, thus will Image authentication code is reduced to original image.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
In the related technology, machine with original image by being compared the image after scratching except localized mass to obtain difference Figure can directly obtain the new position and home position for being scratched the localized mass removed, based on the disparity map so as to by that will locate Localized mass in new position is moved to its home position and is cracked, and the anti-crack ability of identifying code is poor.Although in the prior art Add random noise to handle original image to improve the means of the anti-crack ability of image authentication code in the presence of taking, but passes through drop It makes an uproar etc. after processing, machine is still able to be relatively easy to obtain the new position for being scratched the localized mass removed and home position, therefore, Its anti-attack ability is still poor.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of safe verification method, device, terminal and Storage medium.The technical solution is as follows:
In a first aspect, a kind of safe verification method is provided, the method includes:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, second figure Piece is the picture cut from stylized picture, and first picture is remained after cutting off the second picture in stylized picture Remaining picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
Second aspect provides a kind of safe verification method, the method includes:
Receive checking request;
In response to the checking request to obtain image authentication code, described image identifying code includes the first picture and the second figure Piece, the second picture are the pictures cut from stylized picture, and first picture is that institute is cut off from stylized picture State remaining picture after second picture;The stylization picture is original image by the transformed picture of style;
Described image identifying code is sent, and receives verification information;The verification information is according to user to second figure The verification operation of piece and generate;
Check results are generated according to the verification information, and send the check results.
The third aspect, provides a kind of safety verification device, and described device includes:
Request sending module, for sending checking request;
Identifying code receiving module, for receiving and showing image authentication code, described image identifying code include the first picture and Second picture, the second picture are the pictures cut from stylized picture, and first picture is from stylized picture Cut off remaining picture after the second picture;The stylization picture is original image by the transformed picture of style;
Verification information generation module, for receiving user to the verification operation of the second picture and generating verification information
Verification result display module, for showing the result of safety verification according to the check results of the verification information.
Fourth aspect, provides a kind of safety verification device, and described device includes:
Request receiving module, for receiving checking request;
Second obtains module, for obtaining image authentication code, described image identifying code packet in response to the checking request Include the first picture and second picture, the second picture is the picture cut from stylized picture, first picture be from Remaining picture after the second picture is cut off in stylized picture;The stylization picture is that original image is converted by style Picture afterwards;
First sending module, for sending described image identifying code;
Second receiving module, for receiving verification information;The verification information is according to user to the second picture Verification operation and generate;
Check results sending module for generating check results according to the verification information, and sends the check results.
5th aspect, provides a kind of terminal, including:Processor and memory;Wherein, the memory is stored with calculating Machine program, the computer program are suitable for being loaded by the processor and executing following steps:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, second figure Piece is the picture cut from stylized picture, and first picture is remained after cutting off the second picture in stylized picture Remaining picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
6th aspect, provides a kind of computer storage medium, which is stored with computer program and refers to It enables, which is performed, and realizes above-mentioned safe verification method.
Technical solution bring beneficial effect provided in an embodiment of the present invention is:
In the embodiment of the present invention, since the stylized picture that style converts is difficult to obtain original graph by inverse transformation Therefore piece based on the image authentication code that stylized picture generates, enables to machine by comparing image authentication code and original graph Piece obtains differentiation image to determine that position of the second picture in original image becomes relatively difficult, improves image authentication code Anti- machine crack ability.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the schematic diagram of implementation environment provided in an embodiment of the present invention;
Fig. 2 is the architecture diagram of server provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of safe verification method provided in an embodiment of the present invention;
Fig. 4 is the generation method flow chart of image authentication code provided in an embodiment of the present invention;
Fig. 5 be it is provided in this embodiment use depth convolutional neural networks model to original image carry out style transformation with life At the exemplary diagram of stylized picture;
Fig. 6 is the method flow diagram provided in an embodiment of the present invention that check results are generated according to verification information;
Fig. 7 is the method flow of the check results provided in an embodiment of the present invention that verification information is generated according to pixel value difference Figure;
Fig. 8 is the flow chart of another safe verification method provided in an embodiment of the present invention;
Fig. 9 is the flow chart of another safe verification method provided in an embodiment of the present invention;
Figure 10 is the flow chart of another safe verification method provided in an embodiment of the present invention;
Figure 11 is a kind of block diagram of safety verification device provided in an embodiment of the present invention;
Figure 12 is the block diagram of identifying code generation module provided in an embodiment of the present invention;
Figure 13 is the block diagram of check results generation module provided in an embodiment of the present invention;
Figure 14 is the block diagram of another safety verification device provided in an embodiment of the present invention;
Figure 15 is the structural schematic diagram of terminal provided in an embodiment of the present invention;
Figure 16 is the structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Referring to FIG. 1, it illustrates the schematic diagram of implementation environment provided in an embodiment of the present invention, which includes: Terminal 01 and server 02.
It should be noted that the safe verification method of the embodiment of the present invention can be applied to the safety verification of the embodiment of the present invention Device.Wherein, terminal 01 may include supporting network function:Smart phone, tablet computer, E-book reader, MP3 are played Device (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio layer Face 4) player, pocket computer on knee, vehicle-mounted computer, wearable device, desktop computer, set-top box, smart television, one Body machine etc..
Server 02 can be a server, be also possible to the server cluster consisted of several servers.
Server 02 can be established by network and terminal 01 and be communicated to connect.The network can be wireless network, can also be with It is cable network.
In one example, as shown in Fig. 2, server 02 may include when server 02 is aggregated structure:Webpage clothes Business device 021, identifying code server 022, picture storage server 023, stylized server 024 and authentication server 025, In:
Web page server 021 with terminal 01, identifying code server 022 and authentication server 025 for interacting.Example Such as, web page server 021 receives the checking request that user is sent by terminal 01, sends image authentication code etc. to terminal 01.Net The school that page server 021 can also receive the image authentication code of the transmission of identifying code server 022 and authentication server 025 is sent Test result.
Identifying code server 022 is used to provide the function of generating image authentication code.Picture storage server 023 is for providing Store the function for generating the original image of image authentication code.Stylized server 024 carries out original image for providing The function of style transformation.Authentication server 025 is for providing the function of safety verification.
It can be established and be communicated to connect by network between above-mentioned each server.The network can be wireless network, can also be with It is cable network.
Referring to FIG. 3, this method can it illustrates a kind of flow chart of safe verification method provided in an embodiment of the present invention Applied in implementation environment shown in FIG. 1.As shown in figure 3, the safe verification method may include:
Step 301, checking request is sent.
When user needs to log in, checking request can be sent by terminal to server, by the checking request from clothes Business device pulls identifying code.
Step 302, it receives and shows image authentication code.
In embodiments of the present invention, terminal receives and shows the image authentication code obtained based on above-mentioned checking request, should Image authentication code includes the first picture and second picture, which is the picture cut from stylized picture, this first Picture is the remaining picture after cutting off above-mentioned second picture in stylized picture.
Above-mentioned stylization picture is the picture obtained after style converts for generating the original image of image authentication code.
Style transformation can refer to through certain algorithm, and the image in original image is converted into possess certain specific style Image, to generate stylized picture.The style of image is mainly the detail textures passed through in image, the expression way of lines It is embodied with coloring style, so the style conversion of picture is exactly that the texture in original image is converted to certain with coloring style to refer to The style of reference style image is transformed into another input picture by fixed style, for example, a kind of reference picture is selected, Can will be in different illumination, different periods, the photo of Various Seasonal shooting translates into different styles art uply.
Original image obtains the stylized picture of the original image after style converts, and general machine is more difficult by the style Change picture and carries out inverse transformation to obtain original image.
In embodiments of the present invention, the generating mode of above-mentioned image authentication code can use method shown in Fig. 4.Fig. 4 institute It is shown as the generation method flow chart of image authentication code provided in an embodiment of the present invention, as shown in figure 4, this method includes:
Step 401, the original image for generating image authentication code is obtained.
In embodiments of the present invention, original image is pre-stored picture in database, obtains the mode of original image It can be random acquisition, be also possible to according to preset Rule.
Step 402, stylized picture is obtained according to above-mentioned original image.
In embodiments of the present invention, above-mentioned acquisition stylization picture can be under the triggering of checking request, according to original The stylized picture that picture generates in real time is also possible to obtain pre-generated stylized picture according to original image, this is in advance The stylized picture of generation can store in the database.
In embodiments of the present invention, can use depth convolutional neural networks model to original image carry out style transformation with Generate stylized picture.
For example, can include 16 using preparatory trained 19 layers of VGG network (referred to as VGG-19), the VGG network The feature space that convolutional layer and 5 pond layers provide, the convolution kernel size of each convolutional layer is 3, step-length 1, while each There is the nonlinear activation layer of a ReLU behind convolutional layer, treated that output is that image stylization obtains through the function Characteristic pattern.
Style transformation will common image become the style of another style image, basic principle is:It is one given The secondary style image S of picture X and one, finds a picture Y, so that Y is close with X in terms of content, while close with S in style. The content and style of picture can be to be extracted by trained VGG-19 network.
It is that depth convolutional neural networks model is used to carry out style transformation to original image to generate stylization as shown in Figure 5 The exemplary diagram of picture, wherein picture pointed by arrow is original image, and the picture of arrow root is that style picture is used for wind For the sample of case transformation with reference to figure, the picture below arrow is the stylized picture of depth convolutional neural networks model output, it is seen then that The content of the stylization picture is close with original image, and its style is close with style picture.
VGG-19 network trained for one, using picture A as input, so that it may several groups characteristic pattern is obtained, this The structure of a little characteristic patterns is [H, W, C], wherein H and W respectively represents the height and width of characteristic pattern, and C represents the number of characteristic pattern, should [H, W, C] can represent the content of A, the Multidimensional numerical F (X) that structure is [H*W, C] be obtained after deformation, to the multidimensional number Group F (X) asks gram matrix G=Gram (F (X)), the textural characteristics of available X, i.e. style.
After the extracting mode for defining content and style, image style convert the problem of can by way of optimization solution Certainly.Assuming that Y is according to the image of the content of X and the synthesis of the style of S, the content error of Y and X are:
The style error of Y and S is:
To which global error is:
LA=α LC+β·LS
Wherein, α is content proportion in global error, and β is style proportion in global error, α and β value The different representatives of size are different to the emphasis of content and style.
The algorithm of style transformation can be based on iteration optimization, specially:1) random initializtion image Y;2) whole mistake is found out Poor LA;3) each point pixel value of Y is adjusted according to gradient descent algorithm;If 4) LAConvergence is less than preset threshold, then stops Otherwise only iteration continues the 2) step.
Since depth convolutional neural networks usually have at least millions of parameters, so complicated parameter transformation to think The stylized picture obtained after style is converted carries out inverse transformation and is difficult to realize with obtaining original image.
Step 403, local picture is cut from stylized picture as second picture.
Remaining picture is as the first picture after stylized picture cuts off above-mentioned second picture, it should be noted that second The shapes and sizes of picture can be randomly generated, as the second picture shape can for quadrangle, pentagon, ellipse, circle, The size of triangle and irregular figure etc., the second picture can be changed by the form parameter being randomly generated, should The form parameter being randomly generated can be round radius, elliptical long axis and short axle, the side length of triangle etc..
In embodiments of the present invention, in order to increase the difficulty that machine cracks image authentication code, safety verification is being initiated every time When, the shape and/or size of the second picture in image authentication code generate in a random way, so, it will be difficult to which prediction is each In secondary safety verification, the shapes and sizes of the second picture in image authentication code shown by terminal are conducive to raising image and test The anti-crack ability of card.
Step 404, the first location information of second picture is obtained, which is second picture in above-mentioned stylization figure Position in piece.
Believe after cutting second picture in stylized picture, obtaining position of the second picture in stylized picture Breath is used as first location information.It should be understood that the first location information can be used to indicate that the home position of second picture.
It should be noted that above-mentioned first location information can be the center of second picture in stylized picture Position coordinates.
Step 405, second picture is moved to the second position from first position to generate image authentication code, the second position For any position in the first picture.
It should be understood that the second position is the position of second picture new placement.
It should be noted that before generating image authentication code, may be used also to improve the anti-crack ability of image authentication code The second picture for being moved to the second position is rotated by a certain angle or be overturn.It is, of course, also possible to in the first picture Blank position (i.e. default position) carry out simple pattern or color filling, to increase the difficulty that machine searches the position.
In embodiments of the present invention, in order to increase the difficulty that machine cracks image authentication code, safety verification is being initiated every time When, the position (i.e. the second position) of the home position (i.e. first position) of the second picture in image authentication code and new placement with The mode of machine generates, and will so increase the difficulty of the position in the home position and new placement of machine acquisition second picture, is conducive to Improve the anti-crack ability of image authentication code.
In embodiments of the present invention, the image authentication code generated based on the stylized picture obtained after style transformation includes upper The first picture and second picture are stated, second picture can be mobile relative to the first picture, or operate also to second picture It can make its overturning, or rotate by a certain angle around a certain fixed point.For example, it can be made by choosing second picture to drag it It is mobile relative to the first picture;Its overturning can be made by clicking second picture;The certain point in second picture is clicked, its rotation can be made Turn certain angle.
Since the transformed picture of style may have certain abstractness, the first picture and that user sees Two pictures may be uncomfortable on visual experience, in order to improve the experience effect of user, so that the user as people is seeing It is unlikely to generate lofty feeling when image authentication code, and ensures that the user as people can pass through safety verification, this hair In bright embodiment, before step 302, terminal can also receive the original image for generating image authentication code and show the original Beginning picture is so that user can first see original before seeing image authentication code (stylized second picture and the first picture) Beginning picture.
Step 303, user is received to the verification operation of second picture and generate verification information.
In embodiments of the present invention, user includes mobile second picture to the verification operation of above-mentioned second picture, for example is selected Middle second picture and the default position for being dragged to the first picture.It will of course be understood that, above-mentioned verification operation can also wrap Include overturning second picture and rotation second picture.
In embodiments of the present invention, verification information includes the third place information of above-mentioned second picture, the third place letter Breath is the location information of the second picture after the above-mentioned second picture of user's operation.
Above-mentioned the third place information can be position of the center of the second picture after movement in the first picture Coordinate.
It should be noted that above-mentioned verification information can also include the image information and rotation angle letter of second picture Breath.
Step 304, the result of safety verification is shown according to the check results of verification information.
Terminal obtains the check results of verification information and shows the result of this safety verification according to the check results.It can be with Understand, the result of safety verification includes not by safety verification and by safety verification, and terminal can be by the knot of safety verification Fruit shows user with written form, it is, of course, also possible to inform user by way of voice broadcast.
In embodiments of the present invention, the check results of verification information can be generated using method shown in fig. 6.Shown in Fig. 6 For it is provided in an embodiment of the present invention according to verification information generate check results method flow diagram, as shown in fig. 6, this method packet It includes:
Step 601, according to the first Pixel Information of the third place acquisition of information of second picture.
Terminal generates and obtains verification information when receiving verification operation of the user to second picture, which includes The third place information of second picture, the third place information are the positions of the second picture after user's operation second picture Information.
Terminal further obtains the first Pixel Information according to the third place information of the second picture of acquisition, such as works as the third When location information is position coordinates of the center of the second picture after movement in the first picture, first Pixel Information For the pixel value of the center of the second picture after the movement.
Step 602, the second Pixel Information is obtained according to the first location information of second picture.
When generating image authentication code, the first location information of second picture is obtained, i.e. second picture is schemed in stylization The original position-information of on piece.In the generating process for carrying out check results, terminal is according to first of the second picture of acquisition Confidence breath further obtains the second Pixel Information, such as when the center that the first location information is second picture is schemed in stylization When position coordinates in piece, which is the pixel value of the center of the second picture.
Step 603, pixel value difference is calculated according to above-mentioned first Pixel Information and the second Pixel Information.
Terminal calculates the first pixel value and the second pixel value after getting the first Pixel Information and the second Pixel Information Pixel value difference.
Step 604, the check results of verification information are generated according to above-mentioned pixel value difference.
After the pixel value difference for calculating the first pixel value and the second pixel value, terminal generates phase according to the pixel value difference The check results for the verification information answered.
In embodiments of the present invention, it can be used according to the check results that pixel value difference generates verification information shown in Fig. 7 Method.Fig. 7 show the method flow of the check results provided in an embodiment of the present invention that verification information is generated according to pixel value difference Figure, as shown in fig. 7, this method includes:
Step 701, judge whether above-mentioned pixel value difference is greater than preset threshold.
After the pixel value difference for calculating the first pixel value and the second pixel value, terminal judges whether the pixel value difference is big In preset threshold, which is pre-set pixel value difference, if the preset threshold can be 5 pixels.
Step 702, if above-mentioned pixel value difference is greater than preset threshold, the unsanctioned result of verification is generated.
If the pixel value difference is greater than preset threshold, for example, after the mobile second picture of user, after the movement that terminal obtains The pixel value of the center of second picture and the difference of the pixel value of the center of the second picture in stylized picture are big In preset threshold, can interpretation to go out to carry out the user of safety verification at present be machine, to generate the unsanctioned result of verification.? It generates after verifying unsanctioned result, terminal shows that safety verification does not pass through to user according to the result.
Step 703, if above-mentioned pixel value difference is less than or equal to preset threshold, the result that verification passes through is generated.
If the pixel value difference is less than or equal to preset threshold, for example, after the mobile second picture of user, the shifting of terminal acquisition The pixel value of the center of the second picture in the pixel value of the center of second picture after dynamic and stylized picture Difference be less than or equal to preset threshold, can interpretation go out at present carry out safety verification user be not machine, to generate Verify the result passed through.After generating the result that verification passes through, terminal shows that safety verification passes through to user according to the result.
It should be noted that can also be carried out according to pixel value difference to improve the anti-crack ability of image authentication code On the basis of safety verification, the image information and rotation angle further progress safety verification according to second picture are considered, when When pixel value difference, image information, rotation angle are all satisfied the requirement of setting, generation currently verifies the result passed through.
To sum up, safe verification method provided by the embodiment of the present invention, the stylized picture converted due to style is very It is difficult that original image is obtained by inverse transformation, therefore, based on the image authentication code that stylized picture generates, machine is enabled to pass through It compares image authentication code and obtains differentiation image with original image to determine that position of the second picture in original image becomes to compare It is more difficult, improve the anti-machine crack ability of image authentication code.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
Referring to FIG. 8, it illustrates the flow chart of another safe verification method provided in an embodiment of the present invention, this method It can be applied in implementation environment shown in FIG. 1.As shown in figure 8, the safe verification method may include:
Step 801, the checking request that terminal is sent is received.
The checking request for being used to pull identifying code that server receiving terminal is sent, the identifying code can be used for terminal User carries out safety verification.
Step 802, in response to above-mentioned checking request to obtain image authentication code.
After server receives checking request, in response to the checking request to obtain image authentication code.Implement in the present invention In example, image authentication code includes the first picture and second picture, which is the picture cut from stylized picture, should First picture is the remaining picture after cutting off above-mentioned second picture in stylized picture.
Above-mentioned stylization picture is the picture obtained after style converts for generating the original image of image authentication code.
The generating mode of image authentication code in the step may refer to embodiment of the method shown in Fig. 4, no longer superfluous herein It states.
Step 803, image authentication code is sent, and receives verification information.
After server generates in response to checking request and obtains image authentication code, which is sent to end End so that the image authentication code is shown to user by terminal, and request user to above-mentioned second picture carry out verification operation with Generate verification information.
In embodiments of the present invention, terminal user includes that user carries out second picture to the verification operation of second picture Moving operation can also include overturning and rotation process of the user to second picture.
In embodiments of the present invention, the received verification information of server includes the third place information of second picture, this Three location informations are the location informations of the second picture after the above-mentioned second picture of user's operation.
Above-mentioned the third place information can be position of the center of the second picture after movement in the first picture Coordinate.
It should be noted that above-mentioned verification information can also include the image information and rotation angle letter of second picture Breath.
In embodiments of the present invention, terminal can send above-mentioned verification information, the operation in response to the operational order of user Instruction can be user and click submitting button, the submission instruction issued.
It should be noted that since the transformed picture of style may have certain abstractness, terminal display is given The first picture and second picture of user may make the visual experience of user uncomfortable, in order to improve the experience effect of user, So that the user as people is unlikely to generate lofty feeling when seeing image authentication code, and ensure that the user as people can Pass through safety verification, in the embodiment of the present invention, before step 803, server can also will be used to generate image authentication The original image of code is sent to terminal, so that the original image is shown to user by terminal.
In embodiments of the present invention, the request for the display image authentication code that server can be sent according to terminal is obtained above-mentioned The image authentication code taken is sent to terminal, the image authentication code just can also be sent to end after having obtained image authentication code End can also set directional terminals and send original image and send the time interval of image authentication code to terminal, when time interval reaches Then, server sends the image authentication code to terminal.It will of course be understood that, which should be able to complete The generation of above-mentioned image authentication code operates.
Step 804, check results are generated according to above-mentioned verification information, and sends the check results.
After the verification information that server receiving terminal returns, check results are generated according to the verification information, and verification As a result it is sent to terminal, so that terminal shows the knot of safety verification according to the check results of its received verification information to user Fruit.
In this step, the generating mode of check results may refer to Fig. 6 and embodiment of the method shown in Fig. 7, herein not It repeats again.
In one example, when server is aggregated structure shown in Fig. 2, which can be such as Fig. 9 institute Show and includes the following steps:
Step 901, terminal sends checking request to web page server.
When user needs login service device, terminal can send checking request to web page server 021.
Correspondingly, web page server 021 receives the checking request that terminal 01 is sent.
Step 902, web page server sends the request for pulling identifying code to identifying code server.
Web page server 021 receives user and passes through the operation requests that terminal 01 is sent, according to the operation requests, to identifying code Server 022 sends the request for pulling identifying code, which carries out testing for safety verification for obtaining to identifying code server 022 Demonstrate,prove code.
Correspondingly, identifying code server 022 receives the request for pulling identifying code that web page server 021 is sent.
Step 903, identifying code server obtains the original image for generating image authentication code from picture storage server, And the original image is sent to web page server.
In embodiments of the present invention, a large amount of original image is stored in picture storage server 023.Identifying code server 022 acquisition can be random acquisition for generating the mode of the original image of image authentication code, be also possible to according to scheduled rule Then obtain.
After identifying code server 022 gets original image from picture storage server 023, which is sent To web page server 021.
In embodiments of the present invention, above-mentioned original image can also be sent to stylized service by identifying code server 022 Device 024.
Correspondingly, web page server 021 and stylized server receive the original graph of the transmission of identifying code server 022 respectively Piece.
Step 904, above-mentioned original image is sent to terminal by web page server.
Web page server 021 sends out the original image after the original image for receiving the transmission of identifying code server 022 Terminal 01 is given, so that the original image is shown to user by terminal 01.
Step 905, stylized server carries out style transformation to above-mentioned original image to generate stylized picture.
Stylized server 024 is after the original image for receiving the transmission of identifying code server 022, to the original image Style transformation is carried out, the transformed picture of style is stylized picture.
In embodiments of the present invention, style can be carried out using original image of the depth convolutional neural networks model to input Transformation.
For example, can include 16 using preparatory trained 19 layers of VGG network (referred to as VGG-19), the VGG network The feature space that convolutional layer and 5 pond layers provide, the convolution kernel size of each convolutional layer is 3, step-length 1, while each There is the nonlinear activation layer of a ReLU behind convolutional layer, treated that output is that image stylization obtains through the function Characteristic pattern.
Style transformation will common image become the style of another style image, basic principle is:It is one given The secondary style image S of picture X and one, finds a picture Y, so that Y is close with X in terms of content, while close with S in style. The content and style of picture can be to be extracted by trained VGG-19 network.
VGG-19 network trained for one, using picture A as input, so that it may several groups characteristic pattern is obtained, this The structure of a little characteristic patterns is [H, W, C], wherein H and W respectively represents the height and width of characteristic pattern, and C represents the number of characteristic pattern, should [H, W, C] can represent the content of A, the Multidimensional numerical F (X) that structure is [H*W, C] be obtained after deformation, to the multidimensional number Group F (X) asks gram matrix G=Gram (F (X)), the textural characteristics of available X, i.e. style.
After the extracting mode for defining content and style, image style convert the problem of can by way of optimization solution Certainly.Assuming that Y is according to the image of the content of X and the synthesis of the style of S, the content error of Y and X are:
The style error of Y and S is:
To which global error is:
LA=α LC+β·LS
Wherein, α is content proportion in global error, and β is style proportion in global error, α and β value The different representatives of size are different to the emphasis of content and style.
The algorithm of style transformation can be based on iteration optimization, specially:1) random initializtion image Y;2) whole mistake is found out Poor LA;3) each point pixel value of Y is adjusted according to gradient descent algorithm;If 4) LAConvergence is less than preset threshold, then stops Otherwise only iteration continues the 2) step.
Since depth convolutional neural networks usually have at least millions of parameters, so complicated parameter transformation to think The stylized picture obtained after style is converted carries out inverse transformation and is difficult to realize with obtaining original image.
Step 906, stylized server sends above-mentioned stylized picture to identifying code server.
After stylized server 024 carries out the stylized picture of style transformation generation to original image, which is schemed Piece is sent to identifying code server 022.
Correspondingly, identifying code server 022 receives the stylized picture that stylized server 024 is sent.
Step 907, identifying code server generates image authentication code according to above-mentioned stylized picture.
After identifying code server 022 gets stylized picture, image authentication code, the figure are generated according to the stylization picture Picture identifying code includes the first picture and second picture, and second picture is the picture cut from above-mentioned stylized picture, the first figure Piece is the remaining picture after cutting off above-mentioned second picture in above-mentioned stylized picture.Second picture can be relative to the first picture Mobile, its overturning can also be made or rotate by a certain angle around a certain fixed point by perhaps operating to second picture.For example, choosing Middle second picture, which drags it, can make it mobile relative to the first picture;Its overturning can be made by clicking second picture;Point The certain point in second picture is selected, it can be made to rotate by a certain angle.
The generating mode of above-mentioned image authentication code may refer to embodiment of the method shown in Fig. 4, and details are not described herein.
It should be noted that identifying code server 022 can obtain above-mentioned second figure during generating image authentication code The first location information of piece, the first position are position of the second picture in above-mentioned stylized picture.Identifying code server 022 The first location information of above-mentioned second picture is sent to authentication server 025.
Correspondingly, authentication server 025 receives the first location information for the second picture that identifying code server 022 is sent.
Step 908, above-mentioned image authentication code is sent to web page server by identifying code server.
Identifying code server 022 is sent to webpage clothes after the generation for completing image authentication code, by the image authentication code Business device 021.
Correspondingly, web page server 021 receives the image authentication code that identifying code server 022 is sent.
Step 909, above-mentioned image authentication code is sent to terminal by web page server, and the terminal is for receiving to above-mentioned second The verification operation of picture simultaneously generates verification information.
After web page server 021 receives image authentication code, which is sent to terminal 01, so that eventually The image authentication code is shown to user by end 01, and is received user to the verification operation of above-mentioned second picture and generated verifying letter Breath.
User includes mobile second picture to the verification operation of above-mentioned second picture, for example chooses second picture and dragged Move a certain position.It will of course be understood that, above-mentioned verification operation can also include the second figure of overturning second picture and rotation Piece.
Verification information includes the location information of above-mentioned second picture, and the location information of the second picture is that user's operation is above-mentioned After second picture, the location information of the second picture.
Certainly, which can also include the image information and rotation angle information of second picture.
Correspondingly, terminal 01 receives the image authentication code that web page server 021 is sent.
In embodiments of the present invention, timer can be set in web page server 021, the timer is for being arranged webpage clothes Business device 021 sends original image and sends the time interval of image authentication code, when preset time interval reaches, web service Image authentication code is sent to terminal by 021 ability of device.
It should be understood that web page server can also receive terminal transmission image authentication code send request after, The image authentication code is sent to terminal again.
Step 910, terminal shows above-mentioned image authentication code.
Terminal 01 shows the image authentication code after receiving image authentication code, enables a user to see To image authentication code.
Step 911, terminal monitoring second picture receives user to the verification operation of above-mentioned second picture, generates verifying letter Breath.
Above-mentioned verification information includes the third place information of second picture, and the third place information of the second picture is user After operating above-mentioned second picture, the location information of the second picture.
Certainly, above-mentioned verification information can also include the image information and rotation angle information of second picture.
Step 912, the check results for sending above-mentioned verification information to web page server, and web page server being waited to send.
Terminal sends above-mentioned verification information in response to the operational order of user, such as works as terminal user and clicks submitting button, under After hair submits instruction, the verification information of generation is sent to web page server 021 by terminal, and web page server 021 is waited to return Check results.
Correspondingly, web page server 021 receives the verification information that terminal 01 is sent.
Step 913, above-mentioned verification information is sent to authentication server by web page server.
Correspondingly, authentication server receives above-mentioned verification information.
Step 914, authentication server carries out safety verification according to above-mentioned verification information, and check results are sent to webpage Server.
After authentication server 025 receives verification information, safety verification is carried out to generate check results, is specifically verified As a result generating process refers to Fig. 6 and Fig. 7, and therefore not to repeat here.
After generating check results, check results are sent to web page server 021 by authentication server 025.The verification knot Fruit does not pass through including verification and verification passes through.
Correspondingly, web page server 021 receives check results.
Step 915, check results are sent to terminal by web page server.
Corresponding terminal receives the check results that web page server is sent.
Step 916, terminal shows the result of safety verification according to check results.
After web page server 021 receives check results, which is sent to terminal 01 so that terminal according to The check results show the result of safety verification.Specifically, terminal is shown to user pacifies when check results are that verification does not pass through Verify entirely unsanctioned as a result, terminal shows the result that safety verification passes through to user when check results pass through for verification.
Referring to Fig. 10, its flow chart for showing another safe verification method provided in an embodiment of the present invention.This reality Applying example can be applied in application environment shown in Fig. 2, realize the safety verification side by terminal shown in Fig. 2 and each server Method.As shown in Figure 10, which includes:
Step 1001, stylized server obtains original image from picture storage server.
Step 1002, stylized server carries out style transformation to original image to generate stylized picture, and will generate Stylized picture be sent to picture storage server.Style transformation specifically is carried out to generate stylized picture to original image Correlative detail may refer to step 905, do not repeat herein.
Correspondingly, picture storage server receives the stylized picture that stylized server is sent.
Step 1003, picture storage server stores the corresponding pass of stylized picture and original image with stylized picture System.
After picture storage server receives stylized picture, the corresponding pass between original image and stylized picture is established System, and stores the corresponding relationship so that it is subsequent can be found according to the original image of acquisition it is corresponding with the original image Stylized picture.
Step 1004, terminal sends checking request to web page server.
Step 1005, web page server sends the request for pulling identifying code to identifying code server.
Step 1006, identifying code server obtains the original graph for generating image authentication code from picture storage server Piece, and the original image is sent to web page server.
Step 1007, above-mentioned original image is sent to terminal by web page server.
It can be with it should be noted that original image can not also be sent to terminal by web page server, i.e., after step 1006 Directly execute step 1008.
Step 1008, identifying code server obtains stylization corresponding with above-mentioned original image from picture storage server Picture.
Step 1009, identifying code server generates image authentication code according to above-mentioned stylized picture.
Step 1010, above-mentioned image authentication code is sent to web page server by identifying code server.
Step 1011, above-mentioned image authentication code is sent to terminal by web page server.
Step 1012, terminal receives and shows above-mentioned image authentication code.
Step 1013, terminal receives user to the verification operation of second picture, generates verification information.
Step 1014, terminal sends above-mentioned verification information to web page server, and the verification for waiting web page server to send As a result.
Step 1015, above-mentioned verification information is sent to authentication server by web page server.
Step 1016, authentication server carries out safety verification according to above-mentioned verification information, and check results are sent to net Page server.
Step 1017, check results are sent to terminal by web page server.
Step 1018, terminal shows the result of safety verification according to check results.
Specifically, step 1009 to step 1018 can be with reference to abovementioned steps 907 to step 916, therefore not to repeat here.
To sum up, safe verification method provided by the embodiment of the present invention, the stylized picture converted due to style is very It is difficult that original image is obtained by inverse transformation, therefore, based on the image authentication code that stylized picture generates, machine is enabled to pass through It compares image authentication code and obtains differentiation image with original image to determine that position of the second picture in original image becomes to compare It is more difficult, improve the anti-machine crack ability of image authentication code.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
Please refer to Figure 11 which shows a kind of block diagram of safety verification device provided in an embodiment of the present invention, device tool There is the function of realizing terminal side in above method embodiment, the function can also execute phase by hardware by hardware realization The software realization answered.As shown in figure 11, which may include:Request sending module 1101, identifying code connects Receive module 1102, verification information generation module 1103 and verification result display module 1104.
Request sending module 1101, for sending checking request.
Identifying code receiving module 1102, for receiving and showing image authentication code, which includes the first picture And second picture, wherein second picture is the picture cut from stylized picture, and the first picture is cut from stylized picture Except picture remaining after second picture;Stylized picture is original image by the transformed picture of style.
Optionally, original image can be input in depth convolutional neural networks model and carries out style transformation to obtain wind It formats picture.
Verification information generation module 1103, for receiving user to the verification operation of second picture and generating verification information.
Above-mentioned verification information includes the third place information of second picture, which is the second figure of user's operation After piece, the location information of second picture.
Verification result display module 1104, for showing the result of safety verification according to the check results of verification information.
Optionally, as shown in figure 11, which can also include the identifying code generation module for generating image authentication code 1105.As shown in figure 12, which may include:First obtains module 1105a, and stylized picture obtains Module 1105b, cuts module 1105c, and first position module 1105d and first generates submodule 1105e, wherein
First obtains module 1105a, for obtaining the original image for generating image authentication code.
Stylized picture obtains module 1105b, for obtaining stylized picture according to the original image.
Module 1105c is cut, for cutting local picture from stylized picture as the second picture.
First position module 1105d, for obtaining the first location information of second picture, which is second picture Position in above-mentioned stylized picture.
First generates submodule 1105e, for second picture to be moved to the second position from first position to generate image Identifying code, the second position are any position in the first picture.
Optionally, as shown in figure 11, which can also include the verification knot for generating the check results of verification information Fruit generation module 1106.As shown in figure 13, which may include:First pixel obtains module 1106a, the second pixel obtain module 1106b, and pixel value difference computing module 1106c and second generates submodule 1106d, wherein
First pixel obtains module 1106a, for the first Pixel Information of the third place acquisition of information according to second picture.
In embodiments of the present invention, the verification information that verification information generation module 1103 generates includes the third of second picture Location information, the third place information are the location informations of the second picture after user's operation second picture.
Second pixel obtains module 1106b, for obtaining the second Pixel Information according to the first location information of second picture.
Pixel value difference computing module 1106c, for calculating pixel according to above-mentioned first Pixel Information and the second Pixel Information Difference.
Second generates submodule 1106d, for generating the check results of verification information according to above-mentioned pixel value difference.
Optionally, as shown in figure 11, which can also include the first receiving module 1107, first receiving module 1107 For receiving and showing the original image for generating image authentication code.
Please refer to Figure 14 which shows the block diagram of another kind safety verification device provided in an embodiment of the present invention, the device Have the function of realizing that server side in above method embodiment, the function can also be held by hardware realization by hardware The corresponding software realization of row.As shown in figure 14, which may include:Request receiving module 1401, second Obtain module 1402, the first sending module 1403, the second receiving module 1404 and check results sending module 1405.
Request receiving module 1401, for receiving checking request.
Second obtain module 1402, in response to above-mentioned checking request to obtain image authentication code, the image authentication code Including the first picture and second picture, wherein second picture is the picture cut from stylized picture, and the first picture is from wind It formats remaining picture after cutting off second picture in picture;Above-mentioned stylization picture is original image by the transformed figure of style Piece.
First sending module 1403, for sending above-mentioned image authentication code.
Second receiving module 1404, for receiving verification information;The verification information is to be tested according to user second picture Card is operated and is generated.
Check results sending module 1405 for generating check results according to above-mentioned verification information, and sends the verification knot Fruit.
To sum up, safety verification device provided in an embodiment of the present invention, since the stylized picture that style converts is difficult Original image is obtained by inverse transformation, therefore, based on the image authentication code that stylized picture generates, machine is enabled to pass through ratio Compared with obtaining differentiation image with original image to image authentication code to determine that position of the second picture in original image becomes Difficulty improves the anti-machine crack ability of image authentication code.
In addition, user can only see image authentication code, and can not see complete style during entire safety verification Change picture, therefore, is cannot achieve for machine by comparing complete stylized picture and image authentication code and obtain the Location information of two pictures in stylized picture, to improve the anti-machine crack ability of image authentication code.
In addition, human eye can be relatively easy to for picking out second picture in the first picture in the embodiment of the present invention With position, to complete safety verification by mobile second picture, the experience of the people as user will not be had an impact.
An exemplary embodiment of the invention additionally provides a kind of security authentication systems, which includes:Terminal and server.
Terminal, for sending checking request to server;Receive and show image authentication code, which includes the One picture and second picture, the second picture are the pictures cut from stylized picture, and the first picture is from stylized picture Remaining picture after middle excision second picture, above-mentioned stylization picture are original images by the transformed picture of style;It receives User is to the verification operation of above-mentioned second picture and generates verification information;Safety is shown according to the check results of above-mentioned verification information The result of verifying.
Server, for receiving the checking request of terminal transmission;It, should in response to the checking request to obtain image authentication code Image authentication code includes the first picture and second picture, which is the picture cut from stylized picture, the first figure Piece is the remaining picture after cutting off above-mentioned second picture in stylized picture, and above-mentioned stylization picture is original image by wind Picture after case transformation;Above-mentioned image authentication code is sent to terminal, and receives the verification information of terminal return, which is The verification operation of above-mentioned second picture is generated according to user;Check results are generated according to above-mentioned verification information, and to terminal Send the check results.
It should be noted that device provided by the above embodiment, when realizing its function, only with above-mentioned each functional module It divides and carries out for example, can according to need in practical application and be completed by different functional modules above-mentioned function distribution, The internal structure of equipment is divided into different functional modules, to complete all or part of the functions described above.In addition, Apparatus and method embodiment provided by the above embodiment belongs to same design, and specific implementation process is detailed in embodiment of the method, this In repeat no more.
Please refer to Figure 15 which shows the structural schematic diagram for the terminal that one embodiment of the invention provides, the terminal is for real The safe verification method of the terminal side provided in above-described embodiment is provided.Specifically:
Terminal 1500 may include RF (Radio Frequency, radio frequency) circuit 1510, include one or more Memory 1520, input unit 1530, display unit 1540, the video sensor 1550, audio of computer readable storage medium Circuit 1560, includes one or more than one processing at WiFi (wireless fidelity, Wireless Fidelity) module 1570 The components such as the processor 1580 and power supply 150 of core.It will be understood by those skilled in the art that terminal knot shown in Figure 15 The restriction of structure not structure paired terminal may include perhaps combining certain components or not than illustrating more or fewer components Same component layout.Wherein:
RF circuit 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 1580 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuit 1510 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillator, It is subscriber identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), double Work device etc..In addition, RF circuit 1510 can also be communicated with network and other equipment by wireless communication.The wireless communication can be with Using any communication standard or agreement, including but not limited to GSM (Global System of Mobile communication, Global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short Messaging Service, short message service) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation 1520 software program and module, thereby executing various function application and data processing.Memory 1520 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored is created according to using for terminal 1500 Data (such as video data, phone directory etc.) built etc..In addition, memory 1520 may include high-speed random access memory, It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited Memory device.Correspondingly, memory 1520 can also include Memory Controller, to provide processor 1580 and input unit 1530 Access to memory 1520.
Input unit 1530 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 1530 may include figure As input equipment 1531 and other input equipments 1532.Image input device 1531 can be camera, be also possible to photoelectricity Scanning device.In addition to image input device 1531, input unit 1530 can also include other input equipments 1532.Specifically, Other input equipments 1532 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 1540 can be used for showing information input by user or the information and terminal 1500 that are supplied to user Various graphical user interface, these graphical user interface can be by figure, text, icon, video and any combination thereof come structure At.Display unit 1540 may include display panel 1541, optionally, can using LCD (Liquid Crystal Display, Liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, 15 Organic Light Emitting Diodes) it is aobvious to configure Show panel 1541.
Terminal 1500 may include at least one video sensor 1550, and video sensor is used to obtain the video letter of user Breath.Terminal 1500 can also include other sensor (not shown), such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1541, and proximity sensor can close aobvious when terminal 1500 is moved in one's ear Show panel 1541 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect (one in all directions As be three axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The other sensors such as the gyroscope, barometer, hygrometer, thermometer, the infrared sensor that can also configure as terminal 1500, This is repeated no more.
Video circuit 1560, loudspeaker 1561, microphone 1562 can provide the video interface between user and terminal 1500. Electric signal after the audio data received conversion can be transferred to loudspeaker 1561, by loudspeaker 1561 by voicefrequency circuit 1560 Be converted to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560 receive after be converted to audio data, then by after the processing of audio data output processor 1580, through RF circuit 1511 to send It exports to memory 1520 to such as another terminal, or by audio data to be further processed.Voicefrequency circuit 1560 may be used also It can include earphone jack, to provide the communication of peripheral hardware earphone Yu terminal 1500.
WiFi belongs to short range wireless transmission technology, and terminal 1500 can help user to receive and dispatch electricity by WiFi module 1570 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Figure 15 shows Go out WiFi module 1570, but it is understood that, and it is not belonging to must be configured into for terminal 1500, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Processor 1580 is the control centre of terminal 1500, utilizes each portion of various interfaces and connection whole mobile phone Point, by running or execute the software program and/or module that are stored in memory 1520, and calls and be stored in memory Data in 1520 execute the various functions and processing data of terminal 1500, to carry out integral monitoring to mobile phone.Optionally, Processor 1580 may include one or more processing cores;Preferably, processor 1580 can integrate application processor and modulatedemodulate Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Terminal 1500 further includes the power supply 150 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity Management system and processor 1580 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.Power supply 150 can also include one or more direct current or AC power source, recharging system, power supply event Hinder the random components such as detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal 1500 can also be including bluetooth module etc., and details are not described herein.
Specifically in the present embodiment, terminal 1500 further includes having memory and one or more than one program, In one perhaps more than one program be stored in memory and be configured to be executed by one or more than one processor. Said one or more than one program include the instruction for executing the method for above-mentioned terminal side.
Please refer to Figure 16 which shows the structural schematic diagram of server provided in an embodiment of the present invention, the server are used for The safe verification method of the server side provided in above-described embodiment is provided.Specifically:
The server 1600 includes central processing unit (CPU) 1601 including random access memory (RAM) 1602 and read-only The system storage 1604 of memory (ROM) 1603, and the system of connection system storage 1604 and central processing unit 1601 Bus 1605.The server 1600 further include help computer in each device between transmit information it is basic input/it is defeated System (I/O system) 1606 out, and for the big of storage program area 1613, application program 1614 and other program modules 1615 Capacity storage device 16 07.
The basic input/output 1606 includes display 1608 for showing information and inputs for user The input equipment 1609 of such as mouse, keyboard etc of information.Wherein the display 1608 and input equipment 1609 all pass through The input and output controller 1610 for being connected to system bus 1605 is connected to central processing unit 1601.The basic input/output System 1606 can also include input and output controller 1610 for receiving and handling from keyboard, mouse or electronic touch The input of multiple other equipment such as pen.Similarly, input and output controller 1610 also provide output to display screen, printer or its The output equipment of his type.
The mass-memory unit 1607 (is not shown by being connected to the bulk memory controller of system bus 1605 It is connected to central processing unit 1301 out).The mass-memory unit 1607 and its associated computer-readable medium are clothes Business device 1600 provides non-volatile memories.That is, the mass-memory unit 1607 may include such as hard disk or The computer-readable medium (not shown) of CD-ROM drive etc.
Without loss of generality, the computer-readable medium may include computer storage media and communication media.Computer Storage medium includes information such as computer readable instructions, data structure, program module or other data for storage The volatile and non-volatile of any method or technique realization, removable and irremovable medium.Computer storage medium includes RAM, ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, tape Box, tape, disk storage or other magnetic storage devices.Certainly, skilled person will appreciate that the computer storage medium It is not limited to above-mentioned several.Above-mentioned system storage 1604 and mass-memory unit 1607 may be collectively referred to as memory.
According to various embodiments of the present invention, the server 1600 can also be arrived by network connections such as internets Remote computer operation on network.Namely server 1600 can be connect by the network being connected on the system bus 1605 Mouth unit 1611 is connected to network 1612, in other words, it is other kinds of to be connected to that Network Interface Unit 1611 also can be used Network or remote computer system (not shown).
The memory further includes that one or more than one program, the one or more programs are stored in In memory, and it is configured to be executed by one or more than one processor.Said one or more than one program include For executing the instruction of the method for above-mentioned server side.
In embodiments of the present invention, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory of instruction, above-metioned instruction can be executed by the processor of terminal to complete terminal side in above method embodiment Each step or above-metioned instruction are executed by the processor of server to complete each of server side in above method embodiment Step.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, Tape, floppy disk and optical data storage devices etc..
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or device including a series of elements are not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or device Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or device including the element.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (15)

1. a kind of safe verification method, which is characterized in that the method includes:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, and the second picture is The picture cut from stylized picture, first picture are remaining after cutting off the second picture in stylized picture Picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
2. safe verification method according to claim 1, which is characterized in that the style, which converts, includes:
The original image is input in depth convolutional neural networks model and carries out style transformation to obtain the stylization figure Piece.
3. safe verification method according to claim 1, which is characterized in that the generating mode packet of described image identifying code It includes:
Obtain the original image for generating image authentication code;
Stylized picture is obtained according to the original image;
Local picture is cut as the second picture from the stylized picture;
The first location information of the second picture is obtained, the first position is the second picture in the stylized picture In position;
The second picture is moved to the second position from the first position to generate described image identifying code, the second It is set to any position in first picture.
4. safe verification method according to claim 3, which is characterized in that described to obtain style according to the original image Changing picture includes:
Stylized picture is generated according to the original image, alternatively,
Pre-generated stylized picture is obtained according to the original image.
5. safe verification method according to claim 3, which is characterized in that the verification information includes the second picture The third place information, the third place information is the position of the second picture after second picture described in user's operation Information;
The generating mode of the check results includes:
According to the first Pixel Information of the third place acquisition of information of the second picture;
The second Pixel Information is obtained according to the first location information of the second picture;
Pixel value difference is calculated according to first Pixel Information and the second Pixel Information;
The check results of the verification information are generated according to the pixel value difference.
6. safe verification method according to claim 5, which is characterized in that described according to pixel value difference generation The check results of verification information include:
Judge whether the pixel value difference is greater than preset threshold;
If the pixel value difference is greater than the preset threshold, the unsanctioned result of verification is generated;
If the pixel value difference is less than or equal to the preset threshold, the result that verification passes through is generated.
7. safe verification method according to claim 1, which is characterized in that before receiving and showing image authentication code, The method also includes:It receives and shows the original image for generating image authentication code.
8. safe verification method according to claim 1, which is characterized in that in each received described image identifying code, The shape and/or size of the second picture generate in a random way.
9. safe verification method according to claim 1, which is characterized in that in each received described image identifying code, The home position of the second picture and the position of new placement generate in a random way.
10. a kind of safety verification device, which is characterized in that described device includes:
Request sending module, for sending checking request;
Identifying code receiving module, for receiving and showing image authentication code, described image identifying code includes the first picture and second Picture, the second picture are the pictures cut from stylized picture, and first picture is cut off from stylized picture Remaining picture after the second picture;The stylization picture is original image by the transformed picture of style;
Verification information generation module, for receiving user to the verification operation of the second picture and generating verification information
Verification result display module, for showing the result of safety verification according to the check results of the verification information.
11. safety verification device according to claim 10, which is characterized in that the style, which converts, includes:
The original image is input in depth convolutional neural networks model and carries out style transformation to obtain the stylization figure Piece.
12. safety verification device according to claim 10, which is characterized in that described device further includes for generating image The identifying code generation module of identifying code, the identifying code generation module include:
First obtains module, for obtaining the original image for generating image authentication code;
Stylized picture obtains module, for obtaining stylized picture according to the original image;
Module is cut, for cutting local picture as the second picture from the stylized picture;
First position module, for obtaining the first location information of the second picture, the first position is second figure Position of the piece in the stylized picture;
First generates submodule, for the second picture to be moved to the second position from the first position to generate the figure As identifying code, the second position is any position in first picture.
13. safety verification device according to claim 12, which is characterized in that the verification information includes second figure The third place information of piece, the third place information are the positions of the second picture after second picture described in user's operation Confidence breath;
Described device further includes check results generation module, for generating the check results of the verification information;The verification knot Fruit generation module includes:
First pixel obtains module, for the first Pixel Information of the third place acquisition of information according to the second picture;
Second pixel obtains module, for obtaining the second Pixel Information according to the first location information of the second picture;
Pixel value difference computing module, for calculating pixel value difference according to first Pixel Information and the second Pixel Information;
Second generates submodule, for generating the check results of the verification information according to the pixel value difference.
14. safety verification device according to claim 13, which is characterized in that described to generate institute according to the pixel value difference The check results for stating verification information include:
Judge whether the pixel value difference is greater than preset threshold;
If the pixel value difference is greater than the preset threshold, the unsanctioned result of verification is generated;
If the pixel value difference is less than or equal to the preset threshold, the result that verification passes through is generated.
15. a kind of terminal, which is characterized in that including:Processor and memory;Wherein, the memory is stored with computer journey Sequence, the computer program are suitable for being loaded by the processor and executing following steps:
Send checking request;
Receive and show image authentication code, described image identifying code includes the first picture and second picture, and the second picture is The picture cut from stylized picture, first picture are remaining after cutting off the second picture in stylized picture Picture;The stylization picture is original image by the transformed picture of style;
User is received to the verification operation of the second picture and generates verification information;
The result of safety verification is shown according to the check results of the verification information.
CN201810312164.6A 2018-04-09 2018-04-09 Security verification method, device and terminal Active CN108846274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810312164.6A CN108846274B (en) 2018-04-09 2018-04-09 Security verification method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810312164.6A CN108846274B (en) 2018-04-09 2018-04-09 Security verification method, device and terminal

Publications (2)

Publication Number Publication Date
CN108846274A true CN108846274A (en) 2018-11-20
CN108846274B CN108846274B (en) 2020-08-18

Family

ID=64212064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810312164.6A Active CN108846274B (en) 2018-04-09 2018-04-09 Security verification method, device and terminal

Country Status (1)

Country Link
CN (1) CN108846274B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109559363A (en) * 2018-11-23 2019-04-02 网易(杭州)网络有限公司 Stylized processing method, device, medium and the electronic equipment of image
CN109886010A (en) * 2019-01-28 2019-06-14 平安科技(深圳)有限公司 Verify picture sending method, synthetic method and device, storage medium and terminal
CN110706221A (en) * 2019-09-29 2020-01-17 武汉极意网络科技有限公司 Verification method, verification device, storage medium and device for customizing pictures
CN110942062A (en) * 2019-11-21 2020-03-31 网易(杭州)网络有限公司 Image verification code generation method, medium, device and computing equipment
CN111447207A (en) * 2020-03-24 2020-07-24 咪咕文化科技有限公司 Verification code verification method, electronic device and storage medium
WO2021031242A1 (en) * 2019-08-21 2021-02-25 平安科技(深圳)有限公司 Character verification method and apparatus, computer device, and storage medium
CN113158167A (en) * 2021-04-30 2021-07-23 腾讯音乐娱乐科技(深圳)有限公司 Verification code implementation method, electronic device and computer-readable storage medium
EP3828740A3 (en) * 2020-07-21 2021-10-06 Baidu Online Network Technology (Beijing) Co., Ltd. Captcha based on image rotation
CN114626047A (en) * 2022-03-04 2022-06-14 北京百度网讯科技有限公司 Verification method, device and equipment based on man-machine interaction
TWI770947B (en) * 2021-04-20 2022-07-11 國立清華大學 Verification method and verification apparatus based on attacking image style transfer

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187206A (en) * 2014-05-28 2015-12-23 腾讯科技(深圳)有限公司 Identity verification method and device
CN105323065A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Safety verification method and device
CN105335645A (en) * 2015-09-23 2016-02-17 北京奇虎科技有限公司 Verification method and apparatus for picture verification code
CN106886975A (en) * 2016-11-29 2017-06-23 华南理工大学 It is a kind of can real time execution image stylizing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187206A (en) * 2014-05-28 2015-12-23 腾讯科技(深圳)有限公司 Identity verification method and device
CN105323065A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Safety verification method and device
CN105335645A (en) * 2015-09-23 2016-02-17 北京奇虎科技有限公司 Verification method and apparatus for picture verification code
CN106886975A (en) * 2016-11-29 2017-06-23 华南理工大学 It is a kind of can real time execution image stylizing method

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109559363A (en) * 2018-11-23 2019-04-02 网易(杭州)网络有限公司 Stylized processing method, device, medium and the electronic equipment of image
CN109559363B (en) * 2018-11-23 2023-05-23 杭州网易智企科技有限公司 Image stylization processing method and device, medium and electronic equipment
CN109886010A (en) * 2019-01-28 2019-06-14 平安科技(深圳)有限公司 Verify picture sending method, synthetic method and device, storage medium and terminal
WO2020155772A1 (en) * 2019-01-28 2020-08-06 平安科技(深圳)有限公司 Verification image sending method, synthesis method, device, storage medium, and terminal
CN109886010B (en) * 2019-01-28 2023-10-17 平安科技(深圳)有限公司 Verification picture sending method, verification picture synthesizing method and device, storage medium and terminal
WO2021031242A1 (en) * 2019-08-21 2021-02-25 平安科技(深圳)有限公司 Character verification method and apparatus, computer device, and storage medium
CN110706221A (en) * 2019-09-29 2020-01-17 武汉极意网络科技有限公司 Verification method, verification device, storage medium and device for customizing pictures
CN110942062B (en) * 2019-11-21 2022-12-23 杭州网易智企科技有限公司 Image verification code generation method, medium, device and computing equipment
CN110942062A (en) * 2019-11-21 2020-03-31 网易(杭州)网络有限公司 Image verification code generation method, medium, device and computing equipment
CN111447207A (en) * 2020-03-24 2020-07-24 咪咕文化科技有限公司 Verification code verification method, electronic device and storage medium
EP3828740A3 (en) * 2020-07-21 2021-10-06 Baidu Online Network Technology (Beijing) Co., Ltd. Captcha based on image rotation
US12032672B2 (en) 2020-07-21 2024-07-09 Baidu Online Network Technology (Beijing) Co., Ltd. Image verification method and apparatus, electronic device and computer-readable storage medium
TWI770947B (en) * 2021-04-20 2022-07-11 國立清華大學 Verification method and verification apparatus based on attacking image style transfer
CN113158167A (en) * 2021-04-30 2021-07-23 腾讯音乐娱乐科技(深圳)有限公司 Verification code implementation method, electronic device and computer-readable storage medium
CN113158167B (en) * 2021-04-30 2024-02-23 腾讯音乐娱乐科技(深圳)有限公司 Verification code implementation method, electronic equipment and computer readable storage medium
CN114626047A (en) * 2022-03-04 2022-06-14 北京百度网讯科技有限公司 Verification method, device and equipment based on man-machine interaction

Also Published As

Publication number Publication date
CN108846274B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN108846274A (en) A kind of safe verification method, device and terminal
CN107872623B (en) A kind of image pickup method, mobile terminal and computer readable storage medium
CN107256555B (en) Image processing method, device and storage medium
CN106371689B (en) Picture joining method, apparatus and system
CN107977144A (en) A kind of screenshotss processing method and mobile terminal
CN107817939A (en) A kind of image processing method and mobile terminal
CN107977132A (en) A kind of method for information display and mobile terminal
CN104021129B (en) Show the method and terminal of group picture
CN109582475A (en) A kind of sharing method and terminal
CN107656793A (en) A kind of Application Program Interface switching method and mobile terminal
CN109146760A (en) A kind of watermark generation method, device, terminal and storage medium
CN107977652A (en) The extracting method and mobile terminal of a kind of screen display content
CN106204423A (en) A kind of picture-adjusting method based on augmented reality, device and terminal
CN108304070A (en) The bright screen method of mobile terminal, mobile terminal and computer readable storage medium
CN104991699B (en) A kind of method and apparatus of video display control
CN104516624B (en) A kind of method and device inputting account information
CN109871164A (en) A kind of message method and terminal device
CN109814786A (en) Image storage method and terminal device
US20150043312A1 (en) Sound playing method and device thereof
CN109067981A (en) Split screen application switching method, device, storage medium and electronic equipment
CN107908330A (en) The management method and mobile terminal of application icon
CN108932086A (en) Display methods, device and the storage medium of application interface
CN108227934A (en) display area lighting method, mobile terminal and computer readable storage medium
CN110191426A (en) A kind of method and terminal of information sharing
CN110309004A (en) The processing method and terminal of data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant