CN109951431B - Verification method, system, electronic device and computer readable medium - Google Patents

Verification method, system, electronic device and computer readable medium Download PDF

Info

Publication number
CN109951431B
CN109951431B CN201711401210.1A CN201711401210A CN109951431B CN 109951431 B CN109951431 B CN 109951431B CN 201711401210 A CN201711401210 A CN 201711401210A CN 109951431 B CN109951431 B CN 109951431B
Authority
CN
China
Prior art keywords
images
entity
image
different
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711401210.1A
Other languages
Chinese (zh)
Other versions
CN109951431A (en
Inventor
王春兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201711401210.1A priority Critical patent/CN109951431B/en
Publication of CN109951431A publication Critical patent/CN109951431A/en
Application granted granted Critical
Publication of CN109951431B publication Critical patent/CN109951431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present disclosure provides a verification method, comprising: presenting candidate images, the candidate images comprising at least one set of compared images, each set of compared images comprising at least one first image with a first entity and at least one second image with a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity includes that the first entity and the second entity can not be distinguished by a specific image recognition device; and generating a verification question comprising selecting at least one of the first images in each set of comparison images.

Description

Verification method, system, electronic device and computer readable medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a verification method, a verification system, an electronic device, and a computer-readable medium.
Background
With the rapid development of internet technology, more and more network functions require users to log in various systems for realization. When various network functions are utilized, verification is required to be carried out through verification codes so as to determine that behaviors utilizing various network functions are triggered by human operation and non-computer programs. For example, the current verification code is generally generated by superimposing a plurality of randomly acquired images and adding interference lines and/or interference pixels to the superimposed images, and the verification code generated in this way belongs to a dominant static verification code.
In the process of implementing the inventive concept, the inventor finds that at least the following problems exist in the prior art: the static verification code can be easily identified by a computer through a certain identification technology, so that the difficulty of a malicious computer in cracking the verification code is reduced, and the risk of system data loss is increased.
Disclosure of Invention
In view of the above, the present disclosure provides a verification method, a system, an electronic device, and a computer-readable medium, which require a user to interact with a verification code more deeply and are not easy to be recognized and cracked by a computer.
One aspect of the present disclosure provides a verification method, comprising: presenting candidate images, the candidate images comprising at least one set of compared images, each set of compared images comprising at least one first image with a first entity and at least one second image with a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity includes that the first entity and the second entity can not be distinguished by a specific image recognition device; and generating a verification question comprising selecting at least one of the first images in each set of comparison images.
According to an embodiment of the present disclosure, the candidate images include a plurality of sets of comparison images, each set of comparison images including two of the first images, and the selecting at least one of the first images in each set of comparison images includes: two of the first images in each set of compared images are selected.
According to an embodiment of the present disclosure, the method further comprises: when the accuracy of the user input selection reaches a first threshold value, the verification is passed; and/or updating the verification code when the error rate of the user input selection reaches a second threshold value.
According to an embodiment of the present disclosure, the first entity in different first images has different backgrounds, different poses and/or different presentation angles; and/or the second entity in different said second images has a different background, a different pose and/or a different presentation angle.
According to the embodiment of the present disclosure, before presenting the candidate image, the method further includes: acquiring a first original image of at least one first entity and a second original image of at least one second entity; respectively processing the first original image and the second original image, wherein the processing comprises rotation, superposition and/or random combination; and generating the first image and the second image respectively based on the processed first original image and the processed second original image.
According to the embodiment of the disclosure, the method further comprises the step of determining the value ranges of the first threshold value and the second threshold value according to the use scene of the verification code and/or the number of the contrast image groups.
Another aspect of the disclosure provides a verification system that includes a presentation module and a first generation module. The presentation module is configured to present candidate images, the candidate images including at least one set of comparison images, each set of comparison images including at least one first image having a first entity and at least one second image having a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity comprising that the first entity and the second entity cannot be distinguished by a specific image recognition device. The first generating module is used for generating a verification question, and the verification question comprises at least one first image selected from each group of comparison images.
According to an embodiment of the present disclosure, the candidate images include a plurality of sets of comparison images, each set of comparison images includes two of the first images, and the selecting at least one of the first images in each set of comparison images includes selecting two of the first images in each set of comparison images.
According to an embodiment of the present disclosure, the system further comprises a verification module and/or an update module. The verification module is used for passing the verification when the accuracy of the user input selection reaches a first threshold value. The updating module is used for updating the verification code when the error rate of the user input selection reaches a second threshold value.
According to an embodiment of the present disclosure, the first entity in different first images has different backgrounds, different poses and/or different presentation angles; and/or the second entity in different said second images has a different background, a different pose and/or a different presentation angle.
According to an embodiment of the present disclosure, the system further includes an obtaining module, a processing module, and a second generating module. The acquisition module is used for acquiring at least one first original image of a first entity and at least one second original image of a second entity. The processing module is used for respectively processing the first original image and the second original image, and the processing comprises rotation, superposition and/or random combination. The second generation module is used for respectively generating the first image and the second image based on the processed first original image and the processed second original image.
According to an embodiment of the present disclosure, the system further comprises a determination module. The determining module is used for determining the value ranges of the first threshold value and the second threshold value according to the using scene of the verification code and/or the number of the comparison image group.
Another aspect of the disclosed embodiments provides an electronic device, including: one or more processors; and one or more memories storing executable instructions that, when executed by the processor, cause the processor to perform the method as described above.
Another aspect of the present disclosure provides a computer-readable medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, the difficulty of a malicious computer in cracking the system verification code can be increased at least partially, the problem of the malicious computer in cracking the system verification code is solved partially, and therefore, the technical effect of increasing the anti-attack capability of the system can be realized.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario of the authentication method and system according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow chart of a verification method according to an embodiment of the present disclosure;
FIG. 3 schematically shows a flow chart of a verification method according to another embodiment of the present disclosure;
FIG. 4A schematically illustrates a flow diagram of a verification method according to another embodiment of the present disclosure;
FIG. 4B schematically illustrates a flow diagram of a verification method according to another embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart of a verification method according to another embodiment of the present disclosure;
FIG. 6 schematically illustrates an application diagram of a captcha according to an embodiment of the present disclosure;
FIG. 7 schematically illustrates a block diagram of an authentication system according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a block diagram of an authentication system according to another embodiment of the present disclosure; and
fig. 9 schematically illustrates an exemplary system architecture to which the authentication method may be applied, according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of such, B, and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, A, B, C together, etc.). Where a convention analogous to "at least one of line, B, or C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, A, B, C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase "short or bshort should be understood to include the possibility of" being or "," being, or "or and B or.
The embodiment of the disclosure provides a verification method and a verification system. The method comprises presenting candidate images comprising at least one set of compared images, each set comprising at least one first image with a first entity and at least one second image with a second entity, wherein: the first entity and the second entity are different but similar entities, wherein the similarity comprises that the first entity and the second entity can not be distinguished by a specific image recognition device; and generating a verification question comprising selecting at least one first image of each set of comparison images.
According to the verification method and the verification system of the embodiment of the disclosure, the displayed candidate images comprise the contrast images formed by different but similar entities, so that the user is required to distinguish and select in the contrast images when answering the verification questions, and the user can interact with the verification code image more deeply. And the first entity and the second entity in the comparison images of each group can not be distinguished through the test of a specific image recognition device, so that the difference of each group of comparison images can not be recognized by a computer at least with the image recognition capability equal to or lower than that of the specific image recognition device. In this way, the difficulty of a malicious computer in cracking the system verification code is effectively increased, the problem of the malicious computer in cracking the system verification code is partially solved, and therefore the technical effect of increasing the anti-attack capability of the system can be achieved.
Fig. 1 schematically illustrates an exemplary system architecture 100 to which the verification methods and systems may be applied, according to embodiments of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
In some embodiments, in the process of using various network functions by the terminal devices 101, 102, 103, when user identity authentication is required, the server 105 may send candidate images for the verification code and verification questions to the terminal devices 101, 102, 103 according to the received user request. The user can perform authentication operations at the terminal devices 101, 102, 103. In some embodiments, the server 105 may obtain and process the authentication operation of the user through the terminal devices 101, 102, 103 to determine the authentication result.
It should be noted that the authentication method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the authentication system provided by the embodiments of the present disclosure may be generally disposed in the server 105. The authentication method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the authentication system provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically shows a flow chart of a verification method according to an embodiment of the present disclosure.
As shown in fig. 2, the authentication method includes operations S201 and S202.
In operation S201, candidate images are presented, the candidate images including at least one set of comparison images, each set of comparison images including at least one first image having a first entity and at least one second image having a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity comprising that the first entity and the second entity are not distinguishable by a specific image recognition means.
According to an embodiment of the present disclosure, the specific image recognition device may be a selected currently known or acquirable image recognition device with the highest accuracy.
In operation S202, a verification question is generated, which includes selecting at least one of the first images in each set of comparison images.
According to an embodiment of the present disclosure, when a user logs in to a system (e.g., a ticketing system, a banking system, or a communication system, etc.) by answering the above-mentioned authentication questions, the user can recognize the difference of each set of the comparison images by a deeper observation and thinking. For example, the first image is a live image and the second image is a wax image, and the user may select a live image for each set of comparison images. However, computers (e.g., hackers) often have difficulty distinguishing between the first entity and the second entity (e.g., the first entity is a real person and the second entity is a wax image). This is because a computer usually detects what entity is in an image according to the outline (for example, it only detects that the outlines of the first entity and the second entity are both people), and cannot sense the expression of a person in the image by using the sense, so that it is difficult to distinguish whether the person in the image is true or false.
Moreover, since the first entity and the second entity in the comparison image of each group cannot be distinguished by the specific image recognition device, the difference of each group of comparison images cannot be recognized by a computer having at least an image recognition capability equivalent to or lower than that of the specific image recognition device.
In this way, the difficulty of the computer in cracking the verification problem can be increased, so that the loss of system data is avoided, and the safety factor of the system is enhanced.
According to an embodiment of the present disclosure, the first entity in different first images has different backgrounds, different poses and/or different presentation angles; and/or the second entity in a different second image differs in background, pose, and/or presentation angle. The verification codes generated by the first image and the second image with different backgrounds, different postures and/or different display angles are higher in safety, and meanwhile, the safety factor of the whole system is also improved.
The first entity is a character, and the second entity is a wax image of the character.
The posture of the first entity may be different, specifically, the posture of the person is different in different first images (for example, standing in one first image, sitting in another first image), or the expression of the person is different, and the like.
The different display angles of the first entities may specifically be different display angles of people in different first images. For example, a front image of a person is shown in one first image and a side image of the person is shown in the other first image.
The background of the first entity may be different, and specifically, the background environment where the person is located in different first images is different.
The background, the posture and/or the display angle of the second entity in different second images are different and are similar to those of the first image, and are not repeated.
In this way, the user's deep interaction with the captcha may be increased as well as increasing the difficulty of the computer identifying the captcha.
Fig. 3 schematically shows a flow chart of a verification method according to another embodiment of the present disclosure.
According to an embodiment of the present disclosure, the candidate images include a plurality of sets of comparison images, each set of comparison images includes two first images, and selecting at least one first image of each set of comparison images includes selecting two of the first images of each set of comparison images, with reference to fig. 3 in particular.
As shown in fig. 3, operation S202 in the verification method may specifically be operation S302.
In operation S201, candidate images are presented, the candidate images including at least one set of comparison images, each set of comparison images including at least one first image having a first entity and at least one second image having a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity comprising that the first entity and the second entity are not distinguishable by a specific image recognition means.
In operation S302, a verification question is generated, which includes selecting two first images of each set of comparison images.
According to an embodiment of the present disclosure, a user may log into the system by selecting two first images in each set of comparison images. For example, the candidate images include six sets of contrast images, each set of contrast images including two first images and two second images, wherein the pictures of the first images in the six sets of contrast images may be the same or different and the pictures of the second images in the six sets of contrast images may be the same or different.
In the following, six sets of images are described as an example of a wax image in which the first entity is a real person and the second entity is the real person. The verification problem generated in operation S302 in this case may be "please select two real-person images of each of the six sets of comparison images in turn for pairing? The verification problem requires that the user performs real person image matching selection, so that the safety of the verification code is further enhanced, and the safety factor of the whole system is further improved. Because the malicious computer aiming at the verification problem needs to detect not only the authenticity of the first image and the second image, but also another first image which has the same first entity as the first image, the difficulty of cracking the verification code is further enhanced.
According to the embodiment of the disclosure, each set of comparison images may include three or four or more first images, and the like, besides two first images, and the number of the first images is determined according to the application scene using the verification code.
Fig. 4A schematically illustrates a flow chart of a verification method according to another embodiment of the present disclosure.
As shown in fig. 4A, the authentication method includes operation S401 in addition to operation S201 and operation S202 described in the embodiment of fig. 2.
In operation S401, when the accuracy of the user input selection reaches a first threshold, the verification is passed; and/or updating the verification code when the error rate of the user input selection reaches a second threshold value.
According to an embodiment of the present disclosure, the accuracy of the user input selection may be a ratio of the number of the first images selected by the user to the number of all the first images in the verification code. The error rate of the user input selection may be a ratio of the number of images selected by the user other than the first image to the number of remaining images in the captcha other than the first image.
FIG. 4B schematically illustrates a flow chart of a verification method that selects two first images in each set of comparison images according to another embodiment of the disclosure.
As shown in fig. 4B, the method includes operation S402, in addition to operation S201 and operation S302 described in the embodiment of fig. 3.
In operation S402, when the accuracy of the user input selection reaches a first threshold, the verification is passed; and/or updating the verification code when the error rate of the user input selection reaches a second threshold value.
According to an embodiment of the present disclosure, the correct rate of the user input selection may be a ratio of the logarithm of the first image selected by the user to the logarithms of all the first images in the verification code. The error rate of the user input selection may be a ratio of the logarithm of the image selected by the user other than the first image to the logarithm of the remaining images of the captcha other than the first image.
According to the embodiment of the disclosure, the verification code is updated when the error rate of the user input selection reaches the second threshold value. Because the malicious computer's ability to process data is fast, if the second threshold is not set, the malicious computer tries continuously, possibly a few seconds, to break the authentication code. In this case, it is necessary to set a second threshold value, which may add a layer of protection to the captcha, thereby increasing the difficulty of malicious computers in cracking the captcha.
According to the embodiment of the present disclosure, when the user selects the first image of the comparison images, there may be many selection ways.
For example, the system may respond to the selection operation of the user in real time, and when the accuracy of the selection operation continuously input by the user reaches a first threshold value, the verification is passed; or when the error rate of the selection operation continuously input by the user reaches a second threshold value, updating the verification code, and then reselecting the verification code after updating. For example, the user clicks one image to calculate a correct rate or an error rate once, and determines whether the correct rate or the error rate reaches a first threshold value or a second threshold value.
For another example, the system may respond to a determination operation after the user selects one or more pairs of first images (e.g., click on a determination option after the user selects completion), verify the first image when the correctness of the determination operation input by the user reaches a first threshold, or update the verification code when the error rate of the determination operation input by the user reaches a second threshold, and then the user re-selects the updated verification code.
According to the embodiment of the disclosure, the value ranges of the first threshold value and the second threshold value can be determined according to the use scene of the verification code and/or the number of the comparison image groups. For example, if the verification code is used in a government system or a bank system, the number of the comparison image sets may be increased, in which case the first threshold may reach 100% or 90%, and the second threshold may reach 20% or 10%. For another example, if the verification code is used in a game system or a ticket purchasing system, the number of the comparison image groups may be two or three, in which case the first threshold may be 75% or 85% and the second threshold may be 25% or 15%. Determining the value ranges of the first threshold value and the second threshold value in this way is beneficial to the expansion of different application scenarios.
Fig. 5 schematically shows a flow chart of a verification method according to another embodiment of the present disclosure.
As shown in fig. 5, the method includes operations S501 to S503 in addition to operations S201 and S202 described in fig. 2.
In operation S501, a first original image of at least one first entity and a second original image of at least one second entity are acquired.
In operation S502, the first original image and the second original image are respectively processed, the processing including rotation, superposition and/or random combination.
In operation S503, a first image and a second image are generated based on the processed first original image and the processed second original image, respectively.
According to the embodiment of the disclosure, the first original image and the second original image are respectively rotated, overlapped and/or randomly combined, so that the generated first image and second image are more difficult to identify, and the verification code generated based on the first image and the second image has higher security and is not easy to break.
Fig. 6 schematically shows an application diagram of a verification code according to an embodiment of the present disclosure.
As shown in fig. 6, the candidate images include two sets of comparison images, each set including four real-person images, or four wax-up images or four barbie doll images, respectively, and the verification problem generated based on the four sets of comparison images is "please select a real-person image among the following comparison images? ".
In this case, the user can quickly select the real person image (e.g., the image of liudeluxe and the image of a boy) of fig. 6 through simple observation and thinking and log in the system, and a malicious computer is difficult to distinguish the authenticity of the real person image, the wax image and the barbie doll image, so that the difficulty of cracking the verification code is increased, the loss of system data is avoided, and the safety factor of the system is improved.
FIG. 7 schematically shows a block diagram of an authentication system according to an embodiment of the disclosure.
As shown in FIG. 7, the system 700 includes a presentation module 710 and a first generation module 720.
A presentation module 710 for presenting candidate images, the candidate images comprising at least one set of comparison images, each set of comparison images comprising at least one first image having a first entity and at least one second image having a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity comprising that the first entity and the second entity are not distinguishable by a specific image recognition means.
A first generating module 720 is configured to generate a verification question including at least one first image selected from each set of comparison images.
According to an embodiment of the present disclosure, the system 700 may be used to implement the method flow described with reference to fig. 2.
FIG. 8 schematically shows a block diagram of an authentication system according to another embodiment of the present disclosure.
As shown in fig. 8, the system 800 includes, in addition to the presentation module 710 and the first generation module 720, a verification module 810, an update module 820, an acquisition module 830, a processing module 840, a second generation module 850, and a determination module 860.
The system 800 may be used to implement the methods described with reference to fig. 2-6.
The verifying module 810 is configured to pass the verification when the accuracy of the user input selection reaches a first threshold.
And an updating module 820, configured to update the verification code when the error rate of the user input selection reaches a second threshold value.
The obtaining module 830 is configured to obtain at least one first original image of a first entity and at least one second original image of a second entity.
A processing module 840, configured to process the first original image and the second original image separately, where the processing includes rotation, superposition, and/or random combination.
A second generating module 850, configured to generate the first image and the second image based on the processed first original image and the processed second original image, respectively.
The determining module 860 is configured to determine the value ranges of the first threshold and the second threshold according to the usage scenario of the verification code and/or the number of the comparison image groups.
It is to be appreciated that the presentation module 710, the first generation module 720, the verification module 810, the update module 820, the acquisition module 830, the processing module 840, the second generation module 850, and the determination module 860 may be combined in one module for implementation, or any one of them may be split into multiple modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present invention, at least one of the presentation module 710, the first generation module 720, the verification module 810, the update module 820, the acquisition module 830, the processing module 840, the second generation module 850, and the determination module 860 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or in a suitable combination of three implementations of software, hardware, and firmware. Alternatively, at least one of the presentation module 710, the first generation module 720, the verification module 810, the update module 820, the acquisition module 830, the processing module 840, the second generation module 850, and the determination module 860 may be implemented at least in part as a computer program module that, when executed by a computer, may perform the functions of the respective module.
Fig. 9 schematically illustrates an exemplary system architecture to which the authentication method may be applied, according to an embodiment of the present disclosure. The computer system illustrated in FIG. 9 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 9, a computer system 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage section 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. Processor 901 may include a single processing unit or multiple processing units for performing the different actions of the method flows described with reference to fig. 2-5 in accordance with embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the system 900 are stored. The processor 901, the ROM902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various operations of the authentication method described above with reference to fig. 2 to 5 by executing programs in the ROM902 and/or the RAM 903. Note that the programs may also be stored in one or more memories other than the ROM902 and the RAM 903. The processor 901 may also perform various operations of the authentication method described above with reference to fig. 2 to 5 by executing the program stored in the one or more memories.
System 900 may also include an input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. The system 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
According to an embodiment of the present disclosure, the method described above with reference to the flow chart may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing. According to embodiments of the present disclosure, a computer-readable medium may include the ROM902 and/or the RAM 903 described above and/or one or more memories other than the ROM902 and the RAM 903.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present disclosure also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to perform: presenting candidate images, the candidate images comprising at least one set of compared images, each set of compared images comprising at least one first image with a first entity and at least one second image with a second entity, wherein: the first entity and the second entity are different but similar entities, wherein the similarity comprises that the first entity and the second entity can not be distinguished by a specific image recognition device; and generating a verification question comprising selecting at least one first image of each set of comparison images.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (14)

1. A method of authentication, comprising:
presenting candidate images, the candidate images comprising at least one set of compared images, each set of compared images comprising at least one first image with a first entity and at least one second image with a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity comprises that the first entity and the second entity can not be distinguished by a specific image recognition device, the first image is generated by first original image processing of the first entity, and the second image is generated by second original image processing of the second entity; and
generating a verification question that includes a selection of at least one of the first images in each set of comparison images.
2. The method of claim 1, wherein the candidate images comprise a plurality of sets of comparison images, each set comprising two of the first images, the selecting at least one of the first images in each set comprising:
two of the first images in each set of compared images are selected.
3. The method of claim 1 or 2, further comprising:
when the accuracy of the user input selection reaches a first threshold value, the verification is passed; and/or
And updating the verification code when the error rate of the user input selection reaches a second threshold value.
4. The method of claim 1, wherein:
the background, the posture and/or the display angle of the first entity in different first images are different; and/or
The second entities in different second images have different backgrounds, different poses and/or different presentation angles.
5. The method of claim 1, prior to presenting the candidate image, further comprising:
acquiring at least one first original image of the first entity and at least one second original image of the second entity;
respectively processing the first original image and the second original image, wherein the processing comprises rotation, superposition and/or random combination; and
generating the first image and the second image based on the processed first original image and the processed second original image, respectively.
6. The method of claim 3, further comprising:
and determining the value ranges of the first threshold value and the second threshold value according to the use scene of the verification code and/or the number of the contrast image groups.
7. A verification system, comprising:
a presentation module configured to present candidate images, the candidate images including at least one set of comparison images, each set of comparison images including at least one first image having a first entity and at least one second image having a second entity, wherein: the first entity and the second entity are different but similar entities, the similarity comprises that the first entity and the second entity can not be distinguished by a specific image recognition device, the first image is generated by first original image processing of the first entity, and the second image is generated by second original image processing of the second entity; and
a first generating module configured to generate a verification problem, wherein the verification problem includes selecting at least one of the first images in each set of comparison images.
8. The system of claim 7, wherein the candidate images comprise a plurality of sets of comparison images, each set comprising two of the first images, the selecting at least one of the first images in each set comprising:
two of the first images in each set of compared images are selected.
9. The system of claim 7 or 8, further comprising:
the verification module is used for passing the verification when the accuracy of the user input selection reaches a first threshold value; and/or
And the updating module is used for updating the verification code when the error rate of the user input selection reaches a second threshold value.
10. The system of claim 7, wherein:
the background, the posture and/or the display angle of the first entity in different first images are different; and/or
The second entities in different second images have different backgrounds, different poses and/or different presentation angles.
11. The system of claim 7, prior to presenting the candidate image, further comprising:
the acquisition module is used for acquiring at least one first original image of the first entity and at least one second original image of the second entity;
a processing module, configured to process the first original image and the second original image respectively, where the processing includes rotation, superposition, and/or random combination; and
and the second generation module is used for respectively generating the first image and the second image based on the processed first original image and the processed second original image.
12. The system of claim 9, further comprising:
and the determining module is used for determining the value ranges of the first threshold value and the second threshold value according to the use scene of the verification code and/or the number of the contrast image groups.
13. An electronic device, comprising:
one or more processors; and
one or more memories storing executable instructions that, when executed by a processor, cause the processor to perform the method of any of claims 1-6.
14. A computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 6.
CN201711401210.1A 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium Active CN109951431B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711401210.1A CN109951431B (en) 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711401210.1A CN109951431B (en) 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium

Publications (2)

Publication Number Publication Date
CN109951431A CN109951431A (en) 2019-06-28
CN109951431B true CN109951431B (en) 2021-12-14

Family

ID=67006214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711401210.1A Active CN109951431B (en) 2017-12-21 2017-12-21 Verification method, system, electronic device and computer readable medium

Country Status (1)

Country Link
CN (1) CN109951431B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103670A (en) * 2009-12-22 2011-06-22 迪斯尼实业公司 Human verification by contextually iconic visual public turing test
CN103854031A (en) * 2012-11-28 2014-06-11 伊姆西公司 Method and device for identifying image content
CN104468101A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 User identity authentication method and device and authentication service system
CN105354481A (en) * 2015-10-23 2016-02-24 中国联合网络通信集团有限公司 Network verification method and network verification server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130007875A1 (en) * 2011-06-30 2013-01-03 Ebay, Inc. Interactive CAPTCHA

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103670A (en) * 2009-12-22 2011-06-22 迪斯尼实业公司 Human verification by contextually iconic visual public turing test
CN103854031A (en) * 2012-11-28 2014-06-11 伊姆西公司 Method and device for identifying image content
CN104468101A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 User identity authentication method and device and authentication service system
CN105354481A (en) * 2015-10-23 2016-02-24 中国联合网络通信集团有限公司 Network verification method and network verification server

Also Published As

Publication number Publication date
CN109951431A (en) 2019-06-28

Similar Documents

Publication Publication Date Title
US20210139127A1 (en) Methods and systems for identifying and authorizing a user based on a mini-game login
US9813441B2 (en) Detecting and breaking CAPTCHA automation scripts and preventing image scraping
US20160261586A1 (en) Identity Authentication Method And Device And Storage Medium
CN108369615B (en) Dynamically updating CAPTCHA challenges
US20180253542A1 (en) Variation Analysis-Based Public Turing Test to Tell Computers and Humans Apart
US20160057157A1 (en) Verification method, apparatus, server and system
CN111163095B (en) Network attack analysis method, network attack analysis device, computing device, and medium
Marforio et al. Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications
US9563763B1 (en) Enhanced captchas
US20220103539A1 (en) Verifying trusted communications using established communication channels
CN110007936B (en) Data processing method and device
CN107729768A (en) A kind of page display method, device, Intelligent flat and storage medium
CN110764979A (en) Log identification method, system, electronic device and computer readable medium
US20120198555A1 (en) Testing web services that are accessible via service oriented architecture (soa) interceptors
CN107844696B (en) Verification code interference method and server
CN109951431B (en) Verification method, system, electronic device and computer readable medium
CN108133132B (en) Identity verification method and system and electronic equipment
CN111625805B (en) Verification method, verification device, electronic equipment and storage medium
EP3819797A1 (en) Methods and systems for identifying and authorizing a user based on a mini-game login
CN110543754A (en) memory, verification code implementation method, device and equipment
KR102470639B1 (en) Improving Data Integrity with Trusted Proof-of-Code Tokens
WO2022087432A1 (en) Multi-factor authentication using symbols
CN112751799B (en) Verification method and device based on picture verification code
CN107016266B (en) Content-based authentication
CN111460422B (en) Method and device for generating verification code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant