CN110213205B - Verification method, device and equipment - Google Patents

Verification method, device and equipment Download PDF

Info

Publication number
CN110213205B
CN110213205B CN201810260604.8A CN201810260604A CN110213205B CN 110213205 B CN110213205 B CN 110213205B CN 201810260604 A CN201810260604 A CN 201810260604A CN 110213205 B CN110213205 B CN 110213205B
Authority
CN
China
Prior art keywords
model
models
cutting
target
dimensional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810260604.8A
Other languages
Chinese (zh)
Other versions
CN110213205A (en
Inventor
高静
魏仁佳
陈卓铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810260604.8A priority Critical patent/CN110213205B/en
Publication of CN110213205A publication Critical patent/CN110213205A/en
Application granted granted Critical
Publication of CN110213205B publication Critical patent/CN110213205B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a verification method, a verification device and verification equipment. The method comprises the following steps: displaying at least two cutting models, wherein the cutting models are three-dimensional models; acquiring moving information of a moved target cutting model, wherein the target cutting model is any one of at least two cutting models; and updating and displaying the target cutting model according to the movement information, sending the movement information to a server, detecting whether at least two cutting models are spliced into the target model or not by the server according to the movement information, and acquiring a verification result according to the detection result. The target model is combined and formed through the three-dimensional target block model for verification, and compared with a two-dimensional jigsaw sliding block, the calculation complexity for identifying the target block model and determining how to combine the target model is higher, the anti-cracking capability is higher, and the safety is higher.

Description

Verification method, device and equipment
Technical Field
The embodiment of the application relates to the technical field of computer internet, in particular to a verification method, a verification device and verification equipment.
Background
A Completely Automated Turing test to distinguish Computers from Humans (computer Automated Public turning test to tell Computers and Humans Apart, CAPTCHA) is a technique to distinguish whether a user is a computer or a human, also commonly referred to as a passcode.
In the related art, the human-machine authentication is generally performed by sliding a puzzle authentication code. When the human-computer verification is carried out through the sliding jigsaw verification code, a background picture is displayed. The user needs to drag the slider to the notch in the background picture to combine the background picture into a complete background picture, and then the verification can be completed. And the terminal judges whether the verification is passed according to whether the final position of the sliding block is the same as the position of the notch.
In the sliding jigsaw verification code in the related art, because the shape and the color of the sliding block and the shape and the color of the notch have larger difference compared with a background picture and are easily identified by a cracking program, the man-machine verification mode by the sliding jigsaw verification code is easily cracked by the cracking program, and the safety is lower.
Disclosure of Invention
The embodiment of the application provides a verification method, a verification device and verification equipment, which can be used for solving the problem of low safety caused by the fact that a man-machine verification mode is easy to crack in the related technology through a sliding jigsaw puzzle. The technical scheme is as follows:
in one aspect, a verification method is provided, the method comprising:
displaying at least two cut-block models, wherein the cut-block models are three-dimensional models;
acquiring moving information of a target cutting model which is any one cutting model in the at least two cutting models;
and updating and displaying the target cutting model according to the movement information, sending the movement information to a server, detecting whether the at least two cutting models are spliced into the target model or not by the server according to the movement information, and acquiring a verification result according to a detection result.
In one aspect, a verification method is provided, the method comprising:
acquiring moving information of a target switching model which is any one of at least two cutting models displayed by a terminal and is a three-dimensional model;
and detecting whether the at least two cutting block models are spliced into a target model according to the movement information, and acquiring a verification result according to a detection result.
In one aspect, a verification method is provided, the method comprising:
displaying at least two cut-block models, wherein the cut-block models are three-dimensional models;
acquiring moving information of a target cutting model which is any one cutting model in the at least two cutting models;
and updating and displaying the target cutting model according to the movement information, detecting whether the at least two cutting models are spliced into the target model according to the movement information, and acquiring a verification result according to a detection result.
In one aspect, there is provided an authentication apparatus, the apparatus comprising:
the display module is used for displaying at least two cutting models, and the cutting models are three-dimensional models;
the acquisition module is used for acquiring the moving information of a target cutting model, wherein the target cutting model is any one cutting model in the at least two cutting models;
the display module is further used for updating and displaying the target cutting block model according to the mobile information;
and the sending module is used for sending the mobile information to a server, detecting whether the at least two cutting models are spliced into a target model or not by the server according to the mobile information, and acquiring a verification result according to a detection result.
In one aspect, there is provided an authentication apparatus, the apparatus comprising:
the device comprises an acquisition module, a display module and a switching module, wherein the acquisition module is used for acquiring the moving information of a target switching model, the target switching model is any one of at least two cutting models displayed by a terminal, and the cutting model is a three-dimensional model;
and the verification module is used for detecting whether the at least two cutting models are spliced into a target model according to the movement information and obtaining a verification result according to the detection result.
In one aspect, there is provided an authentication apparatus, comprising:
the display module is used for displaying at least two cutting models, and the cutting models are three-dimensional models;
the acquisition module is used for acquiring the moving information of a target cutting model, wherein the target cutting model is any one cutting model in the at least two cutting models;
the display module is further used for updating and displaying the target cutting block model according to the mobile information;
and the verification module is used for detecting whether the at least two cutting models are spliced into a target model according to the movement information and obtaining a verification result according to the detection result.
In one aspect, a computer device is provided, the computer device comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which when executed by the processor, implements a verification method as described above.
In one aspect, a computer-readable storage medium is provided, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which when executed, implements a validation method as described above.
In one aspect, a computer program product is provided for performing the above-described authentication method when the computer program product is executed.
The technical scheme provided by the embodiment of the application can bring the following beneficial effects:
and (4) moving and splicing the target cut-block model to form a target model for verification. Because the target cutting block model and the target model are three-dimensional models, compared with a two-dimensional jigsaw sliding block, the calculation complexity of identifying the target cutting block model and determining how to combine the target model by the cracking program is higher and is difficult to realize, so the cracking resistance is higher, and the safety is higher.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1A is a schematic illustration of an implementation environment provided by an embodiment of the present application;
FIG. 1B is a flow chart of a verification method provided by one embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a dicing model provided by an embodiment of the present application;
FIG. 3 is a schematic diagram of a display disturbance model provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of a moving object dicing model provided by one embodiment of the present application;
FIG. 5A is a schematic illustration of a validation pass provided by one embodiment of the present application;
FIG. 5B is a schematic illustration of a failure of the validation provided by one embodiment of the present application;
FIG. 5C is a schematic illustration of a validation prompt provided by one embodiment of the present application;
FIG. 5D is a schematic illustration of a validation prompt provided by one embodiment of the present application;
FIG. 5E is a schematic illustration of a validation prompt provided by one embodiment of the present application;
FIG. 6 is a schematic diagram showing a dicing model provided by another embodiment of the present application;
FIG. 7 is a schematic illustration of determining a target location provided by one embodiment of the present application;
FIG. 8A is a schematic illustration of a validation pass provided by another embodiment of the present application;
FIG. 8B is a schematic illustration of a failure to verify as provided by another embodiment of the present application;
FIG. 9 is a flow chart of a verification method provided by another embodiment of the present application;
FIG. 10 is a schematic diagram of an authentication system provided by one embodiment of the present application;
FIG. 11 is a schematic view of an authentication device provided in one embodiment of the present application;
FIG. 12 is a schematic view of an authentication device provided in one embodiment of the present application;
fig. 13 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
With the rapid development of internet technology, network security becomes more and more important, and in order to ensure security, many scenarios need to be applied to verification codes for verification. For example, during login of various applications, login verification needs to be completed through a verification code; for example, after a certain application program is registered, when setting information is changed, it is necessary to perform authentication by an authentication code. For another example, in some information query scenarios, verification by a verification code is often required. Therefore, the application range of the verification code is wider and more common.
Therefore, the embodiment of the application provides a verification method, which is implemented by segmenting a three-dimensional model into at least two segment models and detecting whether the at least two segment models are spliced into a target model or not, so that the verification complexity is improved and the anti-cracking performance is further improved. Please refer to fig. 1A, which illustrates a schematic diagram of an implementation environment of a method provided in an embodiment of the present application. The implementation environment may include: a terminal 11 and a server 12.
Among them, the terminal 11 may display at least two cutting models, update and display a target cutting model (any one cutting model) by acquiring movement information that the target cutting model is moved, and transmit the movement information to the server 12.
After the server 12 obtains the movement information, it detects whether the at least two dicing models are combined into the target model according to the movement information, and then obtains a verification result according to the detection result.
In addition to the above, for the detailed process of the interaction between the terminal 11 and the server 12 to implement the verification, reference may be specifically made to the following method embodiments, which are not described herein again.
In practical applications, the terminal 11 may be an electronic device such as a mobile phone, a tablet computer, a personal computer, and the like. The server 12 may be a server, a server cluster composed of a plurality of servers, or a cloud computing service center. The terminal 11 establishes a communication connection with the server 12 through a wired or wireless network.
Referring to fig. 1B, a flowchart of an authentication method provided by an embodiment of the present application is shown, and the method can be applied to the implementation environment shown in fig. 1A. Referring to fig. 1B, the method includes the following steps:
and 101, displaying at least two cutting models by the terminal.
When verification is needed, the terminal displays at least two cutting models. For example, when a user logs in to an account, authentication is required. And the terminal renders the at least two cutting models according to the three-dimensional model data of the at least two cutting models and displays the at least two cutting models. Wherein the three-dimensional model data is indicative of a size and shape of the model. Optionally, the three-dimensional model data is also used to indicate the color of the model.
The dicing model displayed by the terminal is a three-dimensional model, and in order to facilitate subsequent movement, the distance between one dicing model of the at least two dicing models displayed by the terminal for the first time and at least one dicing model of the other displayed dicing models may be greater than a preset distance. Wherein the preset distance can be set according to practical experience. And when the distance between the two cutting models is smaller than the preset distance, the terminal determines that the two cutting models are in a splicing state. The at least two cutting block models displayed by the terminal are used for splicing the target model. The user needs to combine at least two dicing models into a target model to complete the verification.
Illustratively, as shown in fig. 2, when verification is required, the target model is a cylinder, and the terminal displays three cut-block models: the cut-block model 201, the cut-block model 202 and the cut-block model 203, and a user needs to combine the three cut-block models into a target model to complete verification.
Optionally, the terminal displays an interference model in addition to the at least two cutting models, the interference model having at least one of a size, a shape and a color different from the at least two cutting models. By displaying the interference model, the computational complexity of the cracking program for identifying the block cutting model and determining how to combine the block cutting model into the target model is increased, so that the anti-cracking capability is improved.
Illustratively, as shown in fig. 3, in addition to the three dicing models, the terminal displays an interference model 204 and an interference model 205.
Optionally, the dicing model displayed by the terminal may be obtained by a server and sent to the terminal, and the process of obtaining the dicing model by the server includes the following sub-steps:
step 101a, an object model is determined.
The server firstly determines a target model for verification, and selects one from a plurality of preset models as the target model for the verification. In implementation, the server may randomly select the target model, or may select the target model according to the security level of the verification. The higher the safety level is, the lower the possibility that the verification is that the cracking program cracks is, the simpler the target model, such as a sphere, is selected; the lower the security level is, the higher the possibility that the verification is that the cracking program cracks is, the more complex the target model is selected, such as a regular decahedron. The more complex the shape of the target model is, the more computationally complex the cracking program determines how to combine the target model, and the more difficult it is to crack. For the specific way of determining the target model by the server, the embodiment of the present application is not particularly limited.
And 101b, randomly cutting the target model to obtain at least two cutting models.
When the server randomly cuts the target model, because the target model is cut randomly, the number and the shape of the cut block models obtained by cutting are random, so that the calculation complexity of the cracking program for identifying the cut block models is improved, and the safety is improved.
Optionally, the more the number of the cut models is, the more the shapes are complex, the more the color types are, the higher the computational complexity of the cracking program for identifying the cut models is, and the more difficult the cracking is.
Step 101c, determining position information of at least two cutting models.
The position information is used to indicate the position of the dicing model. In one implementation, the server may first need to ensure that a distance between one cutting model of the at least two cutting models and at least one cutting model of the displayed other cutting models is greater than a preset distance, and on this premise, determine the position information of the at least two cutting models. Alternatively, the position information may be three-dimensional coordinates.
Optionally, the larger the distance between the sliced models is, the more computationally complex the cracking program determines how to combine the target models, and the more difficult it is to crack.
After the terminal receives the at least two dicing models sent by the server, the dicing models can be displayed at corresponding positions respectively according to the position information of the at least two dicing models.
And 102, the terminal acquires the moving information of the moved target cutting model, wherein the target cutting model is any one cutting model of at least two cutting models.
The user operates the target cutting model through an operation object (such as a hand or a mouse) to move the target cutting model so as to combine the target models. The operation may be a sliding operation or a clicking operation, and the embodiment of the present application is not particularly limited with respect to the specific manner of the operation of moving the target dicing model. In addition, the user may move one of the at least two cutout models to stitch the target model, or may move a plurality of the at least two cutout models to stitch the target model. And operating any one of the at least two cutting models by the user, wherein the operated cutting model is the target cutting model. Accordingly, the terminal acquires an operation signal corresponding to the target dicing model and acquires movement information of the target dicing model moved according to the operation signal.
The moving information may be coordinates of the real-time position of the target dicing model after the target dicing model is moved, for example, an interface where the at least two dicing models are located serves as a coordinate system, and after the terminal detects that a certain target dicing model is moved, coordinates of the target dicing model in the coordinate system are detected in real time, and the detected coordinates serve as the moving information.
Alternatively, the movement information may also be position coordinates of the target cutout model relative to other cutout models. For example, if the at least two cutting models include an immovable cutting model, the terminal may determine the position where the target cutting model is moved with reference to the position of the immovable cutting model after the movable target cutting model is moved, and use the relative position as the movement information.
Of course, besides the two types of information, i.e. the position coordinates and the relative position, are used as the movement information, in practical applications, other types of information can be used as the movement information of the target block model, and different types of movement information have different verification modes.
103, updating and displaying the target cutting model by the terminal according to the moving information of the target cutting model, and sending the moving information to a server;
and after the terminal acquires the moving information of the moved target cutting model, updating and displaying the target cutting model according to the moving information of the moved target cutting model. Illustratively, as shown in fig. 4, the user moves the target cutting model 201 through a sliding operation, and accordingly, the terminal moves the target cutting model 201 according to an operation signal triggered by the sliding operation.
The verification process can be triggered because the cutting model is moved, at the moment, the terminal can send the obtained moving information that the target cutting model is moved to the server, and the server realizes the relevant verification process.
It should be noted that the target cutting model may be continuously moved, and thus the terminal needs to acquire the movement information of the moved target cutting model in real time and send it to the server for verification. In addition, after the terminal acquires the mobile information, the terminal can update and display the target cutting model according to the mobile information, and then send the mobile information to the server; or the mobile information can be sent to a server, and then the target cutting model is updated and displayed according to the mobile information; two steps can be executed simultaneously, and the sequence of executing the two steps by the terminal is not limited in the embodiment of the application.
And 104, the server acquires the movement information of the moved target cutting model, detects whether the at least two cutting models are spliced into the target model according to the movement information, and acquires a verification result according to the detection result.
After receiving the moving information of the target cutting model moved sent by the terminal, the server detects whether at least two cutting models are combined into the target model according to the moving information, namely, after the user moves one cutting model each time, the server is triggered to detect whether at least two cutting models are combined into the target model.
Optionally, when the server detects whether the at least two cutting models are combined into the target model according to the movement information, the server may detect a relative position between the at least two target cutting models according to the movement information. And when the relative position between the at least two cutting models meets a preset condition, determining that the at least two cutting models are spliced into a target model. The relative position refers to a positional relationship between the two cut pieces. Since the cut-out models are cut out from the target model, the positional relationship between the cut-out models is determined when at least two cut-out models are combined to form the target model. The terminal sets the position relation as a preset condition, and when the relative position between the at least two cutting models meets the preset condition, the target model formed by splicing the at least two cutting models can be determined; when the relative position between the at least two cutting models does not meet the preset condition, the situation that the at least two cutting models are not spliced into the target model can be determined.
And when the verification result is obtained according to the detection result, if the at least two dicing models are spliced into the target model, the verification is determined to be passed, and related services are provided. Illustratively, as shown in fig. 5A, the dicing models 201, 202 and 203 are combined into the target model, and the verification is passed. As also shown in fig. 5B, the dicing models 201, 202, and 203 are not combined into the target model, and the verification fails.
Optionally, in order to allow the user to explicitly verify the operation, the method provided in the embodiment of the present application further includes: and the server generates verification prompt information according to the at least two target dicing models and the target model, and sends the verification prompt information to the terminal to display the verification prompt information. The verification prompt information is used for indicating that at least two cutting block models are combined into the target model. The server determines a prompt template matched with the at least two cutting models and the model, and then generates verification prompt information according to the at least two cutting models, the target model and the prompt template. In actual implementation, the server stores a preset prompt template, for example, the prompt template is "drag (shape) dicing, split (shape)", the server determines the shape in parentheses according to the shapes of the dicing model and the target model, and finally generates verification prompt information. For another example, if the prompt template is "drag (color) cut and fit (shape)", the cut model needs to have a color, and the server can generate the verification prompt information according to the target. And the server determines the color in the bracket according to the color of the target dicing model, determines the shape in the bracket according to the shape of the target model and finally generates verification prompt information. The embodiment of the present application is not particularly limited to a specific type of the prompt target. Illustratively, as shown in fig. 5C, the terminal displays the verification prompt 206: dragging the pie-shaped cutting block and splicing the cylinder. Illustratively, as shown in fig. 5D, the terminal displays the different color tile models, such as a blue tile model 501, a pink tile model 502, a blue tile model 503, a yellow tile model 504, and a red tile model 505, and the displayed verification prompt information is: please drag the blue cut block in the drawing, and split the cylinder, and further mark the cut block model to be split, as shown in fig. 5D, the blue cut block model 501 and the blue cut block model 503 are marked by dashed frames, respectively, so as to improve the prompt effect. The interface after splicing can be as shown in fig. 5E, and the blue dicing mold 501 and the blue dicing mold 503 are spliced into a cylinder, and the cylinder can also be marked by a dashed box.
If the server determines that the at least two cutting models are not combined into the target model, the verification result is returned to the terminal, and the terminal starts to execute the step 102 again, namely, the user can move the target cutting models for multiple times to combine the target models until the verification is passed. Optionally, when the server determines that the at least two cutting models are not combined into the target model, the terminal detects the moving times of the user for moving the target cutting model, and if the moving times is greater than the preset times, the server determines that the verification fails; if the moving times is less than the preset times, the terminal starts to execute from step 102 again.
Alternatively, when the target dicing model is moved by the sliding operation, the server may further determine whether the verification passes according to the trajectory of the sliding operation. The server detects that the track of the sliding operation accords with the operation rule of the natural person. And when the track of the sliding operation accords with the natural human operation rule, the server determines that the verification is passed. And when the track of the sliding operation does not accord with the natural human operation rule, the server determines that the verification is not passed.
In one possible embodiment, the target model is a three-dimensional word model, the three-dimensional word model includes at least two three-dimensional letter models, and the block model is a three-dimensional letter model of the three-dimensional word model. The user needs to combine the three-dimensional letter models into a three-dimensional word model according to the specific meaning of the word to complete verification. Illustratively, the target model is a three-dimensional word model: DOG, the cutting model is a three-dimensional word model: D. o and G. The user needs to move the three-dimensional word models D, O and G to piece together the word DOG to complete the verification.
In another possible implementation, the target model is a three-dimensional Chinese character model, the three-dimensional Chinese character model includes at least two three-dimensional stroke models, and the block model is a three-dimensional stroke model in the three-dimensional Chinese character model. The user needs to combine the three-dimensional stroke models into a three-dimensional Chinese character model according to the specific meaning of the Chinese character to complete verification. For example, the three-dimensional Chinese character model represents that the Chinese character is 'Ming', the three-dimensional stroke model represents 'Ri' and 'Yue', and the user needs to combine the 'Ri' and the 'Yue' to form the Chinese character 'Ming' to complete the verification.
It should be noted that, in addition to the three-dimensional word model and the three-dimensional Chinese character model, the target model may be other three-dimensional models having specific meanings, such as a three-dimensional symbol model and a three-dimensional building model. The embodiments of the present application are not limited to specific types of target models.
The above embodiments describe a verification method in which a user can move the object cut-out model multiple times. The target block model can be moved for many times, the times of cracking the program can be increased, and the safety is not improved. Therefore, in the embodiment of the application, the target cutting model can be moved only once through one-time verification is also supported. Illustratively, as shown in fig. 6, the target model is a cylinder, the cut- block models 601, 602 and 603 are already in the correct split state, and the user only needs to move the target cut-block model 604 to complete the verification. As shown in fig. 7, from the cut piece models 601, 602, and 603, a target position 605 to which the target cut piece model 604 is to be moved can be determined. The user operates the target cutting model 604 through the operation objects to move the target cutting model 604, so as to combine the target models. The user can only move the object cutout model 604 once. Illustratively, as shown in FIG. 8A, the target block model 604 is located at the target location, and the verification is passed. As also shown in fig. 8B, if the target dicing model 604 is not located at the target location, the verification fails.
In the embodiment of the application, the target model is spliced by moving the target cutting model to verify. Because the target cutting block model and the target model are three-dimensional models, compared with a two-dimensional jigsaw sliding block, the calculation complexity of identifying the target cutting block model and determining how to combine the target model by the cracking program is higher and is difficult to realize, so the cracking resistance is higher, and the safety is higher.
In addition, as the target cutting block model can only be moved once through one-time verification, the cracking program cannot be cracked through multiple attempts, the anti-cracking capability is provided, and the safety is higher.
The above embodiment describes the verification in detail by taking an example of interaction between a terminal and a server, and in practical application, the method provided by the embodiment of the present application may also be implemented on one device, for example, the verification may be performed by the terminal. As shown in fig. 9, taking a terminal as an example to implement a verification process, the method provided in the embodiment of the present application includes:
step 901, displaying at least two cutting models, wherein the cutting models are three-dimensional models;
step 902, obtaining moving information of a target cutting model which is any one of at least two cutting models;
and 903, updating and displaying the target cutting model according to the movement information, detecting whether at least two cutting models are spliced into the target model according to the movement information, and acquiring a verification result according to the detection result.
The method provided in the embodiment of the present application is consistent with the method principle provided in the above embodiment, and thus the specific implementation manner of the steps 901-903 is consistent with the related step principle in the above embodiment, and specific reference may be made to the corresponding content in the above embodiment, which is not described herein again.
Alternatively, as shown in fig. 10, when the entire verification process is implemented by a terminal, the terminal includes a production system 1001, a rendering system 1002, a front-end system 1003, and a verification system 1004. The production system 1001 is configured to determine a target model, cut the target model, determine position information of the target cutting model, and generate verification prompt information. Rendering system 1002 is used to render the target tile model. The front-end system 1003 is configured to display the target cutting model and the verification prompt information, and interact with the user to move the target cutting model according to the operation signal. The checking system 1004 is configured to detect whether at least two cut-block models are combined into a target model, and then determine whether the verification passes.
In the embodiment of the application, the target model is spliced by moving the target cutting model to verify. Because the target cutting block model and the target model are three-dimensional models, compared with a two-dimensional jigsaw sliding block, the calculation complexity of identifying the target cutting block model and determining how to combine the target model by the cracking program is higher and is difficult to realize, so the cracking resistance is higher, and the safety is higher.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Referring to fig. 11, a block diagram of an authentication apparatus according to an embodiment of the present application is shown. The device has the function of realizing the verification method at the terminal side in the embodiment, and the function can be realized by hardware or by hardware executing corresponding software. The apparatus may include: a display module 1101, an acquisition module 1102 and a sending module 1103.
A display module 1101, configured to display at least two dicing models, where the dicing models are three-dimensional models.
An obtaining module 1102, configured to obtain moving information of a target dicing model, where the target dicing model is any one dicing model of at least two dicing models.
The display module 1101 is further configured to update the display target block model according to the movement information.
A sending module 1103, configured to send the movement information to a server, where the server detects whether the at least two dicing models are combined into a target model according to the movement information, and obtains a verification result according to a detection result.
In the embodiment of the application, the target model is spliced by moving the target cutting model to verify. Because the target cutting block model and the target model are three-dimensional models, compared with a two-dimensional jigsaw sliding block, the calculation complexity of identifying the target cutting block model and determining how to combine the target model by the cracking program is higher and is difficult to realize, so the cracking resistance is higher, and the safety is higher.
Optionally, the obtaining module 1102 is further configured to obtain verification prompt information, where the verification prompt information is used to instruct to combine at least two dicing models into a target model.
The display module 1101 is further configured to display a verification prompt message.
Optionally, the display module 1101 is further configured to display an interference model, wherein at least one of the size, shape and color of the interference model is different from at least two target dicing models.
Optionally, the target model is a three-dimensional word model, the three-dimensional word model includes at least two three-dimensional letter models, and the target block model is a three-dimensional letter model of the three-dimensional word model.
Optionally, the target model is a three-dimensional Chinese character model, the three-dimensional Chinese character model includes at least two three-dimensional stroke models, and the target block model is a three-dimensional stroke model in the three-dimensional Chinese character model.
Referring to fig. 12, a block diagram of an authentication apparatus according to an embodiment of the present application is shown. The device has the function of realizing the authentication method at the server side in the above embodiment, and the function can be realized by hardware or by hardware executing corresponding software. The apparatus may include: an acquisition module 1201 and a verification module 1202.
An obtaining module 1201, configured to obtain movement information of a target switching model, where the target switching model is any one of at least two dicing models displayed by a terminal, and the dicing model is a three-dimensional model.
And the verification module 1202 is configured to detect whether the at least two dicing models are spliced into the target model according to the movement information, and obtain a verification result according to the detection result.
Optionally, a verification module 1202 for detecting a relative position between at least two cutting models according to the movement information; and when the relative position between the at least two cutting models meets a preset condition, determining that the at least two cutting models are spliced into a target model.
Optionally, the obtaining module 1201 is further configured to obtain at least two dicing models, where the dicing models are three-dimensional models;
the device also includes: and the sending module is used for sending the at least two switching models to the terminal, displaying the at least two switching models by the terminal, acquiring the mobile information of the target cutting model moved, updating and displaying the target cutting model according to the mobile information, and returning the mobile information.
Optionally, the obtaining module 1201 is configured to determine a target model; randomly cutting the target model to obtain at least two cutting models; position information of at least two cutting models is determined, and the position information is used for indicating the positions of the cutting models.
Optionally, the obtaining module 1201 is further configured to generate verification prompt information according to the at least two dicing models and the target model, where the verification prompt information is used to instruct to combine the at least two dicing models into the target model;
and the sending module is also used for sending the verification prompt information to the terminal and displaying the verification prompt information by the terminal.
It should be noted that, when the apparatus provided in the foregoing embodiment implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Fig. 13 shows a block diagram of a terminal 1300 according to an exemplary embodiment of the present application. The terminal 1300 may be a portable mobile terminal such as: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. Terminal 1300 may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, etc.
In general, terminal 1300 includes: a processor 1301 and a memory 1302.
Processor 1301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 1301 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1301 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also referred to as a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1301 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing content that the display screen needs to display. In some embodiments, processor 1301 may further include an AI (Artificial Intelligence) processor for processing computational operations related to machine learning.
Memory 1302 may include one or more computer-readable storage media, which may be non-transitory. The memory 1302 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1302 is used to store at least one instruction for execution by processor 1301 to implement the authentication method provided by method embodiments herein.
In some embodiments, terminal 1300 may further optionally include: a peripheral interface 1303 and at least one peripheral. Processor 1301, memory 1302, and peripheral interface 1303 may be connected by a bus or signal line. Each peripheral device may be connected to the peripheral device interface 1303 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1304, touch display 1305, camera 1306, audio circuitry 1307, positioning component 1308, and power supply 1309.
Peripheral interface 1303 may be used to connect at least one peripheral associated with I/O (Input/Output) to processor 1301 and memory 1302. In some embodiments, processor 1301, memory 1302, and peripheral interface 1303 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1301, the memory 1302, and the peripheral device interface 1303 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 1304 is used to receive and transmit RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1304 communicates with communication networks and other communication devices via electromagnetic signals. The radio frequency circuit 1304 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1304 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 1304 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1304 may also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 1305 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 1305 is a touch display screen, the display screen 1305 also has the ability to capture touch signals on or over the surface of the display screen 1305. The touch signal may be input to the processor 1301 as a control signal for processing. At this point, the display 1305 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, display 1305 may be one, providing the front panel of terminal 1300; in other embodiments, display 1305 may be at least two, either on different surfaces of terminal 1300 or in a folded design; in still other embodiments, display 1305 may be a flexible display disposed on a curved surface or on a folded surface of terminal 1300. Even further, the display 1305 may be arranged in a non-rectangular irregular figure, i.e., a shaped screen. The Display 1305 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 1306 is used to capture images or video. Optionally, camera assembly 1306 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 1306 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuit 1307 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1301 for processing, or inputting the electric signals to the radio frequency circuit 1304 for realizing voice communication. For stereo capture or noise reduction purposes, multiple microphones may be provided, each at a different location of terminal 1300. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 1301 or the radio frequency circuitry 1304 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, audio circuitry 1307 may also include a headphone jack.
The positioning component 1308 is used for positioning the current geographic position of the terminal 1300 for implementing navigation or LBS (Location Based Service). The Positioning component 1308 can be a Positioning component based on the Global Positioning System (GPS) in the united states, the beidou System in china, or the galileo System in russia.
Power supply 1309 is used to provide power to various components in terminal 1300. The power source 1309 may be alternating current, direct current, disposable or rechargeable. When the power source 1309 comprises a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 1300 also includes one or more sensors 1310. The one or more sensors 1310 include, but are not limited to: acceleration sensor 1311, gyro sensor 1312, pressure sensor 1313, fingerprint sensor 1314, optical sensor 1315, and proximity sensor 1316.
The acceleration sensor 1311 can detect the magnitude of acceleration on three coordinate axes of the coordinate system established with the terminal 1300. For example, the acceleration sensor 1311 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 1301 may control the touch display screen 1305 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1311. The acceleration sensor 1311 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 1312 may detect the body direction and the rotation angle of the terminal 1300, and the gyro sensor 1312 may cooperate with the acceleration sensor 1311 to acquire a 3D motion of the user with respect to the terminal 1300. Processor 1301, based on the data collected by gyroscope sensor 1312, may perform the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensor 1313 may be disposed on a side bezel of terminal 1300 and/or underlying touch display 1305. When the pressure sensor 1313 is disposed on the side frame of the terminal 1300, a user's holding signal to the terminal 1300 may be detected, and the processor 1301 performs left-right hand recognition or shortcut operation according to the holding signal acquired by the pressure sensor 1313. When the pressure sensor 1313 is disposed at a lower layer of the touch display screen 1305, the processor 1301 controls an operability control on the UI interface according to a pressure operation of the user on the touch display screen 1305. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1314 is used for collecting the fingerprint of the user, and the processor 1301 identifies the identity of the user according to the fingerprint collected by the fingerprint sensor 1314, or the fingerprint sensor 1314 identifies the identity of the user according to the collected fingerprint. When the identity of the user is identified as a trusted identity, the processor 1301 authorizes the user to perform relevant sensitive operations, including unlocking a screen, viewing encrypted information, downloading software, paying, changing settings, and the like. The fingerprint sensor 1314 may be disposed on the front, back, or side of the terminal 1300. When a physical button or vendor Logo is provided on the terminal 1300, the fingerprint sensor 1314 may be integrated with the physical button or vendor Logo.
The optical sensor 1315 is used to collect the ambient light intensity. In one embodiment, the processor 1301 can control the display brightness of the touch display screen 1305 according to the intensity of the ambient light collected by the optical sensor 1315. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 1305 is increased; when the ambient light intensity is low, the display brightness of the touch display 1305 is turned down. In another embodiment, the processor 1301 can also dynamically adjust the shooting parameters of the camera assembly 1306 according to the ambient light intensity collected by the optical sensor 1315.
Proximity sensor 1316, also known as a distance sensor, is typically disposed on a front panel of terminal 1300. Proximity sensor 1316 is used to gather the distance between the user and the front face of terminal 1300. In one embodiment, the processor 1301 controls the touch display 1305 to switch from the bright screen state to the dark screen state when the proximity sensor 1316 detects that the distance between the user and the front face of the terminal 1300 gradually decreases; the touch display 1305 is controlled by the processor 1301 to switch from the rest state to the bright state when the proximity sensor 1316 detects that the distance between the user and the front face of the terminal 1300 gradually becomes larger.
Those skilled in the art will appreciate that the configuration shown in fig. 13 is not intended to be limiting with respect to terminal 1300 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be employed.
Fig. 14 is a schematic structural diagram of a server according to an embodiment of the present application. The server may be a stand-alone server or a cluster server. Specifically, the method comprises the following steps:
the server includes a Central Processing Unit (CPU)1401, a system memory 1404 including a Random Access Memory (RAM)1402 and a Read Only Memory (ROM)1403, and a system bus 1405 connecting the system memory 1404 and the central processing unit 1401. The server also includes a basic input/output system (I/O system) 1406 that facilitates transfer of information between devices within the computer, and a mass storage device 1407 for storing an operating system 1413, application programs 1414, and other program modules 1415.
The basic input/output system 1406 includes a display 1408 for displaying information and an input device 1409, such as a mouse, keyboard, etc., for user input of information. Wherein a display 1408 and an input device 1409 are both connected to the central processing unit 1401 via an input-output controller 1410 connected to the system bus 1405. The basic input/output system 1406 may also include an input/output controller 1410 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 1410 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 1407 is connected to the central processing unit 1401 through a mass storage controller (not shown) connected to the system bus 1405. The mass storage device 1407 and its associated computer-readable media provide non-volatile storage for the server. That is, the mass storage device 1407 may include a computer readable medium (not shown) such as a hard disk or CD-ROM drive.
Without loss of generality, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that computer storage media is not limited to the foregoing. The system memory 1404 and mass storage device 1407 described above may collectively be referred to as memory.
According to various embodiments of the present application, the server may also operate as a remote computer connected to a network through a network, such as the Internet. That is, the servers can be connected to the network 1412 through the network interface unit 1411, which is coupled to the system bus 1405, or alternatively, the network interface unit 1411 can be used to connect to other types of networks or remote computer systems (not shown).
The memory further includes one or more programs, and the one or more programs are stored in the memory and configured to be executed by the CPU. The one or more programs include instructions for performing the authentication methods provided by embodiments of the present application.
In an exemplary embodiment, a computer readable storage medium is also provided, in which at least one instruction, at least one program, a set of codes or a set of instructions is stored, which when executed by a processor of a terminal implements the functions of the respective steps in the authentication method as described above.
Alternatively, the computer-readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (15)

1. A method of authentication, the method comprising:
displaying at least two cut-block models, wherein the cut-block models are three-dimensional models;
acquiring moving information of a target cutting model which is any one cutting model in the at least two cutting models;
and updating and displaying the target cutting model according to the movement information, sending the movement information to a server, detecting whether the at least two cutting models are spliced into the target model or not by the server according to the movement information, and acquiring a verification result according to a detection result.
2. The method of claim 1, further comprising:
obtaining verification prompt information, wherein the verification prompt information is used for indicating that the at least two dicing models are combined into the target model;
and displaying the verification prompt information.
3. The method of claim 1, further comprising:
displaying an interference model, the interference model differing in at least one of size, shape and color from the at least two dicing models.
4. The method according to any one of claims 1 to 3, wherein the target model is a three-dimensional word model, the three-dimensional word model comprises at least two three-dimensional letter models, and the block model is a three-dimensional letter model of the three-dimensional word model.
5. The method according to any one of claims 1 to 3, wherein the target model is a three-dimensional Chinese character model, the three-dimensional Chinese character model comprises at least two three-dimensional stroke models, and the block model is a three-dimensional stroke model in the three-dimensional Chinese character model.
6. A method of authentication, the method comprising:
acquiring moving information of a target cutting model which is any one of at least two cutting models displayed by a terminal and is a three-dimensional model;
and detecting whether the at least two cutting block models are spliced into a target model according to the movement information, and acquiring a verification result according to a detection result.
7. The method of claim 6, wherein the detecting whether the at least two cut-block models are combined into a target model according to the movement information comprises:
detecting a relative position between the at least two dicing models according to the movement information;
and when the relative position between the at least two cutting models meets a preset condition, determining that the at least two cutting models are spliced into a target model.
8. The method of claim 6, further comprising:
obtaining at least two cutting models, wherein the cutting models are three-dimensional models;
and sending the at least two cutting models to a terminal, displaying the at least two cutting models by the terminal, acquiring the mobile information of the target cutting model moved, updating and displaying the target cutting model according to the mobile information, and sending the mobile information.
9. The method of claim 8, wherein said obtaining at least two dicing models comprises:
determining the target model;
randomly cutting the target model to obtain at least two cutting models;
determining position information of the at least two cutting models, wherein the position information is used for indicating the positions of the cutting models.
10. The method according to any one of claims 6-9, further comprising:
generating verification prompt information according to the at least two cutting block models and a target model, wherein the verification prompt information is used for indicating that the at least two cutting block models are combined into the target model;
and sending the verification prompt information to the terminal, and displaying by the terminal.
11. A method of authentication, the method comprising:
displaying at least two cut-block models, wherein the cut-block models are three-dimensional models;
acquiring moving information of a target cutting model which is any one cutting model in the at least two cutting models;
and updating and displaying the target cutting model according to the movement information, detecting whether the at least two cutting models are spliced into the target model according to the movement information, and acquiring a verification result according to a detection result.
12. An authentication apparatus, the apparatus comprising:
the display module is used for displaying at least two cutting models, and the cutting models are three-dimensional models;
the acquisition module is used for acquiring the moving information of a target cutting model, wherein the target cutting model is any one cutting model in the at least two cutting models;
the display module is further used for updating and displaying the target cutting block model according to the mobile information;
and the sending module is used for sending the mobile information to a server, detecting whether the at least two cutting models are spliced into a target model or not by the server according to the mobile information, and acquiring a verification result according to a detection result.
13. An authentication apparatus, the apparatus comprising:
the device comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring the moving information of a target cutting model, the target cutting model is any one of at least two cutting models displayed by a terminal, and the cutting model is a three-dimensional model;
and the verification module is used for detecting whether the at least two cutting models are spliced into a target model according to the movement information and obtaining a verification result according to the detection result.
14. A computer device comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which when executed by the processor, implement the authentication method of any one of claims 1 to 5 or implement the authentication method of any one of claims 6-10 or implement the authentication method of claim 11.
15. A computer-readable storage medium, in which at least one instruction, at least one program, a set of codes, or a set of instructions, is stored, which when executed, implements the authentication method of any one of claims 1 to 5 or implements the authentication method of any one of claims 6-10 or implements the authentication method of claim 11.
CN201810260604.8A 2018-03-27 2018-03-27 Verification method, device and equipment Active CN110213205B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810260604.8A CN110213205B (en) 2018-03-27 2018-03-27 Verification method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810260604.8A CN110213205B (en) 2018-03-27 2018-03-27 Verification method, device and equipment

Publications (2)

Publication Number Publication Date
CN110213205A CN110213205A (en) 2019-09-06
CN110213205B true CN110213205B (en) 2021-08-24

Family

ID=67778802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810260604.8A Active CN110213205B (en) 2018-03-27 2018-03-27 Verification method, device and equipment

Country Status (1)

Country Link
CN (1) CN110213205B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112569574B (en) * 2019-09-30 2024-03-19 超级魔方(北京)科技有限公司 Model disassembly method and device, electronic equipment and readable storage medium
CN115552400A (en) * 2022-08-08 2022-12-30 广州酷狗计算机科技有限公司 Sliding verification method, image generation method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254355A (en) * 2011-07-05 2011-11-23 周圣云 Method and device for generating three-dimensional verification code
CN102685078A (en) * 2011-03-17 2012-09-19 中国电信股份有限公司 Method for verifying verification code and server
CN103927465A (en) * 2014-01-05 2014-07-16 艾文卫 Verification code generating and verifying method based on graphs
CN106355072A (en) * 2016-08-19 2017-01-25 沈建国 Implementation method and device for three-dimensional model verification code
CN106686009A (en) * 2017-03-03 2017-05-17 苏州仙度网络科技有限公司 Identity verifying method, device and system
CN106778194A (en) * 2016-11-16 2017-05-31 广东欧珀移动通信有限公司 Verification method, device and electronic equipment
CN107154924A (en) * 2016-03-04 2017-09-12 阿里巴巴集团控股有限公司 Authentication processing method and device based on identifying code

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8872820B2 (en) * 2008-04-14 2014-10-28 Siemens Product Lifecycle Management Software Inc. System and method for splitting faces on a solid model
CN101739720B (en) * 2009-12-18 2012-02-22 武汉大学 Method and device for generating three-dimensional dynamic verification code
US20120291122A1 (en) * 2011-05-13 2012-11-15 University Of Wollongong Multi Dimensional CAPTCHA System and Method
US9509671B2 (en) * 2012-12-27 2016-11-29 Dassault Systèmes 3D bot detection
CN103312512B (en) * 2013-06-07 2016-03-02 深圳第七大道网络技术有限公司 A kind of generation method of picture validation code and device, auth method and device
CN107454049A (en) * 2016-06-01 2017-12-08 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN107509080B (en) * 2017-08-18 2021-01-15 北京奇艺世纪科技有限公司 Method and device for displaying coded image and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685078A (en) * 2011-03-17 2012-09-19 中国电信股份有限公司 Method for verifying verification code and server
CN102254355A (en) * 2011-07-05 2011-11-23 周圣云 Method and device for generating three-dimensional verification code
CN103927465A (en) * 2014-01-05 2014-07-16 艾文卫 Verification code generating and verifying method based on graphs
CN107154924A (en) * 2016-03-04 2017-09-12 阿里巴巴集团控股有限公司 Authentication processing method and device based on identifying code
CN106355072A (en) * 2016-08-19 2017-01-25 沈建国 Implementation method and device for three-dimensional model verification code
CN106778194A (en) * 2016-11-16 2017-05-31 广东欧珀移动通信有限公司 Verification method, device and electronic equipment
CN106686009A (en) * 2017-03-03 2017-05-17 苏州仙度网络科技有限公司 Identity verifying method, device and system

Also Published As

Publication number Publication date
CN110213205A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
CN110992493B (en) Image processing method, device, electronic equipment and storage medium
CN108710525B (en) Map display method, device, equipment and storage medium in virtual scene
WO2020253655A1 (en) Method for controlling multiple virtual characters, device, apparatus, and storage medium
CN110148178B (en) Camera positioning method, device, terminal and storage medium
CN109815150B (en) Application testing method and device, electronic equipment and storage medium
WO2019205881A1 (en) Method and apparatus for displaying information in virtual environment, device, and storage medium
CN110059652B (en) Face image processing method, device and storage medium
CN109948586B (en) Face verification method, device, equipment and storage medium
CN113204298B (en) Method and device for displaying release progress, electronic equipment and storage medium
CN112907725B (en) Image generation, training of image processing model and image processing method and device
CN109522863B (en) Ear key point detection method and device and storage medium
CN109886208B (en) Object detection method and device, computer equipment and storage medium
CN109821237B (en) Method, device and equipment for rotating visual angle and storage medium
CN110839128A (en) Photographing behavior detection method and device and storage medium
CN111897465B (en) Popup display method, device, equipment and storage medium
CN110738185B (en) Form object identification method, form object identification device and storage medium
CN111062725B (en) Face payment method, device and system and computer readable storage medium
CN110213205B (en) Verification method, device and equipment
CN109189290B (en) Click area identification method and device and computer readable storage medium
CN112308103A (en) Method and device for generating training sample
CN111128115B (en) Information verification method and device, electronic equipment and storage medium
CN110152309B (en) Voice communication method, device, electronic equipment and storage medium
CN115329309A (en) Verification method, verification device, electronic equipment and storage medium
CN111061369B (en) Interaction method, device, equipment and storage medium
CN112329909B (en) Method, apparatus and storage medium for generating neural network model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant