CN111327576A - Identity verification method, client and server - Google Patents

Identity verification method, client and server Download PDF

Info

Publication number
CN111327576A
CN111327576A CN201811537049.5A CN201811537049A CN111327576A CN 111327576 A CN111327576 A CN 111327576A CN 201811537049 A CN201811537049 A CN 201811537049A CN 111327576 A CN111327576 A CN 111327576A
Authority
CN
China
Prior art keywords
verification
client
server
instruction set
drawing requirement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811537049.5A
Other languages
Chinese (zh)
Other versions
CN111327576B (en
Inventor
黄翊凇
杨疆
梁耿
韦佩华
白雪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Guangxi Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Guangxi Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Guangxi Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201811537049.5A priority Critical patent/CN111327576B/en
Publication of CN111327576A publication Critical patent/CN111327576A/en
Application granted granted Critical
Publication of CN111327576B publication Critical patent/CN111327576B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses an identity verification method, a client and a server, wherein the method comprises the steps that the client acquires a verification drawing requirement instruction set sent by the server, the verification drawing requirement instruction set comprises multi-step drawing requirements indicating drawing of a user, a verification threshold value of each step and prompt information of each step, the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client, a verification result is determined according to the verification drawing requirement instruction set, and the verification result is sent to the server. The embodiment of the invention enriches the complexity and confidentiality of user drawing verification by multiplexing a multimedia technology, and can better avoid the cracking of an image recognition program.

Description

Identity verification method, client and server
Technical Field
The embodiment of the invention relates to the field of user authentication, in particular to an identity authentication method, a client and a server.
Background
The current authentication scheme is that a user terminal acquires drawing authentication information carrying a drawing pattern and then sends the drawing authentication information to a server, the server authenticates the drawing authentication information and sends an authenticated authentication result to the user terminal, and the user terminal determines that authentication passes when the authentication result is that the drawing authentication information is successfully authenticated. The drawing information does not provide a method for showing all drawing requirements in a drawing interval at one time in an animation mode, and requires a user to execute the drawing requirements, and how to avoid the drawing requirements from being cracked by a program of an image recognition technology is also not provided.
Disclosure of Invention
The embodiment of the invention provides an identity authentication method, a client and a server, which are used for improving the cracking difficulty of an image recognition program.
The identity authentication method provided by the embodiment of the invention comprises the following steps:
the client acquires a verification drawing requirement instruction set sent by the server; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step; the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client;
the client determines a verification result according to the verification drawing requirement instruction set;
and the client sends the verification result to the server.
In the technical scheme, the complexity and the confidentiality of user drawing verification are enriched through a multiplexing multimedia technology, and the cracking of an image recognition program can be better avoided.
Optionally, the determining, by the client, a verification result according to the verification drawing requirement instruction set includes:
the client displays the first-step drawing requirement to a user, collects drawing coordinates drawn by the user within preset limited time, determines whether the drawing coordinates meet a verification threshold of the first step, if yes, determines that the first-step drawing verification is passed, and prompts the user of the next-step drawing requirement to continue the verification of the second-step drawing until the multi-step drawing requirement passes the verification, and then determines that the verification result is successful.
Optionally, if the drawing coordinate drawn by the user is not collected within a preset limited time, the client determines that the verification result is a failure.
Optionally, if the drawing coordinate does not meet the verification threshold of the first step, the client determines that the verification result is a failure.
Optionally, after each step of drawing verification passes, the client prompts a drawing success message to the user.
Optionally, after verification of each drawing step is passed, the client hides each drawing step that the user has successfully drawn.
Optionally, the verification threshold includes a preset number of coordinates included in a pixel path required by each step of drawing and a fault tolerance radius.
Optionally, before obtaining the verification drawing requirement instruction set sent by the server, the method further includes:
the client sends a verification request to the server to enable the server to determine a verification drawing requirement instruction set corresponding to the client, wherein the verification request comprises identification information of the client.
Correspondingly, the embodiment of the invention also provides an identity authentication method, which comprises the following steps:
a server acquires a verification request sent by a client, wherein the verification request comprises identification information of the client;
the server randomly generates a verification drawing requirement instruction set corresponding to the client according to the identification information of the client; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step;
the server sends the verification drawing requirement instruction set to the client.
Optionally, the method further includes:
the server acquires a verification result sent by the client;
and the server determines to provide the service corresponding to the verification result to the client according to the verification result.
Correspondingly, an embodiment of the present invention further provides a client, including:
the acquisition unit is used for acquiring a verification drawing requirement instruction set sent by the server; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step; the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client;
the processing unit is used for determining a verification result according to the verification drawing requirement instruction set;
and the sending unit is used for sending the verification result to the server.
Optionally, the processing unit is specifically configured to:
the method comprises the steps of displaying a first-step drawing requirement to a user, collecting drawing coordinates drawn by the user within preset limited time, determining whether the drawing coordinates meet a verification threshold of the first step, if so, determining that the first-step drawing verification is passed, prompting the user of the next-step drawing requirement to continue to perform second-step drawing verification, and determining that the verification result is successful after the multi-step drawing requirement verification is passed.
Optionally, the processing unit is further configured to:
and if the drawing coordinate drawn by the user is not acquired within the preset limited time, determining that the verification result is failure.
Optionally, the processing unit is further configured to:
and if the drawing coordinate does not meet the verification threshold of the first step, determining the verification result as failure.
Optionally, the processing unit is further configured to:
and after each step of drawing verification is passed, prompting the user for drawing success information.
Optionally, the processing unit is further configured to:
after each step drawing verification passes, hiding each step drawing which the user has successfully drawn.
Optionally, the verification threshold includes a preset number of coordinates included in a pixel path required by each step of drawing and a fault tolerance radius.
Optionally, the processing unit is further configured to:
before acquiring the verification drawing requirement instruction set sent by the server, controlling the sending unit to send a verification request to the server so as to enable the server to determine the verification drawing requirement instruction set corresponding to the client, wherein the verification request comprises the identification information of the client.
Correspondingly, an embodiment of the present invention provides a server, including:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a verification request sent by a client, and the verification request comprises identification information of the client;
the processing unit is used for randomly generating a verification drawing requirement instruction set corresponding to the client according to the identification information of the client; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step;
a sending unit, configured to send the verification drawing requirement instruction set to the client.
Optionally, the processing unit is further configured to:
controlling the acquisition unit to acquire a verification result sent by the client;
and determining to provide the service corresponding to the verification result to the client according to the verification result.
Accordingly, an embodiment of the present invention provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the identity authentication method according to the obtained program.
Accordingly, embodiments of the present invention provide a computer-readable non-volatile storage medium including computer-readable instructions, which, when read and executed by a computer, cause the computer to perform a method of identity verification.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an authentication method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a client according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 exemplarily shows a structure of a system architecture to which an embodiment of the present invention is applicable, and the system architecture may include a client 100 and a server 200, and the client 100 may communicate with the server 200.
Among other things, the client 100 can include an internet component 110, a display content component 120, an image processor 130, a computation component 140, a storage component 150, and a user action instruction tracking component 160. The internet component 110 is a component module for connecting to the internet, calling data information of the server side, and returning a verification result. The display content component 120 is used to display game screen content including, but not limited to, an LCD screen, an AMOLED screen, wrap-around 3dVR glasses, a projector, or a screen made by other techniques. The image processor 130, i.e., the GPU, is used for the image rendering process and the like of the present invention. The operation component 140 is used for the client-side global computation of the present invention, and includes a Central Processing Unit (CPU) and the like for performing data operations. The storage component 150 is a component device for data storage. The user motion instruction tracking component 160 captures the motion of the user's finger and hand and calculates whether the motion focus of the user meets the drawing requirement through a device such as, but not limited to, a touch screen, a mouse, a stylus, a camera, an infrared detector, etc.
The server 200 may include an internet component 210, a validation instruction set component 220, a storage component 230, and a computation component 240. The internet component 210 is configured to receive a verification request initiated by a client, return information such as a verification request instruction, and receive a verification result returned by the client. The verification instruction set component 220 is configured to generate a corresponding verification drawing requirement instruction set by operation after obtaining the client verification request. Storage component 230 is used for server data storage. The computing component 240 is used for server-side global computing according to the present invention, and includes a central processing unit and the like, and is used for performing data operations.
Based on the above description, fig. 2 exemplarily shows a flow of a method for identity verification according to an embodiment of the present invention, and the flow will be described in a manner that a client interacts with a server.
As shown in fig. 2, the process specifically includes:
in step 201, the client sends a verification request to the server.
The client may send a verification request to the server through the internet component, which may include identification information of the client, which may be used to identify information unique to the client.
Step 202, the server randomly generates a verification drawing requirement instruction set corresponding to the client according to the identification information of the client.
After the server calls the internet component to receive the verification request, the server can call the verification instruction set component to calculate and generate a verification drawing requirement instruction set corresponding to the client, wherein the instruction set can include multi-step drawing requirements indicating drawing of the user, a verification threshold value of each step and prompt information of each step, can be an encrypted file, and records all instruction requirements needing drawing verification of the user and corresponding prompt information requirements.
The verification threshold may include a preset number of coordinates included in the pixel path required for each step of drawing and a fault tolerance radius. Both the preset number and the fault tolerance radius may be set empirically. For example, the verification drawing request instruction set at least includes X drawing requests (X is a positive integer), and a pixel-appropriate path for each drawing request, where each pixel-appropriate path at least includes Y (Y > -2, and Y is a positive integer) coordinates, and a fault-tolerant radius R for the coordinates.
Step 203, the server sends a verification drawing requirement instruction set to the client.
The server may invoke the internet component to send a verification drawing requirement instruction set to the client.
And step 204, the client determines a verification result according to the verification drawing requirement instruction set.
And after receiving the verification drawing requirement instruction set through the Internet component, the client analyzes the verification drawing requirement instruction set.
Specifically, the client displays a first-step drawing requirement to a user, collects drawing coordinates drawn by the user within a preset limited time, determines whether the drawing coordinates meet a verification threshold of the first step, if so, determines that the first-step drawing verification is passed, and prompts the user to continue to verify the next-step drawing requirement until the multi-step drawing requirement passes the verification, and then determines that the verification result is successful. The preset limit time may be set empirically.
And if the drawing coordinate drawn by the user is not acquired within the preset limited time, the client determines that the verification result is failure. And if the drawing coordinate does not meet the verification threshold of the first step, the client determines that the verification result is failure. After each step of drawing verification is passed, the client prompts a user for drawing success information. After each step of drawing verification passes, the client hides each step of drawing which the user has successfully drawn.
For example, the client calls the image processor to display the drawing requirement of the first step on the display content component through the arithmetic component, sets the current step number N to 1, and sets a limited time to start timing.
If the client does not finish and initiate the drawing behavior within the limited time, the operation component judges that the verification is overtime, the verification result is failure, and the result is returned to the server side through the internet component.
If the client initiates the first step of drawing behavior within the limited time, the user action instruction tracking component collects the drawn coordinates, generates a drawing coordinate set and sends the drawing coordinate set to the operation component.
The client arithmetic component verifies whether the drawing coordinate set of the first step is in accordance with Y coordinates of the pixel proper amount path required by drawing. When all coordinates in the user drawing coordinate set are in a set with Y coordinates as the circle center and fault-tolerant radius R as the radius, the first-step verification requirement threshold is considered to be reached.
The client arithmetic component calls the image processor to display the animation or the multimedia information such as voice, text and the like successfully prompted in the first step on the display content component, simultaneously prompts the hidden drawing requirement in the step 2, and sets a limited time to start timing.
Alternatively, if the instruction requires it, the image processor may hide the completed first N-step drawing record on the display content component.
And (3) the client sequentially performs the steps, the operation component sets N to be N +1, the drawing verification behaviors of the Nth step, the N +1 step and the … of the Nth step and the last X step are completed, when all the drawing verification behaviors of the X steps are verified to be passed, the operation component of the client judges that the verification is successful, and otherwise, the operation component of the client fails.
In step 205, the client sends the verification result to the server.
And the client returns the verification result to the server through the Internet component.
The server receives the verification result through the internet component. And determining to provide the service corresponding to the verification result to the client according to the verification result.
For example, the arithmetic component provides different contents to the client according to the verification result, provides the next service requested by the client if the verification is passed, and prompts failure information and other contents to be displayed if the verification fails.
The above embodiment may show that the client obtains a verification drawing requirement instruction set sent by the server, where the verification drawing requirement instruction set includes a multi-step drawing requirement indicating drawing of the user, a verification threshold value of each step, and prompt information of each step, and the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client, and determines a verification result according to the verification drawing requirement instruction set, and sends the verification result to the server. The embodiment of the invention enriches the complexity and confidentiality of user drawing verification by multiplexing a multimedia technology, and can better avoid the cracking of an image recognition program.
The verification method provided by the embodiment of the invention enriches the complexity and confidentiality of user drawing verification by multiplexing a multimedia technology, and can better avoid cracking of an image recognition program by hiding the drawing requirement of the step (N + 1) before the drawing requirement of the step (N) is achieved.
The embodiment of the invention also provides multimedia information such as animation, voice, characters and the like which are successfully prompted by the drawing in the Nth step, so that a client can conveniently confirm that the drawing in the Nth step is completed and the drawing in the (N + 1) th step is carried out, and simultaneously, the displayed prompting information can also become an interference element in a picture, thereby further increasing the cracking difficulty of an image recognition program.
The embodiment of the invention also provides that after the customer finishes the drawing in the Nth step successfully, the finished drawing records in the previous N steps can be hidden according to actual requirements; therefore, the drawing verification requirement is improved to the separated multiple unrelated drawing actions from the continuous drawing, the relevance between the drawings is reduced, the drawing verification complexity is increased, and a better secret effect is achieved.
Based on the same technical concept, fig. 3 exemplarily shows a client provided by an embodiment of the present invention, and the apparatus may execute the flow executed by the client.
As shown in fig. 3, the apparatus may include:
an obtaining unit 301, configured to obtain a verification drawing requirement instruction set sent by a server; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step; the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client;
a processing unit 302, configured to determine a verification result according to the verification drawing requirement instruction set;
a sending unit 303, configured to send the verification result to the server.
Optionally, the processing unit 302 is specifically configured to:
the method comprises the steps of displaying a first-step drawing requirement to a user, collecting drawing coordinates drawn by the user within preset limited time, determining whether the drawing coordinates meet a verification threshold of the first step, if so, determining that the first-step drawing verification is passed, prompting the user of the next-step drawing requirement to continue to perform second-step drawing verification, and determining that the verification result is successful after the multi-step drawing requirement verification is passed.
Optionally, the processing unit 302 is further configured to:
and if the drawing coordinate drawn by the user is not acquired within the preset limited time, determining that the verification result is failure.
Optionally, the processing unit 302 is further configured to:
and if the drawing coordinate does not meet the verification threshold of the first step, determining the verification result as failure.
Optionally, the processing unit 302 is further configured to:
and after each step of drawing verification is passed, prompting the user for drawing success information.
Optionally, the processing unit 302 is further configured to:
after each step drawing verification passes, hiding each step drawing which the user has successfully drawn.
Optionally, the verification threshold includes a preset number of coordinates included in a pixel path required by each step of drawing and a fault tolerance radius.
Optionally, the processing unit 302 is further configured to:
before acquiring the verification drawing requirement instruction set sent by the server, the sending unit 303 is controlled to send a verification request to the server so as to enable the server to determine the verification drawing requirement instruction set corresponding to the client, wherein the verification request comprises the identification information of the client.
Based on the same technical concept, fig. 4 exemplarily shows a server provided by an embodiment of the present invention, and the apparatus may perform the steps performed by the server.
As shown in fig. 4, the apparatus may include:
an obtaining unit 401, configured to obtain a verification request sent by a client, where the verification request includes identification information of the client;
a processing unit 402, configured to randomly generate a verification drawing requirement instruction set corresponding to the client according to the identification information of the client; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step;
a sending unit 403, configured to send the verification drawing requirement instruction set to the client.
Optionally, the processing unit 402 is further configured to:
controlling the obtaining unit 401 to obtain the verification result sent by the client;
and determining to provide the service corresponding to the verification result to the client according to the verification result.
Based on the same technical concept, an embodiment of the present invention further provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the authentication method according to the obtained program.
Based on the same technical concept, the embodiment of the invention also provides a computer-readable non-volatile storage medium, which comprises computer-readable instructions, and when the computer-readable instructions are read and executed by a computer, the computer is enabled to execute the above identity verification method.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (22)

1. A method of identity verification, comprising:
the client acquires a verification drawing requirement instruction set sent by the server; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step; the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client;
the client determines a verification result according to the verification drawing requirement instruction set;
and the client sends the verification result to the server.
2. The method of claim 1, wherein the client determining a validation result from the validation drawing requirement instruction set comprises:
the client displays the first-step drawing requirement to a user, collects drawing coordinates drawn by the user within preset limited time, determines whether the drawing coordinates meet a verification threshold of the first step, if yes, determines that the first-step drawing verification is passed, and prompts the user of the next-step drawing requirement to continue the verification of the second-step drawing until the multi-step drawing requirement passes the verification, and then determines that the verification result is successful.
3. The method of claim 2, wherein the client determines that the verification result is a failure if drawing coordinates drawn by a user are not collected within a preset limited time.
4. The method of claim 2, wherein the client determines the verification result as a failure if the drawing coordinates do not meet the verification threshold of the first step.
5. The method of claim 2, wherein the client prompts a user for draw success information after each step of draw verification passes.
6. The method of claim 2, wherein after each drawing verification passes, the client hides each drawing that the user has successfully drawn.
7. The method of any of claims 1 to 6, wherein the validation threshold comprises a preset number of coordinates and a fault tolerance radius that a pixel path of each step of the drawing requires.
8. The method of any of claims 1 to 6, wherein prior to obtaining the validation drawing requirement instruction set sent by the server, further comprising:
the client sends a verification request to the server to enable the server to determine a verification drawing requirement instruction set corresponding to the client, wherein the verification request comprises identification information of the client.
9. A method of identity verification, comprising:
a server acquires a verification request sent by a client, wherein the verification request comprises identification information of the client;
the server randomly generates a verification drawing requirement instruction set corresponding to the client according to the identification information of the client; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step;
the server sends the verification drawing requirement instruction set to the client.
10. The method of claim 9, further comprising:
the server acquires a verification result sent by the client;
and the server determines to provide the service corresponding to the verification result to the client according to the verification result.
11. A client, comprising:
the acquisition unit is used for acquiring a verification drawing requirement instruction set sent by the server; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step; the verification drawing requirement instruction set is a verification drawing requirement instruction set corresponding to the client and randomly generated by the server after receiving a verification request sent by the client;
the processing unit is used for determining a verification result according to the verification drawing requirement instruction set;
and the sending unit is used for sending the verification result to the server.
12. The client of claim 11, wherein the processing unit is specifically configured to:
the method comprises the steps of displaying a first-step drawing requirement to a user, collecting drawing coordinates drawn by the user within preset limited time, determining whether the drawing coordinates meet a verification threshold of the first step, if so, determining that the first-step drawing verification is passed, prompting the user of the next-step drawing requirement to continue to perform second-step drawing verification, and determining that the verification result is successful after the multi-step drawing requirement verification is passed.
13. The client of claim 12, wherein the processing unit is further to:
and if the drawing coordinate drawn by the user is not acquired within the preset limited time, determining that the verification result is failure.
14. The client of claim 12, wherein the processing unit is further to:
and if the drawing coordinate does not meet the verification threshold of the first step, determining the verification result as failure.
15. The client of claim 12, wherein the processing unit is further to:
and after each step of drawing verification is passed, prompting the user for drawing success information.
16. The client of claim 12, wherein the processing unit is further to:
after each step drawing verification passes, hiding each step drawing which the user has successfully drawn.
17. The client of any one of claims 11 to 16, wherein the validation threshold comprises a preset number of coordinates and a fault tolerance radius that a pixel path of each step of the drawing requires.
18. The client of any of claims 11 to 16, wherein the processing unit is further to:
before acquiring the verification drawing requirement instruction set sent by the server, controlling the sending unit to send a verification request to the server so as to enable the server to determine the verification drawing requirement instruction set corresponding to the client, wherein the verification request comprises the identification information of the client.
19. A server, comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a verification request sent by a client, and the verification request comprises identification information of the client;
the processing unit is used for randomly generating a verification drawing requirement instruction set corresponding to the client according to the identification information of the client; the verification drawing requirement instruction set comprises a multi-step drawing requirement indicating a user drawing, a verification threshold for each step, and a prompt for each step;
a sending unit, configured to send the verification drawing requirement instruction set to the client.
20. The server according to claim 19, wherein the processing unit is further to:
controlling the acquisition unit to acquire a verification result sent by the client;
and determining to provide the service corresponding to the verification result to the client according to the verification result.
21. A computing device, comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to execute the method of any one of claims 1 to 10 in accordance with the obtained program.
22. A computer readable non-transitory storage medium including computer readable instructions which, when read and executed by a computer, cause the computer to perform the method of any one of claims 1 to 10.
CN201811537049.5A 2018-12-14 2018-12-14 Identity verification method, client and server Active CN111327576B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811537049.5A CN111327576B (en) 2018-12-14 2018-12-14 Identity verification method, client and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811537049.5A CN111327576B (en) 2018-12-14 2018-12-14 Identity verification method, client and server

Publications (2)

Publication Number Publication Date
CN111327576A true CN111327576A (en) 2020-06-23
CN111327576B CN111327576B (en) 2022-05-06

Family

ID=71166696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811537049.5A Active CN111327576B (en) 2018-12-14 2018-12-14 Identity verification method, client and server

Country Status (1)

Country Link
CN (1) CN111327576B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101360104A (en) * 2007-07-31 2009-02-04 株式会社理光 Authentication system, image forming apparatus, and authentication server
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN106066959A (en) * 2016-05-25 2016-11-02 北京比邻弘科科技有限公司 A kind of method and device of bot access detection
US20180239888A1 (en) * 2017-02-20 2018-08-23 Alibaba Group Holding Limited Verification method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101360104A (en) * 2007-07-31 2009-02-04 株式会社理光 Authentication system, image forming apparatus, and authentication server
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN106066959A (en) * 2016-05-25 2016-11-02 北京比邻弘科科技有限公司 A kind of method and device of bot access detection
US20180239888A1 (en) * 2017-02-20 2018-08-23 Alibaba Group Holding Limited Verification method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩双旺: "基于ASP.NET的动态网站验证码功能的实现!", 《中央民族大学学报(自然科学版)》 *

Also Published As

Publication number Publication date
CN111327576B (en) 2022-05-06

Similar Documents

Publication Publication Date Title
US20200211025A1 (en) Augmented reality-based virtual object allocation method and apparatus
US11250229B2 (en) Displaying and recognizing two-dimensional code
CA2836052C (en) Picture gesture authentication
US9524441B2 (en) System and method for identity authentication based on face recognition, and computer storage medium
CN107508826B (en) Authentication method and device based on VR scene, VR terminal and VR server
TW201814439A (en) Virtual reality scene-based business realization method and apparatus
CN107682368B (en) Verification method, client, server and system based on interactive operation
CN110659569A (en) Electronic signature method, device, storage medium and electronic equipment
CN106101463B (en) Gesture-based verification method in mobile application, mobile terminal and system
CN110866239A (en) Verification code request processing method, device, equipment and computer storage medium
CN112583799A (en) Processing method, related device, equipment and medium for registered account
CN110138800A (en) Interface alternation and its verification method, log on request generation and verification method and device
US10936705B2 (en) Authentication method, electronic device, and computer-readable program medium
CN106485114B (en) Data verification method and device
CN109688109B (en) Verification method and device of verification code based on client information identification
US20210266314A1 (en) Systems and methods of enabling fast user access to remote desktops
CN111327576B (en) Identity verification method, client and server
CN109801076B (en) Handwriting authentication method, device and storage medium based on self-service terminal
CN110795706B (en) Hash-based verification method, equipment, storage medium and device
CN109525485B (en) Message leaving method and terminal equipment
CN108200043B (en) Picture verification code verification method and picture verification code verification device
CN110543754A (en) memory, verification code implementation method, device and equipment
CN112052711B (en) Fingerprint input method, identity verification method and device
CN108882005B (en) Barrage verification method, computer equipment and storage medium
CN112613005A (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant