CN111625805B - Verification method, verification device, electronic equipment and storage medium - Google Patents

Verification method, verification device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111625805B
CN111625805B CN201910152403.0A CN201910152403A CN111625805B CN 111625805 B CN111625805 B CN 111625805B CN 201910152403 A CN201910152403 A CN 201910152403A CN 111625805 B CN111625805 B CN 111625805B
Authority
CN
China
Prior art keywords
verification
objects
preset
verification objects
moved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910152403.0A
Other languages
Chinese (zh)
Other versions
CN111625805A (en
Inventor
顾玉婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910152403.0A priority Critical patent/CN111625805B/en
Publication of CN111625805A publication Critical patent/CN111625805A/en
Application granted granted Critical
Publication of CN111625805B publication Critical patent/CN111625805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the disclosure discloses a verification method, a verification device, electronic equipment and a storage medium, wherein the verification method comprises the following steps: detecting a movement operation for any one of a plurality of authentication objects; wherein at least a portion of the plurality of verification objects respectively correspond to at least one component of a preset commercial identifier; in response to the detected movement operation, it is determined whether one or more of the plurality of verification objects is moved to a location that matches other verification objects of the plurality of verification objects for verification. According to the technical scheme, the verification efficiency can be improved, interaction can be generated with the user in the verification process, and the use experience of the user can be improved.

Description

Verification method, verification device, electronic equipment and storage medium
Technical Field
The disclosure relates to the technical field of computers, and in particular relates to a verification method, a verification device, electronic equipment and a storage medium.
Background
In the technical field of internet security, in order to prevent a robot program from simulating human behaviors, operations such as registration or login are performed on platforms such as websites and APP, and the platforms are usually distinguished by adopting a verification code mode. The current verification codes are mainly divided into two types, wherein one type is that a platform randomly generates character verification codes such as numbers or symbols and the like and requires users to fill the character verification codes in a verification code area, but the character verification codes are relatively mechanical, have poor readability and have no interest; the other is that the platform randomly generates graphics, requiring the user to complete verification by manipulating the graphics, for example by sliding the picture into the fill area of the background picture, which utilizes the user's behavioral characteristics to complete verification. However, in the verification mode, a background picture is selected randomly, a picture on a small area is scratched out, and a user is guided to slide the picture on the small area to a missing part of the background picture through the sliding operation of the sliding block, so that the missing area can be distinguished by eyes of the user, the missing area is difficult to identify by a robot program, the processing difficulty is high, the identification difficulty is also high for the user with poor color resolution, errors are easy to occur when the sliding block is operated on the mobile terminal with a small screen, and the user experience is poor.
Disclosure of Invention
The embodiment of the disclosure provides a verification method, a verification device, electronic equipment and a computer readable storage medium.
In a first aspect, an embodiment of the present disclosure provides a verification method.
Specifically, the verification method includes:
detecting a movement operation for any one of a plurality of authentication objects; wherein at least a portion of the plurality of verification objects respectively correspond to at least one component of a preset commercial identifier;
in response to the detected movement operation, it is determined whether one or more of the plurality of verification objects is moved to a location that matches other verification objects of the plurality of verification objects for verification.
Further, the matched position includes a preset range where the moved position of the verification object adjacent to the other verification objects is located.
Further, in response to the detected movement operation, determining whether one or more of the plurality of verification objects is moved to a location that matches other verification objects of the plurality of verification objects, comprising:
and displaying prompt information at a preset position after detecting that one of the verification objects is moved to a position matched with other verification objects in the plurality of verification objects.
Further, displaying the prompt information at the preset position includes:
and displaying at least one part of the prompt information at the matched position.
Further, the method further comprises:
and after the verification is passed, displaying a dynamic effect diagram corresponding to the preset commercial identifier.
Further, the method further comprises:
acquiring the preset business identifier;
generating at least one part of the verification objects according to the preset business identification;
the plurality of verification objects are presented.
Further, presenting the plurality of verification objects includes:
determining the display position of each verification object;
and dispersedly displaying a plurality of verification objects on a display interface according to the display positions.
Further, the method further comprises:
after one of the plurality of verification objects is moved to a position matching other verification objects of the plurality of verification objects, the moved verification object is combined with the other verification objects to form a new verification object or the preset business identification.
Further, after forming the new verification object, the method further comprises:
a movement operation for the new authentication object is detected, and in response to the movement operation for the new authentication object, it is determined whether the new authentication object is moved to a position matching other authentication objects than the new authentication object.
In a second aspect, an embodiment of the present invention provides an authentication apparatus.
Specifically, the verification device includes:
a first detection module configured to detect a movement operation for any one of a plurality of authentication objects; wherein at least a portion of the plurality of verification objects respectively correspond to at least one component of a preset commercial identifier;
a determination module configured to determine, in response to the detected movement operation, whether one or more of the plurality of verification objects is moved to a position that matches other verification objects of the plurality of verification objects for verification.
Further, the matched position includes a preset range where the moved position of the verification object adjacent to the other verification objects is located.
Further, the determining module includes:
and the first display sub-module is configured to display prompt information at a preset position after detecting that one of the verification objects is moved to a position matched with other verification objects in the plurality of verification objects.
Further, the first display sub-module includes:
and the second display sub-module is configured to display at least part of the prompt information at the matched position.
Further, the apparatus further comprises:
and the first display module is configured to display the dynamic effect graph corresponding to the preset business identifier after the verification is passed.
Further, the apparatus further comprises:
the acquisition module is configured to acquire the preset business identifier;
a generation module configured to generate at least a portion of the plurality of verification objects according to the preset business identification;
and a second display module configured to display the plurality of verification objects.
Further, the second display module includes:
a determining sub-module configured to determine a presentation position of each of the verification objects;
and a third display sub-module configured to display a plurality of verification objects on a display interface in a scattered manner according to the display positions.
Further, the apparatus further comprises:
and the combination module is configured to combine the moved verification object with other verification objects after one of the verification objects is moved to a position matched with the other verification objects in the verification objects, so as to form a new verification object or the preset business identifier.
Further, after the combining module, the method further includes:
A second detection module configured to detect a movement operation for the new authentication object and determine whether the new authentication object is moved to a position matching other authentication objects than the new authentication object in response to the movement operation for the new authentication object.
The functions may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the structure of the verification device includes a memory for storing one or more computer instructions for supporting the verification device to perform the verification method in the first aspect, and a processor configured to execute the computer instructions stored in the memory. The authentication means may further comprise a communication interface for the authentication means to communicate with other devices or a communication network.
In a third aspect, embodiments of the present disclosure provide an electronic device comprising a memory and a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement the method of the first aspect.
In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium storing computer instructions for use by a security authentication device for an enterprise account, comprising computer instructions for performing the verification method of the first aspect described above.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
in the embodiment of the disclosure, in the verification process, a verification object detects a movement operation for any one of a plurality of verification objects, and after detecting a movement operation of a user for one or more verification objects, the verification is completed according to whether the moved verification object is moved to a position matched with other verification objects. According to the embodiment of the disclosure, at least one component in the preset commercial identifiers is taken as the verification object, and the user performs mobile operation on any verification object in the verification objects to finally form the complete preset commercial identifier.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
Other features, objects and advantages of the present disclosure will become more apparent from the following detailed description of non-limiting embodiments, taken in conjunction with the accompanying drawings. In the drawings:
fig. 1 is a schematic diagram of a network environment of a network in which a terminal for implementing an authentication method according to an embodiment of the present disclosure is located;
FIG. 2 shows a flow chart of a verification method according to an embodiment of the present disclosure;
FIG. 3 illustrates a flow diagram showing a plurality of verification object sections in an embodiment in accordance with the present disclosure;
FIG. 4 shows a flow chart of step S303 of FIG. 3 according to an embodiment of the present disclosure;
fig. 5 shows a schematic diagram of a verification scenario to which a verification method proposed by an embodiment of the present disclosure is applied;
FIG. 6 shows a block diagram of a verification device according to an embodiment of the present disclosure;
FIG. 7 illustrates a partial block diagram showing a plurality of verification objects in accordance with one embodiment of the present disclosure;
FIG. 8 illustrates a block diagram of the second presentation module 703 of FIG. 7 according to one embodiment of the present disclosure;
fig. 9 is a schematic diagram of an electronic device suitable for use in implementing a verification method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily implement them. In addition, for the sake of clarity, portions irrelevant to description of the exemplary embodiments are omitted in the drawings.
In this disclosure, it should be understood that terms such as "comprises" or "comprising," etc., are intended to indicate the presence of features, numbers, steps, acts, components, portions, or combinations thereof disclosed in this specification, and are not intended to exclude the possibility that one or more other features, numbers, steps, acts, components, portions, or combinations thereof are present or added.
In addition, it should be noted that, without conflict, the embodiments of the present disclosure and features of the embodiments may be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
In accordance with an embodiment of the present disclosure, a verification method is provided, it being noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system, such as a set of computer executable instructions, and, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order other than that illustrated herein.
The verification method provided by the embodiment of the disclosure can be executed in a mobile terminal, a computer terminal or a similar computing device. Fig. 1 is a schematic diagram of a network environment of a network in which a terminal for implementing an authentication method according to an embodiment of the present disclosure is located.
As shown in fig. 1, the network environment may include a terminal 101 and a server 102, and in this embodiment, the above-described authentication method may be applied to a hardware environment constituted by the server 102 and the terminal 101 as shown in fig. 1. As shown in fig. 1, the server is connected to the terminal 101 through a network including, but not limited to: the terminal 101 is not limited to a PC, a mobile phone, a tablet computer, or the like. The verification method of the embodiment of the present disclosure may be performed by the server 102, may be performed by the terminal 101, or may be performed by both the server 102 and the terminal 101. In some embodiments, the verification method performed by the terminal 101 of embodiments of the present disclosure is performed by client software installed thereon.
In some embodiments, the terminal 101 may be any mobile computing device or the like. The terminal 101 may establish a connection with the server 102 through a data network, which may be a local area network connection, a wide area network connection, an internet connection, or other type of data network connection. The terminal 101 may execute to connect to a network service executed by a server or a group of servers. The web server is a web-based user service such as an authentication service, social network, cloud resources, email, online payment, or other online application.
In some embodiments, the terminal 101 generates and sends an authentication request to the server, the server 102 generates an authentication object, and presents the authentication object to the user through the terminal 101, the user can input operation on the terminal 101, the terminal records operation information of the user on the authentication object, and submits operation information of the user side to the server 102 for authentication.
In other embodiments, the authentication method is applied to the terminal 101, that is, the authentication method of the embodiments of the present disclosure may be implemented in the network environment without including a server, specifically, the processor of the terminal receives the generated authentication request, sends the authentication request to the authentication processor of the terminal (the authentication processor may be a virtual processing unit in the processor of the terminal), generates authentication information at the processor, and displays the generated authentication object to the user, where the user may input an operation on the screen of the terminal, and the processor records the operation information of the user on the authentication image and performs authentication according to the operation information.
It should be noted here that, according to one embodiment of the present disclosure, the terminal shown in fig. 1 described above has a touch display (also referred to as a "touch screen" or "touch display screen"). According to another embodiment of the present disclosure, the terminal shown in fig. 1 has a mouse input interface.
In some embodiments, the terminal 101 shown in fig. 1 described above has a Graphical User Interface (GUI) with which a user can interact with the GUI by finger contact and/or gestures on the touch screen surface, or with which the GUI interacts by mouse operations. The man-machine interaction functions herein optionally include the following interactions: executable instructions for performing the above-described human-machine interaction functions, such as entering predetermined verification operations, creating web pages, drawing, word processing, making electronic documents, gaming, video conferencing, instant messaging, sending and receiving electronic mail, talking interfaces, playing digital video, playing digital music, and/or web browsing, are configured/stored in one or more processor-executable computer program products or readable storage media.
Fig. 2 shows a flow chart of a verification method according to an embodiment of the present disclosure. As shown in fig. 2, the verification method includes the following steps S201 to S202:
in step S201, a movement operation for any one of a plurality of authentication objects is detected; wherein at least a portion of the plurality of verification objects respectively correspond to at least one component of a preset commercial identifier;
in step S202, in response to the detected movement operation, it is determined whether one or more of the plurality of verification objects is moved to a position matching other verification objects of the plurality of verification objects to perform verification.
Step S201
In this embodiment, the preset business identifier may include a business body identifier such as a company, a product identifier, a service identifier, a trademark, a brand identifier, and the like; for example, the preset business identifier may be a brand identifier of a verification platform currently logged in by the user, and the brand identifier of the platform usually appears at each corner of the page, or an icon serving as an APP is displayed on the terminal desktop, so that the user can quickly and accurately splice a plurality of verification objects, and the verification process of the jigsaw can bring a certain interest to the user.
In some embodiments, the preset commercial identifier involved in each verification may be fixed or randomly selected from a plurality of preset commercial identifiers for the same verification platform. All or part of the plurality of verification objects may correspond to at least one component of the preset commercial identity, and the verification objects corresponding to the preset commercial identity may be combined to form all or part of the preset commercial identity. The verification object may be a picture, a component (e.g., interface component, graphical component), etc.
In some embodiments, the number of verification objects and the content presented may be different for each verification, for example, at least a portion of the verification objects may correspond to at least one component generated by randomly dividing a preset business identifier, and the display position of the verification objects on the display interface may also be not fixed, so that the verification process is difficult for a robot program to identify, and similar to a jigsaw puzzle for a user, thereby providing interest to the user and improving user experience while completing verification.
In some embodiments, the movement operation may be performed by the user directly dragging the authentication object, for example, the movement operation may be an operation in which the user slides to a certain position by operating the touch screen to hold the authentication object with a finger, or an operation in which the user slides to a certain position by clicking the authentication object with a mouse without releasing the hand. In other embodiments, the movement operation may be performed by the user clicking on the authentication object with a finger by operating the touch screen or by operating the mouse, clicking on another movement location, and recognizing the operation by the terminal or the server. In other embodiments, the movement operation may also be performed by the user sliding a slider associated with the authentication object with a finger by operating a touch screen or operating a mouse. It should be understood that the above three types of movement operations are merely illustrative, and the manner in which the movement operation can be performed is not limited to the above types, and any movement operation can be considered as the movement operation of the verification object as long as the verification object can be moved from the current position to another position, and the movement operation can be specifically set according to the actual situation, and is not limited herein.
In some embodiments, some or all of the plurality of verification objects may be moved and matched with other verification objects, as the case may be, without limitation.
In some embodiments, the presentation locations of the plurality of verification objects may be different at each verification to prevent the robot program from masquerading as a user attacking the verification platform.
Step S202
In some embodiments, the plurality of verification objects may correspond to part or all of the preset business identification after being moved and combined. The components of the preset commercial identifier may be arbitrarily divided, that is, the components corresponding to the two verification objects may or may not be adjacent in the preset commercial identifier. In one embodiment, whether two verification objects match or not may be determined by whether the components corresponding to the two verification objects are two adjacent components in the preset commercial identifier.
In one embodiment, completing the verification operation may result in the result of a verification success or a verification failure. The verification success can be understood as that the user moves one or more of the plurality of verification objects to other matched verification objects to form a preset combination, for example, after one or more of the plurality of verification objects are moved, the preset business identifier is formed by combining the one or more verification objects, and then the verification is considered to be successful. The verification failure may be understood as that a plurality of verification objects are not combined into one preset complete combination by a moving operation, or a plurality of verification objects are not combined into one preset combination within a predetermined time, and the verification failure may be considered.
In some embodiments, the processing unit of the terminal or server may automatically match (e.g., splice) one authentication object after detecting that the two authentication objects are moved to matching locations of another matching authentication object. It will be appreciated that when one verification object is detected to be moved to a non-matching verification object, no matching operation is performed on the two verification objects.
In some embodiments, after the verification operation is completed, a prompt for passing or failing the verification may also be output. The form of the prompt message may be determined according to the actual situation, for example, a word that passes verification is displayed on a page, and after a few seconds of pause, the page is transferred to the next page, or the page may be directly transferred to the next page, so as to indicate that the verification passes, which may be determined according to the actual situation, and the method is not limited herein.
In the verification process, the embodiment of the disclosure detects the movement operation of any one of a plurality of verification objects, and after detecting the movement operation of one or more verification objects by a user, completes verification according to whether the moved verification object is moved to a position matched with other verification objects. According to the embodiment of the disclosure, at least one component in the preset commercial identifications is taken as the verification object, and the user performs mobile operation on any verification object in the verification objects to finally form all or part of the preset commercial identifications.
In an optional implementation manner of this embodiment, the matched position includes a preset range where the moved position of the verification object is adjacent to the other verification objects.
In this alternative implementation manner, two verification objects are matched, and the corresponding components of the two verification objects are adjacent in the preset commercial identifier, so that matching of the two verification objects in the verification process can be understood as splicing of the two verification objects, and the adjacent position can be understood as the position of one or more points on the common edge after splicing of the two verification objects. In some embodiments, the matched position includes a predetermined range in which the adjacent position is located. The preset range may be understood as a range obtained by expanding adjacent positions according to a preset expansion mode, and the preset expansion mode may be, for example, expanding a preset distance from the adjacent positions to one or more expansion directions, etc. It will be understood, of course, that the size of the preset range may be adjusted according to the verification accuracy, when the requirement of the verification accuracy is low, a larger preset range may be set, and when the requirement of the verification accuracy is high, a smaller preset range may be set, specifically, may be determined according to the actual situation, and the method is not limited herein.
In the moving process, if a part of the moved verification objects enter the preset range of other matched verification objects, the verification objects are considered to move in place, and the two verification objects can be matched. By the method, the user can complete matching without accurately moving the verification object to the position adjacent to another verification object, but the user is approximately close to the adjacent position, the characteristic of fuzzy matching is enhanced, the operation of the user is more convenient, and the verification efficiency can be improved.
It should be noted that if there are more than two verification objects corresponding to the preset commercial identifier, for example, there are three verification objects corresponding to three components of the preset commercial identifier, where the component corresponding to the verification object that is currently moved is adjacent to the component corresponding to the other two verification objects in the preset commercial identifier, if the preset range where the adjacent positions of the other two verification objects are located is entered simultaneously during the movement of the verification object (for example, if the preset ranges where the adjacent positions of the other two verification objects are located overlap), one of the verification objects may be selected according to a preset rule to perform matching, for example, one of the verification objects closer to the other verification object, the verification object that is more biased in the movement direction, or any one of the two verification objects may be selected to perform matching according to the actual situation, which is not limited herein.
In some embodiments, the plurality of verification objects can be moved at will, which increases flexibility and interest and improves the user experience compared to the prior art in which only one of the images can be moved and combined with the background image.
In an optional implementation manner of this embodiment, the step S202, that is, the step of determining whether one or more of the plurality of verification objects is moved to a position matching with other verification objects of the plurality of verification objects in response to the detected movement operation, further includes the steps of:
and displaying prompt information at a preset position after detecting that one of the verification objects is moved to a position matched with other verification objects in the plurality of verification objects.
In this alternative implementation manner, after determining that the verification object that is currently moved is moved to the matched position, a prompt message may be displayed at a preset position to prompt the user that the verification object that is currently moved is successfully matched to another verification object, and after seeing the prompt, the user may release the mouse or the finger to stop the movement operation. The preset position may be a matched position, that is, a preset range of adjacent positions of the two verification objects, or other positions, which is determined according to practical situations.
In an optional implementation manner of this embodiment, the step of displaying the prompt information at the preset position further includes the following steps:
and displaying at least one part of the prompt information at the matched position.
In this alternative implementation, after one verification object is moved to a position matching with the other verification object, that is, within a preset range of the adjacent position, at least a portion of the prompt information is displayed within the preset range, for example, at least a portion of an auxiliary line is displayed within the preset range, so that the user can be prompted in a more visual manner that the two verification objects have completed matching, and the user can release the mouse. According to the embodiment of the disclosure, the fuzzy matching of the verification object can be realized by setting the preset range where the adjacent positions are located and displaying the lines in the preset range, and the user can be intuitively prompted when to stop moving operation, so that the use experience of the user can be improved.
The line displayed at the matched position may be a straight line or a curved line, for example, the line may be a part or all of an edge line where adjacent positions on the matched verification object are located, or may be a straight line formed at the adjacent positions, and the line is not limited herein, specifically, the line may be a straight line according to actual situations.
In an alternative implementation of this embodiment, the verification method further includes the steps of:
and after the verification is passed, displaying a dynamic effect diagram corresponding to the preset commercial identifier.
In this optional implementation manner, after the user successfully splices the multiple verification objects into the preset business identifier, the dynamic effect diagram of the preset business identifier can be displayed on the page, and the dynamic effect diagram can be a brand logo of the verification platform, can be an effect diagram displayed by the preset business identifier dynamically, can be provided with music, provides a certain interest for the user, and enhances the brand effect of the verification platform.
In an alternative implementation of this embodiment, as shown in fig. 3, the verification method further includes the following steps S301 to S303:
in step S301, a preset commercial identifier is obtained;
in step S302, generating at least a part of the plurality of verification objects according to the preset business identifier;
in step S303, the plurality of verification objects are presented.
In this alternative implementation manner, different verification platforms may correspond to different preset commercial identifiers, and the same verification platform may also correspond to a plurality of different preset commercial identifiers. For the same verification platform, theme patterns of different preset commercial identifications can be consistent, but materials, colors, additional elements and the like can be different, so that randomness and interestingness of each verification are increased. After receiving the verification request, the terminal or the server can select a corresponding preset commercial identifier according to the verification platform sending the verification request and a preset selection mode (such as randomly selecting one of the preset commercial identifiers corresponding to the verification platform); and after the preset business identifier is obtained, generating a plurality of verification objects according to the preset business identifier, wherein the number and the generation mode of the verification objects can be determined based on preset rules. After the plurality of verification objects are obtained, the plurality of verification objects may be presented on the page. In addition, while a plurality of verification objects are displayed, some prompts can be given, such as displaying some static or dynamic guiding instructions, guiding the user to drag one verification object to the vicinity of the other verification object, or prompting the periphery by text, displaying the style of the preset business mark, and the like, for the user to refer to.
In an optional implementation manner of this embodiment, the step S302, that is, the step of generating at least a part of the plurality of verification objects according to the preset business identifier, further includes one of the following steps:
dividing the preset business mark into a plurality of component parts according to a preset dividing mode, and generating at least one part of the verification objects according to the component parts;
at least a portion of the plurality of verification objects are generated by selecting one of a plurality of combinations of pre-divided preset commercial identifications.
In this optional implementation manner, a division manner may be preset, after the terminal or the server and the like obtain the preset business identifier, the preset business identifier may be divided into a plurality of component parts according to the preset division manner, so as to further generate a corresponding verification object, where the preset division manner may include the number of component parts and a rule how to divide. For example, the division may be performed in a random manner, or may be performed by a preset algorithm.
In another implementation, the preset commercial identifiers may be divided in advance to form a plurality of different combinations, each combination including a plurality of components of the preset commercial identifiers, and during the verification process, one of the combinations is selected randomly or in a preset manner to generate the verification object.
In an alternative implementation manner of this embodiment, as shown in fig. 4, the step S303, that is, the step of displaying the plurality of verification objects, further includes the following steps S401 to S402:
in step S401, determining a display position of each verification object;
in step S402, a plurality of verification objects are displayed on a display interface in a scattered manner according to the display positions.
In this alternative implementation, the display positions of the verification objects may be determined randomly or by a preset manner, but it is to be adhered to the principle that the verification objects preferably do not overlap after being displayed, at least to enable the user to distinguish that the different verification objects are independent and not mistakenly considered a whole.
In an alternative implementation of this embodiment, the method further includes the steps of:
after one of the plurality of verification objects is moved to a position matching other verification objects of the plurality of verification objects, the moved verification object is combined with the other verification objects to form a new verification object or the preset business identification.
In this alternative implementation, after two verification objects are matched, they can be combined to form a new verification object. In some embodiments, after all verification objects corresponding to the preset commercial identity components are matched together, part or all of the preset commercial identity may be formed, at which point verification may be considered complete; and if only a part of all verification objects corresponding to the preset commercial identification components are matched together, the verification cannot be considered to be completed, but only a new verification object is formed. The new verification object, like the original verification object, may be moved as a whole and may be matched with other original verification objects or with other new verification objects until the verification objects are all matched together to form all or part of the preset commercial identity (the part of the preset commercial identity may refer herein to all verification objects corresponding to the part of the preset commercial identity in combination provided that all verification objects do not correspond to all parts of the preset commercial identity).
In an alternative implementation of this embodiment, after forming the new verification object, the method further includes the steps of:
a movement operation for the new authentication object is detected, and in response to the movement operation for the new authentication object, it is determined whether the new authentication object is moved to a position matching other authentication objects than the new authentication object.
In this alternative implementation, after the new verification object is formed, the new verification object and the remaining verification objects may still be displayed on the display interface for the user to continue matching. In some embodiments, the new verification object is similar to the original verification object, and can be arbitrarily moved to match with other verification objects. After detecting the moving operation of the new verification object, it may be determined whether the new verification object is moved to a position where other verification objects match, and after moving the matched position, the new verification object may be matched with other verification objects (e.g. spliced to form all or part of the preset commercial identifier).
In other embodiments, the new verification object may not be moved as a reference, while other remaining verification objects may be moved to the new verification object for matching. In other embodiments, the new verification object formed by the first stitching may not be able to be moved as a reference, and other remaining verification objects may be moved to the new verification object for matching, and then the new verification object formed outside the new verification object formed by the first stitching may be moved, which is merely illustrative, and may be specific according to the actual situation and not limited herein.
In some embodiments, each time an operation is moved, or after a new verification object is formed, at least one verification object of the plurality of verification objects may also be re-presented by changing the presentation position of the at least one verification object.
For example, after successfully matching two verification objects to form a new verification object, the verification objects may be re-presented, i.e., the presentation position of at least one of the verification objects may be re-adjusted, including the new verification object and the other verification objects. After the user operates once, the display position is readjusted, the recognition difficulty of the robot program is increased, and the verification platform is prevented from being attacked by the robot program.
In some embodiments, the at least one verification object may also be re-presented by changing the presentation location of the at least one of the plurality of verification objects upon detecting that the moved verification object stopped moving and did not successfully match any one of the verification objects.
In this optional implementation manner, after the user performs the moving operation on one of the verification objects, if the user does not successfully match with any one of the verification objects, the display position of at least one verification object may be readjusted, so as to increase the verification difficulty and prevent the verification platform from being attacked by the robot program.
Fig. 5 shows a schematic diagram of a verification scenario to which the verification method proposed by the embodiment of the present disclosure is applied. As shown in fig. 5 (a), logo of the alicloud is shown on the verification page, and is divided into two verification pictures for display. Meanwhile, as shown in fig. 5 (a), an instruction to move the verification picture (a finger and a solid origin of flickering) and a moving direction (a direction indicated by an arrow) may also be displayed at a position of one of the plurality of verification pictures. The user can drag one of the pictures to the other picture by a finger and display an auxiliary line at the point of merger as shown in fig. 5 (b) to prompt the user that the hand can be released. And then, automatically combining the two pictures into a logo of the alicloud, displaying the logo, and outputting a verified word and playing the Slogan of the alicloud logo at the same time as shown in fig. 5 (c).
The following are device embodiments of the present disclosure that may be used to perform method embodiments of the present disclosure.
Fig. 6 shows a block diagram of a verification apparatus according to an embodiment of the disclosure, which may be implemented as part or all of an electronic device by software, hardware, or a combination of both. As shown in fig. 6, the authentication apparatus includes:
A first detection module 601 configured to detect a movement operation for any one of a plurality of authentication objects; wherein at least a portion of the plurality of verification objects respectively correspond to at least one component of a preset commercial identifier;
a determining module 602 configured to determine, in response to the detected movement operation, whether one or more of the plurality of verification objects is moved to a position matching other verification objects of the plurality of verification objects for verification.
First detection module 601
In this embodiment, the preset business identifier may include a business body identifier such as a company, a product identifier, a service identifier, a trademark, a brand identifier, and the like; for example, the preset business identifier may be a brand identifier of a verification platform currently logged in by the user, and the brand identifier of the platform usually appears at each corner of the page, or an icon serving as an APP is displayed on the terminal desktop, so that the user can quickly and accurately splice a plurality of verification objects, and the verification process of the jigsaw can bring a certain interest to the user.
In some embodiments, the preset commercial identifier involved in each verification may be fixed or randomly selected from a plurality of preset commercial identifiers for the same verification platform. All or part of the plurality of verification objects may correspond to at least one component of the preset commercial identity, and the verification objects corresponding to the preset commercial identity may be combined to form all or part of the preset commercial identity. The verification object may be a picture, a component (e.g., interface component, graphical component), etc.
In some embodiments, the number of verification objects and the content presented may be different for each verification, for example, at least a portion of the verification objects may correspond to at least one component generated by randomly dividing a preset business identifier, and the display position of the verification objects on the display interface may also be not fixed, so that the verification process is difficult for a robot program to identify, and similar to a jigsaw puzzle for a user, thereby providing interest to the user and improving user experience while completing verification.
In some embodiments, the movement operation may be performed by the user directly dragging the authentication object, for example, the movement operation may be an operation in which the user slides to a certain position by operating the touch screen to hold the authentication object with a finger, or an operation in which the user slides to a certain position by clicking the authentication object with a mouse without releasing the hand. In other embodiments, the movement operation may be performed by the user clicking on the authentication object with a finger by operating the touch screen or by operating the mouse, clicking on another movement location, and recognizing the operation by the terminal or the server. In other embodiments, the movement operation may also be performed by the user sliding a slider associated with the authentication object with a finger by operating a touch screen or operating a mouse. It should be understood that the above three types of movement operations are merely illustrative, and the manner in which the movement operation can be performed is not limited to the above types, and any movement operation can be considered as the movement operation of the verification object as long as the verification object can be moved from the current position to another position, and the movement operation can be specifically set according to the actual situation, and is not limited herein.
In some embodiments, some or all of the plurality of verification objects may be moved and matched with other verification objects, as the case may be, without limitation.
In some embodiments, the presentation locations of the plurality of verification objects may be different at each verification to prevent the robot program from masquerading as a user attacking the verification platform.
Determination module 602
In some embodiments, the plurality of verification objects may correspond to part or all of the preset business identification after being moved and combined. The components of the preset commercial identifier may be arbitrarily divided, that is, the components corresponding to the two verification objects may or may not be adjacent in the preset commercial identifier. In one embodiment, whether two verification objects match or not may be determined by whether the components corresponding to the two verification objects are two adjacent components in the preset commercial identifier.
In one embodiment, completing the verification operation may result in the result of a verification success or a verification failure. The verification success can be understood as that the user moves one or more of the plurality of verification objects to other matched verification objects to form a preset combination, for example, after one or more of the plurality of verification objects are moved, the preset business identifier is formed by combining the one or more verification objects, and then the verification is considered to be successful. The verification failure may be understood as that a plurality of verification objects are not combined into one preset complete combination by a moving operation, or a plurality of verification objects are not combined into one preset combination within a predetermined time, and the verification failure may be considered.
In some embodiments, the processing unit of the terminal or server may automatically match (e.g., splice) one authentication object after detecting that the two authentication objects are moved to matching locations of another matching authentication object. It will be appreciated that when one verification object is detected to be moved to a non-matching verification object, no matching operation is performed on the two verification objects.
In some embodiments, after the verification operation is completed, a prompt for passing or failing the verification may also be output. The form of the prompt message may be determined according to the actual situation, for example, a word that passes verification is displayed on a page, and after a few seconds of pause, the page is transferred to the next page, or the page may be directly transferred to the next page, so as to indicate that the verification passes, which may be determined according to the actual situation, and the method is not limited herein.
In the verification process, the embodiment of the disclosure detects the movement operation of any one of a plurality of verification objects, and after detecting the movement operation of one or more verification objects by a user, completes verification according to whether the moved verification object is moved to a position matched with other verification objects. According to the embodiment of the disclosure, at least one component in the preset commercial identifications is taken as the verification object, and the user performs mobile operation on any verification object in the verification objects to finally form all or part of the preset commercial identifications.
In an optional implementation manner of this embodiment, the matched position includes a preset range where the moved position of the verification object is adjacent to the other verification objects.
In this alternative implementation manner, two verification objects are matched, and the corresponding components of the two verification objects are adjacent in the preset commercial identifier, so that matching of the two verification objects in the verification process can be understood as splicing of the two verification objects, and the adjacent position can be understood as the position of one or more points on the common edge after splicing of the two verification objects. In some embodiments, the matched position includes a predetermined range in which the adjacent position is located. The preset range may be understood as a range obtained by expanding adjacent positions according to a preset expansion mode, and the preset expansion mode may be, for example, expanding a preset distance from the adjacent positions to one or more expansion directions, etc. It will be understood, of course, that the size of the preset range may be adjusted according to the verification accuracy, when the requirement of the verification accuracy is low, a larger preset range may be set, and when the requirement of the verification accuracy is high, a smaller preset range may be set, specifically, may be determined according to the actual situation, and the method is not limited herein.
In the moving process, if a part of the moved verification objects enter the preset range of other matched verification objects, the verification objects are considered to move in place, and the two verification objects can be matched. By the method, the user can complete matching without accurately moving the verification object to the position adjacent to another verification object, but the user is approximately close to the adjacent position, the characteristic of fuzzy matching is enhanced, the operation of the user is more convenient, and the verification efficiency can be improved.
It should be noted that if there are more than two verification objects corresponding to the preset commercial identifier, for example, there are three verification objects corresponding to three components of the preset commercial identifier, where the component corresponding to the verification object that is currently moved is adjacent to the component corresponding to the other two verification objects in the preset commercial identifier, if the preset range where the adjacent positions of the other two verification objects are located is entered simultaneously during the movement of the verification object (for example, if the preset ranges where the adjacent positions of the other two verification objects are located overlap), one of the verification objects may be selected according to a preset rule to perform matching, for example, one of the verification objects closer to the other verification object, the verification object that is more biased in the movement direction, or any one of the two verification objects may be selected to perform matching according to the actual situation, which is not limited herein.
In some embodiments, the plurality of verification objects have similar attributes and can be moved at will, which increases flexibility and interest and improves the user experience compared to prior art techniques in which only one of the pictures can be moved and combined with the background picture.
In an alternative implementation of this embodiment, the determining module 602 includes:
and the first display sub-module is configured to display prompt information at a preset position after detecting that one of the verification objects is moved to a position matched with other verification objects in the plurality of verification objects.
In this alternative implementation manner, after determining that the verification object that is currently moved is moved to the matched position, a prompt message may be displayed at a preset position to prompt the user that the verification object that is currently moved is successfully matched to another verification object, and after seeing the prompt, the user may release the mouse or the finger to stop the movement operation. The preset position may be a matched position, that is, a preset range of adjacent positions of the two verification objects, or other positions, which is determined according to practical situations.
In an optional implementation manner of this embodiment, the first display sub-module includes:
And the second display sub-module is configured to display at least part of the prompt information at the matched position.
In this alternative implementation, after one verification object is moved to a position matching with the other verification object, that is, within a preset range of the adjacent position, at least a portion of the prompt information is displayed within the preset range, for example, at least a portion of an auxiliary line is displayed within the preset range, so that the user can be prompted in a more visual manner that the two verification objects have completed matching, and the user can release the mouse. According to the embodiment of the disclosure, the fuzzy matching of the verification object can be realized by setting the preset range where the adjacent positions are located and displaying the lines in the preset range, and the user can be intuitively prompted when to stop moving operation, so that the use experience of the user can be improved.
The line displayed at the matched position may be a straight line or a curved line, for example, the line may be a part or all of an edge line where adjacent positions on the matched verification object are located, or may be a straight line formed at the adjacent positions, and the line is not limited herein, specifically, the line may be a straight line according to actual situations.
In an alternative implementation of this embodiment, the apparatus further includes:
and the first display module is configured to display the dynamic effect graph corresponding to the preset business identifier after the verification is passed.
In this optional implementation manner, after the user successfully splices the multiple verification objects into the preset business identifier, the dynamic effect diagram of the preset business identifier can be displayed on the page, and the dynamic effect diagram can be a brand logo of the verification platform, can be an effect diagram displayed by the preset business identifier dynamically, can be provided with music, provides a certain interest for the user, and enhances the brand effect of the verification platform.
In an alternative implementation of this embodiment, as shown in fig. 7, the apparatus further includes:
an obtaining module 701, configured to obtain the preset business identifier;
a generating module 702 configured to generate at least a portion of the plurality of verification objects according to the preset business identification;
a second presentation module 703 is configured to present the plurality of verification objects.
In this alternative implementation manner, different verification platforms may correspond to different preset commercial identifiers, and the same verification platform may also correspond to a plurality of different preset commercial identifiers. For the same verification platform, theme patterns of different preset commercial identifications can be consistent, but materials, colors, additional elements and the like can be different, so that randomness and interestingness of each verification are increased. After receiving the verification request, the terminal or the server can select a corresponding preset commercial identifier according to the verification platform sending the verification request and a preset selection mode (such as randomly selecting one of the preset commercial identifiers corresponding to the verification platform); and after the preset business identifier is obtained, generating a plurality of verification objects according to the preset business identifier, wherein the number and the generation mode of the verification objects can be determined based on preset rules. After the plurality of verification objects are obtained, the plurality of verification objects may be presented on the page. In addition, while a plurality of verification objects are displayed, some prompts can be given, such as displaying some static or dynamic guiding instructions, guiding the user to drag one verification object to the vicinity of the other verification object, or prompting the periphery by text, displaying the style of the preset business mark, and the like, for the user to refer to.
In an alternative implementation manner of this embodiment, the generating module 702 includes:
a first generation sub-module configured to divide the preset business identifier into a plurality of component parts according to a preset division manner, and generate at least a part of the plurality of verification objects according to the plurality of component parts;
and a second generation sub-module configured to select one of a plurality of combinations, which are pre-divided with respect to the preset commercial identifications, to generate at least a part of the plurality of verification objects.
In this optional implementation manner, a division manner may be preset, after the terminal or the server and the like obtain the preset business identifier, the preset business identifier may be divided into a plurality of component parts according to the preset division manner, so as to further generate a corresponding verification object, where the preset division manner may include the number of component parts and a rule how to divide. For example, the division may be performed in a random manner, or may be performed by a preset algorithm.
In another implementation, the preset commercial identifiers may be divided in advance to form a plurality of different combinations, each combination including a plurality of components of the preset commercial identifiers, and during the verification process, one of the combinations is selected randomly or in a preset manner to generate the verification object.
In an alternative implementation manner of this embodiment, as shown in fig. 8, the second display module 703 includes:
a determining sub-module 801 configured to determine a presentation position of each of the verification objects;
a third presentation sub-module 802 configured to present a plurality of the verification objects in a dispersed manner on a presentation interface according to the presentation location.
In this alternative implementation, the display positions of the verification objects may be determined randomly or by a preset manner, but it is to be adhered to the principle that the verification objects preferably do not overlap after being displayed, at least to enable the user to distinguish that the different verification objects are independent and not mistakenly considered a whole.
In an alternative implementation of this embodiment, the apparatus further includes:
and the combination module is configured to combine the moved verification object with other verification objects after one of the verification objects is moved to a position matched with the other verification objects in the verification objects, so as to form a new verification object or the preset business identifier.
In this alternative implementation, after two verification objects are matched, they can be combined to form a new verification object. In some embodiments, after all verification objects corresponding to the preset commercial identity components are matched together, part or all of the preset commercial identity may be formed, at which point verification may be considered complete; and if only a part of all verification objects corresponding to the preset commercial identification components are matched together, the verification cannot be considered to be completed, but only a new verification object is formed. The new verification object, like the original verification object, may be moved as a whole and may be matched with other original verification objects or with other new verification objects until the verification objects are all matched together to form all or part of the preset commercial identity (the part of the preset commercial identity may refer herein to all verification objects corresponding to the part of the preset commercial identity in combination provided that all verification objects do not correspond to all parts of the preset commercial identity).
In an optional implementation manner of this embodiment, after the combining module, the method further includes:
a second detection module configured to detect a movement operation for the new authentication object and determine whether the new authentication object is moved to a position matching other authentication objects than the new authentication object in response to the movement operation for the new authentication object.
In this alternative implementation, after the new verification object is formed, the new verification object and the remaining verification objects may still be displayed on the display interface for the user to continue matching. In some embodiments, the new verification object is similar to the original verification object, and can be arbitrarily moved to match with other verification objects. After detecting the moving operation of the new verification object, it may be determined whether the new verification object is moved to a position where other verification objects match, and after moving the matched position, the new verification object may be matched with other verification objects (e.g. spliced to form all or part of the preset commercial identifier).
In other embodiments, the new verification object may not be moved as a reference, while other remaining verification objects may be moved to the new verification object for matching. In other embodiments, the new verification object formed by the first stitching may not be able to be moved as a reference, and other remaining verification objects may be moved to the new verification object for matching, and then the new verification object formed outside the new verification object formed by the first stitching may be moved, which is merely illustrative, and may be specific according to the actual situation and not limited herein.
In some embodiments, each time an operation is moved, or after a new verification object is formed, at least one verification object of the plurality of verification objects may also be re-presented by changing the presentation position of the at least one verification object.
For example, after successfully matching two verification objects to form a new verification object, the verification objects may be re-presented, i.e., the presentation position of at least one of the verification objects may be re-adjusted, including the new verification object and the other verification objects. After the user operates once, the display position is readjusted, the recognition difficulty of the robot program is increased, and the verification platform is prevented from being attacked by the robot program.
In some embodiments, the at least one verification object may also be re-presented by changing the presentation location of the at least one of the plurality of verification objects upon detecting that the moved verification object stopped moving and did not successfully match any one of the verification objects.
In this optional implementation manner, after the user performs the moving operation on one of the verification objects, if the user does not successfully match with any one of the verification objects, the display position of at least one verification object may be readjusted, so as to increase the verification difficulty and prevent the verification platform from being attacked by the robot program.
Fig. 9 is a schematic structural diagram of an electronic device suitable for use in implementing a verification method according to an embodiment of the present disclosure.
As shown in fig. 9, the electronic apparatus 900 includes a Central Processing Unit (CPU) 901 that can execute various processes in the embodiment shown in fig. 1 described above in accordance with a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage section 908 into a Random Access Memory (RAM) 903. In the RAM903, various programs and data necessary for the operation of the electronic device 900 are also stored. The CPU901, ROM902, and RAM903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to the bus 904.
The following components are connected to the I/O interface 905: an input section 906 including a keyboard, a mouse, and the like; an output portion 907 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 908 including a hard disk or the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as needed. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 910 so that a computer program read out therefrom is installed into the storage section 908 as needed.
In particular, the method described above with reference to fig. 1 may be implemented as a computer software program according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a medium readable thereby, the computer program comprising program code for performing the method shown in fig. 1. In such an embodiment, the computer program may be downloaded and installed from the network through the communication section 909, and/or installed from the removable medium 911.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware. The units or modules described may also be provided in a processor, the names of which in some cases do not constitute a limitation of the unit or module itself.
As another aspect, the present disclosure also provides a computer-readable storage medium, which may be a computer-readable storage medium included in the apparatus described in the above embodiment; or may be a computer-readable storage medium, alone, that is not assembled into a device. The computer-readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present disclosure.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention referred to in this disclosure is not limited to the specific combination of features described above, but encompasses other embodiments in which any combination of features described above or their equivalents is contemplated without departing from the inventive concepts described. Such as those described above, are mutually substituted with the technical features having similar functions disclosed in the present disclosure (but not limited thereto).

Claims (20)

1. A method of authentication, comprising:
detecting a movement operation for any one of a plurality of authentication objects; at least one part of the verification objects corresponds to at least one component part which is generated by random division in a preset commercial identifier, and the preset commercial identifier is randomly selected from a plurality of preset commercial identifiers corresponding to a verification platform which a user logs in at present;
in response to detecting a movement operation for any one of the plurality of verification objects, determining whether one or more of the plurality of verification objects is moved to a position that matches other verification objects of the plurality of verification objects for verification, and changing a presentation position of the plurality of verification objects on a presentation interface.
2. The method of claim 1, wherein the matched location includes a predetermined range of locations where the moved verification object is adjacent to the other verification objects.
3. The method of claim 1 or 2, wherein determining whether one or more of the plurality of verification objects are moved to a location that matches other ones of the plurality of verification objects in response to detecting a move operation for any of the plurality of verification objects comprises:
And displaying prompt information at a preset position after detecting that one of the verification objects is moved to a position matched with other verification objects in the plurality of verification objects.
4. A method according to claim 3, wherein presenting the reminder information at the preset location comprises:
and displaying at least one part of the prompt information at the matched position.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
and after the verification is passed, displaying a dynamic effect diagram corresponding to the preset commercial identifier.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
acquiring the preset business identifier;
generating at least one part of the verification objects according to the preset business identification;
the plurality of verification objects are presented.
7. The method of claim 6, wherein exposing the plurality of verification objects comprises:
determining the display position of each verification object;
and dispersedly displaying a plurality of verification objects on a display interface according to the display positions.
8. The method according to claim 1 or 2, further comprising:
After one of the plurality of verification objects is moved to a position matching other verification objects of the plurality of verification objects, the moved verification object is combined with the other verification objects to form a new verification object or the preset business identification.
9. The method of claim 8, further comprising, after forming the new authentication object:
a movement operation for the new authentication object is detected, and in response to the movement operation for the new authentication object, it is determined whether the new authentication object is moved to a position matching other authentication objects than the new authentication object.
10. A verification apparatus, comprising:
a first detection module configured to detect a movement operation for any one of a plurality of authentication objects; at least one part of the verification objects corresponds to at least one component part which is generated by random division in a preset commercial identifier, and the preset commercial identifier is randomly selected from a plurality of preset commercial identifiers corresponding to a verification platform which a user logs in at present;
and the determining module is configured to determine whether one or more of the plurality of verification objects are moved to a position matched with other verification objects in the plurality of verification objects to verify and change the display position of the plurality of verification objects on the display interface after detecting the movement operation for any one of the plurality of verification objects.
11. The apparatus of claim 10, wherein the matched location comprises a predetermined range of locations where the moved authentication object is adjacent to the other authentication objects.
12. The apparatus according to claim 10 or 11, wherein the determining module comprises:
and the first display sub-module is configured to display prompt information at a preset position after detecting that one of the verification objects is moved to a position matched with other verification objects in the plurality of verification objects.
13. The apparatus of claim 12, wherein the first display sub-module comprises:
and the second display sub-module is configured to display at least part of the prompt information at the matched position.
14. The apparatus according to claim 10 or 11, characterized in that the apparatus further comprises:
and the first display module is configured to display the dynamic effect graph corresponding to the preset business identifier after the verification is passed.
15. The apparatus according to claim 10 or 11, characterized in that the apparatus further comprises:
the acquisition module is configured to acquire the preset business identifier;
A generation module configured to generate at least a portion of the plurality of verification objects according to the preset business identification;
and a second display module configured to display the plurality of verification objects.
16. The apparatus of claim 15, wherein the second display module comprises:
a determining sub-module configured to determine a presentation position of each of the verification objects;
and a third display sub-module configured to display a plurality of verification objects on a display interface in a scattered manner according to the display positions.
17. The apparatus according to claim 10 or 11, characterized in that the apparatus further comprises:
and the combination module is configured to combine the moved verification object with other verification objects after one of the verification objects is moved to a position matched with the other verification objects in the verification objects, so as to form a new verification object or the preset business identifier.
18. The apparatus of claim 17, wherein the combining module is followed by:
a second detection module configured to detect a movement operation for the new authentication object and determine whether the new authentication object is moved to a position matching other authentication objects than the new authentication object in response to the movement operation for the new authentication object.
19. An electronic device comprising a memory and a processor; wherein,
the memory is for storing one or more computer instructions, wherein the one or more computer instructions are executable by the processor to implement the method of any of claims 1-9.
20. A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the method of any of claims 1-9.
CN201910152403.0A 2019-02-28 2019-02-28 Verification method, verification device, electronic equipment and storage medium Active CN111625805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910152403.0A CN111625805B (en) 2019-02-28 2019-02-28 Verification method, verification device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910152403.0A CN111625805B (en) 2019-02-28 2019-02-28 Verification method, verification device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111625805A CN111625805A (en) 2020-09-04
CN111625805B true CN111625805B (en) 2024-02-20

Family

ID=72258763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910152403.0A Active CN111625805B (en) 2019-02-28 2019-02-28 Verification method, verification device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111625805B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115085995B (en) * 2022-06-10 2024-06-21 中国银行股份有限公司 Identity verification method, system, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732135A (en) * 2015-02-17 2015-06-24 网易有道信息技术(北京)有限公司 Sliding verification method and device
CN104917724A (en) * 2014-03-11 2015-09-16 腾讯科技(深圳)有限公司 Identity verification method and apparatus
CN105912923A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Mobile terminal verification method and device
WO2017076186A1 (en) * 2015-11-03 2017-05-11 腾讯科技(深圳)有限公司 Sliding verification method and apparatus for handheld mobile device
CN108460268A (en) * 2017-02-20 2018-08-28 阿里巴巴集团控股有限公司 Verification method and device
CN108881126A (en) * 2017-05-15 2018-11-23 阿里巴巴集团控股有限公司 The methods, devices and systems of authentication code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170345038A1 (en) * 2016-05-31 2017-11-30 Capital One Services, Llc Systems and methods for providing a redeemable commerce object

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917724A (en) * 2014-03-11 2015-09-16 腾讯科技(深圳)有限公司 Identity verification method and apparatus
CN104732135A (en) * 2015-02-17 2015-06-24 网易有道信息技术(北京)有限公司 Sliding verification method and device
WO2017076186A1 (en) * 2015-11-03 2017-05-11 腾讯科技(深圳)有限公司 Sliding verification method and apparatus for handheld mobile device
CN105912923A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Mobile terminal verification method and device
CN108460268A (en) * 2017-02-20 2018-08-28 阿里巴巴集团控股有限公司 Verification method and device
CN108881126A (en) * 2017-05-15 2018-11-23 阿里巴巴集团控股有限公司 The methods, devices and systems of authentication code

Also Published As

Publication number Publication date
CN111625805A (en) 2020-09-04

Similar Documents

Publication Publication Date Title
EP2410450A1 (en) Method for providing a challenge based on a content
US10055894B2 (en) Markerless superimposition of content in augmented reality systems
US8141146B2 (en) Authentication server, authentication method and authentication program
US9223997B2 (en) Detecting and breaking CAPTCHA automation scripts and preventing image scraping
CN103079092B (en) Obtain the method and apparatus of people information in video
CN104796428A (en) Dynamic verification method, client side, server and system
CN104732135A (en) Sliding verification method and device
CN111767554B (en) Screen sharing method and device, storage medium and electronic equipment
CN108460268A (en) Verification method and device
CN112074831B (en) Authentication-based virtual content presentation
US20150143481A1 (en) Application security verification method, application server, application client and system
US20170011212A1 (en) Access control for a resource
CN109309844A (en) Video platform word treatment method, videoconference client and server
CN107888553A (en) A kind of verification method, server and system
CN113496017B (en) Verification method, device, equipment and storage medium
US11962582B2 (en) Systems and methods of enabling fast user access to remote desktops
CN111625805B (en) Verification method, verification device, electronic equipment and storage medium
CN110083467A (en) Processing method, equipment and the computer storage medium of small routine message
CN112988586A (en) Control testing method and device, electronic equipment and storage medium
CN110089076B (en) Method and device for realizing information interaction
US11704885B2 (en) Augmented reality (AR) visual display to save
CN109525485A (en) A kind of message leaving method and terminal device
CN110543754A (en) memory, verification code implementation method, device and equipment
JP6364889B2 (en) Display control program, display control apparatus, and display control method
Oluwaranti et al. Architectural Model For An Augmented Reality Based Mobile Learning Application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant