CN111680284A - Slider verification method and device and readable storage medium - Google Patents

Slider verification method and device and readable storage medium Download PDF

Info

Publication number
CN111680284A
CN111680284A CN202010443468.3A CN202010443468A CN111680284A CN 111680284 A CN111680284 A CN 111680284A CN 202010443468 A CN202010443468 A CN 202010443468A CN 111680284 A CN111680284 A CN 111680284A
Authority
CN
China
Prior art keywords
slider
image
coordinates
information
notch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010443468.3A
Other languages
Chinese (zh)
Inventor
刘尚超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Taikang Pension Insurance Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Taikang Pension Insurance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd, Taikang Pension Insurance Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN202010443468.3A priority Critical patent/CN111680284A/en
Publication of CN111680284A publication Critical patent/CN111680284A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0485Scrolling or panning

Abstract

The embodiment of the invention provides a slider verification method, a slider verification device and a readable storage medium. The invention discloses a slide block verification method, which comprises the following steps: the method comprises the steps of receiving a login request sent by a terminal device, responding to the login request, determining a slide block notch coordinate on a target image, sending coordinates of vertexes of all the split images, the slide block notch coordinate and an out-of-order split image group to the terminal device, receiving behavior characteristic information sent by the terminal device and current image information when the slide block verification is finished, wherein the behavior characteristic information is information collected by the terminal device from the beginning of dragging the slide block to the end of the slide block verification, and judging whether the slide block verification passes or not according to the behavior characteristic information, preset behavior characteristic information, the current image information and the information of the target image. The safety of slider verification is improved.

Description

Slider verification method and device and readable storage medium
Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for slider verification and a readable storage medium.
Background
Currently, the use of authentication codes is the current way many websites pass through. The application of the verification code can prevent malicious password cracking, ticket swiping and forum watering, and effectively prevent a hacker from making continuous login attempts for a certain specific registered user in a brute force cracking mode of a specific program.
In the prior art, most pictures are used for inputting verification codes. To improve the security of authentication, the target has come in a way of adopting slider authentication. The slider verification is also called as a dragging type verification code, which is similar to the sliding unlocking of a mobile phone, and the slider is dragged to a specified position by a mouse according to a prompt to complete the verification. At present, the slider verification is usually performed by sending an image with a slider and a slider notch to a terminal device by a server, dragging the slider to the slider notch by a user to perform slider verification, acquiring an end point position of the slider by the terminal device when the user drags the slider, matching the end point position with the slider notch position, and judging whether the end point position and the slider notch coincide or whether the distance between the end point position and the slider notch is smaller than a preset distance threshold value.
Disclosure of Invention
The embodiment of the invention provides a sliding block verification method, a sliding block verification device and a readable storage medium, and aims to solve the problems that the existing sliding block verification method is easy to crack by malicious programs and has low verification safety.
In a first aspect of the embodiments of the present invention, a slider verification method is provided, including:
receiving a login request sent by terminal equipment;
determining slider notch coordinates on a target image in response to the login request;
sending coordinates of each vertex of each sliced image, coordinates of the sliding block notch and a disordered sliced image group to the terminal equipment so that the terminal equipment assembles each sliced image into the target image according to the coordinates of each vertex and the disordered sliced image group, and displaying the sliding block notch and the sliding block matched with the sliding block notch at the position of the sliding block notch coordinates on the target image, wherein the disordered sliced image group comprises the disordered sliced images;
receiving behavior characteristic information sent by the terminal equipment and current image information when the slider verification is finished, wherein the behavior characteristic information is information collected by the terminal equipment from the beginning of dragging the slider to the end of the slider verification;
and judging whether the slider passes the verification according to the behavior feature information, preset behavior feature information, the current image information and the information of the target image, wherein the preset behavior feature information is determined according to sample behavior feature information of a plurality of users.
In a second aspect of the embodiments of the present invention, there is provided a slider verification apparatus, which is disposed in a server, and includes:
the receiving module is used for receiving a login request sent by the terminal equipment;
the determining module is used for responding to the login request and determining the coordinates of the sliding block notch on the target image;
the sending module is used for sending the coordinates of each vertex of each segmented image, the coordinates of the notch of the sliding block and the disordered segmented image group to the terminal equipment so that the terminal equipment assembles each segmented image into the target image according to the coordinates of each vertex and the disordered segmented image group, and displays the notch of the sliding block and the sliding block matched with the notch of the sliding block at the position of the notch of the sliding block on the target image, wherein the disordered segmented image group comprises the disordered segmented images;
the receiving module is further configured to receive behavior feature information sent by the terminal device and current image information when the slider verification is ended, where the behavior feature information is information collected by the terminal device from the start of dragging the slider to the end of the slider verification;
and the judging module is used for judging whether the slider verification passes according to the behavior characteristic information, preset behavior characteristic information, the current image information and the information of the target image, wherein the preset behavior characteristic information is determined according to sample behavior characteristic information of a plurality of users.
In a third aspect of the embodiments of the present invention, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program, when being executed by a processor, implements the steps of the slider verification method described above.
In a fourth aspect of the present invention, there is provided a slider verification apparatus, comprising a processor, a memory, and a computer program stored on the memory and operable on the processor, wherein the computer program, when executed by the processor, implements the steps of the slider verification method described above.
Aiming at the prior art, the invention has the following advantages:
the method for verifying the slider comprises the steps of receiving a login request sent by a terminal device, responding to the login request, determining a slider notch coordinate on a target image, sending the coordinate of each vertex of each segmented image, the slider notch coordinate and a disordered segmented image group to the terminal device, enabling the terminal device to assemble the segmented images into the target image according to the coordinate of each vertex and the disordered segmented image group, displaying a slider notch and a slider matched with the slider notch at the position of the slider notch coordinate on the target image, receiving behavior characteristic information sent by the terminal device and current image information when the slider verification is finished, wherein the behavior characteristic information is information collected by the terminal device and dragged from a start slider to an end slider for verification, and according to the behavior characteristic information, And presetting behavior characteristic information, current image information and target image information, and judging whether the slider verification passes. Therefore, the received behavior characteristic information can be matched with the preset behavior characteristic information in the stored database to determine whether the behavior characteristic information is the behavior characteristic information generated by the user, the safety degree of the slider verification is improved, the slider verification can be effectively ensured to be performed artificially, and the slider verification performed by AI simulation of malicious programs is restrained. Moreover, because the server sends the out-of-order segmentation image group to the terminal device, even if the malicious program acquires the coordinates of each vertex of each segmentation image, the coordinates of a slide block notch and the out-of-order segmentation image group, the segmentation images included in the out-of-order segmentation image group need to be restored into the target image, so that the complexity of the slide block verification scheme is increased, and the slider verification scheme is not easy to crack by the malicious program.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flowchart illustrating steps of a slider verification method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an interface for slider verification according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of another slider verification method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a slider verification apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
It should be understood that the specific embodiments described herein are merely illustrative of the invention, but do not limit the invention to only some, but not all embodiments.
Referring to fig. 1, fig. 1 is a flowchart illustrating steps of a slider verification method according to an embodiment of the present invention, where the slider verification method according to the embodiment is suitable for improving security of slider verification. The method of the embodiment comprises the following steps:
step 101, receiving a login request sent by a terminal device.
For example, when the user inputs information such as a user name and a password, the user clicks a login button to log in to a website, and when the user clicks the login button, the terminal device transmits a login request to the server. Accordingly, the server receives the login request and then performs step 102.
Step 102, responding to the login request, and determining the coordinates of the sliding block notch on the target image.
The target image may be a preset image or an image randomly selected from a plurality of preset images. In the case that the target image is a fixed preset image, the slider notch coordinate may be a preset coordinate. When the target image is an image randomly selected from a plurality of preset images, the slider notch coordinates may be randomly changed, for example, the slider notch coordinates are determined according to the size of the image of each preset image.
103, sending the coordinates of each vertex of each segmented image, the coordinates of a slide block notch and the disordered segmented image group to the terminal device so that the terminal device assembles each segmented image into a target image according to the coordinates of each vertex and the disordered segmented image group, and displaying the slide block notch at the position of the slide block notch coordinates on the target image and displaying a slide block matched with the slide block notch, wherein the disordered segmented image group comprises the disordered segmented images.
The disordered segmentation image group comprises disordered segmentation images. Because the server sends the disordered segmented image group to the terminal device, even if the malicious program acquires the coordinates of each vertex of each segmented image, the coordinates of a slide block notch and the disordered segmented image group, the segmented images in the disordered segmented image group need to be restored into the target image, so that the complexity of the slide block verification scheme is increased, and the disordered segmented images are not easy to crack by the malicious program.
The terminal device may assemble the sorted images into the target image according to the coordinates of the vertices and the disordered-tile image group, and may display a tile notch at a position of the tile notch coordinates on the target image according to the tile notch coordinates, and display a tile matching the tile notch on the target image. It should be noted that the initial position of the slider displayed on the terminal device may be the leftmost position on the target image, so that the user may drag the leftmost slider on the target image to the slider notch for slider verification. For example, as shown in fig. 2, fig. 2 is a schematic interface diagram of slider verification according to an embodiment of the present invention. A slider 201 may be disposed below the target image, and the user may drag the slider 202 to the slider notch 203 through the slider 201.
And 104, receiving behavior characteristic information sent by the terminal equipment and current image information when the slider verification is finished, wherein the behavior characteristic information is information collected by the terminal equipment from the start of dragging the slider to the end of the slider verification.
It should be noted that the information from dragging the slider to finishing the verification may be behavior characteristic information of the user generated by dragging the slider by the user, or may be a slider verification operation performed by a malicious program simulating a human behavior. During the period from the start of dragging the slider to the end of slider verification, the terminal device may collect behavior characteristic information during the period, where the behavior characteristic information includes, for example, frequency, speed, track information, and the like of slider verification, and the frequency of slider verification is, for example, the number of times of slider verification performed in 1 minute. The velocity refers to the moving velocity of the slider, and the trajectory information refers to the moving trajectory of the slider.
And 105, judging whether the slider verification passes according to the behavior feature information, the preset behavior feature information, the current image information and the information of the target image, wherein the preset behavior feature information is determined according to the sample behavior feature information of a plurality of users.
In this embodiment, through an Artificial Intelligence manner, the sliding block is dragged by hundreds of thousands of times by a user, so that the machine can memorize information such as sliding track, frequency, speed and the like of the sliding block in the process of dragging the sliding block by all people, the information such as the sliding track, the frequency, the speed and the like of the sliding block can be used as behavior characteristic information of the user due to information generated in the process of dragging the sliding block by the user, the behavior characteristic information learned by the machine memory can be stored in the database as reference information, so that the server can match the received behavior characteristic information with preset behavior characteristic information in the stored database, and a matching result is used as a basis for judging whether the behavior characteristic information is human behavior characteristic information or Artificial Intelligence (AI) and simulation (for example, a malicious program simulates human behavior). If the received behavior characteristic information is matched with the preset behavior characteristic information in the stored database, the behavior characteristic information of a person is determined, and the current image information when the slider verification is finished is matched with the information of the target image, the slider verification at this time can be determined to be passed, and if the behavior characteristic information of the person is determined, but the current image information when the slider verification is finished is not matched with the information of the target image, the slider verification at this time can be determined to be failed. If the received behavior characteristic information is matched with the preset behavior characteristic information in the stored database, the behavior characteristic information is determined to be not human behavior characteristic information and possibly AI simulation behavior characteristic information, and the slider verification at this time can be determined to be failed. Therefore, the safety degree of the verification can be improved, the verification can be effectively ensured to be carried out manually, and AI simulation of malicious programs is restrained.
The method for verifying the slider provided by this embodiment includes determining a slider notch coordinate on a target image by receiving a login request sent by a terminal device, responding to the login request, sending coordinates of vertices of each segmented image, the slider notch coordinate and a disordered segmented image group to the terminal device, so that the terminal device assembles each segmented image into the target image according to the coordinates of the vertices and the disordered segmented image group, displaying a slider notch and a slider matched with the slider notch at a position of the slider notch coordinate on the target image, receiving behavior feature information sent by the terminal device and current image information when slider verification is finished, wherein the behavior feature information is information collected by the terminal device from the beginning of dragging the slider to the end of slider verification, and verifying the slider according to the behavior feature information, preset behavior feature information, current image information, the random number of the slider notch coordinate, and the random number of the random, And information of the target image, and judging whether the slider verification passes. Therefore, the received behavior characteristic information can be matched with the preset behavior characteristic information in the stored database to determine whether the behavior characteristic information is the behavior characteristic information generated by the user, the safety degree of the slider verification is improved, the slider verification can be effectively ensured to be performed artificially, and the slider verification performed by AI simulation of malicious programs is restrained. Moreover, because the server sends the out-of-order segmentation image group to the terminal device, even if the malicious program acquires the coordinates of each vertex of each segmentation image, the coordinates of a slide block notch and the out-of-order segmentation image group, the segmentation images included in the out-of-order segmentation image group need to be restored into the target image, so that the complexity of the slide block verification scheme is increased, and the slider verification scheme is not easy to crack by the malicious program.
Referring to fig. 3, fig. 3 is a flowchart illustrating steps of another method for slider verification according to an embodiment of the present invention, the method including the steps of:
step 301, receiving a login request sent by a terminal device.
Step 302, in response to the login request, randomly acquiring an image from the image database, and using the acquired image as a target image.
The image database can store a plurality of images, can take out image serial numbers in a random data mode according to the number of the images, and then obtains the images corresponding to the image serial numbers from the database. The database stores the corresponding relation between the image serial number and the image, so that the image corresponding to the acquired image serial number can be determined according to the acquired image serial number, and the acquired image is taken as the target image. Because an image corresponding to the login request is obtained in a random mode aiming at each login request, the problem that the image is easy to crack by a malicious attacker due to a fixed rule under the condition that a fixed image is always adopted as the image adopted during the slider verification in the prior art can be solved.
And step 303, determining the coordinates of the sliding block notch on the target image according to the length and the width of the target image.
Optionally, the coordinates of the slider notch may be coordinates of a center point of the slider notch. And taking a prime number between 1 and less than or equal to the length as an abscissa in the coordinate of the central point of the sliding block notch, and taking a prime number between 1 and less than or equal to the width as an ordinate in the coordinate of the central point of the sliding block notch to form the coordinate of the central point of the sliding block notch.
It should be noted that the manner of determining the coordinates of the center point of the slider notch may also be not particularly limited by using an odd number or an even number between 1 and less than or equal to the length as the abscissa of the coordinates of the center point of the slider notch, and using an odd number or an even number between 1 and less than or equal to the width as the ordinate of the coordinates of the center point of the slider notch. When the prime number is used as the abscissa or the ordinate, the rule of the prime number is not easy to be cracked by a malicious program, so that the safety of the slider verification is further improved. Moreover, since the length and width of the image randomly selected in step 302 may be different from those of the previously selected image, the determined slider notch coordinates may be different, and thus, the problem that the rule is easily found out by a malicious program because a fixed slider notch coordinate is always adopted in the prior art can be avoided. In the embodiment, a prime number between 1 and less than or equal to the length is used as an abscissa in a coordinate of a central point of the slider notch, and a prime number between 1 and less than or equal to the width is used as an ordinate in the coordinate of the central point of the slider notch, so that the malicious program is not easy to find out the rule, the malicious program can be effectively resisted, and the problem that the malicious program is subjected to AI simulation so as to continuously attack the server is solved.
And step 304, cutting the target image to obtain each cut image.
The method comprises the following steps of cutting a target image to obtain each cut image:
and cutting the target image according to an image cutting algorithm to obtain each cut image.
Wherein the image cutting algorithm comprises at least one of a threshold-based cutting method, an edge-based cutting method, and a region-based cutting method.
The image segmentation algorithm includes but is not limited to the several algorithms provided above. As for the image segmentation algorithm provided above, reference may be made to the prior art, which will not be described in detail in this embodiment.
The method for cutting the target image by using the region-based cutting method may specifically be as follows:
after the image is fetched according to the random algorithm, the size of the image can be obtained, the length and the width of the image are taken as cutting conditions each time, and then the remainder is obtained by dividing the length and the width by a random number within 1 to 100, so as to locate the seed pixel. The abscissa of the seed pixel is positioned according to the remainder when the sum of the remainder and the dividend obtained by dividing the length by one random number within 1 to 100 is greater than the length, and the ordinate of the seed pixel is positioned according to the remainder when the sum of the remainder and the dividend obtained by dividing the width by one random number within 1 to 100 is greater than the width. The length is taken as the abscissa of the seed pixel in the case where the sum of the remainder and the dividend is equal to the length, and the width is taken as the ordinate of the seed pixel in the case where the sum of the remainder and the dividend is equal to the width.
For example, for a 300 × 200 pixel image, that is, the number of pixels in the horizontal direction is 300, and the number of pixels in the vertical direction is 200, if 300 is divided by a random number 50 within 1 to 100, the remainder is 0, and the sum of the remainder and the dividend is equal to the length 300, then 300 is taken as the abscissa of the seed pixel. Meanwhile, the remainder is 20 when 200 is divided by 60, and since the sum of 20 and 200 is greater than the width 200, 20 is taken as the ordinate of the seed pixel, and thus the determined coordinate of the seed pixel is (300, 20).
After the seed pixel is determined, the four-neighborhood or the eight-neighborhood of the seed pixel can be determined, so that the pixel closest to the seed pixel in the four-neighborhood or the eight-neighborhood of the seed pixel is determined, the pixel closest to the seed pixel in the four-neighborhood or the eight-neighborhood is taken as a cutting node, the cutting node is taken as a new seed pixel, the pixel closest to the new seed pixel is determined from the four-neighborhood or the eight-neighborhood of the new seed pixel, the pixel closest to the new seed pixel is taken as a new cutting node, and cutting is carried out according to the above steps to obtain each cut image.
Step 305, recording the coordinates of each vertex of each sliced image.
And step 306, encrypting the coordinates of each vertex of each segmented image and the slide block notch coordinates to obtain the encrypted coordinates of each vertex and the encrypted slide block notch coordinates.
The server may encrypt the coordinates of each vertex of each sliced image and the slider notch coordinates. For example, a pseudo number is added before the coordinates of each vertex, a pseudo number is added before the slider notch coordinates, and the coordinates of each vertex after encryption and the slider notch coordinates after encryption are obtained by encrypting the pseudo numbers.
And 307, sending the encrypted coordinates of each vertex, the encrypted coordinates of the notch of the sliding block and the disordered split image group to the terminal equipment.
The server sends the encrypted coordinates of each vertex, the encrypted coordinates of a slide block notch and the disordered split image group to the terminal equipment, correspondingly, the terminal equipment receives the encrypted coordinates of each vertex and the encrypted coordinates of the slide block notch, the encrypted coordinates of each vertex and the encrypted coordinates of the slide block notch can be decrypted by adopting a rule appointed by the server end, the coordinates of each vertex and the coordinates of the slide block notch are obtained, so that the initial position of the slide block on the target image can be determined according to the coordinates of the slide block notch, the disordered split images included in the disordered split image group are assembled according to the coordinates of each vertex, the complete target image including the notch and the slide block located at the initial position is formed, and a user can drag the slide block to the notch to perform slide block verification.
It should be noted that, since the server encrypts the coordinates of each vertex and the slider notch coordinates in step 306, and sends the encrypted coordinates of each vertex and the encrypted slider notch coordinates to the terminal device, even if the malicious program obtains the out-of-order sliced image group, since the encrypted coordinates of each vertex and the encrypted slider notch coordinates cannot be decrypted, the sliced images included in the out-of-order sliced image group cannot be assembled, and a complete target image cannot be formed.
It should be noted that, when the target image is a frame of image randomly selected from the image database, the server sends the encrypted coordinates of each vertex, the encrypted coordinates of a slider notch, and the disordered split image group to the terminal device, and may also send the target image identifier of the target image to the terminal device. Each frame of image stored in the image database has a unique image identifier, so that in step 308, when the server receives current image information sent by the terminal device, that is, when the terminal device sends the current image information to the server, the current image information may include an image identifier of a target image, so that after the server receives the current image information, the image identifier included in the current image information may be compared with the image identifier of the target image selected by the server for the terminal device, if the image identifier included in the current image information is consistent with the image identifier of the target image selected by the server for the terminal device, the slider verification may pass, and if the image identifier included in the current image information is inconsistent with the image identifier of the target image selected by the server for the terminal device, the slider verification fails.
And 308, receiving behavior characteristic information sent by the terminal equipment and current image information when the slider verification is finished, wherein the behavior characteristic information is information collected by the terminal equipment from the start of dragging the slider to the end of the slider verification.
Step 309, judging whether the slider verification passes according to the behavior feature information, the preset behavior feature information, the current image information and the information of the target image.
The method comprises the following steps of judging whether the slider verification passes through the following steps according to behavior characteristic information, preset behavior characteristic information, current image information and information of a target image:
matching the behavior characteristic information with preset behavior characteristic information to judge whether the behavior characteristic information is user behavior characteristic information or not;
under the condition that the behavior characteristic information is determined to be the user behavior characteristic information, matching the current image information with the information of the target image to obtain a matching result;
and judging whether the slider verification passes or not according to the matching result.
It should be noted that, if, in step 307, the server sends the encrypted coordinates of each vertex, the encrypted coordinates of a slider notch, and the scrambled image group to the terminal device, even if the malicious program obtains the scrambled image group, because the encrypted coordinates of each vertex and the encrypted coordinates of a slider notch cannot be decrypted, the respective segmented images included in the scrambled image group cannot be assembled, and a complete target image cannot be formed, even if the malicious program submits image information to the server, because the submitted image information is not complete image information, in this step, the server may fail to match the image information with the information of the target image, so that AI simulation of the malicious program may be effectively resisted.
When the current image information is matched with the information of the target image, whether an image identifier in the current image information is consistent with an image identifier in the information of the target image or not can be matched, under the condition that the image identifier in the current image information is consistent with the image identifier in the information of the target image, whether the distance between a slider coordinate and a slider notch coordinate in the current image information is smaller than or equal to a preset threshold or not is judged, and under the condition that the distance between the slider coordinate and the slider notch coordinate in the current image information is smaller than or equal to the preset threshold, and the behavior characteristic information is determined to be user behavior characteristic information, the slider is determined to pass verification, so that the safety of the slider verification is improved to a certain extent.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a slider verification apparatus according to an embodiment of the present invention, where the slider verification apparatus is disposed in a server, and the apparatus 400 includes:
a receiving module 410, configured to receive a login request sent by a terminal device;
a determining module 420 for determining a slider notch coordinate on the target image in response to the login request;
the sending module 430 is configured to send the coordinates of each vertex of each sliced image, the coordinates of a slider notch, and the disordered sliced image group to the terminal device, so that the terminal device assembles each sliced image into a target image according to the coordinates of each vertex and the disordered sliced image group, and displays the slider notch at the position of the slider notch coordinates on the target image and displays a slider matched with the slider notch, where the disordered sliced image group includes the disordered sliced images;
the receiving module 410 is further configured to receive behavior feature information sent by the terminal device and current image information when the slider verification is ended, where the behavior feature information is information collected by the terminal device from the start of dragging the slider to the end of the slider verification;
the determining module 440 is configured to determine whether the slider verification passes according to the behavior feature information, preset behavior feature information, current image information, and information of the target image, where the preset behavior feature information is determined according to sample behavior feature information of multiple users.
Optionally, the method further includes:
the encryption module is used for encrypting the coordinates of each vertex of each segmented image and the slide block notch coordinates to obtain the encrypted coordinates of each vertex and the encrypted slide block notch coordinates;
correspondingly, the sending module 430 is specifically configured to send the encrypted coordinates of each vertex, the encrypted coordinates of the slider notch, and the out-of-order segmentation image group to the terminal device.
Optionally, the determining module 420 includes:
an acquisition unit configured to randomly acquire an image from an image database in response to a login request, and to take the acquired image as a target image;
and the determining unit is used for determining the slide block notch coordinates on the target image according to the length and the width of the target image.
Optionally, the determining unit is specifically configured to use a prime number between 1 and less than or equal to the length as an abscissa in a coordinate of a center point of the slider notch, and use a prime number between 1 and less than or equal to the width as an ordinate in the coordinate of the center point of the slider notch, so as to form the coordinate of the center point of the slider notch.
Optionally, the method further includes:
the cutting module is used for cutting the target image to obtain each cut image;
and the recording module is used for recording the coordinates of each vertex of each segmented image.
The cutting module is specifically used for cutting the target image according to an image cutting algorithm to obtain each cut image; wherein the image cutting algorithm comprises at least one of a threshold-based cutting method, an edge-based cutting method, and a region-based cutting method.
The determining module 440 is specifically configured to match the behavior feature information with preset behavior feature information to determine whether the behavior feature information is user behavior feature information; under the condition that the behavior characteristic information is determined to be the user behavior characteristic information, matching the current image information with the information of the target image to obtain a matching result; and judging whether the slider verification passes or not according to the matching result.
In addition, an embodiment of the present invention further provides a slider verification apparatus, where the slider verification apparatus includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, and when the computer program is executed by the processor, the computer program implements each process of the embodiment of the slider verification method of the foregoing embodiment, and can achieve the same technical effect, and is not described herein again to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned embodiment of the slider verification method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
The embodiment of the invention also provides a computer program, and the computer program can be stored on a cloud or a local storage medium. When being executed by a computer or a processor, for performing the respective steps of the slider validation method according to an embodiment of the present invention, and for implementing the respective modules in the slider validation apparatus according to an embodiment of the present invention.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As is readily imaginable to the person skilled in the art: any combination of the above embodiments is possible, and thus any combination between the above embodiments is an embodiment of the present invention, but the present disclosure is not necessarily detailed herein for reasons of space.
The slider verification methods provided herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The structure required to construct a system incorporating aspects of the present invention will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of a slider verification method in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (10)

1. A method for verifying a slider, executed on a server, includes:
receiving a login request sent by terminal equipment;
determining slider notch coordinates on a target image in response to the login request;
sending coordinates of each vertex of each sliced image, coordinates of the sliding block notch and a disordered sliced image group to the terminal equipment so that the terminal equipment assembles each sliced image into the target image according to the coordinates of each vertex and the disordered sliced image group, and displaying the sliding block notch and the sliding block matched with the sliding block notch at the position of the sliding block notch coordinates on the target image, wherein the disordered sliced image group comprises the disordered sliced images;
receiving behavior characteristic information sent by the terminal equipment and current image information when the slider verification is finished, wherein the behavior characteristic information is information collected by the terminal equipment from the beginning of dragging the slider to the end of the slider verification;
and judging whether the slider passes the verification according to the behavior feature information, preset behavior feature information, the current image information and the information of the target image, wherein the preset behavior feature information is determined according to sample behavior feature information of a plurality of users.
2. The method of claim 1, further comprising, prior to said sending coordinates of vertices of each sliced image, the slider notch coordinates, and the group of out-of-order sliced images to the terminal device:
encrypting the coordinates of each vertex of each segmented image and the slide block notch coordinates to obtain the encrypted coordinates of each vertex and the encrypted slide block notch coordinates;
the sending of the coordinates of the vertexes of the segmentation images, the coordinates of the sliding block notches and the disordered segmentation image group to the terminal device includes:
and sending the encrypted coordinates of each vertex, the encrypted coordinates of the slide block notch and the disordered segmentation image group to the terminal equipment.
3. The method of claim 1 or 2, wherein determining slider notch coordinates on a target image in response to the login request comprises:
responding to the login request, randomly acquiring an image from an image database, and taking the acquired image as the target image;
and determining the coordinates of the sliding block notch on the target image according to the length and the width of the target image.
4. The method of claim 3, wherein the slider notch coordinates are coordinates of a center point of a slider notch, and wherein determining the slider notch coordinates on the target image based on the length and width of the target image comprises:
and taking a prime number between the length and the width as an abscissa in the coordinate of the central point of the sliding block gap, and taking a prime number between the length and the width as an ordinate in the coordinate of the central point of the sliding block gap to form the coordinate of the central point of the sliding block gap.
5. The method according to claim 2, further comprising, before the encrypting the coordinates of the vertices of the sliced images and the slider notch coordinates to obtain the encrypted coordinates of the vertices and the encrypted slider notch coordinates:
cutting the target image to obtain each cut image;
and recording the coordinates of each vertex of each segmentation image.
6. The method of claim 5, wherein the segmenting the target image to obtain the segmented images comprises:
cutting the target image according to an image cutting algorithm to obtain each cut image; wherein the image cutting algorithm comprises at least one of a threshold-based cutting method, an edge-based cutting method, and a region-based cutting method.
7. The method according to claim 1 or 2, wherein the determining whether the slider verification passes according to the behavior feature information, preset behavior feature information, the current image information, and the information of the target image comprises:
matching the behavior characteristic information with preset behavior characteristic information to judge whether the behavior characteristic information is user behavior characteristic information or not;
under the condition that the behavior feature information is determined to be user behavior feature information, matching the current image information with the information of the target image to obtain a matching result;
and judging whether the slider verification passes or not according to the matching result.
8. The utility model provides a slider verifying attachment which characterized in that sets up in the server, includes:
the receiving module is used for receiving a login request sent by the terminal equipment;
the determining module is used for responding to the login request and determining the coordinates of the sliding block notch on the target image;
a sending module, configured to send the coordinates of each vertex of each sliced image, the coordinates of the slider notch, and the disordered sliced image group to the terminal device, so that the terminal device assembles each sliced image into the target image according to the coordinates of each vertex and the disordered sliced image group, and displays the slider notch and the slider matched with the slider notch at the position of the slider notch coordinates on the target image, where the disordered sliced image group includes each sliced image in disordered arrangement;
the receiving module is further configured to receive behavior feature information sent by the terminal device and current image information when the slider verification is ended, where the behavior feature information is information collected by the terminal device from the start of dragging the slider to the end of the slider verification;
and the judging module is used for judging whether the slider verification passes according to the behavior characteristic information, preset behavior characteristic information, the current image information and the information of the target image, wherein the preset behavior characteristic information is determined according to sample behavior characteristic information of a plurality of users.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a slider verification method according to any one of claims 1 to 7.
10. A slider validation apparatus comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the steps of the slider validation method according to any of claims 1 to 7.
CN202010443468.3A 2020-05-22 2020-05-22 Slider verification method and device and readable storage medium Pending CN111680284A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010443468.3A CN111680284A (en) 2020-05-22 2020-05-22 Slider verification method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010443468.3A CN111680284A (en) 2020-05-22 2020-05-22 Slider verification method and device and readable storage medium

Publications (1)

Publication Number Publication Date
CN111680284A true CN111680284A (en) 2020-09-18

Family

ID=72452715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010443468.3A Pending CN111680284A (en) 2020-05-22 2020-05-22 Slider verification method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN111680284A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112287324A (en) * 2020-11-18 2021-01-29 深圳源中瑞科技有限公司 Picture verification method, server, terminal device and storage medium
CN113467678A (en) * 2021-06-10 2021-10-01 北京达佳互联信息技术有限公司 Target object display method and device, electronic equipment and computer-readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106341403A (en) * 2016-08-30 2017-01-18 竞技世界(北京)网络技术有限公司 Identifying code theft preventing method
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN109902470A (en) * 2019-01-08 2019-06-18 平安科技(深圳)有限公司 Sliding block verification method, device, computer equipment and storage medium
US20200065471A1 (en) * 2017-11-14 2020-02-27 Tencent Technology (Shenzhen) Company Limited Security verification method and relevant device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106341403A (en) * 2016-08-30 2017-01-18 竞技世界(北京)网络技术有限公司 Identifying code theft preventing method
US20200065471A1 (en) * 2017-11-14 2020-02-27 Tencent Technology (Shenzhen) Company Limited Security verification method and relevant device
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN109902470A (en) * 2019-01-08 2019-06-18 平安科技(深圳)有限公司 Sliding block verification method, device, computer equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112287324A (en) * 2020-11-18 2021-01-29 深圳源中瑞科技有限公司 Picture verification method, server, terminal device and storage medium
CN112287324B (en) * 2020-11-18 2024-02-09 深圳源中瑞科技有限公司 Picture verification method, server, terminal device and storage medium
CN113467678A (en) * 2021-06-10 2021-10-01 北京达佳互联信息技术有限公司 Target object display method and device, electronic equipment and computer-readable storage medium

Similar Documents

Publication Publication Date Title
US10097360B2 (en) Automated test to tell computers and humans apart
US8990959B2 (en) Manipulable human interactive proofs
CA2676845C (en) Method and apparatus for network authentication of human interaction and user identity
US9690923B2 (en) Method, apparatus and system for verifying terminal
CN108989269B (en) Method, device and system for acquiring verification code
US20180253542A1 (en) Variation Analysis-Based Public Turing Test to Tell Computers and Humans Apart
US10395022B2 (en) Access control for a resource
CN107682368B (en) Verification method, client, server and system based on interactive operation
EP3819830B1 (en) Systems and methods for distorting captcha images with generative adversarial networks
US20160180073A1 (en) Captcha processing method and device, terminal and server
CN108121906A (en) A kind of verification method, device and computing device
CN111680284A (en) Slider verification method and device and readable storage medium
CN112187702A (en) Method and device for verifying client
CN111447207A (en) Verification code verification method, electronic device and storage medium
CN108390848B (en) Information witness method and device
CN108259183B (en) Attention method, attention device, attention electronic equipment and attention medium
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN113918898A (en) Safety verification code generation method, system and medium based on track drawing interaction
US10832485B1 (en) CAPTCHA authentication via augmented reality
CN108769749A (en) A kind of determining method, client and server for stealing brush data
CN110598421B (en) Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN106390458B (en) Webpage game on-hook method, server, mobile terminal and browser client
CN106161338A (en) For verifying the method and device of user identity
US11888841B2 (en) Multi-factor authentication using symbols
TWI741413B (en) Fingerprint encryption method, fingerprint encryption transmission method, decryption method and device, storage medium, terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination