CN111695105A - Verification method and device and electronic equipment - Google Patents

Verification method and device and electronic equipment Download PDF

Info

Publication number
CN111695105A
CN111695105A CN202010481879.1A CN202010481879A CN111695105A CN 111695105 A CN111695105 A CN 111695105A CN 202010481879 A CN202010481879 A CN 202010481879A CN 111695105 A CN111695105 A CN 111695105A
Authority
CN
China
Prior art keywords
target image
image
transparency
target
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010481879.1A
Other languages
Chinese (zh)
Other versions
CN111695105B (en
Inventor
吴源燚
张佳龙
黄鹤清
谢文奇
陈洪飞
赵晨晓
石崇文
杜培东
王欣宇
宋晔
段文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010481879.1A priority Critical patent/CN111695105B/en
Publication of CN111695105A publication Critical patent/CN111695105A/en
Priority to PCT/CN2021/094774 priority patent/WO2021238753A1/en
Application granted granted Critical
Publication of CN111695105B publication Critical patent/CN111695105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the disclosure discloses a verification method, a verification device and electronic equipment. One embodiment of the method comprises: displaying a target image and a target control; according to the operation aiming at the target control, rotating the target image and changing the transparency of the target image; based on the operation, it is determined whether the verification passes. Thus, a new authentication method can be provided.

Description

Verification method and device and electronic equipment
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a verification method and apparatus, and an electronic device.
Background
The fully Automated turing test (computer Automated Public turing test to tell Computers and Humans), also known as CAPTCHA test, is a Public, fully Automated program that distinguishes between users and Computers. The verification code is set, so that malicious registration, brute force cracking or batch posting of the use program and the like can be effectively prevented.
With the continuous development of verification code technology, various forms of verification codes, such as digital verification codes, picture verification codes, slider verification codes, and the like, have appeared. It is still useful for someone to attempt to break the captcha using various methods, such as disguising that a human is operating using the machine operation running a breaking program.
Disclosure of Invention
This disclosure is provided to introduce concepts in a simplified form that are further described below in the detailed description. This disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The embodiment of the disclosure provides a verification method, a verification device and electronic equipment.
In a first aspect, an embodiment of the present disclosure provides a verification method, where the method includes: displaying a target image and a target control; according to the operation aiming at the target control, rotating the target image and changing the transparency of the target image; based on the operation, it is determined whether the verification passes.
In a second aspect, an embodiment of the present disclosure provides an authentication apparatus, including: the display unit is used for displaying the target image and the target control; the rotating unit is used for rotating the target image and changing the transparency of the target image according to the operation aiming at the target control; a verification unit for determining whether verification passes based on the operation.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to carry out the authentication method according to the first aspect.
In a fourth aspect, the disclosed embodiments provide a computer readable medium, on which a computer program is stored, which when executed by a processor, implements the steps of the authentication method according to the first aspect.
The verification method, the verification device and the electronic equipment provided by the embodiment of the disclosure can display a target image and a target control; then, the target image is rotated according to the operation of the target control by the user, the transparency of the target image is changed, and whether the user is a human user is verified based on the operation of the user, namely whether the verification is passed is determined. Thus, a new authentication method can be provided. Moreover, the change of the transparency of the target image increases the operation difficulty for a human user compared with the situation that the transparency of the target image is not changed, so that more operation details can be provided for verification, and the verification accuracy is improved.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
FIG. 1 is a flow diagram of one embodiment of a verification method according to the present disclosure;
FIGS. 2A, 2B and 2C are diagrams of exemplary application scenarios of a verification method according to the present disclosure;
FIG. 3 is a schematic illustration of an exemplary disruption approach;
FIG. 4 is a schematic block diagram of one embodiment of an authentication device according to the present disclosure;
FIG. 5 is an exemplary system architecture to which the verification method of one embodiment of the present disclosure may be applied;
fig. 6 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Referring to fig. 1, a flow diagram of one embodiment of a verification method according to the present disclosure is shown. The verification method as shown in fig. 1 includes the following steps:
and 101, displaying a target image and a target control.
In this embodiment, an execution subject (e.g., a terminal device) of the verification method may present the target image and the target control.
Here, the target image may be obtained in various ways, and is not limited herein.
As an example, the target image may be sent to the terminal by the server. How the server obtains the target image may be set according to an actual application scene, which is not limited herein. For example, the server may rotate the material image, and use the rotated material image as the target image, or adjust the rotated material image to obtain the target image.
As an example, the target image may be generated by the terminal itself, that is, the server sends a material image to the terminal, and then the terminal rotates the material image, and adjusts the rotated material image to obtain the target image.
In this embodiment, the target control is used to rotate the target image and change the transparency of the target image.
In this embodiment, the target control may be moved by a human user or a machine user.
In this embodiment, the display form of the target control may be various, and is not limited herein. As an example, the target control may be a circular ring, a bar, or the like.
In this embodiment, the operation form of the target control may be various, and is not limited herein.
By way of example, a preset area of the target control may be clicked on, the target image rotates as the click progresses, and the transparency of the mask changes.
As an example, the target control may include a sliding rail and a slider, and the slider may be dragged, and as the dragging is performed, the target image continuously rotates, and the transparency of the mask continuously changes.
It will be appreciated that in some cases a device may need to be authenticated in order to obtain the corresponding rights. In some cases, verification may also be referred to as authentication. For example, the device needs to be authenticated before logging into the website, before performing payment operations, etc.; in particular, the device may send various requests (e.g., login requests or payment requests) to the server, which may return an authentication code to the device if the request triggers an authentication mechanism. The interface that prompts the device to present the verification code may be referred to as a verification interface. By way of example, the validation code may be various, such as an alphabetic validation code, a numeric validation code, a slider validation code, and the like.
It should be noted that the device that sends the various requests to trigger the authentication mechanism may be a terminal used by a real human user, or may be an electronic device (e.g., a terminal or a server) on which an automatic operation program designed by a cracker runs. The auto-operator runtime can automatically recognize the authentication code and perform the operation and provide the executing agent with an answer that attempts to convince the server that authenticated the device that sent the various requests is being authenticated by the human user operation.
In other words, the operator may be a human user, or a machine user; wherein a machine user may execute a cracking program (or an automatic operating program) to simulate the operation of a human user.
And 102, rotating the target image and changing the transparency of the target image according to the operation aiming at the target control.
In this embodiment, the executing body may rotate the target image and change the transparency of the target image according to the operation on the target control.
In this embodiment, a specific process of rotating the target image according to the operation on the target control and a specific process of changing the transparency of the mask according to the operation on the target control may be set according to the actual application scenario.
As an example, the above operation is a dragging operation, and the rotation speed of the rotation target image may be a constant speed or a non-constant speed as the dragging operation is performed at a constant speed.
As an example, the above operation is a dragging operation, and as the dragging operation is performed at a constant speed, the changing speed of the transparency of the target image may be at a constant speed or at a non-constant speed.
In some embodiments, the method may further include: and displaying the operation prompt information. Here, the operation prompt information is used to indicate at least one of the following operations on the target control: the mode of operation and the target of operation.
As an example, the operation mode may be "drag slider".
As an example, the operation target may be "rotate the image to the forward position".
Step 103, based on the operation, it is determined whether the verification passes.
In this embodiment, the execution subject may determine whether the verification passes based on the operation on the target control.
Here, the verification is performed based on the operation, and may be performed based on various matters related to the operation, such as parameters related to the operation.
In some embodiments, the operation-related parameter may be predefined according to an actual application scenario, and is not limited herein.
In some application scenarios, if the verification passes, a prompt indicating that the verification passes may be presented; if the verification fails, indication information indicating that the verification failed may be presented.
In some application scenarios, the verification based on the operation may be performed by the terminal, may be performed by the server, or may be performed by a combination of the terminal and the server. If the client executes, the step 103 executed by the client may include: and sending the parameters related to the operation to the server, wherein the server can return a verification result to the terminal, and the terminal can determine whether the verification passes according to the received verification result. As an example, in the case where there are two kinds of operation-related parameters, one kind may be verified at the terminal and the other kind may be verified at the server; the terminal can combine the verification results of the two parameters to determine whether the verification is passed.
Referring to fig. 2A, 2B and 2C, fig. 2A, 2B and 2C illustrate an exemplary scenario of the present embodiment. In fig. 2A, 2B and 2C, a target image 201 and a target control 202 are shown. The target control 202 may include a slide rail 2021 and a slider 2022, among others. When the user operates the slider 2022 to slide on the slide rail 2021, the image 201 may rotate within a rectangular area on the interface, and visually, the building image in a circular area may rotate.
It should be noted that the actual effect of the transparency change of the target image is difficult to show due to the format limitation of the drawings of the specification. Here, in fig. 2A, 2B and 2C, the transparency of the target image is represented by the density of the shadow image; the more dense the shadow image, the more transparent (i.e., more visually opaque) the target image is.
In fig. 2A, the slider 2022 is in the initial position, and the shadow image is most dense, i.e., most opaque. In fig. 2B, as the operation proceeds, the slider 2022 is in the intermediate position, and the density of the shadow image in the target image is reduced relative to fig. 2A, that is, the transparency of the target image is reduced. I.e. the target image in fig. 2B becomes transparent with respect to the target image in fig. 2A. As the operation proceeds, the movement distance of the slider 2022 is further increased, and the shadow image disappears, indicating that the transparency of the target image is further reduced to the transparency of the target image with respect to fig. 2B.
It should be noted that the verification method provided by this embodiment may display the target image and the target control; then, the target image is rotated according to the operation of the target control by the user, the transparency of the target image is changed, and whether the user is a human user is verified based on the operation of the user, namely whether the verification is passed is determined. Thus, a new authentication method can be provided. Moreover, the change of the transparency of the target image increases the operation difficulty for a human user compared with the situation that the transparency of the target image is not changed, so that more operation details can be provided for verification, and the verification accuracy is improved.
In some embodiments, the target image comprises a graphic image and a mask of the graphic image, and changing the target image transparency of the target image is achieved by at least one of: changing a mask transparency of the mask, changing a graphic image transparency of the graphic image.
The transparency of the target image can be used to characterize the transparency of the graphic image and the mask when they are superimposed.
It should be noted that, the setting of the mask can make it more convenient to change the transparency of the target image.
In this embodiment, the graphic image and the mask may be obtained from a server together, or the graphic image may be obtained from a server and the mask may be generated locally at the terminal.
The graphic image and the mask are understood to be images in both layers. And the layer where the mask is located is above the layer where the graphic image is located.
Visually, the mask corresponds to a sheet of glass that overlies the graphic image, and the sheet of glass may be transparent, translucent, or completely opaque.
Here, the graphic image may be obtained in various ways, and is not limited herein.
As an example, the graphic image may be sent to the terminal by the server. How the server obtains the graphic image may be set according to an actual application scene, which is not limited herein. For example, the server may rotate the material image, and adjust the rotated material image to obtain the graphic image.
As an example, the graphic image may be generated by the terminal itself, that is, the server sends a material image to the terminal, and then the terminal rotates the material image, and adjusts the rotated material image to obtain the graphic image.
Here, the mask of the graphic image may be a mask layer provided to cover the graphic image. Since the graphic image in the graphic image is displayed together with the mask, the display effect of the graphic image may be a superposition effect of the graphic image and the mask.
In some application scenarios, the mask may be various, and is not limited herein.
As an example, the mask may be a line drawing, which may include a pattern in the form of lines; in the line graph, the line positions show patterns, and the non-line positions do not show patterns.
As an example, the mask may be a blank, the blank may not include a pattern, the blank does not show a pattern throughout, but the transparency of the blank may vary.
Here, the transparency of the mask can be used to characterize the transparency of the mask. In general, the transparency of a mask can be characterized by the numerical value of the transparency Channel (also called Alpha Channel) of the mask; in other words, adjusting the mask transparency can be achieved by adjusting the value of the alpha channel of the mask image. For example, a picture stored using 16 bits, it is possible that 5 bits represent red, 5 bits represent green, 5 bits represent blue, 1 bit is alpha; in the case where the 1 bit is alpha, the image is either completely transparent or completely opaque. As another example, a picture stored using 32 bits, each 8 bits representing a red, green, blue and clear channel; in this case, the transparent channel may represent 256 levels of transparency.
In some application scenarios, the server may preset a library of material images. The server can rotate the material images in the material image library to obtain the original images and the target rotation angles, and the target rotation angles can indicate the rotation angles from the material images to the original images.
Optionally, the server may perform rotation to various degrees in advance for each material image in the material image library to obtain a plurality of pairs of original images and target rotation angles. When the server triggers the verification mechanism and needs to return the verification code to the equipment, the original image and the target rotation angle can be randomly acquired.
Alternatively, the server may set a material image library in advance. When the server triggers the verification mechanism and needs to return a verification code to the equipment, the server randomly acquires a material image from the material image library, randomly rotates the material image, and then obtains an original image and a target rotation angle.
Here, the material image generally has a forward image feature that can be recognized by a human user, wherein the forward image feature allows the human user to determine whether the image is in a forward state. For example, an animal image can be selected as a material image, the head of the animal in the animal image is not inclined upwards, the animal has long legs and a long neck, and the animal is in a standing state; still images can also be selected, and the still in the still images can be scenes common in life, such as scenes containing obvious gravity (such as buildings) and background ground level.
Here, the material image is generally rotated with the image center as the rotation center. It will be appreciated that the images are all rectangular (e.g. rectangular or square). The original image obtained by rotating the material image is also rectangular. When the material image and the original image are identical in size (i.e., the pixels in the longitudinal direction are the same and the pixels in the width direction are the same), the original image obtained by rotating the material image loses some pixels from the material image.
In some application scenarios, the original image may be adjusted in a non-rotational manner to obtain the target image. It will be appreciated that the target image may have a certain tilt relative to the material image, and the tilt angle is the same as the original image.
It can be understood that the original images rotate at different angles relative to the material image, which means that lost pixel points are different, so that the dominant hue of each original image obtained by rotating the material image at different angles is different, and the channel values (including the color channel value and the transparent channel value) of each pixel in the blank part are all 0. And the same material image is rotated by different angles to obtain the picture with different hash values. If only the cut-out circle is reserved in the rectangular image, the pixel points of all circles can be in one-to-one correspondence no matter how the circle is rotated, so that the main tone of the rectangular image only with the cut-out circle is reserved to be the same; however, at different rotation angles, the rectangular image hash values that only retain a circle are different because the pixel values are located differently in the image matrix.
In some application scenarios, a display area of the original image may be selected, and the shape of the display area may be various. For example, the shape may be circular, triangular, rectangular, etc., and it is understood that the circle in fig. 2 is only illustrative and does not limit the shape of the display area.
In order to illustrate the technical effects of the embodiments in the present disclosure, the cracking modes that may be adopted by a cracker are briefly described herein, and the cracking modes may include a preparation stage and an application stage. Referring to fig. 3, fig. 3 shows a schematic diagram of a cracking manner.
A preparation stage: downloading verification codes in various ways, wherein the aim is to exhaust a material image library through enumeration; then, filtering existing images, namely the images with the same content and different rotation angles through a similar algorithm, and only keeping one image; then, labeling each image, such as a material A, a material B and a material C; then, rotating each image once every preset angle interval (for example, 3 degrees), optionally obtaining an image identifier after rotation by using a hash algorithm, and also obtaining a preset number (for example, 5) of RGB values for the image after each rotation; in this way, for each rotated image, a piece of data is obtained and recorded, and whether the image is a forward image, for example, a material b, a picture hash code, and a dominant tone RGB value (5), or not, for example, 120 pieces of data can be obtained for an image whose image label is a material b, when the image is rotated once every three degrees. For convenience of illustration, regarding the material B in fig. 3, three original images obtained by rotating the material B are shown, which are an a rotation angle, a B rotation angle, and a C rotation angle, respectively.
It should be noted that, whether the forward image is the forward image or not requires manual setting. In addition, the cracker needs to find the corresponding relationship between the operation degree and the rotation angle, for example, the relationship between the sliding distance of the target control and the rotation angle.
An application stage: downloading an original image as an image to be identified; determining an image label of an image to be identified, such as a material B, by using various modes; then, by utilizing hash value comparison, determining which data under the material B is, for example, determining the rotation angle B; then, the angular difference (e.g., 30 degrees) between the B rotation angle and the data annotated with the forward image can be determined; then, an operation degree corresponding to the angle difference may be determined, for example, the operation degree may be a distance value that needs to control the target control to slide when rotating 30 degrees; and finally, the machine user controls the target control according to the operation degree, and rotates the verification code by the angle difference, so that the cracking task can be completed.
It can be seen that in the application stage of the cracking mode, the image label needs to be located first, and then which data image is under the image label needs to be located, and the degree of operation needs to be determined. Alternatively, the two steps of determining the image label of the image to be recognized and determining which piece of data under the image label can be combined through hash value matching.
Referring to fig. 3, the cracker depends on a first point, a second point and a third point. First, the material image library can be exhausted, and the material images are transversely matched and positioned, namely the images accurately identify which content is. The second point, the image of the same content, can pass matching hash value or dominant tone, position the rotation angle; by matching the basis of the hash value or the dominant hue location rotation angle, the following can be made: taking the material B as an example, firstly, the hash values of all rotation angles of the material B are different, or the dominant hues are different; second, the hash value of the material b, a single angle (e.g., a rotation angle), is stable, or the dominant hue is stable. Third, it is also necessary to find a correspondence between the degree of operation and the angular difference (i.e., the target rotation angle).
It can be understood that the hash value is stable, and the hash values calculated for multiple times are the same for the target image of the material b at a single angle (for example, a rotation angle a) obtained by the terminal; it will be appreciated that if the hash values calculated at each time are not the same, there is no matching basis. The same principle applies to the keytone.
In some embodiments, the rotation angle of the target image is inversely related to the transparency of the target image during the operation.
The operation duration may be defined according to different operation types. As an example, for a drag operation, after the drag is started and before the drag is released, the operation may be continued. For example, for the continuous clicking operation, if the click is stopped for a preset interval without the next click, the click is taken as the last click, and the process from the beginning of the click to the beginning of the last click may be taken as the operation continuation process.
Here, the rotation angle of the target image may be inversely related to the transparency of the target image. In other words, as the rotation angle of the target image increases, the transparency of the target image may decrease. The less transparent the object image, the more transparent the object image.
It should be noted that, the transparency of the target image is negatively correlated with the rotation angle of the target image, so that the image content of the target image is gradually clear in the rotation process of the target image, thereby reducing the interference on the target image, improving the efficiency of obtaining image information by a user, and reducing the operation difficulty of a human user. In other words, as the rotation angle increases, the target image will be closer to the forward direction, and the closer the human user is to the success (i.e. rotating the target image to the forward direction), the more the human user needs the target image with higher definition as a reference.
In some embodiments, when the rotation angle of the target image is greater than a preset first angle threshold and smaller than a preset second angle threshold, the transparency of the target image is smaller than a preset transparency threshold.
Here, the preset transparency threshold may indicate a transparency of the target image that the user can see clearly the target image. The term "capable of being clearly seen" refers to value determination, and may be based on a criterion of ordinary people.
It should be noted that, the first angle threshold and the second angle threshold are equivalent to define an angle range, and when the rotation angle of the target image is in the angle range, the transparency of the target image is smaller, so that the target image is clearer, and the operation difficulty of a human user can be reduced.
In some application scenarios, the target control may indicate a "start" typeface. After the user clicks the target control indicating the "start" typeface, the execution main body may rotate the target image according to a preset rotation mode, and change the transparency of the target image according to a preset transparency change mode. And after the user clicks the target control for marking the start typeface, the typeface marked on the target control is changed into the stop typeface so as to prompt the user to click the target control for marking the stop typeface to stop the rotation of the target image.
Here, the preset rotation mode may include a constant rotation and/or a non-constant rotation.
In some embodiments, the step 102 may include: determining the operation degree according to the operation aiming at the target control; and determining the rotation angle of the target image and the transparency of the target image according to the operation degree.
Here, the operation degree may be used to characterize the operation progress of the target control by the user.
Here, if the specific parameter of the operation degree is related to the presentation form of the target control.
As an example, for a target control that includes a sled and a slider, the degree of operation may be represented by a distance between an initial slider position and a current slider position.
By way of example, for a target control that includes a click trigger, the degree of operability may be determined in terms of the number of clicks. The rotation angle may then be determined based on the number of clicks. As an example, the first 5 clicks, each click with an angular increment of 0.5 degrees; starting with the 6 th click, the angular increment for each click is 0.2 degrees.
Here, the first correspondence relationship between the degree of operation and the rotation angle may be set in advance. As an example, the first correspondence may be tabulated by a correspondence table, or may be expressed by a functional relationship.
Here, the second correspondence between the degree of operation and the transparency of the target image may be set in advance, and the second correspondence may be represented by a correspondence table or a functional relationship, for example.
Here, the execution body may determine a rotation angle of the target image according to the degree of operation and a first correspondence relationship set in advance, and further rotate the target image to the determined rotation angle.
Here, the execution subject may determine the transparency of the target image according to the second correspondence between the degree of operation and a preset value, and further adjust the transparency of the target image to the determined transparency of the target image.
In some embodiments, the transparency of the target image and the degree of manipulation are in a linear relationship or a non-linear relationship.
Here, the linear relationship may include: the changing speed of the operation degree is consistent with the changing speed of the transparency of the target image.
It should be noted that, the transparency of the target image and the degree of operation may be in a linear relationship. The transparency and the operability of the target image in the linear relation are achieved, the transparency of the target image cannot be changed beyond the expectation of the human user, and the operation difficulty of the human user is reduced.
It should be noted that, the transparency of the target image and the degree of operation may be in a nonlinear relationship. The target image transparency and the operation degree of the nonlinear relation can provide more verification bases, so that the cracking difficulty is improved.
For example, if the transparency and the operability of the target image are non-linear, a human user may be careful when operating the target image, and the operating speed may be reduced, so that the target image is used as a verification basis, and the cracking difficulty can be improved.
In some embodiments, the rotation angle and the operation degree have a linear or nonlinear relationship.
The rotation angle and the operation degree may be linearly related to each other. The rotation angle and the operation degree of the linear relation, the transparency of the target image cannot be changed beyond the expectation of the human user, and the operation difficulty of the human user is reduced.
It should be noted that the rotation angle and the operation degree are in a nonlinear relationship, and please refer to the third point that the cracker depends on, so that the cracker is difficult to crack the corresponding relationship between the operation degree and the rotation angle, and even if the target rotation angle of the to-be-rotated picture is obtained by cracking, it is impossible to determine how to simulate the operation to achieve the operation degree corresponding to the target rotation angle. Therefore, the cracking difficulty can be increased.
In some application scenarios, the target control may include a slide rail and a slider, the slider may move on the slide rail in response to the operation, and the operation degree may be a distance between a current position and an initial position of the slider, that is, a moving distance of the slider on the slide rail.
In some application scenarios, the rotation angle and the operation degree are in a nonlinear relationship, and even if a cracker obtains a target rotation angle of a to-be-rotated picture, the cracker cannot determine which position on the slide rail indicates the target rotation angle, that is, cannot determine which position on the slide rail the slide block slides to release the dragging operation.
In some application scenarios, the operation-related parameter may include a parameter related to a time when the operation is stopped, and may also include a parameter related to a duration of the operation.
In some embodiments, the step 103 may include: according to at least one of, but not limited to: and determining whether the verification is passed or not according to the related parameters at the operation stopping moment and the related parameters in the operation continuous process. In other words, whether the verification is passed or not may be determined based on the above-described operation stop timing and/or the relevant parameter during the operation duration.
In some embodiments, the parameter in the operation duration comprises an operation position corresponding to an operation time; and said at least one of the following in accordance with said operation: the relevant parameters at the operation stopping time and the relevant parameters in the operation continuous process determine whether the verification is passed, and the method comprises the following steps: and determining whether the verification is passed or not according to the relevant parameters of the operation when the target image is in the preset target image transparency.
Here, the specific value of the transparency of the preset target image may be set according to an actual application scenario, and is not limited herein.
As an example, the preset target image transparency may be near a location where the target image transparency is abrupt, and the human user may repeatedly operate the control (e.g., drag right and then drag left). These operational details can be used to verify whether it is a human user, thereby increasing the difficulty of cracking.
In some embodiments, the step 103 may include: and determining whether the verification passes according to the relevant parameters at the operation stop time of the operation.
Here, the determination of the operation stop time may specifically set a determination manner according to the operation type.
As an example, if it is a drag operation, the operation stop timing may be a timing at which the drag is released.
As an example, the relevant parameter at the operation stop time may include a rotation angle. Whether the verification passes may be determined by determining whether a difference between the rotation angle and the target rotation angle is less than a preset error.
The operation duration may be defined according to different operation types.
As an example, for a drag operation, after the drag is started and before the drag is released, the operation may be continued.
For example, for the continuous clicking operation, if the click is stopped for a preset interval without the next click, the click is taken as the last click, and the process from the beginning of the click to the beginning of the last click may be taken as the operation continuation process.
As an example, the relevant parameters in the operation duration may include an operation track, such as a dragging track.
The parameter values related to the operation may be generated by a human user operation or an automatic operation program controlling the target control. The parameters related to the operation can provide a great deal of details, for example, a dragging track of the target control, and the plurality of details can be integrated to determine whether the device for sending the operation information is operated by a human user.
In some embodiments, the parameter in the operation duration comprises operation position data corresponding to an operation time; and the step of determining whether the verification is passed or not according to the relevant parameters in the operation continuous process of the operation comprises the following steps: and determining whether the verification is passed or not according to the operation position data corresponding to the operation time. As an example, the operation speed may be determined from the operation position data corresponding to the operation time, from the operation trajectory and the operation speed; whether a human user operates can be determined according to the operation track and the operation speed.
With further reference to fig. 4, as an implementation of the methods shown in the above figures, the present disclosure provides an embodiment of an authentication apparatus, which corresponds to the embodiment of the method shown in fig. 1, and which is particularly applicable to various electronic devices.
As shown in fig. 4, the authentication apparatus of the present embodiment includes: a display unit 401, a rotation unit 402 and a verification unit 403; the display unit is used for displaying the target image and the target control; the rotating unit is used for rotating the target image and changing the transparency of the target image according to the operation aiming at the target control; a verification unit for determining whether verification passes based on the operation.
In this embodiment, specific processing of the display unit 401, the rotation unit 402 and the verification unit 403 of the verification apparatus and the technical effects thereof can refer to the related descriptions of step 101, step 102 and step 103 in the corresponding embodiment of fig. 1, which are not described herein again.
In some embodiments, the target image comprises a graphic image and a mask of the graphic image, and changing the image transparency of the target image is achieved by at least one of: changing a mask transparency of the mask, changing a graphic image transparency of the graphic image.
In some embodiments, the angle of rotation of the target image is inversely related to the target image transparency.
In some embodiments, when the rotation angle of the target image is greater than a preset first angle threshold and less than a preset second angle threshold, the transparency of the target image is less than a preset transparency threshold.
In some embodiments, the rotating the target image and changing the transparency of the target image according to the operation on the target control includes: determining the operation degree according to the operation aiming at the target control; and determining the rotation angle of the target image and the transparency of the target image according to the operation degree.
In some embodiments, the target image transparency and the operation degree are in a linear relation or a nonlinear relation.
In some embodiments, the rotation angle and the operation degree have a linear relationship or a nonlinear relationship.
In some embodiments, the target control includes a slide rail and a slider, the slider moves on the slide rail in response to the operation, and the operation degree is a moving distance of the slider on the slide rail.
In some embodiments, the determining whether verification passes based on a parameter associated with the operation comprises: according to at least one of the following operations: and determining whether the verification is passed or not according to the related parameters at the operation stopping moment and the related parameters in the operation continuous process.
In some embodiments, the parameter in the operation duration comprises an operation position corresponding to an operation time; and said at least one of the following in accordance with said operation: the relevant parameters at the operation stopping time and the relevant parameters in the operation continuous process determine whether the verification is passed, and the method comprises the following steps: and determining whether the verification is passed or not according to the relevant parameters of the operation when the target image is in the preset target image transparency.
Referring to fig. 5, fig. 5 illustrates an exemplary system architecture to which the validation method of one embodiment of the present disclosure may be applied.
As shown in fig. 5, the system architecture may include terminal devices 501, 502, 503, a network 504, and a server 505. The network 504 serves to provide a medium for communication links between the terminal devices 501, 502, 503 and the server 505. Network 504 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The terminal devices 501, 502, 503 may interact with a server 505 over a network 504 to receive or send messages or the like. The terminal devices 501, 502, 503 may have various client applications installed thereon, such as a web browser application, a search-type application, and a news-information-type application. The client application in the terminal device 501, 502, 503 may receive the instruction of the user, and complete the corresponding function according to the instruction of the user, for example, add the corresponding information in the information according to the instruction of the user.
The terminal devices 501, 502, 503 may be hardware or software. When the terminal devices 501, 502, 503 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like. When the terminal devices 501, 502, and 503 are software, they can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., software or software modules used to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 505 may be a server providing various services, for example, receiving an information acquisition request sent by the terminal device 501, 502, 503, and acquiring the presentation information corresponding to the information acquisition request in various ways according to the information acquisition request. And the relevant data of the presentation information is sent to the terminal equipment 501, 502, 503.
It should be noted that the authentication method provided by the embodiment of the present disclosure may be executed by a terminal device, and accordingly, the authentication apparatus may be disposed in the terminal device 501, 502, 503. In addition, the authentication method provided by the embodiment of the present disclosure may also be executed by the server 505, and accordingly, the authentication apparatus may be disposed in the server 505.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to fig. 6, shown is a schematic diagram of an electronic device (e.g., a terminal device or a server of fig. 5) suitable for use in implementing embodiments of the present disclosure. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 illustrates an electronic device having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText transfer protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: displaying a target image and a target control; according to the operation aiming at the target control, rotating the target image and changing the transparency of the target image; based on the operation, it is determined whether the verification passes.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a cell does not in some cases constitute a limitation on the cell itself, for example, a presentation cell may also be described as a "cell presenting a target image and a target control".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (13)

1. A method of authentication, comprising:
displaying a target image and a target control;
according to the operation aiming at the target control, rotating the target image and changing the transparency of the target image;
based on the operation, it is determined whether the verification passes.
2. The method of claim 1, wherein the target image comprises a graphic image and a mask of the graphic image, and wherein changing the image transparency of the target image is accomplished by at least one of: changing a mask transparency of the mask, changing a graphic image transparency of the graphic image.
3. The method of claim 1, wherein the rotation angle of the target image is inversely related to the target image transparency.
4. The method according to claim 1, wherein the transparency of the target image is less than a preset transparency threshold when the rotation angle of the target image is greater than a preset first angle threshold and less than a preset second angle threshold.
5. The method of claim 1, wherein the rotating the target image and changing a target image transparency of the target image according to the operation on the target control comprises:
determining an operation degree according to the operation aiming at the target control, wherein the operation degree is used for representing the operation progress of the target control;
and determining the rotation angle of the target image and the transparency of the target image according to the operation degree.
6. The method of claim 5, wherein the mask transparency and the degree of manipulation are related linearly or non-linearly.
7. The method of claim 5, wherein the rotation angle and the degree of manipulation are in a linear relationship or a non-linear relationship.
8. The method of claim 1, wherein the target control comprises a sliding track and a slider, wherein the slider moves on the sliding track in response to the operation, and wherein the degree of operation is a moving distance of the slider on the sliding track.
9. The method of claim 1, wherein the determining whether authentication is passed based on the operation comprises:
according to at least one of the following operations: and determining whether the verification is passed or not according to the related parameters at the operation stopping moment and the related parameters in the operation continuous process.
10. The method of claim 9, wherein the at least one of the following according to the operation: the relevant parameters at the operation stopping time and the relevant parameters in the operation continuous process determine whether the verification is passed, and the method comprises the following steps:
and determining whether the verification is passed or not according to the relevant parameters of the operation when the target image is in the preset target image transparency.
11. An authentication apparatus, comprising:
the display unit is used for displaying the target image and the target control;
the rotating unit is used for rotating the target image and changing the transparency of the target image according to the operation aiming at the target control;
a verification unit for determining whether verification passes based on the operation.
12. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-10.
13. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-10.
CN202010481879.1A 2020-05-29 2020-05-29 Verification method and device and electronic equipment Active CN111695105B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010481879.1A CN111695105B (en) 2020-05-29 2020-05-29 Verification method and device and electronic equipment
PCT/CN2021/094774 WO2021238753A1 (en) 2020-05-29 2021-05-20 Verification method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010481879.1A CN111695105B (en) 2020-05-29 2020-05-29 Verification method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111695105A true CN111695105A (en) 2020-09-22
CN111695105B CN111695105B (en) 2022-08-09

Family

ID=72478741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010481879.1A Active CN111695105B (en) 2020-05-29 2020-05-29 Verification method and device and electronic equipment

Country Status (2)

Country Link
CN (1) CN111695105B (en)
WO (1) WO2021238753A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021238753A1 (en) * 2020-05-29 2021-12-02 北京字节跳动网络技术有限公司 Verification method and apparatus, and electronic device
WO2023098649A1 (en) * 2021-11-30 2023-06-08 北京字节跳动网络技术有限公司 Video generation method and apparatus, and device and storage medium
WO2024027820A1 (en) * 2022-08-05 2024-02-08 北京字跳网络技术有限公司 Image-based animation generation method and apparatus, device, and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732135A (en) * 2015-02-17 2015-06-24 网易有道信息技术(北京)有限公司 Sliding verification method and device
WO2016092502A1 (en) * 2014-12-10 2016-06-16 Universita' Degli Studi Di Padova Method for recognizing if a user of an electronic terminal is a human or a robot
CN107577934A (en) * 2017-10-15 2018-01-12 杨礼帆 A kind of method and apparatus for realizing man-machine checking
CN108121906A (en) * 2016-11-28 2018-06-05 阿里巴巴集团控股有限公司 A kind of verification method, device and computing device
CN109271762A (en) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 User authen method and device based on sliding block identifying code
CN110246207A (en) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 Graphical verification code generation method based on multi-layer image
CN110308847A (en) * 2019-05-31 2019-10-08 北京百度网讯科技有限公司 Picture verification method, device, electronic equipment and computer readable storage medium
CN111079119A (en) * 2019-12-04 2020-04-28 北京达佳互联信息技术有限公司 Verification method, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10164975B1 (en) * 2016-03-30 2018-12-25 Snap Inc. Authentication via camera
CN111695105B (en) * 2020-05-29 2022-08-09 北京字节跳动网络技术有限公司 Verification method and device and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016092502A1 (en) * 2014-12-10 2016-06-16 Universita' Degli Studi Di Padova Method for recognizing if a user of an electronic terminal is a human or a robot
CN104732135A (en) * 2015-02-17 2015-06-24 网易有道信息技术(北京)有限公司 Sliding verification method and device
CN108121906A (en) * 2016-11-28 2018-06-05 阿里巴巴集团控股有限公司 A kind of verification method, device and computing device
CN107577934A (en) * 2017-10-15 2018-01-12 杨礼帆 A kind of method and apparatus for realizing man-machine checking
CN109271762A (en) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 User authen method and device based on sliding block identifying code
CN110308847A (en) * 2019-05-31 2019-10-08 北京百度网讯科技有限公司 Picture verification method, device, electronic equipment and computer readable storage medium
CN110246207A (en) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 Graphical verification code generation method based on multi-layer image
CN111079119A (en) * 2019-12-04 2020-04-28 北京达佳互联信息技术有限公司 Verification method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李欢等: "基于随机顺序的图形验证码改进算法设计", 《计算机应用》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021238753A1 (en) * 2020-05-29 2021-12-02 北京字节跳动网络技术有限公司 Verification method and apparatus, and electronic device
WO2023098649A1 (en) * 2021-11-30 2023-06-08 北京字节跳动网络技术有限公司 Video generation method and apparatus, and device and storage medium
WO2024027820A1 (en) * 2022-08-05 2024-02-08 北京字跳网络技术有限公司 Image-based animation generation method and apparatus, device, and storage medium

Also Published As

Publication number Publication date
WO2021238753A1 (en) 2021-12-02
CN111695105B (en) 2022-08-09

Similar Documents

Publication Publication Date Title
CN111695105B (en) Verification method and device and electronic equipment
US11082490B2 (en) Method and apparatus for execution of applications in a cloud system
CN111695107B (en) Verification method and device and electronic equipment
CN114868106A (en) Projecting, controlling and managing user equipment applications using connection resources
US8650624B2 (en) Obscuring visual login
US20100269152A1 (en) Method and system for rendering composite view of an application
US20120159592A1 (en) Multi-layered color-sensitive passwords
CN111427528B (en) Display method and device and electronic equipment
CN105323218A (en) Identity verifying method and device
US8856958B1 (en) Personalized content access prompt
US20150178059A1 (en) Application launching
US11956239B2 (en) Identity misconfiguration detection for role-based access control
US11588822B2 (en) Right control method and apparatus for terminal device
JP2019522277A (en) Terminal device password unlocking method, apparatus, and terminal device
EP3811251A1 (en) Account management using account activity usage restrictions
KR20220137067A (en) Video special effect processing method and apparatus
WO2021201922A1 (en) Context based data leak prevention of sensitive information
CN114363686B (en) Method, device, equipment and medium for publishing multimedia content
US8934044B2 (en) Systems and methods for live view photo layer in digital imaging applications
CN111695106B (en) Verification method and device and electronic equipment
CA2760826C (en) Multi-layered color-sensitive passwords
US10101831B1 (en) Techniques for sharing data between devices with varying display characteristics
CN108874141B (en) Somatosensory browsing method and device
CN114489457B (en) Virtual object control method and device, readable medium and electronic equipment
US20180349568A1 (en) Augmented reality system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant