CN112818319A - Verification method and device of graphic verification code, electronic equipment and storage medium - Google Patents
Verification method and device of graphic verification code, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112818319A CN112818319A CN202110099063.7A CN202110099063A CN112818319A CN 112818319 A CN112818319 A CN 112818319A CN 202110099063 A CN202110099063 A CN 202110099063A CN 112818319 A CN112818319 A CN 112818319A
- Authority
- CN
- China
- Prior art keywords
- graph
- verification code
- verification
- graphic
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the application provides a verification method, a verification device, electronic equipment and a storage medium of a graphic verification code, wherein the method comprises the following steps: responding to the verification request operation, and randomly selecting at least one target graph from a graph library; outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph; generating a second graph verification code in response to the graph drawing operation; the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result. The technical scheme provided by the embodiment of the application needs to understand the graphic verification code to be drawn and draw the graphic verification code, so that the man-machine interaction in the verification operation is enhanced, the difficulty of the machine in cracking the graphic verification code is effectively increased, and the safety risk is reduced.
Description
Technical Field
The embodiment of the application relates to the technical field of computer application, in particular to a verification method and device of a graphic verification code, electronic equipment and a storage medium.
Background
The verification code is a Public full-automatic program for distinguishing a user as a machine or a human, namely a Turing test (CAPTCHA) for fully automatically distinguishing a computer from a human, and the verification code resists machine automation attack by forcing human-computer interaction to reduce safety risk.
Because the graphic verification code can effectively prevent a machine from violently cracking the verification code, the graphic verification code is widely applied. The existing graphic verification codes mainly comprise common graphic verification codes, sliding jigsaw verification codes, point selection verification codes in the drawings and the like. The common graphic verification code is mainly characterized in that a verification code picture comprising characters is displayed, and the user can complete verification by sequentially inputting the characters in the verification code picture. Aiming at the point selection verification code in the figure, the verification code picture comprising characters or icons is mainly displayed, and the user can finish verification by sequentially clicking the characters or the icons in the verification code picture. Aiming at the sliding jigsaw verification code, a verification code picture with a missing part is mainly displayed, and a user can complete verification by sliding a jigsaw to the missing part.
However, with the development of image recognition technology, machines can crack the verification code in the existing graphical verification code by improving the accuracy of image recognition. Therefore, the existing graphical verification code is also high in risk of being cracked.
Disclosure of Invention
The embodiment of the application provides a verification method and device of a graphic verification code, electronic equipment and a storage medium, which are used for effectively increasing the difficulty of a machine for cracking the graphic verification code and reducing the security risk.
In a first aspect, an embodiment of the present application provides a verification method for a graph verification code, including:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
In a second aspect, an embodiment of the present application provides an apparatus for verifying a graphical verification code, including:
the selection module is used for responding to the verification request operation and randomly selecting at least one target graph from the graph library;
the output module is used for outputting the at least one target graph and prompt information, and the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
the drawing module is used for responding to the drawing operation of the graph and generating a second graph verification code;
and the verification module is used for verifying the second graphic verification code based on the first graphic verification code so as to determine whether the operation is manual operation based on a verification result.
In a third aspect, an embodiment of the present application provides an electronic device, including a storage component and a processing component; the storage component stores one or more computer program instructions; the one or more computer program instructions for invocation and execution by the processing component;
the processing component is to:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium storing a computer program, where the computer program is executed by a computer to perform the steps of the above method.
The method comprises the steps of responding to verification request operation, and randomly selecting at least one target graph from a graph library; outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph; generating a second graph verification code in response to the graph drawing operation; the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result. The verification method needs to understand the graphic verification code to be drawn and draw the graphic verification code, so that man-machine interaction in verification operation is enhanced, the difficulty of machine for cracking the graphic verification code is effectively increased, and the safety risk is reduced.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 illustrates a flow diagram of one embodiment of a method for verification of a graphical passcode provided herein;
FIG. 2 illustrates an exemplary bullet box;
FIG. 3 illustrates yet another exemplary bullet box;
FIG. 4 is a schematic diagram illustrating an embodiment of an apparatus for validating a graphical validation code provided herein;
FIG. 5 illustrates a schematic structural diagram of one embodiment of an electronic device provided in accordance with the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
In some of the flows described in the specification and claims of this application and in the above-described figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, the number of operations, e.g., 101, 102, etc., merely being used to distinguish between various operations, and the number itself does not represent any order of performance. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
FIG. 1 shows a flow diagram of one embodiment of a method for verification of a graphical verification code provided in accordance with the present application. Referring to fig. 1, the method for verifying the graphic verification code may include the steps of:
101. at least one target graphic is randomly selected from the graphic library in response to the authentication request operation.
The verification method of the graphic verification code provided by the embodiment of the application can be applied to various scenes needing verification, such as but not limited to application program login scenes, network payment scenes, shared bicycle unlocking scenes and the like.
The triggering manner of the verification request operation may be a special verification control being clicked or slid, or may be triggered by inputting a voice instruction "trigger verification request operation", but is not limited thereto.
The graphic library may store any shape of graphics, which includes but is not limited to: basic geometric figures such as squares, rectangles, circles, etc., or simple strokes such as characters, animals, or plants.
And when the verification request operation is received, one or more target graphs are randomly selected from the graph library in order to increase the machine cracking difficulty. In this embodiment, the shape and number of the target graphics randomly selected from the graphics library are not limited. Of course, selecting multiple identical or different target graphics may further increase the difficulty of machine cracking.
In practical applications, if the shape of the randomly selected target pattern is complex or the number of the target patterns is large, the time spent on drawing the pattern verification code may be long, which affects the verification efficiency. Therefore, in some embodiments of the present application, optionally, in order to ensure high verification efficiency, randomly selecting at least one target graphic from the graphic library may include: randomly selecting at least one candidate graph from a graph library; determining an estimated drawing time for generating a graphic verification code based on at least one candidate graphic drawing; if the estimated drawing time is longer than the preset drawing time, returning to execute the operation of randomly selecting at least one candidate graph from the graph library until the estimated drawing time is shorter than the preset drawing time; and taking at least one candidate graph with the estimated drawing time length smaller than the preset drawing time length as at least one target graph.
The preset drawing time can be set according to a large amount of test data, the preset drawing time can be understood as the maximum allowable drawing time, and when the estimated drawing time of the graphic verification code is longer than the preset drawing time, the verification efficiency is low; when the estimated drawing time of the graphic verification code is less than the preset drawing time, higher verification efficiency can be ensured.
It can be understood that the shapes or the number of the target graphics required by the combined graphic verification code are different, the drawing difficulty of the graphic verification code is different, and the required drawing time is different. Therefore, in order to estimate the estimated drawing time of the graphic verification code more objectively, estimation can be performed according to the shape and the number of the target graphics combined into the graphic verification code. For example, for each graph in the graph library, the standard drawing time of each graph can be configured based on a large amount of test data, when the estimated drawing time of the graph verification code is estimated, the total drawing time of each graph can be calculated, and the total drawing time of each graph is summed, wherein the total drawing time of each graph is equal to the product of the standard drawing time and the number of the graphs. Assuming that the candidate graphs required by the combined graph verification code are 2 graphs 1 and 1 graph 2, the standard drawing time length of the graph 1 is a, and the standard drawing time length of the graph 2 is B, the estimated drawing time length C of the graph verification code is 2 × a + B.
102. And outputting at least one target graph and prompt information, wherein the prompt information is used for prompting the drawing of the first graph verification code based on the at least one target graph.
The output mode of the at least one target graphic and the prompt message may include, but is not limited to, display output in a form of a pop-up box, and output in a voice broadcast mode.
When the output is displayed in the form of a popup frame, the following display modes can be provided:
the first method comprises the following steps: referring to fig. 2, the shape of the combined graph obtained based on the combination of at least one target graph is displayed in the pop-up box to more intuitively display the combined graph, i.e., the first graph verification code, so that the graph verification code can be accurately and manually input in the following process.
Second, referring to fig. 3, at least one target graphic and a prompt combined graphic information text are displayed in a bullet box. That is, the combined graph is not directly displayed in the bullet frame, and is prompted through the information text. In order to input the combined graphics without error, the information text may prompt the drawing order of each target graphic and the relative positional relationship of the adjacent two target graphics, such as up, down, left, right, and the like. Of course, the prompting mode needs to understand the information text to obtain the combined graph to be drawn, and the machine cracking difficulty can be further increased.
When the combined graph is played in a voice broadcasting mode, in order to input the combined graph accurately, at least one target graph, the drawing sequence of each target graph and the relative position relation of two adjacent target graphs can be broadcasted in the voice broadcasting mode. For example, "please draw a square and a triangle with the square on the top of the triangle".
103. A second graphical verification code is generated in response to the graphical rendering operation.
The method comprises the steps of providing a drawing area, responding to the graphic drawing operation of a user in the drawing area, and drawing a graphic to obtain a second graphic verification code. The user may use a mouse to perform graphic drawing in the drawing area, or if the drawing area is displayed on a handwriting screen supporting a handwriting function, the user may manually draw the second graphic verification code.
In the embodiment of the application, a user is required to understand at least one target graph and prompt information to obtain a first graph verification code to be drawn, and the user is required to execute graph drawing operation to draw a second graph verification code, so that the difficulty of cracking the verification code by a machine can be effectively increased, and the safety risk is reduced.
104. The second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result.
Wherein verifying the second graphical verification code based on the first graphical verification code may include: calculating the graph similarity of the first graph verification code and the second graph verification code; if the graph similarity is larger than a preset graph similarity threshold value, determining that the verification of the second graph verification code is successful; and if the graph similarity is not greater than the preset graph similarity threshold, determining that the verification of the second graph verification code fails.
The preset graph similarity threshold is set according to a large amount of test data, the graph similarity is larger than the preset graph similarity threshold, the drawn second graph verification code is the first graph verification code required by verification, and at the moment, the verification operation can be considered to be completed manually instead of mechanically. The graph similarity is not greater than a preset graph similarity threshold, which indicates that the drawn second graph verification code is not the first graph verification code required by verification, and at this time, the verification operation can be considered to be completed by a machine instead of a human.
In practical application, when the verification operation is performed manually, some human errors are inevitable, and the verification fails. In order to ensure the reliability of the verification, the verification operation is allowed to be performed manually for a limited number of times, and therefore, in some embodiments of the present application, the verification method of the graphic verification code may further include: if the second graphic verification code is determined to fail to be verified, judging whether the verification times are not greater than a preset time threshold value; and if the verification times are not more than the preset time threshold, prompting to trigger the graph drawing operation again until the second graph verification code is verified successfully or the verification times are equal to or more than the preset time threshold.
And verifying the second graphic verification code based on the first graphic verification code each time, wherein the verification times are increased by one. The preset number threshold may be set according to actual situations, for example, 3 times. That is, the user may have the opportunity to draw the second graphic verification code three times, and if the drawing of the second graphic verification code three times fails, the user will not be prompted to trigger the graphic drawing operation again.
In some embodiments of the present application, in order to further prevent the graphical verification code from being cracked by a machine, further distinguish whether the verification operation is completed manually or by a machine, a drawing time of the second graphical verification code is constrained, and therefore, before performing step 104, the method may further include: acquiring the actual drawing time length of the second graphic verification code, and determining the target drawing time length required for manually drawing the first graphic verification code; and if the actual drawing time length is not greater than the target drawing time length, verifying the second graphic verification code based on the first graphic verification code. Of course, if the actual drawing time is longer than the target drawing time, the verification of the second graphic verification code based on the first graphic verification code is prohibited.
The actual drawing duration can be obtained by monitoring the operation time of the graphic drawing operation. For example, a start time at which the graphics drawing operation is started and a completion time at which the graphics drawing operation is completed are recorded, and the period of time from the start time to the completion time is the actual drawing time period.
The determining the target drawing time required for manually drawing the first graphic verification code may include: and determining the target drawing time length required for manually drawing the first graphic verification code according to the shape and/or the quantity of the at least one graphic. The calculation method of the target drawing time length may refer to the calculation method of the estimated drawing time length.
According to the verification method of the graph verification code, at least one target graph is randomly selected from a graph library through responding to verification request operation; outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph; generating a second graph verification code in response to the graph drawing operation; the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result. The verification method needs to understand the graphic verification code to be drawn and draw the graphic verification code, so that man-machine interaction in verification operation is enhanced, the difficulty of machine for cracking the graphic verification code is effectively increased, and the safety risk is reduced.
Fig. 4 is a schematic structural diagram illustrating an embodiment of a verification apparatus for a graphical verification code provided in the present application. The device is an execution main body of the verification method of the graphic verification code, is composed of hardware and/or software, and can be integrated in mobile phones, tablet computers, vehicle-mounted computers and wearable equipment.
Referring to fig. 4, the verification apparatus of the graphic verification code may include:
a selection module 401, configured to randomly select at least one target graphic from a graphic library in response to a verification request operation;
an output module 402, configured to output at least one target graph and prompt information, where the prompt information is used to prompt drawing of a first graph verification code based on the at least one target graph;
a drawing module 403, configured to generate a second graph verification code in response to a graph drawing operation;
a verification module 404 for verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is a manual operation based on a verification result.
In some embodiments of the present application, the selecting module 401 randomly selects at least one target graphic from the graphic library specifically: randomly selecting at least one candidate graph from a graph library; determining an estimated drawing time for generating a graphic verification code based on at least one candidate graphic drawing; if the estimated drawing time is longer than the preset drawing time, returning to execute the operation of randomly selecting at least one candidate graph from the graph library until the estimated drawing time is shorter than the preset drawing time; and taking at least one candidate graph with the estimated drawing time length smaller than the preset drawing time length as at least one target graph.
In some embodiments of the present application, the verification module 404, prior to verifying the second graphical verification code based on the first graphical verification code, is further configured to: acquiring the actual drawing time length of the second graphic verification code, and determining the target drawing time length required for manually drawing the first graphic verification code; and if the actual drawing time length is not greater than the target drawing time length, verifying the second graphic verification code based on the first graphic verification code.
In some embodiments of the present application, the verification module 404 is further configured to: and if the actual drawing time length is longer than the target drawing time length, forbidding the verification of the second graphic verification code based on the first graphic verification code.
In some embodiments of the present application, the verification module 404 determines that the target drawing time required for manually drawing the first graphic verification code is specifically:
and determining the target drawing time length required for manually drawing the first graphic verification code according to the shape and/or the quantity of the at least one graphic.
In some embodiments of the present application, the verification module 404, based on the first graphical verification code, verifies the second graphical verification code specifically by:
calculating the graph similarity of the first graph verification code and the second graph verification code;
if the graph similarity is larger than a preset graph similarity threshold value, determining that the verification of the second graph verification code is successful;
and if the graph similarity is not greater than the preset graph similarity threshold, determining that the verification of the second graph verification code fails.
In some embodiments of the present application, the verification module 404 is further configured to:
if the second graphic verification code is determined to fail to be verified, judging whether the verification times are not greater than a preset time threshold value;
and if the verification times are not more than the preset time threshold, prompting to trigger the graph drawing operation again until the second graph verification code is verified successfully or the verification times are equal to or more than the preset time threshold.
In some embodiments of the present application, the outputting module 402 outputs the at least one target graphic and the prompt message by voice broadcasting.
The verification apparatus of the graph verification code in fig. 4 may execute the verification method of the graph verification code in the embodiment shown in fig. 1, and the implementation principle and the technical effect are not described again. The specific manner in which each module and unit performs operations in the verification apparatus for a graphic verification code in the above embodiments has been described in detail in the embodiments related to the method, and will not be described in detail herein.
In one possible design, the verification apparatus of the graphic verification code of the embodiment shown in fig. 4 may be implemented as an electronic device, as shown in fig. 5, which may include a storage component 501 and a processing component 502;
the storage component 501 stores one or more computer instructions, wherein the one or more computer instructions are for execution by the processing component call.
The processing component 502 is configured to:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result.
The processing component 502 may include one or more processors executing computer instructions to perform all or part of the steps of the method described above. Of course, the processing elements may also be implemented as one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components configured to perform the above-described methods.
The storage component 501 is configured to store various types of data to support operations at the terminal. The memory components may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The electronic device further comprises a display component 503, and the display component 503 may be an Electroluminescent (EL) element, a liquid crystal display or a micro-display with a similar structure, or a laser scanning display with a retina directly displaying or the like.
Of course, the electronic device may of course also comprise other components, such as input/output interfaces, communication components, etc.
The input/output interface provides an interface between the processing components and peripheral interface modules, which may be output devices, input devices, etc.
The communication component is configured to facilitate wired or wireless communication between the electronic device and other devices, and the like.
As used herein, an "electronic device" may be a remote web server, a computer networking device, a chipset, a desktop computer, a notebook computer, a workstation, or any other processing device or equipment.
The electronic device may be a physical device or an elastic computing host provided by a cloud computing platform, and the electronic device may be a cloud server, and the processing component, the storage component, and the like may be basic server resources rented or purchased from the cloud computing platform.
The embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a computer, the method for verifying a graphic verification code according to the embodiment shown in fig. 1 may be implemented.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Claims (11)
1. A verification method of a graphic verification code is characterized by comprising the following steps:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
2. The method of claim 1, wherein randomly selecting at least one target graphic from a graphic library comprises:
randomly selecting at least one candidate graph from the graph library;
determining an estimated drawing time for generating a graphic verification code based on the drawing of the at least one candidate graphic;
if the estimated drawing time is longer than the preset drawing time, returning to execute the operation of randomly selecting at least one candidate graph from the graph library until the estimated drawing time is shorter than the preset drawing time;
and taking at least one candidate graph with the estimated drawing time length smaller than the preset drawing time length as at least one target graph.
3. The method of claim 1, further comprising, prior to validating the second graphical validation code based on the first graphical validation code:
acquiring the actual drawing time length of the second graphic verification code, and determining the target drawing time length required for manually drawing the first graphic verification code;
and if the actual drawing time length is not greater than the target drawing time length, verifying the second graphic verification code based on the first graphic verification code.
4. The method of claim 3, further comprising:
and if the actual drawing time length is longer than the target drawing time length, forbidding the verification of the second graphic verification code based on the first graphic verification code.
5. The method of claim 3, wherein determining a target rendering duration for manually rendering the first graphical verification code comprises:
and determining the target drawing time length required for manually drawing the first graphic verification code according to the shape and/or the number of the at least one graphic.
6. The method of claim 1, wherein validating the second graphical verification code based on the first graphical verification code comprises:
calculating the graph similarity of the first graph verification code and the second graph verification code;
if the graph similarity is larger than a preset graph similarity threshold value, determining that the second graph verification code is successfully verified;
and if the graph similarity is not greater than a preset graph similarity threshold, determining that the verification of the second graph verification code fails.
7. The method of claim 6, further comprising:
if the second graphic verification code is determined to fail to be verified, judging whether the verification times are not greater than a preset time threshold value;
and if the verification times are not greater than the preset time threshold, prompting to trigger the graph drawing operation again until the second graph verification code is verified successfully or the verification times are equal to or greater than the preset time threshold.
8. The method of claim 1, wherein outputting the at least one target graphic and a prompt message comprises:
and outputting the at least one target graph and the prompt message in a voice broadcasting mode.
9. An apparatus for verifying a graphic verification code, comprising:
the selection module is used for responding to the verification request operation and randomly selecting at least one target graph from the graph library;
the output module is used for outputting the at least one target graph and prompt information, and the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
the drawing module is used for responding to the drawing operation of the graph and generating a second graph verification code;
and the verification module is used for verifying the second graphic verification code based on the first graphic verification code so as to determine whether the operation is manual operation based on a verification result.
10. An electronic device comprising a storage component and a processing component; the storage component stores one or more computer program instructions; the one or more computer program instructions for invocation and execution by the processing component;
the processing component is to:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
11. A computer-readable storage medium, in which a computer program is stored, which computer program, when being executed by a computer, is adapted to carry out the steps of the method as described above.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110099063.7A CN112818319B (en) | 2021-01-25 | 2021-01-25 | Verification method and device of graphic verification code, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110099063.7A CN112818319B (en) | 2021-01-25 | 2021-01-25 | Verification method and device of graphic verification code, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112818319A true CN112818319A (en) | 2021-05-18 |
CN112818319B CN112818319B (en) | 2023-03-21 |
Family
ID=75859175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110099063.7A Active CN112818319B (en) | 2021-01-25 | 2021-01-25 | Verification method and device of graphic verification code, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112818319B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112667989A (en) * | 2021-01-06 | 2021-04-16 | 拉扎斯网络科技(上海)有限公司 | Method and apparatus for verifying and generating verification information, storage medium, and electronic device |
CN113343207A (en) * | 2021-06-07 | 2021-09-03 | 网易(杭州)网络有限公司 | Information verification method and device, computer equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514393A (en) * | 2012-06-20 | 2014-01-15 | 上海市上海中学 | Method for achieving three-dimensional verification code |
CN103731403A (en) * | 2012-10-12 | 2014-04-16 | 阿里巴巴集团控股有限公司 | Verification code generating system and method |
US20150302217A1 (en) * | 2014-04-21 | 2015-10-22 | Ohio University | Application engagement identification using a dynamic pattern |
CN106327547A (en) * | 2015-06-23 | 2017-01-11 | 阿里巴巴集团控股有限公司 | Verification code generation and verification method and device |
CN108319844A (en) * | 2018-01-30 | 2018-07-24 | 努比亚技术有限公司 | A kind of verification code generation method, terminal and computer readable storage medium |
CN109933971A (en) * | 2019-02-27 | 2019-06-25 | 珠海格力电器股份有限公司 | A kind of verification method based on identifying code, device, electronic equipment and storage medium |
CN109933970A (en) * | 2017-12-15 | 2019-06-25 | 深圳市腾讯计算机系统有限公司 | A kind of graphic verification code detection method, device and storage medium |
CN110866239A (en) * | 2019-11-15 | 2020-03-06 | 深圳前海微众银行股份有限公司 | Verification code request processing method, device, equipment and computer storage medium |
CN111953647A (en) * | 2020-06-22 | 2020-11-17 | 北京百度网讯科技有限公司 | Security verification method and device, electronic equipment and storage medium |
-
2021
- 2021-01-25 CN CN202110099063.7A patent/CN112818319B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514393A (en) * | 2012-06-20 | 2014-01-15 | 上海市上海中学 | Method for achieving three-dimensional verification code |
CN103731403A (en) * | 2012-10-12 | 2014-04-16 | 阿里巴巴集团控股有限公司 | Verification code generating system and method |
US20160197964A1 (en) * | 2012-10-12 | 2016-07-07 | Alibaba Group Holding Limited | System and Method of Generating Verification Code |
US20150302217A1 (en) * | 2014-04-21 | 2015-10-22 | Ohio University | Application engagement identification using a dynamic pattern |
CN106327547A (en) * | 2015-06-23 | 2017-01-11 | 阿里巴巴集团控股有限公司 | Verification code generation and verification method and device |
CN109933970A (en) * | 2017-12-15 | 2019-06-25 | 深圳市腾讯计算机系统有限公司 | A kind of graphic verification code detection method, device and storage medium |
CN108319844A (en) * | 2018-01-30 | 2018-07-24 | 努比亚技术有限公司 | A kind of verification code generation method, terminal and computer readable storage medium |
CN109933971A (en) * | 2019-02-27 | 2019-06-25 | 珠海格力电器股份有限公司 | A kind of verification method based on identifying code, device, electronic equipment and storage medium |
CN110866239A (en) * | 2019-11-15 | 2020-03-06 | 深圳前海微众银行股份有限公司 | Verification code request processing method, device, equipment and computer storage medium |
CN111953647A (en) * | 2020-06-22 | 2020-11-17 | 北京百度网讯科技有限公司 | Security verification method and device, electronic equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112667989A (en) * | 2021-01-06 | 2021-04-16 | 拉扎斯网络科技(上海)有限公司 | Method and apparatus for verifying and generating verification information, storage medium, and electronic device |
CN113343207A (en) * | 2021-06-07 | 2021-09-03 | 网易(杭州)网络有限公司 | Information verification method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112818319B (en) | 2023-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108650226B (en) | A kind of login validation method, device, terminal device and storage medium | |
TWI787211B (en) | Verification method and device | |
CN112818319B (en) | Verification method and device of graphic verification code, electronic equipment and storage medium | |
US9064104B2 (en) | Graphical authentication | |
EP3242238A1 (en) | Verification method and apparatus for distinguishing man from machine | |
CN106656944B (en) | Method and device for sliding verification of handheld mobile equipment | |
US20160055329A1 (en) | Captcha techniques utilizing traceable images | |
CN103870725B (en) | Method and device for generating and verifying verification codes | |
US10448247B2 (en) | Method and apparatus for information verification | |
EP2506183A1 (en) | Systems and methods for gesture lock obfuscation | |
CN107682368B (en) | Verification method, client, server and system based on interactive operation | |
US10075430B2 (en) | Method and system for efficient password input | |
CN106355059A (en) | Password input method and terminal | |
CN106250756A (en) | Generation method, verification method and the related device of identifying code | |
CN108400980B (en) | User identity authentication method and device, computer equipment and storage medium | |
CN109933971A (en) | A kind of verification method based on identifying code, device, electronic equipment and storage medium | |
CN106250755B (en) | Method and device for generating verification code | |
CN111090849A (en) | Memory, verification code implementation method, device and equipment | |
CN111859322A (en) | Identity verification method and device and electronic equipment | |
CN113158167B (en) | Verification code implementation method, electronic equipment and computer readable storage medium | |
CN109522699B (en) | Security verification method, device, terminal, server and storage medium | |
WO2018145241A1 (en) | Method and device for electronic payment based on fingerprint information | |
CN107272920B (en) | Method and device for changing corresponding relation between keys and characters | |
CN113343189A (en) | Method and device for preventing malicious swiping of short message verification code | |
US20170083699A1 (en) | Dynamic inline assistance messaging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |