CN112818319A - Verification method and device of graphic verification code, electronic equipment and storage medium - Google Patents

Verification method and device of graphic verification code, electronic equipment and storage medium Download PDF

Info

Publication number
CN112818319A
CN112818319A CN202110099063.7A CN202110099063A CN112818319A CN 112818319 A CN112818319 A CN 112818319A CN 202110099063 A CN202110099063 A CN 202110099063A CN 112818319 A CN112818319 A CN 112818319A
Authority
CN
China
Prior art keywords
graph
verification code
verification
graphic
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110099063.7A
Other languages
Chinese (zh)
Other versions
CN112818319B (en
Inventor
李宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin May 8th Home Freight Service Co ltd
Original Assignee
Tianjin May 8th Home Freight Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin May 8th Home Freight Service Co ltd filed Critical Tianjin May 8th Home Freight Service Co ltd
Priority to CN202110099063.7A priority Critical patent/CN112818319B/en
Publication of CN112818319A publication Critical patent/CN112818319A/en
Application granted granted Critical
Publication of CN112818319B publication Critical patent/CN112818319B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application provides a verification method, a verification device, electronic equipment and a storage medium of a graphic verification code, wherein the method comprises the following steps: responding to the verification request operation, and randomly selecting at least one target graph from a graph library; outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph; generating a second graph verification code in response to the graph drawing operation; the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result. The technical scheme provided by the embodiment of the application needs to understand the graphic verification code to be drawn and draw the graphic verification code, so that the man-machine interaction in the verification operation is enhanced, the difficulty of the machine in cracking the graphic verification code is effectively increased, and the safety risk is reduced.

Description

Verification method and device of graphic verification code, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of computer application, in particular to a verification method and device of a graphic verification code, electronic equipment and a storage medium.
Background
The verification code is a Public full-automatic program for distinguishing a user as a machine or a human, namely a Turing test (CAPTCHA) for fully automatically distinguishing a computer from a human, and the verification code resists machine automation attack by forcing human-computer interaction to reduce safety risk.
Because the graphic verification code can effectively prevent a machine from violently cracking the verification code, the graphic verification code is widely applied. The existing graphic verification codes mainly comprise common graphic verification codes, sliding jigsaw verification codes, point selection verification codes in the drawings and the like. The common graphic verification code is mainly characterized in that a verification code picture comprising characters is displayed, and the user can complete verification by sequentially inputting the characters in the verification code picture. Aiming at the point selection verification code in the figure, the verification code picture comprising characters or icons is mainly displayed, and the user can finish verification by sequentially clicking the characters or the icons in the verification code picture. Aiming at the sliding jigsaw verification code, a verification code picture with a missing part is mainly displayed, and a user can complete verification by sliding a jigsaw to the missing part.
However, with the development of image recognition technology, machines can crack the verification code in the existing graphical verification code by improving the accuracy of image recognition. Therefore, the existing graphical verification code is also high in risk of being cracked.
Disclosure of Invention
The embodiment of the application provides a verification method and device of a graphic verification code, electronic equipment and a storage medium, which are used for effectively increasing the difficulty of a machine for cracking the graphic verification code and reducing the security risk.
In a first aspect, an embodiment of the present application provides a verification method for a graph verification code, including:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
In a second aspect, an embodiment of the present application provides an apparatus for verifying a graphical verification code, including:
the selection module is used for responding to the verification request operation and randomly selecting at least one target graph from the graph library;
the output module is used for outputting the at least one target graph and prompt information, and the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
the drawing module is used for responding to the drawing operation of the graph and generating a second graph verification code;
and the verification module is used for verifying the second graphic verification code based on the first graphic verification code so as to determine whether the operation is manual operation based on a verification result.
In a third aspect, an embodiment of the present application provides an electronic device, including a storage component and a processing component; the storage component stores one or more computer program instructions; the one or more computer program instructions for invocation and execution by the processing component;
the processing component is to:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium storing a computer program, where the computer program is executed by a computer to perform the steps of the above method.
The method comprises the steps of responding to verification request operation, and randomly selecting at least one target graph from a graph library; outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph; generating a second graph verification code in response to the graph drawing operation; the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result. The verification method needs to understand the graphic verification code to be drawn and draw the graphic verification code, so that man-machine interaction in verification operation is enhanced, the difficulty of machine for cracking the graphic verification code is effectively increased, and the safety risk is reduced.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 illustrates a flow diagram of one embodiment of a method for verification of a graphical passcode provided herein;
FIG. 2 illustrates an exemplary bullet box;
FIG. 3 illustrates yet another exemplary bullet box;
FIG. 4 is a schematic diagram illustrating an embodiment of an apparatus for validating a graphical validation code provided herein;
FIG. 5 illustrates a schematic structural diagram of one embodiment of an electronic device provided in accordance with the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
In some of the flows described in the specification and claims of this application and in the above-described figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, the number of operations, e.g., 101, 102, etc., merely being used to distinguish between various operations, and the number itself does not represent any order of performance. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
FIG. 1 shows a flow diagram of one embodiment of a method for verification of a graphical verification code provided in accordance with the present application. Referring to fig. 1, the method for verifying the graphic verification code may include the steps of:
101. at least one target graphic is randomly selected from the graphic library in response to the authentication request operation.
The verification method of the graphic verification code provided by the embodiment of the application can be applied to various scenes needing verification, such as but not limited to application program login scenes, network payment scenes, shared bicycle unlocking scenes and the like.
The triggering manner of the verification request operation may be a special verification control being clicked or slid, or may be triggered by inputting a voice instruction "trigger verification request operation", but is not limited thereto.
The graphic library may store any shape of graphics, which includes but is not limited to: basic geometric figures such as squares, rectangles, circles, etc., or simple strokes such as characters, animals, or plants.
And when the verification request operation is received, one or more target graphs are randomly selected from the graph library in order to increase the machine cracking difficulty. In this embodiment, the shape and number of the target graphics randomly selected from the graphics library are not limited. Of course, selecting multiple identical or different target graphics may further increase the difficulty of machine cracking.
In practical applications, if the shape of the randomly selected target pattern is complex or the number of the target patterns is large, the time spent on drawing the pattern verification code may be long, which affects the verification efficiency. Therefore, in some embodiments of the present application, optionally, in order to ensure high verification efficiency, randomly selecting at least one target graphic from the graphic library may include: randomly selecting at least one candidate graph from a graph library; determining an estimated drawing time for generating a graphic verification code based on at least one candidate graphic drawing; if the estimated drawing time is longer than the preset drawing time, returning to execute the operation of randomly selecting at least one candidate graph from the graph library until the estimated drawing time is shorter than the preset drawing time; and taking at least one candidate graph with the estimated drawing time length smaller than the preset drawing time length as at least one target graph.
The preset drawing time can be set according to a large amount of test data, the preset drawing time can be understood as the maximum allowable drawing time, and when the estimated drawing time of the graphic verification code is longer than the preset drawing time, the verification efficiency is low; when the estimated drawing time of the graphic verification code is less than the preset drawing time, higher verification efficiency can be ensured.
It can be understood that the shapes or the number of the target graphics required by the combined graphic verification code are different, the drawing difficulty of the graphic verification code is different, and the required drawing time is different. Therefore, in order to estimate the estimated drawing time of the graphic verification code more objectively, estimation can be performed according to the shape and the number of the target graphics combined into the graphic verification code. For example, for each graph in the graph library, the standard drawing time of each graph can be configured based on a large amount of test data, when the estimated drawing time of the graph verification code is estimated, the total drawing time of each graph can be calculated, and the total drawing time of each graph is summed, wherein the total drawing time of each graph is equal to the product of the standard drawing time and the number of the graphs. Assuming that the candidate graphs required by the combined graph verification code are 2 graphs 1 and 1 graph 2, the standard drawing time length of the graph 1 is a, and the standard drawing time length of the graph 2 is B, the estimated drawing time length C of the graph verification code is 2 × a + B.
102. And outputting at least one target graph and prompt information, wherein the prompt information is used for prompting the drawing of the first graph verification code based on the at least one target graph.
The output mode of the at least one target graphic and the prompt message may include, but is not limited to, display output in a form of a pop-up box, and output in a voice broadcast mode.
When the output is displayed in the form of a popup frame, the following display modes can be provided:
the first method comprises the following steps: referring to fig. 2, the shape of the combined graph obtained based on the combination of at least one target graph is displayed in the pop-up box to more intuitively display the combined graph, i.e., the first graph verification code, so that the graph verification code can be accurately and manually input in the following process.
Second, referring to fig. 3, at least one target graphic and a prompt combined graphic information text are displayed in a bullet box. That is, the combined graph is not directly displayed in the bullet frame, and is prompted through the information text. In order to input the combined graphics without error, the information text may prompt the drawing order of each target graphic and the relative positional relationship of the adjacent two target graphics, such as up, down, left, right, and the like. Of course, the prompting mode needs to understand the information text to obtain the combined graph to be drawn, and the machine cracking difficulty can be further increased.
When the combined graph is played in a voice broadcasting mode, in order to input the combined graph accurately, at least one target graph, the drawing sequence of each target graph and the relative position relation of two adjacent target graphs can be broadcasted in the voice broadcasting mode. For example, "please draw a square and a triangle with the square on the top of the triangle".
103. A second graphical verification code is generated in response to the graphical rendering operation.
The method comprises the steps of providing a drawing area, responding to the graphic drawing operation of a user in the drawing area, and drawing a graphic to obtain a second graphic verification code. The user may use a mouse to perform graphic drawing in the drawing area, or if the drawing area is displayed on a handwriting screen supporting a handwriting function, the user may manually draw the second graphic verification code.
In the embodiment of the application, a user is required to understand at least one target graph and prompt information to obtain a first graph verification code to be drawn, and the user is required to execute graph drawing operation to draw a second graph verification code, so that the difficulty of cracking the verification code by a machine can be effectively increased, and the safety risk is reduced.
104. The second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result.
Wherein verifying the second graphical verification code based on the first graphical verification code may include: calculating the graph similarity of the first graph verification code and the second graph verification code; if the graph similarity is larger than a preset graph similarity threshold value, determining that the verification of the second graph verification code is successful; and if the graph similarity is not greater than the preset graph similarity threshold, determining that the verification of the second graph verification code fails.
The preset graph similarity threshold is set according to a large amount of test data, the graph similarity is larger than the preset graph similarity threshold, the drawn second graph verification code is the first graph verification code required by verification, and at the moment, the verification operation can be considered to be completed manually instead of mechanically. The graph similarity is not greater than a preset graph similarity threshold, which indicates that the drawn second graph verification code is not the first graph verification code required by verification, and at this time, the verification operation can be considered to be completed by a machine instead of a human.
In practical application, when the verification operation is performed manually, some human errors are inevitable, and the verification fails. In order to ensure the reliability of the verification, the verification operation is allowed to be performed manually for a limited number of times, and therefore, in some embodiments of the present application, the verification method of the graphic verification code may further include: if the second graphic verification code is determined to fail to be verified, judging whether the verification times are not greater than a preset time threshold value; and if the verification times are not more than the preset time threshold, prompting to trigger the graph drawing operation again until the second graph verification code is verified successfully or the verification times are equal to or more than the preset time threshold.
And verifying the second graphic verification code based on the first graphic verification code each time, wherein the verification times are increased by one. The preset number threshold may be set according to actual situations, for example, 3 times. That is, the user may have the opportunity to draw the second graphic verification code three times, and if the drawing of the second graphic verification code three times fails, the user will not be prompted to trigger the graphic drawing operation again.
In some embodiments of the present application, in order to further prevent the graphical verification code from being cracked by a machine, further distinguish whether the verification operation is completed manually or by a machine, a drawing time of the second graphical verification code is constrained, and therefore, before performing step 104, the method may further include: acquiring the actual drawing time length of the second graphic verification code, and determining the target drawing time length required for manually drawing the first graphic verification code; and if the actual drawing time length is not greater than the target drawing time length, verifying the second graphic verification code based on the first graphic verification code. Of course, if the actual drawing time is longer than the target drawing time, the verification of the second graphic verification code based on the first graphic verification code is prohibited.
The actual drawing duration can be obtained by monitoring the operation time of the graphic drawing operation. For example, a start time at which the graphics drawing operation is started and a completion time at which the graphics drawing operation is completed are recorded, and the period of time from the start time to the completion time is the actual drawing time period.
The determining the target drawing time required for manually drawing the first graphic verification code may include: and determining the target drawing time length required for manually drawing the first graphic verification code according to the shape and/or the quantity of the at least one graphic. The calculation method of the target drawing time length may refer to the calculation method of the estimated drawing time length.
According to the verification method of the graph verification code, at least one target graph is randomly selected from a graph library through responding to verification request operation; outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph; generating a second graph verification code in response to the graph drawing operation; the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result. The verification method needs to understand the graphic verification code to be drawn and draw the graphic verification code, so that man-machine interaction in verification operation is enhanced, the difficulty of machine for cracking the graphic verification code is effectively increased, and the safety risk is reduced.
Fig. 4 is a schematic structural diagram illustrating an embodiment of a verification apparatus for a graphical verification code provided in the present application. The device is an execution main body of the verification method of the graphic verification code, is composed of hardware and/or software, and can be integrated in mobile phones, tablet computers, vehicle-mounted computers and wearable equipment.
Referring to fig. 4, the verification apparatus of the graphic verification code may include:
a selection module 401, configured to randomly select at least one target graphic from a graphic library in response to a verification request operation;
an output module 402, configured to output at least one target graph and prompt information, where the prompt information is used to prompt drawing of a first graph verification code based on the at least one target graph;
a drawing module 403, configured to generate a second graph verification code in response to a graph drawing operation;
a verification module 404 for verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is a manual operation based on a verification result.
In some embodiments of the present application, the selecting module 401 randomly selects at least one target graphic from the graphic library specifically: randomly selecting at least one candidate graph from a graph library; determining an estimated drawing time for generating a graphic verification code based on at least one candidate graphic drawing; if the estimated drawing time is longer than the preset drawing time, returning to execute the operation of randomly selecting at least one candidate graph from the graph library until the estimated drawing time is shorter than the preset drawing time; and taking at least one candidate graph with the estimated drawing time length smaller than the preset drawing time length as at least one target graph.
In some embodiments of the present application, the verification module 404, prior to verifying the second graphical verification code based on the first graphical verification code, is further configured to: acquiring the actual drawing time length of the second graphic verification code, and determining the target drawing time length required for manually drawing the first graphic verification code; and if the actual drawing time length is not greater than the target drawing time length, verifying the second graphic verification code based on the first graphic verification code.
In some embodiments of the present application, the verification module 404 is further configured to: and if the actual drawing time length is longer than the target drawing time length, forbidding the verification of the second graphic verification code based on the first graphic verification code.
In some embodiments of the present application, the verification module 404 determines that the target drawing time required for manually drawing the first graphic verification code is specifically:
and determining the target drawing time length required for manually drawing the first graphic verification code according to the shape and/or the quantity of the at least one graphic.
In some embodiments of the present application, the verification module 404, based on the first graphical verification code, verifies the second graphical verification code specifically by:
calculating the graph similarity of the first graph verification code and the second graph verification code;
if the graph similarity is larger than a preset graph similarity threshold value, determining that the verification of the second graph verification code is successful;
and if the graph similarity is not greater than the preset graph similarity threshold, determining that the verification of the second graph verification code fails.
In some embodiments of the present application, the verification module 404 is further configured to:
if the second graphic verification code is determined to fail to be verified, judging whether the verification times are not greater than a preset time threshold value;
and if the verification times are not more than the preset time threshold, prompting to trigger the graph drawing operation again until the second graph verification code is verified successfully or the verification times are equal to or more than the preset time threshold.
In some embodiments of the present application, the outputting module 402 outputs the at least one target graphic and the prompt message by voice broadcasting.
The verification apparatus of the graph verification code in fig. 4 may execute the verification method of the graph verification code in the embodiment shown in fig. 1, and the implementation principle and the technical effect are not described again. The specific manner in which each module and unit performs operations in the verification apparatus for a graphic verification code in the above embodiments has been described in detail in the embodiments related to the method, and will not be described in detail herein.
In one possible design, the verification apparatus of the graphic verification code of the embodiment shown in fig. 4 may be implemented as an electronic device, as shown in fig. 5, which may include a storage component 501 and a processing component 502;
the storage component 501 stores one or more computer instructions, wherein the one or more computer instructions are for execution by the processing component call.
The processing component 502 is configured to:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
the second graphical verification code is verified based on the first graphical verification code to determine whether the operation is a manual operation based on the verification result.
The processing component 502 may include one or more processors executing computer instructions to perform all or part of the steps of the method described above. Of course, the processing elements may also be implemented as one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components configured to perform the above-described methods.
The storage component 501 is configured to store various types of data to support operations at the terminal. The memory components may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The electronic device further comprises a display component 503, and the display component 503 may be an Electroluminescent (EL) element, a liquid crystal display or a micro-display with a similar structure, or a laser scanning display with a retina directly displaying or the like.
Of course, the electronic device may of course also comprise other components, such as input/output interfaces, communication components, etc.
The input/output interface provides an interface between the processing components and peripheral interface modules, which may be output devices, input devices, etc.
The communication component is configured to facilitate wired or wireless communication between the electronic device and other devices, and the like.
As used herein, an "electronic device" may be a remote web server, a computer networking device, a chipset, a desktop computer, a notebook computer, a workstation, or any other processing device or equipment.
The electronic device may be a physical device or an elastic computing host provided by a cloud computing platform, and the electronic device may be a cloud server, and the processing component, the storage component, and the like may be basic server resources rented or purchased from the cloud computing platform.
The embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a computer, the method for verifying a graphic verification code according to the embodiment shown in fig. 1 may be implemented.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (11)

1. A verification method of a graphic verification code is characterized by comprising the following steps:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
2. The method of claim 1, wherein randomly selecting at least one target graphic from a graphic library comprises:
randomly selecting at least one candidate graph from the graph library;
determining an estimated drawing time for generating a graphic verification code based on the drawing of the at least one candidate graphic;
if the estimated drawing time is longer than the preset drawing time, returning to execute the operation of randomly selecting at least one candidate graph from the graph library until the estimated drawing time is shorter than the preset drawing time;
and taking at least one candidate graph with the estimated drawing time length smaller than the preset drawing time length as at least one target graph.
3. The method of claim 1, further comprising, prior to validating the second graphical validation code based on the first graphical validation code:
acquiring the actual drawing time length of the second graphic verification code, and determining the target drawing time length required for manually drawing the first graphic verification code;
and if the actual drawing time length is not greater than the target drawing time length, verifying the second graphic verification code based on the first graphic verification code.
4. The method of claim 3, further comprising:
and if the actual drawing time length is longer than the target drawing time length, forbidding the verification of the second graphic verification code based on the first graphic verification code.
5. The method of claim 3, wherein determining a target rendering duration for manually rendering the first graphical verification code comprises:
and determining the target drawing time length required for manually drawing the first graphic verification code according to the shape and/or the number of the at least one graphic.
6. The method of claim 1, wherein validating the second graphical verification code based on the first graphical verification code comprises:
calculating the graph similarity of the first graph verification code and the second graph verification code;
if the graph similarity is larger than a preset graph similarity threshold value, determining that the second graph verification code is successfully verified;
and if the graph similarity is not greater than a preset graph similarity threshold, determining that the verification of the second graph verification code fails.
7. The method of claim 6, further comprising:
if the second graphic verification code is determined to fail to be verified, judging whether the verification times are not greater than a preset time threshold value;
and if the verification times are not greater than the preset time threshold, prompting to trigger the graph drawing operation again until the second graph verification code is verified successfully or the verification times are equal to or greater than the preset time threshold.
8. The method of claim 1, wherein outputting the at least one target graphic and a prompt message comprises:
and outputting the at least one target graph and the prompt message in a voice broadcasting mode.
9. An apparatus for verifying a graphic verification code, comprising:
the selection module is used for responding to the verification request operation and randomly selecting at least one target graph from the graph library;
the output module is used for outputting the at least one target graph and prompt information, and the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
the drawing module is used for responding to the drawing operation of the graph and generating a second graph verification code;
and the verification module is used for verifying the second graphic verification code based on the first graphic verification code so as to determine whether the operation is manual operation based on a verification result.
10. An electronic device comprising a storage component and a processing component; the storage component stores one or more computer program instructions; the one or more computer program instructions for invocation and execution by the processing component;
the processing component is to:
responding to the verification request operation, and randomly selecting at least one target graph from a graph library;
outputting the at least one target graph and prompt information, wherein the prompt information is used for prompting that a first graph verification code is drawn based on the at least one target graph;
generating a second graph verification code in response to the graph drawing operation;
and verifying the second graphical verification code based on the first graphical verification code to determine whether the operation is manual operation based on a verification result.
11. A computer-readable storage medium, in which a computer program is stored, which computer program, when being executed by a computer, is adapted to carry out the steps of the method as described above.
CN202110099063.7A 2021-01-25 2021-01-25 Verification method and device of graphic verification code, electronic equipment and storage medium Active CN112818319B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110099063.7A CN112818319B (en) 2021-01-25 2021-01-25 Verification method and device of graphic verification code, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110099063.7A CN112818319B (en) 2021-01-25 2021-01-25 Verification method and device of graphic verification code, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112818319A true CN112818319A (en) 2021-05-18
CN112818319B CN112818319B (en) 2023-03-21

Family

ID=75859175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110099063.7A Active CN112818319B (en) 2021-01-25 2021-01-25 Verification method and device of graphic verification code, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112818319B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667989A (en) * 2021-01-06 2021-04-16 拉扎斯网络科技(上海)有限公司 Method and apparatus for verifying and generating verification information, storage medium, and electronic device
CN113343207A (en) * 2021-06-07 2021-09-03 网易(杭州)网络有限公司 Information verification method and device, computer equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514393A (en) * 2012-06-20 2014-01-15 上海市上海中学 Method for achieving three-dimensional verification code
CN103731403A (en) * 2012-10-12 2014-04-16 阿里巴巴集团控股有限公司 Verification code generating system and method
US20150302217A1 (en) * 2014-04-21 2015-10-22 Ohio University Application engagement identification using a dynamic pattern
CN106327547A (en) * 2015-06-23 2017-01-11 阿里巴巴集团控股有限公司 Verification code generation and verification method and device
CN108319844A (en) * 2018-01-30 2018-07-24 努比亚技术有限公司 A kind of verification code generation method, terminal and computer readable storage medium
CN109933971A (en) * 2019-02-27 2019-06-25 珠海格力电器股份有限公司 A kind of verification method based on identifying code, device, electronic equipment and storage medium
CN109933970A (en) * 2017-12-15 2019-06-25 深圳市腾讯计算机系统有限公司 A kind of graphic verification code detection method, device and storage medium
CN110866239A (en) * 2019-11-15 2020-03-06 深圳前海微众银行股份有限公司 Verification code request processing method, device, equipment and computer storage medium
CN111953647A (en) * 2020-06-22 2020-11-17 北京百度网讯科技有限公司 Security verification method and device, electronic equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514393A (en) * 2012-06-20 2014-01-15 上海市上海中学 Method for achieving three-dimensional verification code
CN103731403A (en) * 2012-10-12 2014-04-16 阿里巴巴集团控股有限公司 Verification code generating system and method
US20160197964A1 (en) * 2012-10-12 2016-07-07 Alibaba Group Holding Limited System and Method of Generating Verification Code
US20150302217A1 (en) * 2014-04-21 2015-10-22 Ohio University Application engagement identification using a dynamic pattern
CN106327547A (en) * 2015-06-23 2017-01-11 阿里巴巴集团控股有限公司 Verification code generation and verification method and device
CN109933970A (en) * 2017-12-15 2019-06-25 深圳市腾讯计算机系统有限公司 A kind of graphic verification code detection method, device and storage medium
CN108319844A (en) * 2018-01-30 2018-07-24 努比亚技术有限公司 A kind of verification code generation method, terminal and computer readable storage medium
CN109933971A (en) * 2019-02-27 2019-06-25 珠海格力电器股份有限公司 A kind of verification method based on identifying code, device, electronic equipment and storage medium
CN110866239A (en) * 2019-11-15 2020-03-06 深圳前海微众银行股份有限公司 Verification code request processing method, device, equipment and computer storage medium
CN111953647A (en) * 2020-06-22 2020-11-17 北京百度网讯科技有限公司 Security verification method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667989A (en) * 2021-01-06 2021-04-16 拉扎斯网络科技(上海)有限公司 Method and apparatus for verifying and generating verification information, storage medium, and electronic device
CN113343207A (en) * 2021-06-07 2021-09-03 网易(杭州)网络有限公司 Information verification method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112818319B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
CN108650226B (en) A kind of login validation method, device, terminal device and storage medium
TWI787211B (en) Verification method and device
CN112818319B (en) Verification method and device of graphic verification code, electronic equipment and storage medium
US9064104B2 (en) Graphical authentication
EP3242238A1 (en) Verification method and apparatus for distinguishing man from machine
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
US20160055329A1 (en) Captcha techniques utilizing traceable images
CN103870725B (en) Method and device for generating and verifying verification codes
US10448247B2 (en) Method and apparatus for information verification
EP2506183A1 (en) Systems and methods for gesture lock obfuscation
CN107682368B (en) Verification method, client, server and system based on interactive operation
US10075430B2 (en) Method and system for efficient password input
CN106355059A (en) Password input method and terminal
CN106250756A (en) Generation method, verification method and the related device of identifying code
CN108400980B (en) User identity authentication method and device, computer equipment and storage medium
CN109933971A (en) A kind of verification method based on identifying code, device, electronic equipment and storage medium
CN106250755B (en) Method and device for generating verification code
CN111090849A (en) Memory, verification code implementation method, device and equipment
CN111859322A (en) Identity verification method and device and electronic equipment
CN113158167B (en) Verification code implementation method, electronic equipment and computer readable storage medium
CN109522699B (en) Security verification method, device, terminal, server and storage medium
WO2018145241A1 (en) Method and device for electronic payment based on fingerprint information
CN107272920B (en) Method and device for changing corresponding relation between keys and characters
CN113343189A (en) Method and device for preventing malicious swiping of short message verification code
US20170083699A1 (en) Dynamic inline assistance messaging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant