CN112948801A - Method, device and equipment for inputting verification code and computer storage medium - Google Patents

Method, device and equipment for inputting verification code and computer storage medium Download PDF

Info

Publication number
CN112948801A
CN112948801A CN202110244590.2A CN202110244590A CN112948801A CN 112948801 A CN112948801 A CN 112948801A CN 202110244590 A CN202110244590 A CN 202110244590A CN 112948801 A CN112948801 A CN 112948801A
Authority
CN
China
Prior art keywords
input
information
verification code
verification
identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110244590.2A
Other languages
Chinese (zh)
Inventor
费腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chenxing Software Technology Co ltd
Original Assignee
Shanghai Chenxing Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chenxing Software Technology Co ltd filed Critical Shanghai Chenxing Software Technology Co ltd
Priority to CN202110244590.2A priority Critical patent/CN112948801A/en
Publication of CN112948801A publication Critical patent/CN112948801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/40Document-oriented image-based pattern recognition
    • G06V30/41Analysis of document content
    • G06V30/413Classification of content, e.g. text, photographs or tables

Abstract

The embodiment of the application provides a method, a device, equipment and a computer storage medium for inputting verification codes, wherein the method comprises the following steps: and receiving an input instruction of clicking the verification code input area by a user, identifying verification information of the verification code area through a preset identification model according to the input instruction to obtain a verification code to be input, displaying the verification code to be input in a candidate area of an input method, and selecting the verification code to be input by the user to input the verification code input area to finish the input of the verification code. In the whole verification code inputting process, a user does not need to spell for inputting, the condition that input errors or verification codes to be input are difficult to find in the candidate area of the input method is avoided, the time for inputting the verification codes is shortened, the inputting speed of the verification codes is improved, and the winning rate of the robbery is further improved.

Description

Method, device and equipment for inputting verification code and computer storage medium
Technical Field
The present application belongs to the technical field of input methods, and in particular, to a method, an apparatus, a device, and a computer storage medium for inputting a verification code.
Background
At present, various large vendors adopt an on-line shopping mode for commodities with small or limited quantities. On-line robbery, i.e., entering and submitting a validation code by performing some fixed operation, the quicker and easier the submission. The two main factors influencing the submission time are the network quality and the input speed of the verification code, and in the case of a good network, the input speed of the spell verification code is the input speed. When a user inputs the verification code by using the existing input method, the user is easy to input mistakes under the condition of tension, and even if the input is correct, the intended word is not necessarily in the front position or even in the candidate position, so that the input speed of the verification code is influenced, and the winning rate of the robbery is reduced.
Disclosure of Invention
The embodiment of the application provides a method, a device and equipment for inputting a verification code and a computer storage medium, which can quickly and efficiently input the verification code and improve the endorsement rate of a robbery.
In a first aspect, an embodiment of the present application provides a method for inputting a verification code, where the method includes:
receiving an input instruction of clicking a verification code input area by a user;
identifying verification information of a verification code area through a preset identification model according to an input instruction to obtain a verification code to be input;
displaying a verification code to be input in a candidate area of the input method;
receiving an operation instruction of selecting a verification code to be input in a candidate area of an input method by a user;
and responding to the operation instruction, and inputting the verification code to be input in the verification code input area.
In one possible implementation, the verification information includes numerical formula information; the verification code to be input comprises calculation result information; according to the input instruction, identifying the verification information of the verification code area through a preset identification model to obtain the verification code to be input, and the method comprises the following steps:
and identifying the digital formula information through a preset identification model according to the input instruction to obtain calculation result information.
In one possible implementation, the verification information includes first text information; the verification code to be input comprises second text information; according to the input instruction, identifying the verification information of the verification code area through a preset identification model to obtain the verification code to be input, and the method comprises the following steps:
and identifying the first character information through a preset character identification model according to the input instruction to obtain second character information.
In one possible implementation, the method further includes:
the method comprises the steps that an operation instruction of a user for selecting a verification code to be input in a candidate area of an input method is not received within a preset time period, and when input information of the user is received, the information to be input corresponding to the input information is matched from a preset word library;
displaying information to be input in a candidate area of an input method;
receiving an operation instruction of selecting information to be input in a candidate area of an input method by a user;
and responding to the operation instruction, and inputting information to be input in the verification code input area.
In a possible implementation manner, before identifying the verification information of the verification code region through a preset identification model according to the input instruction to obtain the verification code to be input, the method further includes:
acquiring a training set sample, wherein the training set sample comprises a first input picture containing digital formula information, a first output picture containing calculation result information corresponding to the digital formula information, a second input picture containing first character information and a second output picture containing second character information corresponding to the first character information;
and training an initial classification model according to the first input picture, the first output picture, the second input picture and the second output picture to obtain an identification model.
In a second aspect, an embodiment of the present application provides an apparatus for verifying code input, where the apparatus includes:
the receiving module is used for receiving an input instruction of clicking the verification code input area by a user;
the identification module is used for identifying the verification information of the verification code area through a preset identification model according to the input instruction to obtain a verification code to be input;
the display module is used for displaying the verification code to be input in the candidate area of the input method;
the receiving module is also used for receiving an operation instruction of selecting a verification code to be input in a candidate area of the input method by a user;
and the input module is used for responding to the operation instruction and inputting the verification code to be input in the verification code input area.
In one possible implementation, the verification information includes numerical formula information; the verification code to be input comprises calculation result information; the identification module is specifically configured to:
and identifying the digital formula information through a preset identification model according to the input instruction to obtain calculation result information.
In one possible implementation, the verification information includes first text information; the verification code to be input comprises second text information; the identification module is specifically configured to:
and identifying the first character information through a preset character identification model according to the input instruction to obtain second character information.
In a third aspect, an embodiment of the present application provides a verification code input device, including: a processor, and a memory storing computer program instructions; the processor reads and executes the computer program instructions to implement the method of authentication code entry of the first aspect or any one of the possible implementations of the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, where computer program instructions are stored on the computer storage medium, and when the computer program instructions are executed by a processor, the method for inputting a verification code in the first aspect or any one of the possible implementation manners of the first aspect is implemented.
The verification code input method, device, equipment and computer storage medium provided by the embodiment of the application comprise the following steps: and identifying the verification information of the verification code area through a preset identification model to obtain the verification code to be input, displaying the verification code to be input in the candidate area of the input method, and inputting the verification code to be input into the verification code input area by a user to finish the input of the verification code. In the whole verification code inputting process, a user does not need to spell for inputting, the condition that input errors or verification codes to be input are difficult to find in the candidate area of the input method is avoided, the time for inputting the verification codes is shortened, the inputting speed of the verification codes is improved, and the winning rate of the robbery is further improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a verification code input method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an authentication code input device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an authentication code input device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
With the rapid development of internet technology, online shopping has become an important part of people's daily life. For some goods with explosion or limited quantity, such as famous shoes, electronic products, drinks, tea, etc., all large sellers generally adopt an online shopping method, as long as a user submits information to add a drawing lot, when the drawing lot starts, the user has a chance of winning a lot, and the faster the submission, the easier the winning is. The two main factors influencing the submission time are the network quality and the input speed of the verification code, and a general user can select a network with better quality in order to improve the mid-subscription rate, so that the influence of the network on the mid-subscription rate can be reduced. However, the input speed of the verification code varies from person to person, some people may input the verification code by mistake due to tension, even if some people input the verification code, based on the history that the user frequently inputs the characters in the input method, the characters in the verification code are not at the front position or even in the candidate area, and the user needs to spend longer time for searching the characters corresponding to the verification code, so that the submission time is longer, and the countersigning rate of the robbery is reduced.
In order to solve the prior art problems, embodiments of the present application provide a method, an apparatus, a device, and a computer storage medium for identifying code input. In the embodiment of the application, the verification code to be input is obtained by identifying the verification information of the verification code area through the preset identification model and is displayed in the candidate area of the input method, and the user selects the verification code to be input to input the verification code input area so as to complete the input of the verification code. In the whole verification code inputting process, a user does not need to spell and input, the condition that spelling errors or verification codes to be input are difficult to find in the candidate area of the input method is avoided, the time for inputting the verification codes is shortened, the input speed of the verification codes is improved, and the countersigning rate of the robbery is further improved.
The method for inputting the verification code provided by the embodiment of the present application is first described below.
Fig. 1 is a flowchart illustrating a verification code input method according to an embodiment of the present application. As shown in fig. 1, the method may include the steps of:
s110, receiving an input instruction of clicking the verification code input area by a user.
When the user participates in the lottery drawing activity and submits information, the user terminal displays an interface for inputting the verification code, the verification information is positioned right above the verification code input area, the verification code input area is clicked, and at the moment, the cursor stays in the verification code input area. And the user terminal receives an input instruction of clicking the verification code input area by the user and starts the input method software.
And S120, identifying the verification information of the verification code area through a preset identification model according to the input instruction to obtain the verification code to be input.
When the user terminal receives an input instruction, screenshot is carried out on a preset area above a cursor to obtain a picture to be recognized, the picture to be recognized comprises verification information of a verification code area, and the picture to be recognized is input into a preset recognition model to obtain a verification code to be input. The preset area can be set according to actual requirements, and only the fact that complete verification information can be displayed in the preset area is guaranteed.
S130, displaying the verification code to be input in the candidate area of the input method.
The user terminal displays the verification code to be input in the candidate area of the input method, the verification code to be input is complete verification information and is not partial verification information, for example, the verification information is 'Maotai prefecture', at the moment, the verification code to be input is 'Maotai prefecture' and is not partial verification information such as 'Maotai', 'Payment', and the like, so that the user can input the complete verification information at one time.
And S140, receiving an operation instruction of selecting the verification code to be input in the candidate area of the input method by the user.
And clicking the position of the user terminal interface where the verification code to be input is located by the user according to the verification code to be input displayed in the candidate area of the input method so as to finish the input of the verification code to be input. And the user terminal receives an operation instruction of selecting the verification code to be input in the candidate area of the input method by the user.
S150, responding to the operation instruction, and inputting the verification code to be input in the verification code input area.
And the user terminal responds to the operation instruction and inputs the verification code to be input in the verification code input area, so that the information submission is completed.
In the embodiment of the application, the verification code to be input is obtained by identifying the verification information of the verification code area through the preset identification model and is displayed in the candidate area of the input method, and the user selects the verification code to be input to input the verification code input area so as to complete the input of the verification code. In the whole verification code inputting process, a user does not need to spell for inputting, the condition that input errors or verification codes to be input are difficult to find in the candidate area of the input method is avoided, the time for inputting the verification codes is shortened, the inputting speed of the verification codes is improved, and the winning rate of the robbery is further improved.
In some embodiments, the verification information includes numerical formula information; the verification code to be input comprises calculation result information; according to the input instruction, identifying the verification information of the verification code area through a preset identification model to obtain the verification code to be input, and the method comprises the following steps:
and identifying the digital formula information through a preset identification model according to the input instruction to obtain calculation result information.
The verification information comprises digital arithmetic information, the digital arithmetic information comprises numbers and operation symbols, the verification code to be input comprises calculation result information, and the calculation result information is the numbers obtained by calculating the numbers and the operation symbols in the digital arithmetic information according to a certain algorithm. For example, the verification information includes 2 × 3+4-3, when the user terminal receives an input instruction, the verification information in the verification code region is subjected to screenshot to obtain a to-be-recognized picture, the to-be-recognized picture is input into a preset recognition model to obtain a to-be-input verification code of 7, and at this time, the candidate region of the input method shows 7. The user directly inputs the verification code 7 into the verification code input area, so that the calculation time of calculating the digital formula is reduced, and the verification code is input quickly and efficiently.
In some embodiments, the verification information includes first textual information; the verification code to be input comprises second text information; according to the input instruction, identifying the verification information of the verification code area through a preset identification model to obtain the verification code to be input, and the method comprises the following steps:
and identifying the first character information through a preset character identification model according to the input instruction to obtain second character information.
The verification information comprises first character information, and the first character information is any four-character idioms. The verification code to be input comprises second character information, and the second character information is a same four-character idiom as the first character information or a different four-character idiom from the first character information.
And when the user terminal receives an input instruction, screenshot is carried out on the verification information of the verification code area to obtain a picture to be recognized, and the picture to be recognized is input into a preset recognition model to obtain recognition result information. And when the identification result information is correct, namely the second character information is the same four-character idiom as the first character information, displaying the second character information in the candidate area of the input method. The user can input the verification code at one time without spelling, thereby avoiding the situation that spelling is wrong or a spelling result is not easy to search in a candidate area of the input method, reducing the time of spelling search and further improving the speed of inputting the verification code.
And when the identification result information is wrong, namely the second character information is a four-character idiom different from the first character information, manually spelling the first character information by the user and inputting the first character information into the verification code input area.
In some embodiments, the method further comprises: the method comprises the steps that an operation instruction of a user for selecting a verification code to be input in a candidate area of an input method is not received within a preset time period, when input information of the user is received, the information to be input corresponding to the input information is matched from a preset word library, the information to be input is displayed in the candidate area of the input method, the operation instruction of the user for selecting the information to be input in the candidate area of the input method is received, the operation instruction is responded, and the information to be input is input in the verification code input area.
And if the user terminal does not receive an operation instruction of selecting the verification code to be input by the user in the candidate area of the input method within the preset time and receives the input information of the user, the second character information is a four-character idiom different from the first character information, the user does not select the verification code to be input displayed in the candidate area of the input method, and the first character information is input by manual spelling. The preset time is the time for the user to judge whether the verification code to be input is input, and the faster the verification code input speed is, the better the preset time is, the shorter the preset time is.
The input information can be the simple spelling of the first character information, and can also be the simple spelling of the first two characters in the first character information. The user terminal matches information to be input corresponding to the input information from a preset word library, displays the information to be input in a candidate area of the input method, selects the information to be input, receives an operation instruction of selecting the information to be input in the candidate area of the input method by the user terminal, and inputs the information to be input in a verification code input area. For example, if the verification information is "May you like you get good for money", the user only needs to input "gxfc" or "gx", and "May you like you get good for money" will be displayed in the candidate area of the input method.
In some embodiments, before identifying the verification information of the verification code region through a preset identification model according to the input instruction to obtain the verification code to be input, the method further includes:
acquiring a training set sample, wherein the training set sample comprises a first input picture containing digital formula information, a first output picture containing calculation result information corresponding to the digital formula information, a second input picture containing first character information and a second output picture containing second character information corresponding to the first character information;
and training an initial classification model according to the first input picture, the first output picture, the second input picture and the second output picture to obtain an identification model.
And for each four-character idiom, finding a font picture corresponding to each character in the four-character idioms, and splicing into a second input picture containing the four-character idioms through random rotation.
When the first input picture is used as the input of the initial classification model, the first output picture is used as the output of the initial classification model; and when the second input picture is used as the input of the initial classification model, the second output picture is used as the output of the initial classification model. And obtaining a training set sample according to the corresponding relation between the first input picture and the first output picture and the corresponding relation between the second input picture and the second output picture. And training the initial classification model by using the training set sample to obtain the recognition model.
Fig. 2 is a schematic structural diagram of an authentication code input device according to an embodiment of the present disclosure. As shown in fig. 2, the verification code input device 200 may include a receiving module 210, an identifying module 220, a presenting module 230, and an inputting module 240.
The receiving module 210 is configured to receive an input instruction of a user clicking the verification code input area.
The identification module 220 is configured to identify the verification information of the verification code region through a preset identification model according to the input instruction, so as to obtain the verification code to be input.
The display module 230 is configured to display the verification code to be input in the candidate area of the input method.
The receiving module 210 is further configured to receive an operation instruction of selecting the verification code to be input in the candidate area of the input method by the user.
And the input module 240 is used for responding to the operation instruction and inputting the verification code to be input in the verification code input area.
In the embodiment of the application, the user does not need spelling input, the condition that input errors or verification codes to be input are difficult to find in the candidate area of the input method is avoided, the time for inputting the verification codes is shortened, the input speed of the verification codes is improved, and the countersigning rate of the robbery is further improved.
In some embodiments, the verification information includes numerical formula information; the verification code to be input comprises calculation result information; the identification module 220 is specifically configured to:
and identifying the digital formula information through a preset identification model according to the input instruction to obtain calculation result information.
In some embodiments, the verification information includes first textual information; the verification code to be input comprises second text information; the identification module 220 is specifically configured to:
and identifying the first character information through a preset character identification model according to the input instruction to obtain second character information.
In some embodiments, the verification code input device 200 further comprises: the matching module 250 is configured to not receive an operation instruction of selecting a verification code to be input by a user in a candidate area of the input method within a preset time period, and when receiving input information of the user, match information to be input corresponding to the input information from a preset word library.
The display module 230 is further configured to display information to be input in the candidate area of the input method.
The receiving module 210 is further configured to receive an operation instruction for a user to select information to be input in the candidate area of the input method.
The input module 240 is further configured to input information to be input in the verification code input area in response to the operation instruction.
In some embodiments, before identifying the verification information of the verification code region through a preset identification model according to the input instruction to obtain the verification code to be input, the verification code input apparatus further includes:
an obtaining device 260, configured to obtain a training set sample, where the training set sample includes a first input picture containing digital formula information, a first output picture containing calculation result information corresponding to the digital formula information, a second input picture containing first text information, and a second output picture containing second text information corresponding to the first text information;
and a training device 270, configured to train the initial classification model to obtain an identification model according to the first input picture, the first output picture, the second input picture, and the second output picture.
Each module in the apparatus shown in fig. 2 has a function of implementing each step in fig. 1, and can achieve the corresponding technical effect, and for brevity, is not described again here.
Fig. 3 shows a hardware structure diagram of an authentication code input device provided in an embodiment of the present application.
The authentication code input device may include a processor 301 and a memory 302 having stored computer program instructions.
Specifically, the processor 301 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement the embodiments of the present Application.
Memory 302 may include mass storage for data or instructions. By way of example, and not limitation, memory 302 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. In one example, memory 302 can include removable or non-removable (or fixed) media, or memory 302 is non-volatile solid-state memory. The memory 302 may be internal or external to the integrated gateway disaster recovery device.
In one example, memory 302 may include Read Only Memory (ROM), Random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory 302 includes one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform operations described with reference to a method according to an aspect of the present application.
The processor 301 reads and executes the computer program instructions stored in the memory 302 to implement steps S110 to S150 in the embodiment shown in fig. 1, and achieves the corresponding technical effect achieved by executing the steps in the example shown in fig. 1, which is not described herein again for brevity.
In one example, the passcode input device may also include a communication interface 303 and a bus 310. As shown in fig. 3, the processor 301, the memory 302, and the communication interface 303 are connected via a bus 310 to complete communication therebetween.
The communication interface 303 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiment of the present application.
Bus 310 includes hardware, software, or both to couple the components of the authentication code input device to each other. By way of example, and not limitation, a Bus may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (Front Side Bus, FSB), a Hyper Transport (HT) interconnect, an Industry Standard Architecture (ISA) Bus, an infiniband interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a Micro Channel Architecture (MCA) Bus, a Peripheral Component Interconnect (PCI) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a video electronics standards association local (VLB) Bus, or other suitable Bus or a combination of two or more of these. Bus 310 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The verification code input device can execute the verification code input method in the embodiment of the application according to the user instruction information received by the user terminal, thereby realizing the verification code input method described in conjunction with fig. 1.
In addition, in combination with the verification code input method in the foregoing embodiments, the embodiments of the present application may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the authentication code input methods in the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic Circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (10)

1. A method of validating code input, comprising:
receiving an input instruction of clicking a verification code input area by a user;
identifying verification information of a verification code area through a preset identification model according to the input instruction to obtain a verification code to be input;
displaying the verification code to be input in a candidate area of the input method;
receiving an operation instruction of selecting the verification code to be input in the candidate area of the input method by a user;
and responding to the operation instruction, and inputting the verification code to be input in the verification code input area.
2. The method of claim 1, wherein the authentication information comprises numerical information; the verification code to be input comprises calculation result information; the identifying information of the identifying code area is identified through a preset identification model according to the input instruction to obtain the identifying code to be input, and the identifying information comprises the following steps:
and identifying digital formula information through a preset identification model according to the input instruction to obtain calculation result information.
3. The method of claim 1, wherein the authentication information comprises first textual information; the verification code to be input comprises second text information; the identifying information of the identifying code area is identified through a preset identification model according to the input instruction to obtain the identifying code to be input, and the identifying information comprises the following steps:
and identifying the first text information through a preset text identification model according to the input instruction to obtain the second text information.
4. The method of claim 1, further comprising:
the operation instruction that the user selects the verification code to be input in the candidate area of the input method is not received within a preset time period, and when the input information of the user is received, the information to be input corresponding to the input information is matched from a preset word library;
displaying the information to be input in a candidate area of an input method;
receiving an operation instruction of selecting the information to be input in a candidate area of the input method by a user;
and responding to the operation instruction, and inputting the information to be input in the verification code input area.
5. The method according to any one of claims 1-3, wherein before the identifying information for identifying the verification code region through a preset identification model according to the input instruction obtains the verification code to be input, the method further comprises:
acquiring a training set sample, wherein the training set sample comprises a first input picture containing digital formula information, a first output picture containing calculation result information corresponding to the digital formula information, a second input picture containing first character information and a second output picture containing second character information corresponding to the first character information;
and training an initial classification model according to the first input picture, the first output picture, the second input picture and the second output picture to obtain the identification model.
6. An apparatus for validating code input, the apparatus comprising:
the receiving module is used for receiving an input instruction of clicking the verification code input area by a user;
the identification module is used for identifying the verification information of the verification code area through a preset identification model according to the input instruction to obtain a verification code to be input;
the display module is used for displaying the verification code to be input in the candidate area of the input method;
the receiving module is further used for receiving an operation instruction of selecting the verification code to be input in the candidate area of the input method by the user;
and the input module is used for responding to the operation instruction and inputting the verification code to be input in the verification code input area.
7. The apparatus of claim 6, wherein the authentication information comprises numerical formula information; the verification code to be input comprises calculation result information; the identification module is specifically configured to:
and identifying digital formula information through a preset identification model according to the input instruction to obtain calculation result information.
8. The method of claim 6, wherein said authentication information comprises first text information; the verification code to be input comprises second text information; the identification module is specifically configured to:
and identifying the first text information through a preset text identification model according to the input instruction to obtain the second text information.
9. A passcode input device, the passcode input device comprising: a processor, and a memory storing computer program instructions; the processor reads and executes the computer program instructions to implement the method of captcha entry of any of claims 1-5.
10. A computer storage medium having computer program instructions stored thereon which, when executed by a processor, implement a method of captcha entry as claimed in any one of claims 1 to 5.
CN202110244590.2A 2021-03-05 2021-03-05 Method, device and equipment for inputting verification code and computer storage medium Pending CN112948801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110244590.2A CN112948801A (en) 2021-03-05 2021-03-05 Method, device and equipment for inputting verification code and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110244590.2A CN112948801A (en) 2021-03-05 2021-03-05 Method, device and equipment for inputting verification code and computer storage medium

Publications (1)

Publication Number Publication Date
CN112948801A true CN112948801A (en) 2021-06-11

Family

ID=76247847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110244590.2A Pending CN112948801A (en) 2021-03-05 2021-03-05 Method, device and equipment for inputting verification code and computer storage medium

Country Status (1)

Country Link
CN (1) CN112948801A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086591A (en) * 2018-06-11 2018-12-25 平安科技(深圳)有限公司 Method for recognizing verification code, device, computer equipment and storage medium
CN111931155A (en) * 2020-08-11 2020-11-13 深圳传音控股股份有限公司 Verification code input method, verification code input equipment and storage medium
CN111966432A (en) * 2020-06-30 2020-11-20 北京百度网讯科技有限公司 Verification code processing method and device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086591A (en) * 2018-06-11 2018-12-25 平安科技(深圳)有限公司 Method for recognizing verification code, device, computer equipment and storage medium
CN111966432A (en) * 2020-06-30 2020-11-20 北京百度网讯科技有限公司 Verification code processing method and device, electronic equipment and storage medium
CN111931155A (en) * 2020-08-11 2020-11-13 深圳传音控股股份有限公司 Verification code input method, verification code input equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108280542B (en) User portrait model optimization method, medium and equipment
US20140351109A1 (en) Method and apparatus for automatically identifying a fraudulent order
CN109360089B (en) Loan risk prediction method and device
CN107491536B (en) Test question checking method, test question checking device and electronic equipment
CN108509458B (en) Business object identification method and device
US11875336B2 (en) Method and apparatus for migrating payment card, electronic device, server and medium
KR101476229B1 (en) Method And Apparatus for Inputing Mathematical Formula
US20230342772A1 (en) Leakage detection system
CN110784435B (en) Abnormal service identification method and device, electronic equipment and storage medium
CN112580299A (en) Intelligent bid evaluation method, bid evaluation device and computer storage medium
CN108984777B (en) Customer service method, apparatus and computer-readable storage medium
CN114549136A (en) Method, device and equipment for evaluating credit of supply chain user and computer storage medium
CN112948801A (en) Method, device and equipment for inputting verification code and computer storage medium
CN115392787A (en) Enterprise risk assessment method, device, equipment, storage medium and program product
CN112822666B (en) Communication method, communication device, electronic equipment and storage medium
CN112699780A (en) Object identification method, device, equipment and storage medium
CN114417830A (en) Risk evaluation method, device, equipment and computer readable storage medium
CN112416141A (en) Processing method, device, equipment and medium for input character string
CN114092219A (en) Model verification method and device, electronic equipment and storage medium
CN116721505A (en) POS transaction testing method and device, equipment, medium and product thereof
CN114218381B (en) Method, device, equipment and medium for identifying position
CN117235663A (en) Method, device, equipment and medium for determining standing information of news content
WO2024055480A1 (en) Information processing method and apparatus, device, and storage medium
CN115222422A (en) Training method of credit evaluation model, and credit evaluation method, device and equipment
CN117876113A (en) Transaction system processing method, device, equipment, medium and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210611

WD01 Invention patent application deemed withdrawn after publication