CN113836513A - Man-machine verification method and device, storage medium and electronic equipment - Google Patents

Man-machine verification method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113836513A
CN113836513A CN202110963734.XA CN202110963734A CN113836513A CN 113836513 A CN113836513 A CN 113836513A CN 202110963734 A CN202110963734 A CN 202110963734A CN 113836513 A CN113836513 A CN 113836513A
Authority
CN
China
Prior art keywords
image
verification image
verification
sliding
sliding groove
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110963734.XA
Other languages
Chinese (zh)
Inventor
李子兴
黄健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Kugou Computer Technology Co Ltd
Original Assignee
Guangzhou Kugou Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Kugou Computer Technology Co Ltd filed Critical Guangzhou Kugou Computer Technology Co Ltd
Priority to CN202110963734.XA priority Critical patent/CN113836513A/en
Publication of CN113836513A publication Critical patent/CN113836513A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a man-machine verification method and device, a storage medium and electronic equipment. Wherein, the method comprises the following steps: displaying a verification image, an auxiliary verification image and a sliding groove on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image are identical in shape but different in size, and the central point of the auxiliary verification image is superposed with the central point of the verification image; under the condition that the dragging operation on the sliding block is detected, gradually enlarging or reducing the verification image by taking the central point of the verification image as a reference point according to the sliding distance of the sliding block in the sliding groove; and under the condition that the dragging operation of the sliding block is detected to be finished, acquiring the final sliding distance of the sliding block in the sliding groove, comparing the final sliding distance with a preset distance threshold value, and determining whether the verification passes according to the comparison result. The invention solves the technical problem of poor accuracy of man-machine verification.

Description

Man-machine verification method and device, storage medium and electronic equipment
Technical Field
The invention relates to the field of computers, in particular to a man-machine verification method and device, a storage medium and electronic equipment.
Background
In the prior art, the human-computer verification is usually completed by splicing a pattern and a gap of a background pattern by sliding a slider by a user. However, the existing verification method can be easily cracked by identifying the pixels of the graph and the background graph, so that the man-machine verification accuracy is poor.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a man-machine verification method and device, a storage medium and electronic equipment, and aims to at least solve the technical problem of poor man-machine verification accuracy.
According to an aspect of an embodiment of the present invention, there is provided a human-machine authentication method, including: displaying a verification image, an auxiliary verification image and a sliding groove on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image have the same shape but different sizes, and the central point of the auxiliary verification image is superposed with the central point of the verification image; gradually enlarging or reducing the verification image based on a sliding distance of the slider in the sliding groove with the center point of the verification image as a reference point when the dragging operation of the slider is detected; and under the condition that the dragging operation of the slide block is detected to be finished, acquiring the final sliding distance of the slide block in the sliding groove, comparing the final sliding distance with a preset distance threshold value, and determining whether the verification passes according to the comparison result.
According to another aspect of the embodiments of the present invention, there is also provided a human-machine authentication device, including: the first display unit is used for displaying a verification image, an auxiliary verification image and a sliding groove on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image are the same in shape but different in size, and the center point of the auxiliary verification image is superposed with the center point of the verification image; an adjusting unit configured to gradually enlarge or reduce the verification image based on a sliding distance of the slider in the sliding groove with the center point of the verification image as a reference point when a drag operation on the slider is detected; and the verification unit is used for acquiring the final sliding distance of the slide block in the sliding groove under the condition of detecting that the dragging operation of the slide block is finished, comparing the final sliding distance with a preset distance threshold value, and determining whether the verification passes according to the comparison result.
As an optional example, the apparatus further includes: and a third display unit, configured to display a background image on a lower layer of the verification image, the auxiliary verification image, the sliding groove, and the obfuscated verification image on the display interface when the verification image, the auxiliary verification image, and the sliding groove are displayed on the display interface of the client, where the background image includes an obfuscated color or an obfuscated line.
As an optional example, the adjusting unit includes: a first adjusting module, configured to, when the drag operation that presses the slider and slides the slider from one side of the sliding groove to the other side is obtained, enlarge the verification image with the center point of the verification image as a reference point, where a ratio between an enlargement speed of the verification image and a sliding speed of the slider in the sliding groove is not changed; or a second adjusting module, configured to reduce the verification image with the center point of the verification image as a reference point when the drag operation is acquired, in which the slider is pressed and slid from one side of the sliding groove to the other side of the sliding groove, wherein a ratio between a reduction rate of the verification image and a sliding rate of the slider in the sliding groove is not changed.
As an alternative example, the second display unit is configured to display an obfuscated verification image on the display interface when the verification image, the auxiliary verification image, and the sliding groove are displayed on the display interface of the client, where the obfuscated verification image and the auxiliary verification image have the same shape but different directions, and a center point of the obfuscated verification image and a center point of the auxiliary verification image are overlapped.
As an alternative example, the verification unit includes: the acquisition module is used for acquiring the distance between the current position and the initial position of the slide block under the condition that the dragging operation is loosened; and the determining module is used for determining that the verification is passed under the condition that the absolute value of the difference value between the distance and the distance threshold is smaller than a first threshold.
As an optional example, the apparatus further includes: a selection unit configured to randomly select one image from a plurality of candidate images in a database as the verification image before displaying the verification image, the auxiliary verification image, and the sliding slot on a display interface of the client; and a determining unit, configured to enlarge or reduce the verification image by N times to obtain the auxiliary verification image, where N is a real number.
As an alternative example, the verification unit includes: a first determining module, configured to determine that the verification passes this time when the final sliding distance reaches a target distance threshold, where the target distance threshold is a sliding distance of the slider in the sliding groove when the verification image is enlarged or reduced to the size of the auxiliary verification image, and the preset distance threshold includes the target distance threshold; and the second determining module is used for determining that the verification is not passed under the condition that the final sliding distance does not reach the target distance threshold.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the above-mentioned human-machine authentication method when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the human-machine authentication method through the computer program.
In the embodiment of the invention, a verification image, an auxiliary verification image and a sliding groove are displayed on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image have the same shape but different sizes, and the central point of the auxiliary verification image is superposed with the central point of the verification image; gradually enlarging or reducing the verification image based on a sliding distance of the slider in the sliding groove with the center point of the verification image as a reference point when the dragging operation of the slider is detected; the method comprises the steps of obtaining the final sliding distance of the sliding block in the sliding groove under the condition that the dragging operation of the sliding block is detected to be completed, comparing the final sliding distance with a preset distance threshold value, and determining whether the verification passes according to the comparison result.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of an application environment of an alternative human machine authentication method according to an embodiment of the invention;
FIG. 2 is a schematic diagram of an application environment of an alternative human-machine authentication method according to an embodiment of the invention;
FIG. 3 is a schematic diagram of a flow of an alternative human-machine authentication method according to an embodiment of the invention;
FIG. 4 is a schematic diagram of an authentication image and an auxiliary authentication image of an alternative human-machine authentication method according to an embodiment of the invention;
FIG. 5 is a schematic illustration of an obfuscated authentication image of an alternative human-machine authentication method in accordance with embodiments of the invention;
FIG. 6 is a background image diagram of an alternative human-machine authentication method according to an embodiment of the invention;
fig. 7 is a schematic structural diagram of an alternative human-machine authentication device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiments of the present invention, there is provided a human-machine authentication method, which may be, but is not limited to, applied to the environment shown in fig. 1 as an optional implementation manner.
As shown in fig. 1, the terminal device 102 includes a memory 104 for storing various data generated during the operation of the terminal device 102, a processor 106 for processing and computing the various data, and a display 108 for displaying the verification image, the auxiliary verification image and the sliding slot. Terminal device 102 may interact with server 112 via network 110. Server 112 includes a database 114 for storing various data items and a processing engine 116 for processing the various data items. In this embodiment, the terminal device may upload the final sliding distance of the slider in the sliding groove to the server 112, and the server 112 performs the verification, or the terminal device 102 may complete the verification.
As another example, the above-described human-machine authentication method may be applied to an environment as shown in FIG. 2. As shown in fig. 2, the terminal device 202 includes a memory 204 for storing various data generated during the operation of the terminal device 202, a processor 206 for processing and operating the various data, and a display 208 for displaying the authentication image, the auxiliary authentication image, and the sliding slot. The difference from fig. 1 is that the terminal device 202 completes the man-machine authentication and may not interact with the server.
Optionally, in this embodiment, the terminal device may be a terminal device configured with a target client, and may include, but is not limited to, at least one of the following: mobile phones (such as Android phones, iOS phones, etc.), notebook computers, tablet computers, palm computers, MID (Mobile Internet Devices), PAD, desktop computers, smart televisions, etc. The target client may be a video client, an instant messaging client, a browser client, an educational client, etc. Such networks may include, but are not limited to: a wired network, a wireless network, wherein the wired network comprises: a local area network, a metropolitan area network, and a wide area network, the wireless network comprising: bluetooth, WIFI, and other networks that enable wireless communication. The server may be a single server, a server cluster composed of a plurality of servers, or a cloud server. The above is merely an example, and this is not limited in this embodiment.
Optionally, as an optional implementation manner, as shown in fig. 3, the human-machine authentication method includes:
s302, displaying a verification image, an auxiliary verification image and a sliding groove on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image are the same in shape but different in size, and the central point of the auxiliary verification image is superposed with the central point of the verification image;
s304, under the condition that the dragging operation of the slider is detected, gradually enlarging or reducing the verification image by taking the central point of the verification image as a reference point according to the sliding distance of the slider in the sliding groove;
s306, under the condition that the dragging operation of the sliding block is detected to be finished, the final sliding distance of the sliding block in the sliding groove is obtained, the final sliding distance is compared with a preset distance threshold value, and whether the verification passes or not is determined according to the comparison result.
Optionally, the man-machine authentication method may be applied to, but not limited to, screen unlocking, login authentication, identity authentication, and other scenarios. For example, in the authentication scenario, in order to avoid automatic machine login, the current object needs to be authenticated. The verification image, the auxiliary verification image and the sliding groove can be displayed on the display interface, and the sliding groove comprises a sliding block. The user drags the slider to check the enlargement or reduction of the verification image. When the verification image and the auxiliary verification image are overlapped, the user releases the dragging operation to complete the verification. However, if the current object is a machine, since the verification image and the auxiliary verification image are not a method of moving one image to the gap in the background image in the prior art, the verification can be completed only if the distance of the sliding slider cannot be obtained by identifying the pixel point. Therefore, the condition that the machine completes verification can be effectively avoided, and the accuracy of man-machine verification is improved.
In one example, when the authentication image, the secondary authentication image, and the sliding slot are displayed on a display interface of the client, the method further comprises:
displaying a confusion verification image on the display interface, wherein the confusion verification image and the auxiliary verification image have the same shape but different directions, and the central point of the confusion verification image is coincident with the central point of the auxiliary verification image.
Optionally, in this embodiment, the obfuscating the verification image is for obfuscating the auxiliary verification image. Since the confusing authentication image and the auxiliary authentication image are of the same size but in different directions. Therefore, when the machine is verified, the difficulty is improved for machine identification, and the condition that the machine identification image completes verification is avoided.
Alternatively, the direction in the present embodiment may be the orientation of the same one point in the auxiliary verification image and the confusing verification image. Through the difference of the directions, the difficulty caused by the confusion of the verification image to the verification of the current user can be avoided.
In one example, when the authentication image, the secondary authentication image, and the sliding slot are displayed on a display interface of the client, the method further comprises:
displaying a background image on the lower layer of the verification image, the auxiliary verification image, the sliding groove and the confusion verification image on the display interface, wherein the background image comprises confusion colors or confusion lines.
Alternatively, in the present embodiment, the background image may be displayed on the lower layer of the authentication image, the auxiliary authentication image, the slide groove, and the confusing authentication image (if any). The background image is used for confusing the auxiliary verification image, the background image can comprise random patterns, and the colors of pixel points can be random. The color or the pattern of the pixel points of the background image may also be changed, including but not limited to the color change of a single or multiple pixel points, or the size, position, direction, etc. of the pattern. For example, the color of the pixel points in the background image is light yellow, which may be changed to light red in the verification process, and the color of one or more pixel points may be changed.
In one example, the gradually enlarging or reducing the verification image with the center point of the verification image as a reference point according to the sliding distance of the slider in the sliding groove in the case where the drag operation on the slider is detected includes:
under the condition that the dragging operation that the sliding block is pressed and slides from one side of the sliding groove to the other side is obtained, the verification image is amplified by taking the central point of the verification image as a reference point, wherein the ratio of the amplification speed of the verification image to the sliding speed of the sliding block in the sliding groove is unchanged; or
And under the condition that the dragging operation that the slider is pressed and is slid from one side of the sliding groove to the other side is acquired, reducing the verification image by taking the central point of the verification image as a reference point, wherein the ratio of the reduction speed of the verification image to the sliding speed of the slider in the sliding groove is unchanged.
Alternatively, in this embodiment, the verification image may be larger than the auxiliary verification image or smaller than the auxiliary verification image. If the authentication image is larger than the auxiliary authentication image, the authentication image may be reduced by sliding the slider from one side of the sliding groove to the other side, and in the case where the slider slides to the other side, the authentication image may be smaller than the auxiliary authentication image. If the authentication image is smaller than the auxiliary authentication image, the authentication image may be enlarged by sliding the slider from one side of the sliding groove to the other side, and in the case where the slider slides to the other side, the authentication image may be larger than the auxiliary authentication image. If the dragging operation is released, the sliding block stops sliding, and the image is stopped to be amplified or reduced if the image is verified.
In one example, the obtaining, when it is detected that the dragging operation of the slider is completed, a final sliding distance of the slider in the sliding groove, comparing the final sliding distance with a preset distance threshold, and determining whether the verification passes according to the comparison result includes:
under the condition that the dragging operation is released, acquiring the distance between the current position and the initial position of the sliding block;
and determining that the verification is passed under the condition that the absolute value of the difference value between the distance and the distance threshold is smaller than a first threshold.
Optionally, in this embodiment, if the dragging operation is released, the distance between the current position of the slider and the initial position is obtained, and the distance is compared with the distance threshold. The distance threshold may be different at each time of the human-machine verification. By comparing the distance with the distance threshold, whether the verification image is overlapped with the auxiliary verification image or not can be determined when the man-machine verification is performed at the current time, and therefore whether the man-machine verification passes or not is determined.
In one example, before displaying the authentication image, the secondary authentication image, and the sliding slot on a display interface of the client, the method further comprises:
randomly selecting one image from a plurality of alternative images of a database as the verification image;
and amplifying or reducing the verification image by N times to obtain the auxiliary verification image, wherein N is a real number.
In this embodiment, a database may be preset, and a plurality of candidate images are stored in the database. An alternative image. For each man-machine verification, one alternative image can be randomly selected from the database to serve as a verification image, and the alternative image is amplified or reduced by N times to obtain an auxiliary verification image. And keeping the center points of the verification image and the auxiliary verification image to be superposed, and aligning the directions to be used as the man-machine verification image.
In this embodiment, the database may further include a plurality of preliminary background images, and one background image is selected for verification from the preliminary background images for each human-machine verification.
As an example, in the present application, each time the verification is completed, the combination of the verification image and the background image of the current combination is deleted and not used as the combination for subsequent use, or when the number of times of use of the current combination exceeds a threshold, the combination is not used as the combination for subsequent use, and is prevented from being learned by the machine, so that the verification is automatically completed.
Taking an example as an example, for example, a pentagon is randomly selected from the candidate images, the pentagon is used as a verification image, and a background image is selected from the preliminary background images. The verification image is identified as image a and the background image is identified as background B. Image a1 is obtained by rotating image a by an arbitrary angle, and image a1 do not coincide with each other after the arbitrary angle of rotation. Reducing the random multiple k (1< k <40) of the image A by taking the center as a fixed point to obtain an image A' and recording the value of k; and A' is the auxiliary verification image. The image a1 is reduced by a random multiple k '(1 < k' <40 and k '═ k + n or k' ═ k-n, 0< n <10) with the center as a fixed point, and an image a1 'and a 1' are obtained as the confusion verification image. And aligning and combining the image A ', the image A1' and the background B to obtain the jigsaw picture C. Display image A, stitched image C and sliding groove. And dragging the slider by the user to gradually reduce the graph A until the graph A is superposed with the graph A', releasing the slider by the user, reporting the recorded sliding distance and the sliding track data of the user to the server by the client, and finishing verification. Fig. 4 is a schematic diagram of an authentication image and an auxiliary authentication image of the present embodiment. In FIG. 4, image 402 may be a verification image and image 404 may be a secondary verification image. The verification image 402 is reduced by sliding the slider 406 to coincide with the auxiliary verification image. Alternatively, in FIG. 4, image 402 may be a secondary verification image and image 404 may be a verification image. The verification image 404 is enlarged by sliding the slider 406 to coincide with the secondary verification image 402.
Fig. 5 is a schematic diagram of a confusing authentication image. In fig. 5, an obfuscated verification image 502 is added as compared to fig. 4. Fig. 6 is a schematic illustration of adding background. Compared to fig. 5, a background image 602 is added. In this embodiment, the terminal may further request the server for an authentication image before starting authentication, and the server returns the authentication image and the terminal completes authentication.
According to the embodiment, a brand-new verification code solution is adopted, so that the black library cracking difficulty and cost are higher than those of the verification method in the prior art, no external cracking data can be referred to, and no open source code can be referred to. The front end can be combined with machine learning model modeling by collecting user slider behaviors to perform man-machine behavior recognition, and the cracking difficulty is also improved. The condition that the machine passes the automatic verification is effectively avoided, and the verification accuracy is improved.
As an example, determining whether the verification passes according to the comparison result further includes:
determining that the verification passes under the condition that the final sliding distance reaches a target distance threshold, wherein the target distance threshold is the sliding distance of the sliding block in the sliding groove when the verification image is enlarged or reduced to the size of the auxiliary verification image, and the preset distance threshold comprises the target distance threshold;
and under the condition that the final sliding distance does not reach the target distance threshold value, determining that the verification is not passed.
Alternatively, in the present embodiment, the preset distance threshold may be, but is not limited to, a sliding distance of the slider in the sliding groove when the verification image is enlarged or reduced to the size of the auxiliary verification image. In other words, when the verification image is enlarged or reduced to the size of the auxiliary verification image (and may be but is not limited to stay for a certain time), the verification is considered to pass; conversely, when the verification image is enlarged or reduced to the size of the auxiliary verification image (or may not be stopped for a certain period of time), the verification is considered to be failed.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
According to another aspect of the embodiment of the invention, a human-machine verification device for implementing the human-machine verification method is further provided. As shown in fig. 7, the apparatus includes:
the first display unit 702 is configured to display a verification image, an auxiliary verification image, and a sliding groove on a display interface of the client, where the sliding groove includes a slider, the auxiliary verification image and the verification image have the same shape but different sizes, and a center point of the auxiliary verification image coincides with a center point of the verification image;
an adjusting unit 704, configured to gradually enlarge or reduce the verification image based on a sliding distance of the slider in the sliding groove with a center point of the verification image as a reference point when the dragging operation on the slider is detected;
and the verification unit 706 is configured to, when it is detected that the dragging operation of the slider is completed, obtain a final sliding distance of the slider in the sliding groove, compare the final sliding distance with a preset distance threshold, and determine whether the current verification passes according to a comparison result.
Optionally, please refer to the above example for other examples of the present embodiment, which is not described herein again.
According to a further aspect of an embodiment of the present invention, there is also provided an electronic device for implementing the human-machine authentication method, the electronic device including a memory and a processor, the memory storing a computer program therein, the processor being configured to execute the steps in any one of the method embodiments described above through the computer program.
According to a further aspect of an embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A human-machine authentication method, comprising:
displaying a verification image, an auxiliary verification image and a sliding groove on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image are the same in shape but different in size, and the central point of the auxiliary verification image is superposed with the central point of the verification image;
under the condition that the dragging operation of the slider is detected, gradually enlarging or reducing the verification image by taking the central point of the verification image as a reference point according to the sliding distance of the slider in the sliding groove;
and under the condition that the dragging operation of the sliding block is detected to be finished, acquiring the final sliding distance of the sliding block in the sliding groove, comparing the final sliding distance with a preset distance threshold value, and determining whether the verification passes according to the comparison result.
2. The method of claim 1, wherein when displaying the authentication image, the secondary authentication image, and the sliding slot on a display interface of the client, the method further comprises:
displaying a confusion verification image on the display interface, wherein the confusion verification image and the auxiliary verification image have the same shape but different directions, and the central point of the confusion verification image is coincident with the central point of the auxiliary verification image.
3. The method of claim 1, wherein when displaying the authentication image, the secondary authentication image, and the sliding slot on a display interface of the client, the method further comprises:
displaying a background image on the lower layer of the verification image, the auxiliary verification image, the sliding groove and the confusion verification image on the display interface, wherein the background image comprises confusion colors or confusion lines.
4. The method according to any one of claims 1 to 3, wherein the gradually enlarging or reducing the verification image with the center point of the verification image as a reference point according to the sliding distance of the slider in the sliding groove in the case where the dragging operation of the slider is detected comprises:
under the condition that the dragging operation that the sliding block is pressed and slides from one side of the sliding groove to the other side is obtained, the verification image is amplified by taking the central point of the verification image as a reference point, wherein the ratio of the amplification speed of the verification image to the sliding speed of the sliding block in the sliding groove is unchanged; or
And under the condition that the dragging operation that the slider is pressed and is slid from one side of the sliding groove to the other side is acquired, reducing the verification image by taking the central point of the verification image as a reference point, wherein the ratio of the reduction speed of the verification image to the sliding speed of the slider in the sliding groove is unchanged.
5. The method according to any one of claims 1 to 3, wherein the obtaining of the final sliding distance of the slider in the sliding groove in the case that completion of the dragging operation on the slider is detected, comparing the final sliding distance with a preset distance threshold, and determining whether the verification passes according to the comparison result comprises:
under the condition that the dragging operation is released, acquiring the distance between the current position and the initial position of the sliding block;
and determining that the verification is passed under the condition that the absolute value of the difference value between the distance and the distance threshold is smaller than a first threshold.
6. The method of any of claims 1 to 3, wherein prior to displaying the authentication image, the secondary authentication image, and the sliding slot on a display interface of the client, the method further comprises:
randomly selecting one image from a plurality of alternative images of a database as the verification image;
and amplifying or reducing the verification image by N times to obtain the auxiliary verification image, wherein N is a real number.
7. The method according to any one of claims 1 to 3, wherein the determining whether the verification is passed according to the comparison result further comprises:
determining that the verification passes under the condition that the final sliding distance reaches a target distance threshold, wherein the target distance threshold is the sliding distance of the sliding block in the sliding groove when the verification image is enlarged or reduced to the size of the auxiliary verification image, and the preset distance threshold comprises the target distance threshold;
and under the condition that the final sliding distance does not reach the target distance threshold value, determining that the verification is not passed.
8. A human-machine authentication device, comprising:
the first display unit is used for displaying a verification image, an auxiliary verification image and a sliding groove on a display interface of a client, wherein the sliding groove comprises a sliding block, the auxiliary verification image and the verification image are the same in shape but different in size, and the central point of the auxiliary verification image is superposed with the central point of the verification image;
an adjusting unit, configured to gradually enlarge or reduce the verification image with the center point of the verification image as a reference point according to a sliding distance of the slider in the sliding groove when a dragging operation on the slider is detected;
and the verification unit is used for acquiring the final sliding distance of the sliding block in the sliding groove under the condition that the dragging operation of the sliding block is detected to be finished, comparing the final sliding distance with a preset distance threshold value, and determining whether the verification passes according to the comparison result.
9. A computer-readable storage medium, in which a computer program is stored, which computer program, when running, performs the method of any one of claims 1 to 7.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 7 by means of the computer program.
CN202110963734.XA 2021-08-20 2021-08-20 Man-machine verification method and device, storage medium and electronic equipment Pending CN113836513A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110963734.XA CN113836513A (en) 2021-08-20 2021-08-20 Man-machine verification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110963734.XA CN113836513A (en) 2021-08-20 2021-08-20 Man-machine verification method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113836513A true CN113836513A (en) 2021-12-24

Family

ID=78961170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110963734.XA Pending CN113836513A (en) 2021-08-20 2021-08-20 Man-machine verification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113836513A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186342A (en) * 2012-01-03 2013-07-03 Lg电子株式会社 Gesture based unlocking of a mobile terminal
CN105739893A (en) * 2016-01-29 2016-07-06 广东欧珀移动通信有限公司 Unlocking method and apparatus as well as mobile terminal
CN109800559A (en) * 2019-01-02 2019-05-24 平安科技(深圳)有限公司 Generation method, device, computer equipment and the storage medium of sliding block identifying code
CN111079119A (en) * 2019-12-04 2020-04-28 北京达佳互联信息技术有限公司 Verification method, device, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186342A (en) * 2012-01-03 2013-07-03 Lg电子株式会社 Gesture based unlocking of a mobile terminal
CN105739893A (en) * 2016-01-29 2016-07-06 广东欧珀移动通信有限公司 Unlocking method and apparatus as well as mobile terminal
CN109800559A (en) * 2019-01-02 2019-05-24 平安科技(深圳)有限公司 Generation method, device, computer equipment and the storage medium of sliding block identifying code
CN111079119A (en) * 2019-12-04 2020-04-28 北京达佳互联信息技术有限公司 Verification method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
JP6878572B2 (en) Authentication based on face recognition
US10643667B2 (en) Bounding box doubling as redaction boundary
US9507928B2 (en) Preventing the discovery of access codes
US20200065471A1 (en) Security verification method and relevant device
JP6197345B2 (en) Biometric authentication device, biometric authentication system, and biometric authentication method
EP3061023B1 (en) A method and a system for performing 3d-based identity verification of individuals with mobile devices
CN111124888B (en) Method and device for generating recording script and electronic device
CN107622246B (en) Face recognition method and related product
US10628998B2 (en) System and method for three dimensional object reconstruction and quality monitoring
CN105303096A (en) Symbol selection for swipe based authentication
US10581832B1 (en) Authentication / authorization without a password
CN108334869A (en) Selection, face identification method and the device and electronic equipment of face component
CN105701383B (en) A kind of function triggering method, device and terminal
CN113836513A (en) Man-machine verification method and device, storage medium and electronic equipment
CN106354516B (en) The method and device of tracing equipment
CN111274602A (en) Image characteristic information replacement method, device, equipment and medium
US20230186666A1 (en) Secure document authentication
CN115906028A (en) User identity verification method and device and self-service terminal
CN110087235B (en) Identity authentication method and device, and identity authentication method and device adjustment method and device
CN109118551A (en) A kind of image processing method, terminal and storage medium
CN104571889A (en) Image switching method and device
CN113672159B (en) Wind control method, wind control device, computing equipment and computer storage medium
US20230233943A1 (en) Method and system for processing textual depictions in a computer game screenshot
KR101754197B1 (en) System and method for managing log record of remote control
CN115455393A (en) User identity authentication method and device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination