CN113965369B - Verification graph acquisition method and device - Google Patents

Verification graph acquisition method and device Download PDF

Info

Publication number
CN113965369B
CN113965369B CN202111214745.4A CN202111214745A CN113965369B CN 113965369 B CN113965369 B CN 113965369B CN 202111214745 A CN202111214745 A CN 202111214745A CN 113965369 B CN113965369 B CN 113965369B
Authority
CN
China
Prior art keywords
click
clicking
sequence
user side
mouse moving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111214745.4A
Other languages
Chinese (zh)
Other versions
CN113965369A (en
Inventor
肖铮
徐辉
陈树华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dingxiang Technology Co ltd
Original Assignee
Beijing Dingxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dingxiang Technology Co ltd filed Critical Beijing Dingxiang Technology Co ltd
Priority to CN202111214745.4A priority Critical patent/CN113965369B/en
Publication of CN113965369A publication Critical patent/CN113965369A/en
Application granted granted Critical
Publication of CN113965369B publication Critical patent/CN113965369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a verification graph acquisition method and a verification graph acquisition device, wherein the method is applied to a server, and the method comprises the following steps: receiving a verification request sent by a user terminal; the verification request carries the identification of the user side and the network environment information of the user side; determining the security level of the user according to the network environment information; obtaining verification combination according to the target quantity set for the security level; the verification combination comprises multiple palace cases and clicking rules of the multiple palace cases; and sending the multiple lattices and the clicking rules to the user side according to the identification. According to the application, the multiple lattices corresponding to the difficulty of each user side are obtained by aiming at the network security information of different user sides, when the dangerous degree represented by the network environment information of the user side is higher, namely, the security level of the user side is lower, the number of the multiple Gong Gezhong lattices is higher, so that the difficulty of the user in verification operation is increased, and the verification security is improved.

Description

Verification graph acquisition method and device
Technical Field
The present application relates to the field of verification technologies, and in particular, to a method and an apparatus for obtaining a verification pattern.
Background
Verification graphics are used as a means of human-machine recognition for the purpose of distinguishing whether an object operating on the user side is a real human or machine. The function of distinguishing human-computer behaviors is self-evident, and application scenes such as registration, login, posting, coupon capturing, voting and the like of interconnection behaviors are at risk of various losses caused by machine behaviors, and if the behaviors of various machine garbage are not prevented, user behaviors such as garbage registration, malicious login, ticket brushing, event cheating, garbage advertisement, crawlers, wool parties and the like can greatly influence the development of products and user experience once occur.
In the conventional verification pattern acquisition method, one verification pattern is generally selected from a database at random and sent to a user side for verification, and the difficulty of the verification patterns contained in the database is not great, so that the verification patterns with the same or similar difficulty are generally sent to all the user sides in the prior art, and the verification security is lower.
Disclosure of Invention
In view of the above, the present application is directed to a method and an apparatus for obtaining verification graphics to improve the security of verification.
In a first aspect, an embodiment of the present application provides a method for obtaining a verification pattern, where the method is applied to a server, and the method includes:
receiving a verification request sent by a user terminal; the verification request carries the identifier of the user side and the network environment information of the user side;
Determining the security level of the user terminal according to the network environment information; wherein, the security level and the dangerous degree represented by the network environment information are in a negative correlation;
obtaining verification combination according to the target quantity set for the security level; wherein the security level and the target number are in a negative correlation; the verification combination comprises a multi-palace lattice and a clicking rule of the multi-palace lattice; the number of the Gong Gezhong units is the same as the target number; each cell comprises corresponding display content;
and according to the identification, the multi-grid and the click rule are sent to the user side.
With reference to the first aspect, an embodiment of the present application provides a first possible implementation manner of the first aspect, where the verification request further carries a verification passing rate of the user side; the verification passing rate is the probability of successful verification of the user in the history verification process;
the determining the security level of the user terminal according to the network environment information includes:
Determining the security level of the user terminal according to the network environment information and the verification passing rate; wherein, the security level and the verification passing rate are in positive correlation.
With reference to the first aspect, the embodiment of the present application provides a second possible implementation manner of the first aspect, where, when the cells in the multiple palace lattice include a digital cell and a graphic cell, the click rule is that clicking is performed in ascending order or descending order for each of the digital cells, and clicking is not performed on the graphic cell;
When the cells in the multi-grid are all digital cells, the click rule is an ascending click or a descending click.
With reference to the first aspect, the embodiment of the present application provides a third possible implementation manner of the first aspect, wherein the verification combination further includes a standard click sequence of the multiple palettes;
After the multi-grid and the click rule are sent to the user end corresponding to the identifier according to the identifier, the method further comprises:
after receiving the click sequence recorded by the user side when the user clicks the cell, comparing the click sequence with the standard click sequence;
when the clicking sequence is the same as the standard clicking sequence, according to the identification, a first verification result which is successfully verified is sent to the user side corresponding to the identification;
and when the clicking sequence is different from the standard clicking sequence, sending a re-verification prompt message to the user terminal corresponding to the identifier according to the identifier.
With reference to the third possible implementation manner of the first aspect, the embodiment of the present application provides a fourth possible implementation manner of the first aspect, where a click medium of the user side is a mouse;
after receiving the click sequence recorded by the user terminal when the user clicks the cell, before comparing the click sequence with the standard click sequence, the method further comprises:
Receiving the clicking sequence and clicking information recorded by the user side when the user clicks the cell; the click information comprises one or more of a mouse moving track and click time;
After the click sequence recorded by the user terminal and used for clicking the cell by the user is received, the click sequence is compared with the standard click sequence, and the method further comprises the following steps:
when the clicking sequence is the same as the standard clicking sequence, judging whether the operation object of the user terminal is human or machine according to the clicking information;
And when the operation object of the user terminal is human, sending a second verification result which is successfully verified to the user terminal corresponding to the identifier according to the identifier.
With reference to the third possible implementation manner of the first aspect, the embodiment of the present application provides a fifth possible implementation manner of the first aspect, where after receiving a click sequence of the user when clicking the cell, the step of comparing the click sequence with the standard click sequence includes:
After receiving the click sequence recorded by the user terminal when the user clicks the cell, decrypting the click sequence encrypted by the user terminal by using an encryption and decryption algorithm agreed between the user terminal and the server;
And comparing the standard click sequence with the decrypted click sequence.
In a second aspect, an embodiment of the present application provides another verification graphic obtaining method, where the method is applied to a user side, and the method includes:
Sending a verification request to a server; the verification request carries the identifier of the user side and the network environment information of the user side;
Receiving a multi-grid generated by the server and a clicking rule of the multi-grid; wherein the number of the Gong Gezhong cells is a target number; each cell comprises corresponding display content; the target number is determined by the server according to the security level of the user side; the security level of the user side is determined by the server according to the network environment information; the security level and the target number are in a negative correlation; the security level and the dangerous degree represented by the network environment information are in a negative correlation relationship;
And displaying the multi-grid and the click rule on a display screen of the user side.
With reference to the second aspect, the embodiment of the present application provides a first possible implementation manner of the second aspect, where, when the cells in the multiple palace lattice include a digital cell and a graphic cell, the click rule is that clicking is performed in ascending order or descending order for each of the digital cells, and clicking is not performed on the graphic cell;
When the cells in the multi-grid are all digital cells, the click rule is an ascending click or a descending click.
In a third aspect, an embodiment of the present application further provides an authentication graphic acquisition apparatus, including:
the first receiving module is used for receiving a verification request sent by a user side; the verification request carries the identifier of the user side and the network environment information of the user side;
the determining module is used for determining the security level of the user terminal according to the network environment information; wherein, the security level and the dangerous degree represented by the network environment information are in a negative correlation;
The acquisition module is used for acquiring verification combinations according to the target quantity set for the security level; wherein the security level and the target number are in a negative correlation; the verification combination comprises a multi-palace lattice and a clicking rule of the multi-palace lattice; the number of the Gong Gezhong units is the same as the target number; each cell comprises corresponding display content;
And the first sending module is used for sending the multi-grid and the click rule to the user side according to the identification.
With reference to the third aspect, an embodiment of the present application provides a first possible implementation manner of the third aspect, where the verification request further carries a verification passing rate of the user side; the verification passing rate is the probability of successful verification of the user in the history verification process;
the determining module is specifically configured to, when determining the security level of the user terminal according to the network environment information:
Determining the security level of the user terminal according to the network environment information and the verification passing rate; wherein, the security level and the verification passing rate are in positive correlation.
With reference to the third aspect, the embodiment of the present application provides a second possible implementation manner of the third aspect, where, when the cells in the multiple palace lattice include a digital cell and a graphic cell, the click rule is that clicking is performed in ascending order or descending order for each of the digital cells, and clicking is not performed on the graphic cell;
When the cells in the multi-grid are all digital cells, the click rule is an ascending click or a descending click.
With reference to the third aspect, the embodiment of the present application provides a third possible implementation manner of the third aspect, where the verification combination further includes a standard click sequence of the multiple palettes; the first sending module is configured to send the multiple palace lattice and the click rule to the user terminal according to the identifier, and then further includes:
the comparison module is used for comparing the clicking sequence with the standard clicking sequence after receiving the clicking sequence recorded by the user side when the user clicks the cell;
The third sending module is used for sending a first verification result which is successfully verified to the user side corresponding to the identifier according to the identifier when the click sequence is the same as the standard click sequence;
and the fourth sending module is used for sending the re-verification prompt information to the user terminal corresponding to the identifier according to the identifier when the clicking sequence is different from the standard clicking sequence.
With reference to the third possible implementation manner of the third aspect, the embodiment of the present application provides a fourth possible implementation manner of the third aspect, where a click medium of the user side is a mouse;
The comparison module is used for comparing the click sequence with the standard click sequence after receiving the click sequence recorded by the user side when the user clicks the cell, and further comprises:
The third receiving module is used for receiving the clicking sequence and clicking information recorded by the user side when the user clicks the cell; the click information comprises one or more of a mouse moving track and click time;
The comparison module is used for comparing the click sequence with the standard click sequence after receiving the click sequence recorded by the user side when the user clicks the cell, and further comprises:
the judging module is used for judging whether the operation object of the user side is human or a machine according to the click information when the click sequence is the same as the standard click sequence;
And the fifth sending module is used for sending a second verification result which is successfully verified to the user side corresponding to the identifier according to the identifier when the operation object of the user side is human.
With reference to the third possible implementation manner of the third aspect, the embodiment of the present application provides a fifth possible implementation manner of the third aspect, where the comparing module is configured to, after receiving a click sequence recorded by the user terminal when clicking the cell, compare the click sequence with the standard click sequence, and specifically is configured to:
After receiving the click sequence recorded by the user terminal when the user clicks the cell, decrypting the click sequence encrypted by the user terminal by using an encryption and decryption algorithm agreed between the user terminal and the server;
And comparing the standard click sequence with the decrypted click sequence.
In a fourth aspect, an embodiment of the present application further provides another verification graphics acquisition apparatus, residing on a user side, including:
The second sending module is used for sending a verification request to the server; the verification request carries the identifier of the user side and the network environment information of the user side;
The second receiving module is used for receiving the multi-palace lattice generated by the server and the clicking rule of the multi-palace lattice; wherein the number of the Gong Gezhong cells is a target number; each cell comprises corresponding display content; the target number is determined by the server according to the security level of the user side; the security level of the user side is determined by the server according to the network environment information; the security level and the target number are in a negative correlation; the security level and the dangerous degree represented by the network environment information are in a negative correlation relationship;
and the display module is used for displaying the multi-grid and the click rule on a display screen of the user side.
With reference to the fourth aspect, the embodiment of the present application provides a first possible implementation manner of the fourth aspect, where, when the cells in the multiple palace lattice include a digital cell and a graphic cell, the click rule is that clicking is performed in ascending order or descending order for each of the digital cells, and clicking is not performed on the graphic cell;
When the cells in the multi-grid are all digital cells, the click rule is an ascending click or a descending click.
In a fifth aspect, an embodiment of the present application further provides an electronic device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the steps of any one of the possible implementations of the first aspect or the steps of any one of the possible implementations of the second aspect.
In a sixth aspect, the present embodiment further provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of any one of the possible embodiments of the first aspect or the steps of any one of the possible embodiments of the second aspect.
In the application, the security level of the user terminal is determined according to the network environment information of the user terminal, then the multi-grid containing the target number of cells and the clicking rule of the multi-grid are obtained according to the target number set for the security level, and then the multi-grid and the clicking rule are sent to the user terminal. Compared with the method for transmitting verification graphs with the same or similar difficulties to all the user terminals in the prior art, the method provided by the application has the advantages that the multiple lattices with the corresponding difficulties to each user terminal are obtained by aiming at the network security information of different user terminals, when the dangerous degree represented by the network environment information of the user terminal is higher, namely, the security level of the user terminal is lower, the number of the multiple Gong Gezhong lattices is higher, so that the difficulty of the user in verification operation is increased, and the security of verification is further improved.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a verification pattern acquisition method according to an embodiment of the present application;
FIG. 2 shows a schematic view of a 4X 4 multi-grid provided by an embodiment of the present application;
FIG. 3 shows a schematic diagram of a multi-compartment provided by an embodiment of the present application;
FIG. 4 is a flowchart of another verification pattern acquisition method provided by an embodiment of the present application;
FIG. 5 is a schematic diagram of a verification pattern acquisition apparatus according to an embodiment of the present application;
FIG. 6 is a schematic diagram of another verification pattern acquisition apparatus according to an embodiment of the present application;
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
In view of the problem of low security of verification in the prior art, based on this, an embodiment of the present application provides a method and an apparatus for obtaining a verification pattern to improve security of verification, which are described below by way of embodiments.
Embodiment one:
for the convenience of understanding the present embodiment, a method for obtaining verification graphics disclosed in the embodiment of the present application will be described in detail first. Fig. 1 shows a flowchart of a verification graphics acquisition method according to an embodiment of the present application, as shown in fig. 1, where the method is applied to a server, and includes the following steps:
s101: receiving a verification request sent by a user terminal; the verification request carries the identifier of the user side and the network environment information of the user side.
The user side refers to a carrier of a program that interacts with the user and provides local services for the user. The user side may be a desktop computer, a notebook computer, a tablet computer, a mobile phone, a smart watch, or the like. Each user terminal is correspondingly provided with a unique identifier, and the identifier is used for representing the identity information of the user terminal. Each user terminal corresponds to one piece of network environment information, and the network environment information is used for representing the dangerous degree of the network environment of the user terminal. The network environment information includes, but is not limited to, user browser information, historical network information, current network information, and the like.
S102: determining the security level of the user according to the network environment information; wherein, the security level and the dangerous degree characterized by the network environment information are in a negative correlation.
And after receiving the network environment information of the user terminal, determining the security level of the user terminal according to the network environment information of the user terminal. The security level is used to represent the security of the user terminal, that is, the security level is used to represent the probability that the operation object of the user terminal is a real human. If the hazard degree represented by the network environment information is higher, the security level of the user terminal is lower, namely the security of the user terminal is lower; if the risk degree represented by the network environment information is lower, the security level of the user terminal is higher, namely the security of the user terminal is higher.
S103: obtaining verification combination according to the target quantity set for the security level; wherein, the security level and the target quantity are in a negative correlation; the verification combination comprises multiple palace cases and clicking rules of the multiple palace cases; the number of Gong Gezhong more cells is the same as the target number; each cell contains corresponding display content.
Each security level corresponds to a preset target number, and the higher the security level is, the lower the corresponding target number is; the lower the security level, the higher its corresponding target number.
In the embodiment of the application, the multi-grid is composed of cells, and the rows and columns of Gong Gezhong cells are the same. Illustratively, when 4 cells are included in the multi-cell, the multi Gong Gezhong cells are arranged in a2×2 pattern; when 9 cells are included in the multi-cell, the array form of the multi Gong Gezhong cells is 3×3. Fig. 2 shows a schematic diagram of a4×4 multi-grid provided by an embodiment of the present application, where, as shown in fig. 2, the multi-grid includes 16 cells, where the number of rows of the cells is 4 and the number of columns is 4. The display content contained in each cell is different. Click rules refer to rules that instruct a user to click on cells in a multi-cell in turn.
After determining the security level of the user terminal, determining the number of Gong Gezhong cells corresponding to the user terminal according to the target number corresponding to the security level, and specifically, determining that the cells corresponding to the user terminal include the target number of cells in the multiple grids.
Illustratively, the preset target number corresponding to the security level A1 is 25, the preset target number corresponding to the security level A2 is 16, the preset target number corresponding to the security level A3 is 9, and the preset target number corresponding to the security level A4 is 4. Wherein security level A1 is lower than security level A2 and security level A3 is lower than security level A4. When the security level of the user terminal is A3, the target number set for the security level is 9, so that the obtained multiple cells include 9 cells, and the arrangement form of the multiple Gong Gezhong cells is 3×3.
S104: and sending the multiple lattices and the clicking rules to the user side according to the identification.
After the multi-grid of the user terminal is obtained, the multi-grid and the clicking rule of the multi-grid are sent to the user terminal corresponding to the identifier according to the identifier.
According to the method, aiming at network security information of different user ends, multiple lattices with different cell numbers are obtained, verification difficulty of the multiple lattices is reflected through the number of the multiple Gong Gezhong cells, and specifically, the more the number of the multiple Gong Gezhong cells is, the greater the verification difficulty of the multiple lattices is. Namely, when the risk degree represented by the network environment information of the user side is higher, namely, when the security level of the user side is lower, the number of Gong Gezhong more cells is larger, and the difficulty of the user in performing verification operation is larger. In the application, the security of verification is improved by generating multiple lattices with different difficulties for different user terminals.
In a possible implementation manner, the verification request also carries the verification passing rate of the user side; the verification passing rate is the probability of successful verification of the user side in the history verification process; when executing step S102 to determine the security level of the user terminal according to the network environment information, the method specifically may be executed according to the following steps:
determining the security level of the user terminal according to the network environment information and the verification passing rate; wherein, the security level and the verification passing rate are in positive correlation.
The calculation method of the verification passing rate is the ratio of the number of successful verification times to the total verification times of the user terminal in the history verification process. When the verification passing rate of the user side is higher, the security level of the user side is higher; when the verification passing rate of the user side is lower, the security level of the user side is lower.
In the embodiment of the application, when the hazard degree represented by the network environment information of the user side is higher and the verification passing rate of the user side is lower, the security level of the user side is lower; conversely, when the risk degree represented by the network environment information of the user side is lower and the verification passing rate of the user side is higher, the security level of the user side is higher.
In one possible implementation, when the cells in the multi-grid include a digital cell and a graphic cell, the click rule is clicking in ascending or descending order for each digital cell and not clicking the graphic cell; when the cells in the multiple palace lattice are all digital cells, the clicking rule is clicking in ascending order or clicking in descending order.
The digital cell means that the display content in the cell is a number, and the graphic cell means that the display content in the cell is a graphic corresponding to the shape of the number. Illustratively, the display content in the graphic cell may be in the shape of a tree, which is similar to the shape of the number 1, and acts as a disturbance, increasing the verification difficulty.
The graphic unit cell can also be used in cooperation with marketing scenes, such as some brands or advertisement logo, can be rented as advertisement slots, earn click benefits, or can be some holiday pictures with commemorative meaning or a prospective, and the like.
In an embodiment of the present application, when the cells in the multiple cell include a digital cell and a graphic cell, when the verification combination is obtained according to the target number set for the security level, specifically including: randomly generating a first number of digital cells and a second number of graphics cells; wherein the sum of the first number and the second number is equal to the target number; and then, randomly combining the digital cells and the graphic cells to obtain a multi-grid. That is, the multi-cell is formed by splicing the first number of digital cells and the second number of graphic cells, so that the flexibility is enhanced compared with the multi-cell which is a whole picture.
Clicking in ascending or descending order for each digital cell refers to clicking in ascending or descending order for the size of the number displayed in each digital cell. Wherein, ascending clicking refers to clicking from small to large for numbers in each cell, and descending clicking refers to clicking from large to small for numbers in each cell. The numbers in each digital cell in the multiple cells may be continuous numbers or discontinuous numbers, which is not limited by the present application. The numerals may be Arabic numerals, roman numerals, chinese, etc.
For example, when the first number of the digital cells is 8 and the second number of the graphic cells is 1, fig. 3 shows a schematic diagram of the multi-grid provided by the embodiment of the present application, as shown in fig. 3, the numbers displayed in each digital cell are 1,2,3, 4, 5, 6, 7, 8, respectively, and the content displayed in the graphic cells is a tree. If the click rule is a down-order click at this time, the user's standard click order should be 8, 7, 6, 5, 4, 3, 2, 1, and not click on the graphic cell.
In an embodiment of the present application, when the cells in the multi-cell include only digital cells, when the verification combination is obtained according to the target number set for the security level, specifically including: randomly generating a target number of digital cells; and then, randomly combining the digital cells to obtain a multi-cell.
Currently, a common verification method generally selects one or more pictures matched with a text from a plurality of pictures according to the text. When the method is used for verification, the meaning of the characters needs to be understood each time of verification, namely the cost needs to be understood because the characters are different each time. And the content of the picture is fuzzy, so that the user does not know whether the picture is selected or not, and the operation cost is high. In the application, the number is only ordered, namely clicking is carried out according to the order from small to large or from large to small, so that the operation cost is low, and the user verification process is simpler and more convenient.
In the embodiment of the present application, the content displayed in the cell is represented by a picture, and the picture may be a dynamic picture, for example, a gif picture, or a still picture. The cells in the multi-cell in the application can be cells containing dynamic pictures and/or cells containing static pictures. Illustratively, 9 cells are included in the multi-cell, wherein the pictures displayed in 6 cells are moving pictures and the pictures displayed in the remaining 3 cells are still pictures.
Because the content in the still picture is unchanged, the digital content can be identified by mature technical means such as OCR (Optical Character Recognition ) and the like, the existing OCR technology can accurately identify the digital content, the difficulty of OCR identification can be increased by the dynamic picture (gif), and the OCR identification can be resisted by adding a plurality of confusing or similar frame pictures.
In one possible implementation, the verification combination further includes a standard click sequence of multiple boxes; after executing step S104, according to the identifier, the multiple boxes and the click rule are sent to the user end corresponding to the identifier, and the following steps may be specifically executed:
S105: and after receiving the click sequence recorded by the user side when the user clicks the cell, comparing the click sequence with the standard click sequence.
The standard click sequence refers to the correct sequence when clicking the cell, and the click sequence refers to the sequence in which the user clicks when clicking the cell. And comparing the clicking sequence with the standard clicking sequence, and judging whether the clicking sequence is the same as the standard clicking sequence.
S106: and when the clicking sequence is the same as the standard clicking sequence, sending a first verification result which is successfully verified to the user terminal corresponding to the identifier according to the identifier.
When the click order is the same as the standard click order, it means that the click order of the user is correct.
S107: and when the clicking sequence is different from the standard clicking sequence, sending the re-verified prompt information to the user terminal corresponding to the identifier according to the identifier.
When the clicking sequence is different from the standard clicking sequence, the clicking sequence of the user is wrong, and the user side is required to conduct re-verification.
In one possible implementation, the click medium of the user terminal is a mouse; after executing step S105, after receiving the click sequence recorded by the user at the user side when clicking the cell, the specific steps may be further executed as follows:
S1051: receiving the click sequence and click information recorded by a user terminal when the user clicks the cell; the click information includes one or more of a mouse movement trajectory and a click time.
The mouse movement track refers to a position track where the mouse moves when the user clicks the cell using the mouse. The clicking time refers to a time when the user clicks each cell, specifically, the clicking time may be a total time when the user clicks each cell, and in an exemplary embodiment, when the clicking time is recorded, the time may be counted from when the first cell is clicked according to a clicking rule until the last cell is clicked.
The clicking time may also be a time interval between clicking each cell, and in an exemplary embodiment, when the clicking time is recorded, a specific time interval may be that timing is started when the clicking finishes the last cell until timing is ended when the clicking finishes the next cell, and then a plurality of time intervals are obtained, and the plurality of time intervals are taken as the clicking time.
The clicking time may also be the time of clicking each cell, and in an exemplary case, when the clicking time is recorded, the clicking time of a specific cell may be the time counted when the last cell is clicked, until the time counted when the next cell is clicked is ended, and then the clicking time of each cell is obtained, and the clicking time of each cell is taken as the clicking time.
In the embodiment of the application, clicking one cell refers to clicking the cell by the touch medium until leaving the cell ends.
After executing step S105 to receive the click sequence recorded by the user at the user side when clicking the cell, the click sequence is compared with the standard click sequence, and then the following steps may be specifically executed:
S1052: when the clicking sequence is the same as the standard clicking sequence, judging whether the operation object of the user terminal is human or machine according to the clicking information.
When the click information only includes the mouse moving track, when the click sequence is the same as the standard click sequence, judging whether the operation object of the user side is human or machine according to the mouse moving position and the mouse moving acceleration included in the mouse moving track.
Under the condition that the click information only comprises the click time, judging whether the click time is larger than the preset click time or not when the click sequence is the same as the standard click sequence; when the click time is longer than the preset click time, the operation object of the user side is human; when the click time is not more than the preset click time, the operation object indicating the user side is a machine.
When the click information comprises the click time and the mouse moving track, judging whether an operation object of the user side is human or a machine according to the mouse moving position and the mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence; and judging whether the click time is larger than the preset click time. When the mouse moving position and the mouse moving acceleration contained in the mouse moving track meet the preset conditions and the clicking time is longer than the preset clicking time, the operation object of the user side is human; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track do not meet the preset condition and/or the clicking time is not longer than the preset clicking time, the operation object of the user side is a machine.
S1053: when the operation object of the user terminal is human, according to the identification, a second verification result which is successfully verified is sent to the user terminal corresponding to the identification.
When the operation object of the user terminal is a machine, the re-verification prompt information is sent to the user terminal corresponding to the identifier according to the identifier.
In one possible implementation manner, after executing step S105 to receive the click sequence recorded by the user at the user side when clicking the cell, when comparing the click sequence with the standard click sequence, the following steps may be specifically executed:
s1054: after receiving the click sequence recorded by the user terminal when the user clicks the cell, decrypting the click sequence encrypted by the user terminal by using an encryption and decryption algorithm agreed between the user terminal and the server.
S1055: the standard click sequence is compared with the decrypted click sequence.
In the embodiment of the application, an encryption and decryption algorithm is pre-agreed between the user side and the server, for example, encryption and decryption can be performed through specific character string transformation and conversion, and encryption and decryption can also be performed through a public key and a symmetric encryption algorithm. Such algorithms involving public key and symmetric encryption require public key information to be carried in the authentication request.
Embodiment two:
Based on the same technical concept, the embodiment of the application further provides another verification pattern acquisition method, and the other verification pattern acquisition method disclosed by the embodiment of the application is described in detail below. Fig. 4 shows a flowchart of another verification pattern acquisition method provided by an embodiment of the present application, as shown in fig. 4, where the method is applied to a user terminal, and includes the following steps:
S401: sending a verification request to a server; the verification request carries the identifier of the user side and the network environment information of the user side.
S402: receiving a multi-grid and clicking rules of the multi-grid generated by a server; wherein the number of Gong Gezhong more cells is the target number; each cell respectively comprises corresponding display content; the target number is determined by the server according to the security level of the user side; the security level of the user terminal is determined by the server according to the network environment information; the security level and the target number are in a negative correlation; the security level and the danger degree characterized by the network environment information are in a negative correlation.
S403: and displaying the multiple palace lattice and the click rule on a display screen of the user side.
In the embodiment of the application, after the multiple lattices and the clicking rules are displayed on the display screen of the user side, the user clicks each cell in the multiple lattices in turn according to the clicking rules. At this time, the user records the clicking sequence of the user when clicking each cell, and then sends the clicking sequence to the server for verification by the server.
In one possible implementation, when the cells in the multi-grid include a digital cell and a graphic cell, the click rule is clicking in ascending or descending order for each digital cell and not clicking the graphic cell; when the cells in the multiple palace lattice are all digital cells, the clicking rule is clicking in ascending order or clicking in descending order.
Reference is made to the description of the first embodiment for specific implementation of method steps and principles, and detailed descriptions thereof are omitted.
Embodiment III:
Based on the same technical concept, the embodiment of the present application further provides an authentication graphics acquisition device, which resides on a user side, and fig. 5 shows a schematic structural diagram of the authentication graphics acquisition device provided by the embodiment of the present application, and as shown in fig. 5, the device includes:
A first receiving module 501, configured to receive a verification request sent by a user side; the verification request carries the identification of the user side and the network environment information of the user side;
A determining module 502, configured to determine a security level of the user terminal according to the network environment information; wherein, the security level and the dangerous degree represented by the network environment information are in a negative correlation;
An obtaining module 503, configured to obtain a verification combination according to the target number set for the security level; wherein, the security level and the target quantity are in a negative correlation; the verification combination comprises multiple palace cases and clicking rules of the multiple palace cases; the number of Gong Gezhong more cells is the same as the target number; each cell respectively comprises corresponding display content;
The first sending module 504 is configured to send the multiple boxes and the click rule to the user terminal according to the identifier.
Optionally, the verification request also carries the verification passing rate of the user side; the verification passing rate is the probability of successful verification of the user side in the history verification process;
The determining module 502 is specifically configured to, when determining the security level of the user terminal according to the network environment information:
determining the security level of the user terminal according to the network environment information and the verification passing rate; wherein, the security level and the verification passing rate are in positive correlation.
Optionally, when the cells in the multiple palace lattice include a digital cell and a graphic cell, the clicking rule is to click in ascending order or descending order for each digital cell, and does not click the graphic cell;
When the cells in the multiple palace lattice are all digital cells, the clicking rule is clicking in ascending order or clicking in descending order.
Optionally, the verification combination further includes a standard click sequence of the multiple boxes;
The first sending module 504 is configured to send, according to the identifier, the multiple boxes and the click rule to the user terminal corresponding to the identifier, and then further includes:
The comparison module is used for comparing the clicking sequence with the standard clicking sequence after receiving the clicking sequence recorded by the user side when the user clicks the cell;
the third sending module is used for sending a first verification result which is successfully verified to the user terminal corresponding to the identifier according to the identifier when the clicking sequence is the same as the standard clicking sequence;
And the fourth sending module is used for sending the re-verification prompt information to the user terminal corresponding to the identifier according to the identifier when the clicking sequence is different from the standard clicking sequence.
Optionally, the clicking medium of the user side is a mouse;
the comparison module is used for comparing the clicking sequence with the standard clicking sequence after receiving the clicking sequence recorded by the user side when the user clicks the cell, and further comprises:
The third receiving module is used for receiving the clicking sequence and clicking information recorded by the user side when the user clicks the cell; the click information comprises one or more of a mouse moving track and click time;
The comparison module is used for comparing the clicking sequence with the standard clicking sequence after receiving the clicking sequence recorded by the user side when the user clicks the cell, and further comprises:
the judging module is used for judging whether the operation object of the user terminal is human or a machine according to the clicking information when the clicking sequence is the same as the standard clicking sequence;
And the fifth sending module is used for sending a second verification result which is successfully verified to the user side corresponding to the identifier according to the identifier when the operation object of the user side is human.
Optionally, the comparing module is configured to, after receiving the click sequence recorded by the user terminal when the user clicks the cell, compare the click sequence with the standard click sequence, and specifically is configured to:
after receiving the click sequence recorded by the user terminal when the user clicks the cell, decrypting the click sequence encrypted by the user terminal by using an encryption and decryption algorithm agreed between the user terminal and the server;
The standard click sequence is compared with the decrypted click sequence.
Reference is made to the description of the first embodiment for specific implementation of method steps and principles, and detailed descriptions thereof are omitted.
Embodiment four:
Based on the same technical concept, the embodiment of the present application further provides another verification pattern acquisition device, which resides on a user side, and fig. 6 shows a schematic structural diagram of another verification pattern acquisition device provided by the embodiment of the present application, as shown in fig. 6, where the device includes:
A second sending module 601, configured to send a verification request to a server; the verification request carries the identification of the user side and the network environment information of the user side;
A second receiving module 602, configured to receive a server generated multi-grid and a click rule of the multi-grid; wherein the number of Gong Gezhong more cells is the target number; each cell respectively comprises corresponding display content; the target number is determined by the server according to the security level of the user side; the security level of the user terminal is determined by the server according to the network environment information; the security level and the target number are in a negative correlation; the security level and the dangerous degree represented by the network environment information are in a negative correlation;
and the display module 603 is configured to display the multiple boxes and the click rules on a display screen of the user terminal.
Optionally, when the cells in the multiple palace lattice include a digital cell and a graphic cell, the clicking rule is to click in ascending order or descending order for each digital cell, and does not click the graphic cell; when the cells in the multiple palace lattice are all digital cells, the clicking rule is clicking in ascending order or clicking in descending order.
Reference is made to the description of the first embodiment for specific implementation of method steps and principles, and detailed descriptions thereof are omitted.
Fifth embodiment:
based on the same technical concept, the embodiment of the present application further provides an electronic device, and fig. 7 shows a schematic structural diagram of the electronic device provided by the embodiment of the present application, as shown in fig. 7, the electronic device 700 includes: a processor 701, a memory 702 and a bus 703, the memory storing machine-readable instructions executable by the processor, the processor 701 and the memory 702 communicating via the bus 703 when the electronic device is running, the processor 701 executing the machine-readable instructions to perform the method steps described in embodiment one or embodiment two.
Reference is made to the description of the first embodiment for specific implementation of method steps and principles, and detailed descriptions thereof are omitted.
Example six:
the sixth embodiment of the present application further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor performs the method steps described in the first or second embodiment.
Reference is made to the description of the first embodiment for specific implementation of method steps and principles, and detailed descriptions thereof are omitted.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the above examples are only specific embodiments of the present application, and are not intended to limit the scope of the present application, but it should be understood by those skilled in the art that the present application is not limited thereto, and that the present application is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A method of verifying graphics acquisition, the method being applied to a server, the method comprising:
receiving a verification request sent by a user terminal; the verification request carries the identifier of the user side and the network environment information of the user side;
Determining the security level of the user terminal according to the network environment information; wherein, the security level and the dangerous degree represented by the network environment information are in a negative correlation;
Obtaining verification combination according to the target quantity set for the security level; wherein the security level and the target number are in a negative correlation; the verification combination comprises a plurality of grids, a clicking rule of the plurality of grids and a standard clicking sequence of the plurality of grids; the number of the Gong Gezhong units is the same as the target number; each cell comprises corresponding display content;
According to the identification, the multi-grid and the click rule are sent to the user side;
Receiving the clicking sequence and clicking information recorded by the user side when the user clicks the cell; the clicking medium of the user terminal is a mouse; the click information comprises one or more of a mouse moving track and click time;
after receiving the click sequence recorded by the user side when the user clicks the cell, comparing the click sequence with the standard click sequence;
when the clicking sequence is the same as the standard clicking sequence, judging whether the operation object of the user terminal is human or machine according to the clicking information;
when the operation object of the user terminal is human, according to the identification, a second verification result which is successfully verified is sent to the user terminal corresponding to the identification;
when the click sequence is the same as the standard click sequence, judging whether the operation object of the user terminal is a human or a machine according to the click information, including:
when the click information only comprises a mouse moving track, judging whether an operation object of a user side is human or a machine according to a mouse moving position and a mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence;
under the condition that the click information only comprises the click time, judging whether the click time is larger than the preset click time or not when the click sequence is the same as the standard click sequence; when the click time is longer than the preset click time, the operation object of the user side is human; when the click time is not more than the preset click time, the operation object representing the user side is a machine;
When the click information comprises the click time and the mouse moving track, judging whether an operation object of the user side is human or a machine according to the mouse moving position and the mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence; judging whether the click time is longer than the preset click time or not; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track meet the preset conditions and the clicking time is longer than the preset clicking time, the operation object of the user side is human; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track do not meet the preset condition and/or the clicking time is not longer than the preset clicking time, the operation object of the user side is a machine;
the step of obtaining the verification combination according to the target number set for the security level comprises the following steps:
Randomly generating a first number of digital cells and a second number of graphics cells; wherein the sum of the first number and the second number is equal to the target number; the display content in the graphic unit lattice is a graphic corresponding to the shape of the number; the graphic cell is used for interfering user authentication;
and randomly combining the digital cells and the graphic cells to obtain a multi-grid.
2. The method of claim 1, wherein the verification request further carries a verification passing rate of the user side; the verification passing rate is the probability of successful verification of the user in the history verification process;
the determining the security level of the user terminal according to the network environment information includes:
Determining the security level of the user terminal according to the network environment information and the verification passing rate; wherein, the security level and the verification passing rate are in positive correlation.
3. The method of claim 1, wherein when the cells in the multi-grid comprise digital cells and graphic cells, the click rule is clicking in ascending or descending order for each of the digital cells and not clicking the graphic cell;
When the cells in the multi-grid are all digital cells, the click rule is an ascending click or a descending click.
4. The method as recited in claim 1, further comprising:
and when the clicking sequence is different from the standard clicking sequence, sending a re-verification prompt message to the user terminal corresponding to the identifier according to the identifier.
5. The method of claim 1, wherein after receiving the click sequence of the cell when the user clicks the cell, comparing the click sequence with the standard click sequence comprises:
After receiving the click sequence recorded by the user terminal when the user clicks the cell, decrypting the click sequence encrypted by the user terminal by using an encryption and decryption algorithm agreed between the user terminal and the server;
And comparing the standard click sequence with the decrypted click sequence.
6. A method for obtaining verification graphics, wherein the method is applied to a user terminal, and the method comprises:
Sending a verification request to a server; the verification request carries the identifier of the user side and the network environment information of the user side;
Receiving a multi-grid generated by the server and a clicking rule of the multi-grid; wherein the number of the Gong Gezhong cells is a target number; each cell comprises corresponding display content; the target number is determined by the server according to the security level of the user side; the security level of the user side is determined by the server according to the network environment information; the security level and the target number are in a negative correlation; the security level and the dangerous degree represented by the network environment information are in a negative correlation relationship; the multi-grid is generated by the server by: randomly generating a first number of digital cells and a second number of graphics cells; wherein the sum of the first number and the second number is equal to the target number; the display content in the graphic unit lattice is a graphic corresponding to the shape of the number; the graphic cell is used for interfering user authentication; randomly combining the digital cells and the graphic cells to obtain a multi-grid;
displaying the multi-grid and the click rule on a display screen of the user side;
Sending the clicking sequence and clicking information of a user when clicking the cell to the server so that the server compares the clicking sequence with a standard clicking sequence, and when the clicking sequence is the same as the standard clicking sequence, the server judges whether an operation object of the user terminal is human or machine according to the clicking information; the clicking medium of the user terminal is a mouse; the click information comprises one or more of a mouse moving track and click time;
when the operation object of the user terminal is human, receiving a second verification result of successful verification according to the identification;
when the click sequence is the same as the standard click sequence, the server judges whether the operation object of the user terminal is a human or a machine according to the click information, and the method comprises the following steps:
when the click information only comprises a mouse moving track, judging whether an operation object of a user side is human or a machine according to a mouse moving position and a mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence;
under the condition that the click information only comprises the click time, judging whether the click time is larger than the preset click time or not when the click sequence is the same as the standard click sequence; when the click time is longer than the preset click time, the operation object of the user side is human; when the click time is not more than the preset click time, the operation object representing the user side is a machine;
When the click information comprises the click time and the mouse moving track, judging whether an operation object of the user side is human or a machine according to the mouse moving position and the mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence; judging whether the click time is longer than the preset click time or not; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track meet the preset conditions and the clicking time is longer than the preset clicking time, the operation object of the user side is human; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track do not meet the preset condition and/or the clicking time is not longer than the preset clicking time, the operation object of the user side is a machine.
7. The method of claim 6, wherein when the cells in the multi-grid include digital cells and graphic cells, the click rule is clicking in ascending or descending order for each of the digital cells and not clicking the graphic cell;
When the cells in the multi-grid are all digital cells, the click rule is an ascending click or a descending click.
8. A verification pattern acquisition apparatus, comprising:
the first receiving module is used for receiving a verification request sent by a user side; the verification request carries the identifier of the user side and the network environment information of the user side;
the determining module is used for determining the security level of the user terminal according to the network environment information; wherein, the security level and the dangerous degree represented by the network environment information are in a negative correlation;
The acquisition module is used for acquiring verification combinations according to the target quantity set for the security level; wherein the security level and the target number are in a negative correlation; the verification combination comprises a plurality of grids, a clicking rule of the plurality of grids and a standard clicking sequence of the plurality of grids; the number of the Gong Gezhong units is the same as the target number; each cell comprises corresponding display content;
The first sending module is used for sending the multi-grid and the click rule to the user side according to the identification;
the third receiving module is used for receiving the clicking sequence and clicking information recorded by the user side when the user clicks the cell; the clicking medium of the user terminal is a mouse; the click information comprises one or more of a mouse moving track and click time;
The comparison module is used for comparing the clicking sequence with the standard clicking sequence after receiving the clicking sequence recorded by the user side when the user clicks the cell;
the judging module is used for judging whether the operation object of the user terminal is human or a machine according to the clicking information when the clicking sequence is the same as the standard clicking sequence;
The fifth sending module is used for sending a second verification result which is successfully verified to the user side corresponding to the identifier according to the identifier when the operation object of the user side is human;
The judging module is used for judging whether the operation object of the user terminal is a human or a machine according to the clicking information when the clicking sequence is the same as the standard clicking sequence, and is specifically used for:
when the click information only comprises a mouse moving track, judging whether an operation object of a user side is human or a machine according to a mouse moving position and a mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence;
under the condition that the click information only comprises the click time, judging whether the click time is larger than the preset click time or not when the click sequence is the same as the standard click sequence; when the click time is longer than the preset click time, the operation object of the user side is human; when the click time is not more than the preset click time, the operation object representing the user side is a machine;
When the click information comprises the click time and the mouse moving track, judging whether an operation object of the user side is human or a machine according to the mouse moving position and the mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence; judging whether the click time is longer than the preset click time or not; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track meet the preset conditions and the clicking time is longer than the preset clicking time, the operation object of the user side is human; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track do not meet the preset condition and/or the clicking time is not longer than the preset clicking time, the operation object of the user side is a machine;
The obtaining module is specifically configured to, when obtaining the verification combination according to the target number set for the security level:
Randomly generating a first number of digital cells and a second number of graphics cells; wherein the sum of the first number and the second number is equal to the target number; the display content in the graphic unit lattice is a graphic corresponding to the shape of the number; the graphic cell is used for interfering user authentication;
and randomly combining the digital cells and the graphic cells to obtain a multi-grid.
9. An authentication graphic acquisition apparatus residing on a user side, the apparatus comprising:
The second sending module is used for sending a verification request to the server; the verification request carries the identifier of the user side and the network environment information of the user side;
The second receiving module is used for receiving the multi-palace lattice generated by the server and the clicking rule of the multi-palace lattice; wherein the number of the Gong Gezhong cells is a target number; each cell comprises corresponding display content; the target number is determined by the server according to the security level of the user side; the security level of the user side is determined by the server according to the network environment information; the security level and the target number are in a negative correlation; the security level and the dangerous degree represented by the network environment information are in a negative correlation relationship;
the display module is used for displaying the multi-grid and the click rules on a display screen of the user side;
The server is used for:
Receiving the clicking sequence and clicking information recorded by the user side when the user clicks the cell; the clicking medium of the user terminal is a mouse; the click information comprises one or more of a mouse moving track and click time;
after receiving the click sequence recorded by the user side when the user clicks the cell, comparing the click sequence with a standard click sequence;
when the clicking sequence is the same as the standard clicking sequence, judging whether the operation object of the user terminal is human or machine according to the clicking information;
when the operation object of the user terminal is human, according to the identification, a second verification result which is successfully verified is sent to the user terminal corresponding to the identification;
the server is configured to, when the click order is the same as the standard click order, determine, according to the click information, whether the operation object of the user terminal is a human or a machine, specifically configured to:
when the click information only comprises a mouse moving track, judging whether an operation object of a user side is human or a machine according to a mouse moving position and a mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence;
under the condition that the click information only comprises the click time, judging whether the click time is larger than the preset click time or not when the click sequence is the same as the standard click sequence; when the click time is longer than the preset click time, the operation object of the user side is human; when the click time is not more than the preset click time, the operation object representing the user side is a machine;
When the click information comprises the click time and the mouse moving track, judging whether an operation object of the user side is human or a machine according to the mouse moving position and the mouse moving acceleration contained in the mouse moving track when the click sequence is the same as the standard click sequence; judging whether the click time is longer than the preset click time or not; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track meet the preset conditions and the clicking time is longer than the preset clicking time, the operation object of the user side is human; when the mouse moving position and the mouse moving acceleration contained in the mouse moving track do not meet the preset condition and/or the clicking time is not longer than the preset clicking time, the operation object of the user side is a machine;
The server is configured to generate the multiple palace lattice by:
Randomly generating a first number of digital cells and a second number of graphics cells; wherein the sum of the first number and the second number is equal to the target number; the display content in the graphic unit lattice is a graphic corresponding to the shape of the number; the graphic cell is used for interfering user authentication;
and randomly combining the digital cells and the graphic cells to obtain a multi-grid.
CN202111214745.4A 2021-10-19 2021-10-19 Verification graph acquisition method and device Active CN113965369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111214745.4A CN113965369B (en) 2021-10-19 2021-10-19 Verification graph acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111214745.4A CN113965369B (en) 2021-10-19 2021-10-19 Verification graph acquisition method and device

Publications (2)

Publication Number Publication Date
CN113965369A CN113965369A (en) 2022-01-21
CN113965369B true CN113965369B (en) 2024-05-28

Family

ID=79465249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111214745.4A Active CN113965369B (en) 2021-10-19 2021-10-19 Verification graph acquisition method and device

Country Status (1)

Country Link
CN (1) CN113965369B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980128A (en) * 2005-12-01 2007-06-13 王继华 Method and system for identifying internet user
CN103685244A (en) * 2013-11-28 2014-03-26 深圳大学 Differentiated authentication method and differentiated authentication device
CN104243399A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 User identifying method, client, server and system for realizing the method
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN105989268A (en) * 2015-03-02 2016-10-05 苏宁云商集团股份有限公司 Safety access method and system for human-computer identification
CN107742067A (en) * 2016-10-31 2018-02-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
CN107743112A (en) * 2016-10-31 2018-02-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
CN110795719A (en) * 2019-10-16 2020-02-14 上海易点时空网络有限公司 Data configuration method and device for click verification
CN113468515A (en) * 2021-07-13 2021-10-01 富途网络科技(深圳)有限公司 User identity authentication method and device, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017084337A1 (en) * 2015-11-16 2017-05-26 腾讯科技(深圳)有限公司 Identity verification method, apparatus and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980128A (en) * 2005-12-01 2007-06-13 王继华 Method and system for identifying internet user
CN104243399A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 User identifying method, client, server and system for realizing the method
CN103685244A (en) * 2013-11-28 2014-03-26 深圳大学 Differentiated authentication method and differentiated authentication device
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN105989268A (en) * 2015-03-02 2016-10-05 苏宁云商集团股份有限公司 Safety access method and system for human-computer identification
CN107742067A (en) * 2016-10-31 2018-02-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
CN107743112A (en) * 2016-10-31 2018-02-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
CN110795719A (en) * 2019-10-16 2020-02-14 上海易点时空网络有限公司 Data configuration method and device for click verification
CN113468515A (en) * 2021-07-13 2021-10-01 富途网络科技(深圳)有限公司 User identity authentication method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113965369A (en) 2022-01-21

Similar Documents

Publication Publication Date Title
CN105471808B (en) Generate the method for identifying code and the method, apparatus and system of safety verification
CN106384143B (en) Dynamic electronic two-dimensional code generation method and identification method
US20130145441A1 (en) Captcha authentication processes and systems using visual object identification
CN108683667B (en) Account protection method, device, system and storage medium
US20140157382A1 (en) Observable authentication methods and apparatus
CN106341403B (en) A kind of method of the anti-brush of identifying code
CN104135365A (en) A method, a server, and a client for verifying an access request
CN103873432A (en) Verification code implementation method and system thereof and verification code server end
WO2017193165A1 (en) Authenticating a user
US20090235178A1 (en) Method, system, and computer program for performing verification of a user
CN104657653B (en) The verification method and checking device of image authentication code
CN113918898B (en) Security verification code generation method, system and medium based on track drawing interaction
CN1998174A (en) Method and system to generate an image for monitoring user interaction with a computer
CN103971045A (en) Click type verification code implementation method
CN111882425B (en) Service data processing method, device and server
CN113709513B (en) Equipment fingerprint processing method, user side, server, system and storage medium
EP3273377B1 (en) System for dynamic image captcha
CN111353140A (en) Verification code generation and display method, device and system
CN113965369B (en) Verification graph acquisition method and device
CN116074833A (en) Method and device for judging short message verification code
CN111949952B (en) Method for processing verification code request and computer-readable storage medium
CN111523106A (en) Input verification method based on Chinese character splitting
CN105138894B (en) A kind of identifying code safety defense method, system and device
CN110740112B (en) Authentication method, apparatus and computer readable storage medium
JP7227444B2 (en) Access authentication method using random dot pattern CAPTCHA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant