CN115348093A - Picture verification method and device, storage medium and picture verification equipment - Google Patents

Picture verification method and device, storage medium and picture verification equipment Download PDF

Info

Publication number
CN115348093A
CN115348093A CN202210988136.2A CN202210988136A CN115348093A CN 115348093 A CN115348093 A CN 115348093A CN 202210988136 A CN202210988136 A CN 202210988136A CN 115348093 A CN115348093 A CN 115348093A
Authority
CN
China
Prior art keywords
coordinate point
client
coordinate
picture
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210988136.2A
Other languages
Chinese (zh)
Inventor
杨腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210988136.2A priority Critical patent/CN115348093A/en
Publication of CN115348093A publication Critical patent/CN115348093A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a picture verification method, a picture verification device, a storage medium and picture verification equipment. Wherein, the method comprises the following steps: randomly generating a first coordinate point according to a coordinate area range corresponding to the picture to be verified; sending the first coordinate point to a client, and displaying the first coordinate point on a verification interface of the client; receiving a second coordinate point returned by the client, wherein the second coordinate point is generated after clicking operation is carried out on a position indicated by the first coordinate point in a verification interface of the client; and determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point meet the preset condition. The method and the device solve the technical problems of complexity in background processing, high database pressure and low program running speed of the conventional picture verification mode.

Description

Picture verification method and device, storage medium and picture verification equipment
Technical Field
The present application relates to the field of data processing, and in particular, to a picture verification method, an apparatus, a storage medium, and a picture verification device.
Background
With the rapid development of computer technology and electronic technology, communication technology and computer network technology are becoming more mature. The verification code modes provided by the server are more and more diversified, including pictures, sliding, counting, character clicking and the like. For the existing picture verification mode, most of the pictures are complicated in background processing, and the database pressure and the program running speed are increased. For example, in a verification mode of clicking a picture area, verification can be completed only by acquiring detailed information of the picture, and a large amount of information such as canvas dyeing, fonts, brightness, shadows and the like.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a picture verification method, a picture verification device, a storage medium and picture verification equipment, and aims to at least solve the technical problems of complex background processing, high database pressure and low program running speed.
According to an aspect of an embodiment of the present application, there is provided a picture verification method, including: randomly generating a first coordinate point according to a coordinate area range corresponding to the picture to be verified; sending the first coordinate point to a client, and displaying the first coordinate point on a verification interface of the client; receiving a second coordinate point returned by the client, wherein the second coordinate point is generated by clicking the position indicated by the first coordinate point in the verification interface of the client; and determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point meet the preset condition.
Optionally, in a case that it is determined that the first coordinate point and the second coordinate point satisfy a preset condition, determining that the client is verified includes: carrying out rounding operation on the second coordinate point to obtain a rounded second coordinate point; and determining that the client passes the verification under the condition that the rounded second coordinate point is consistent with the first coordinate point.
Optionally, the rounding operation is implemented as follows: determining the digits of the horizontal axis coordinates and the vertical axis coordinates in the second coordinate points after the decimal point; and rounding the numerical value corresponding to the digit after the decimal point to obtain a second coordinate point after the rounding.
Optionally, before randomly generating the first coordinate point according to the coordinate area range corresponding to the picture to be verified, the method further includes: establishing a coordinate system by taking a predetermined position in the picture to be verified as an origin; determining the corresponding coordinate position of each vertex of the picture to be verified in a coordinate system; and generating a coordinate area range according to the coordinate position.
Optionally, before sending the first coordinate point to the client, the method includes: determining a first name of the picture to be verified, encrypting the first name and the first coordinate point by adopting a first type encryption and decryption algorithm to obtain encrypted first data, and storing the first data in a value database.
Optionally, sending the first coordinate point to the client includes: encrypting the first name of the picture to be verified by adopting a second type encryption and decryption algorithm to obtain a name in a ciphertext form; and sending the name in the form of the ciphertext and the first coordinate point to the client.
Optionally, in a case that it is determined that the first coordinate point and the second coordinate point satisfy a preset condition, determining that the client is verified, includes: a second type encryption and decryption algorithm is called to decrypt the ciphertext to obtain a plaintext name; calling a first type encryption and decryption algorithm to encrypt the name in the plaintext form and the second coordinate point to obtain encrypted second data; and comparing the second data with the first data stored in the database, and determining that the client side is verified under the condition of the second data and the first data.
According to another aspect of the embodiments of the present application, there is also provided a picture verification apparatus, including: the generating module is used for randomly generating a first coordinate point according to the coordinate area range corresponding to the picture to be verified; the sending module is used for sending the first coordinate point to the client and displaying the first coordinate point on a verification interface of the client; the receiving module is used for receiving a second coordinate point returned by the client, wherein the second coordinate point is generated by clicking a position indicated by the first coordinate point in the verification interface of the client; and the determining module is used for determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point meet the preset condition.
According to another aspect of embodiments of the present application, there is also provided a nonvolatile storage medium including: the storage medium includes a stored program, wherein the device on which the storage medium is located is controlled to execute any one of the picture authentication methods when the program runs.
According to another aspect of the embodiments of the present application, there is also provided an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to execute the instructions to implement any one of the picture verification methods.
In the embodiment of the application, a first coordinate point is randomly generated by adopting an image verification mode according to a coordinate area range corresponding to a picture to be verified; sending the first coordinate point to a client, and displaying the first coordinate point on a verification interface of the client; receiving a second coordinate point returned by the client, wherein the second coordinate point is generated after clicking operation is carried out on a position indicated by the first coordinate point in a verification interface of the client; under the condition that the first coordinate point and the second coordinate point are determined to meet the preset conditions, the client is determined to pass verification, and the purpose of completing comparison verification by combining the picture name with the coordinate point and then performing encryption processing is achieved, so that the difficulty of program identification is increased, the pressure of program operation is reduced, and the verification safety is increased to a certain extent. Parameters such as text information, fonts and colors in various pictures are omitted, the technical effect of data space is saved, and the technical problems that background processing of picture verification modes in related technologies is complicated, the pressure of a database is high, the running speed of programs is low and the like are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a picture verification method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a flow chart for implementing verification of a coordinate axis anchor point picture according to an embodiment of the present disclosure;
fig. 3 is a schematic device structure diagram of a picture verification method according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For the convenience of better understanding of the embodiments related to the present application, technical terms or partial terms that may be referred to in the present application are now explained:
DES encryption is DES symmetric encryption, which is a relatively conventional encryption method, and the same key is used for encryption operation and decryption operation, and a sender of information and a receiver of information must share the same key (called symmetric key) when transmitting and processing information, which is a symmetric encryption algorithm. DES encryption divides plaintext into fixed byte blocks, encrypts the byte blocks, and finally strings together to form a ciphertext. DES uses a 56-bit key with an additional 8-bit parity bit, resulting in a maximum packet size of 64 bits. This is an iterative block cipher using a technique known as Feistel in which the encrypted text block is divided in half.
RSA encryption is an asymmetric encryption. Decryption can be done without directly passing the key. This ensures the security of the information and avoids the risk of being cracked due to the direct transfer of the key. Is the process of encryption and decryption by a pair of keys, which are respectively called a public key and a private key. In the RAS algorithm, the public key is public, while the private key needs to be kept secret. Both encryption and decryption algorithms are also disclosed. Although the private key is determined by the public key, the private key cannot be calculated from the public key, which is the security of RSA.
In accordance with an embodiment of the present application, there is provided a method embodiment for image verification, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions and that, although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different than that described herein.
Fig. 1 is a picture verification method according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S102, a first coordinate point is randomly generated according to a coordinate area range corresponding to a picture to be verified;
step S104, sending the first coordinate point to the client, and displaying the first coordinate point on a verification interface of the client;
step S106, receiving a second coordinate point returned by the client, wherein the second coordinate point is generated after clicking the position indicated by the first coordinate point in the verification interface of the client;
and step S108, determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point meet the preset conditions.
In the picture verification method, a first coordinate point is randomly generated according to a coordinate area range corresponding to a picture to be verified; sending the first coordinate point to a client, and displaying the first coordinate point on a verification interface of the client; receiving a second coordinate point returned by the client, wherein the second coordinate point is generated after clicking operation is carried out on a position indicated by the first coordinate point in a verification interface of the client; under the condition that the first coordinate point and the second coordinate point are determined to meet the preset conditions, the client is determined to pass verification, and the purpose of completing comparison verification by combining the picture name with the coordinate point and then performing encryption processing is achieved, so that the difficulty of program identification is increased, the pressure of program operation is reduced, and the verification safety is increased to a certain extent. Parameters such as text information, fonts and colors in various pictures are omitted, the technical effect of data space is saved, and the technical problems that background processing of picture verification modes in related technologies is complicated, the pressure of a database is high, the running speed of programs is low and the like are solved.
In some embodiments of the present application, when it is determined that the first coordinate point and the second coordinate point satisfy the preset condition, determining that the client passes the verification may be implemented in the following manner, specifically, performing a rounding operation on the second coordinate point to obtain a rounded second coordinate point; and determining that the client passes the verification under the condition that the rounded second coordinate point is consistent with the first coordinate point. For example, if the position clicked by the user at the client is not an integer, rounding is performed, assuming that the second coordinate clicked by the user is (6.3,6.1), then rounding is performed to obtain a rounded second coordinate (6,6), and the first coordinate is (6,6), so that the rounded second coordinate is consistent with the first coordinate, and then the client can be determined to pass the verification.
In some embodiments of the present application, according to the rounding operation, the rounding operation may be implemented by specifically determining the number of digits of the horizontal axis coordinate and the vertical axis coordinate in the second coordinate point after the decimal point; and rounding the numerical value corresponding to the digit after the decimal point to obtain a second coordinate point after the rounding. For example, the rounding of the second coordinate point is to round the decimal part of the horizontal and vertical coordinates, and if the coordinate of the second coordinate point is (7.8,7.9), the rounding operation is performed at this time to obtain a rounded second coordinate point of (8,8).
In some embodiments of the present application, before the first coordinate point is randomly generated according to the coordinate area range corresponding to the picture to be verified, the method may be implemented as follows, specifically, a coordinate system is established with a predetermined position in the picture to be verified as an origin; determining the corresponding coordinate position of each vertex of the picture to be verified in a coordinate system; and generating a coordinate area range according to the coordinate position. For example, the position of the coordinate origin is determined, and the position of the coordinate origin may be at the center of the picture, at four vertices of the picture, or at any other position. The position of the origin of coordinates is different, and the area range of the coordinates is also different, so the position of the origin of coordinates is determined.
In some embodiments of the present application, before sending the first coordinate point to the client, the method may be implemented in the following manner, specifically, determining a first name of the picture to be verified, encrypting the first name and the first coordinate point by using a first type encryption and decryption algorithm, obtaining encrypted first data, and storing the first data in a database.
In some embodiments of the present application, the sending of the first coordinate point to the client may be implemented in a manner that, specifically, a first name of the picture to be verified is encrypted by using a second type encryption and decryption algorithm to obtain a name in a form of a ciphertext; and sending the name in the form of the ciphertext and the first coordinate point to the client.
In some embodiments of the application, the client verification is determined to be passed according to the condition that the first coordinate point and the second coordinate point meet the preset condition, which can be realized by specifically calling a second type encryption and decryption algorithm to decrypt a ciphertext to obtain a plaintext name; calling a first type encryption and decryption algorithm to encrypt the name in the plaintext form and the second coordinate point to obtain encrypted second data; and comparing the second data with the first data stored in the database, and determining that the client side passes the verification under the condition of the second data and the first data.
To facilitate better understanding of the technical solutions of the present application, a description will now be given with reference to a specific embodiment.
Fig. 2 is a schematic diagram of a process for implementing verification of a coordinate axis anchor point picture according to an embodiment of the present application, and as shown in fig. 2, the process mainly includes the following steps:
(1) Establishing a picture library, marking the picture names by using universal unique identifiers, then storing the picture names and the corresponding coordinate points in a database, encrypting all the picture names and the corresponding coordinate points by using DES (data encryption standard), and storing the picture names and the corresponding coordinate points in the database for comparison and verification.
(2) The method comprises the steps of obtaining an image randomly to obtain information such as encrypted data and an image name, encrypting the image name by using RSA, then sending the encrypted image name to a client, planning coordinate axes in the image by calculation, displaying coordinate points (x, y) and allowing the client to click and view the coordinate points.
(3) The maximum value and the minimum value of the coordinate points in the picture are obtained, the code randomly generates one coordinate point which belongs to the coordinate axis range of the picture and then sends the coordinate point to the client, and the client finishes verification by clicking the corresponding coordinate point through a mouse.
(4) When the position clicked by the client is in the area range between the coordinate points, if the distance is smaller than 1/2, a smaller coordinate point is taken, if the distance is greater than or equal to 1/2, a larger coordinate point is taken, rounding operation is carried out, and the position clicked by the same standard is on the x axis, the x point is changed, and the y is not changed; the y point changes on the y axis, and x does not change.
(5) Extracting the coordinate point and the picture name of the client, firstly carrying out RSA decryption on the picture name, carrying out DES encryption on the picture name and the coordinate point, carrying out comparison on the encrypted data and the encrypted data information of the picture name and the coordinate point in the step 2, passing verification if the encrypted data and the encrypted data information of the picture name and the coordinate point are consistent, otherwise failing verification, and obtaining the picture again for planning until the picture passes verification.
It is easy to notice that this solution has the following effective effect:
(1) The verification is carried out through coordinate axis positioning, and the method is convenient for establishing a gallery and planning data aiming at the prior art. Through the accuracy of the coordinate points and the diversity of the pictures, the identification difficulty of the program is increased.
(2) The security of the verification code is guaranteed through the encryption and decryption modes, brute force cracking of a machine is prevented, and operation and use of the client side are simplified to a certain extent.
(3) The related technologies mostly extract information in the picture and combine the coordinate points to obtain the range to finish the verification technology.
Fig. 3 is a device for image verification according to an embodiment of the present application, and as shown in fig. 3, the device includes:
the generating module 40 is configured to randomly generate a first coordinate point according to a coordinate area range corresponding to the picture to be verified;
the sending module 42 is configured to send the first coordinate point to the client, and display the first coordinate point on a verification interface of the client;
the receiving module 44 is configured to receive a second coordinate point returned by the client, where the second coordinate point is a coordinate point generated by performing a click operation on a position indicated by the first coordinate point in the verification interface of the client;
and the determining module 46 is configured to determine that the client is verified if the first coordinate point and the second coordinate point are determined to meet the preset condition.
In the picture verification device, a generation module 40 is used for randomly generating a first coordinate point according to a coordinate area range corresponding to a picture to be verified; the sending module 42 is configured to send the first coordinate point to the client, and display the first coordinate point on a verification interface of the client; the receiving module 44 is configured to receive a second coordinate point returned by the client, where the second coordinate point is a coordinate point generated by performing a click operation on a position indicated by the first coordinate point in the verification interface of the client; the determining module 46 is configured to determine that the client passes verification when it is determined that the first coordinate point and the second coordinate point satisfy the preset condition, and achieve a purpose of completing comparison and verification in a manner of encrypting after combining a picture name with the coordinate point, thereby increasing difficulty in identifying a program, reducing pressure during program operation, increasing verification security to a certain extent, omitting parameters such as text information, fonts, colors, and the like in various pictures, saving a data space, and further solving technical problems in related technologies, such as cumbersome background processing of a picture verification manner, large database pressure, slow program operation speed, and the like.
According to another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium, where the nonvolatile storage medium includes a stored program, and a device in which the nonvolatile storage medium is controlled to execute any one of the picture verification methods when the program runs.
Specifically, the storage medium is used for storing program instructions of the following functions, and the following functions are realized:
randomly generating a first coordinate point according to a coordinate area range corresponding to a picture to be verified; sending the first coordinate point to a client, and displaying the first coordinate point on a verification interface of the client; receiving a second coordinate point returned by the client, wherein the second coordinate point is generated by clicking the position indicated by the first coordinate point in the verification interface of the client; and determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point meet the preset condition.
An embodiment according to the application provides an electronic device, which includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the above.
Optionally, the electronic device may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
The above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the advantages and disadvantages of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technical content can be implemented in other manners. The above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or may not be executed. In addition, the shown or discussed coupling or direct coupling or communication connection between each other may be an indirect coupling or communication connection through some interfaces, units or modules, and may be electrical or in other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that, as will be apparent to those skilled in the art, numerous modifications and adaptations can be made without departing from the principles of the present application and such modifications and adaptations are intended to be considered within the scope of the present application.

Claims (10)

1. A picture verification method is characterized by comprising the following steps:
randomly generating a first coordinate point according to a coordinate area range corresponding to the picture to be verified;
sending the first coordinate point to a client, and displaying the first coordinate point on a verification interface of the client;
receiving a second coordinate point returned by the client, wherein the second coordinate point is generated after clicking operation is carried out on a position indicated by a first coordinate point in a verification interface of the client;
and determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point are determined to meet the preset condition.
2. The method according to claim 1, wherein in a case that it is determined that the first coordinate point and the second coordinate point satisfy a preset condition, determining that the client terminal is verified to be passed comprises:
performing rounding operation on the second coordinate point to obtain a rounded second coordinate point;
and determining that the client passes the verification under the condition that the rounded second coordinate point is consistent with the first coordinate point.
3. The method of claim 2, wherein the rounding operation is performed by:
determining the digits of the horizontal axis coordinates and the vertical axis coordinates in the second coordinate points after the decimal point;
and rounding the numerical value corresponding to the digit after the decimal point to obtain the rounded second coordinate point.
4. The method according to claim 1, before randomly generating the first coordinate point according to the coordinate area range corresponding to the picture to be verified, the method further comprising:
establishing a coordinate system by taking a predetermined position in the picture to be verified as an origin;
determining the corresponding coordinate positions of all vertexes of the picture to be verified in the coordinate system;
and generating the coordinate area range according to the coordinate position.
5. The method according to claim 1, wherein before transmitting the first coordinate point to a client, the method comprises:
determining a first name of the picture to be verified, encrypting the first name and the first coordinate point by adopting a first type encryption and decryption algorithm to obtain encrypted first data, and storing the first data in a database.
6. The method of claim 5, wherein sending the first coordinate point to a client comprises:
encrypting the first name of the picture to be verified by adopting a second type encryption and decryption algorithm to obtain a name in a ciphertext form;
and sending the name in the form of the ciphertext and the first coordinate point to the client.
7. The method according to claim 6, wherein in a case that it is determined that the first coordinate point and the second coordinate point satisfy a preset condition, determining that the client terminal is verified to be passed comprises:
calling the second type encryption and decryption algorithm to decrypt the ciphertext to obtain a plaintext name;
calling a first type encryption and decryption algorithm to encrypt the name in the plain text form and the second coordinate point to obtain encrypted second data;
and comparing the second data with the first data stored in the database, and determining that the client side passes the verification under the condition of the second data and the first data.
8. An image authentication apparatus, comprising:
the generating module is used for randomly generating a first coordinate point according to the coordinate area range corresponding to the picture to be verified;
the sending module is used for sending the first coordinate point to a client and displaying the first coordinate point on a verification interface of the client;
the receiving module is used for receiving a second coordinate point returned by the client, wherein the second coordinate point is generated by clicking a position indicated by a first coordinate point in a verification interface of the client;
and the determining module is used for determining that the client passes the verification under the condition that the first coordinate point and the second coordinate point are determined to meet the preset condition.
9. A non-volatile storage medium, wherein the storage medium includes a stored program, and wherein when the program runs, a device on which the storage medium is located is controlled to execute the picture authentication method according to any one of claims 1 to 7.
10. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the picture verification method of any one of claims 1 to 7.
CN202210988136.2A 2022-08-17 2022-08-17 Picture verification method and device, storage medium and picture verification equipment Pending CN115348093A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210988136.2A CN115348093A (en) 2022-08-17 2022-08-17 Picture verification method and device, storage medium and picture verification equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210988136.2A CN115348093A (en) 2022-08-17 2022-08-17 Picture verification method and device, storage medium and picture verification equipment

Publications (1)

Publication Number Publication Date
CN115348093A true CN115348093A (en) 2022-11-15

Family

ID=83952192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210988136.2A Pending CN115348093A (en) 2022-08-17 2022-08-17 Picture verification method and device, storage medium and picture verification equipment

Country Status (1)

Country Link
CN (1) CN115348093A (en)

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
JP2746352B2 (en) Secure security communication system and method for communication by a remotely located computer
CN111130803B (en) Method, system and device for digital signature
US4924515A (en) Secure management of keys using extended control vectors
CN109767375A (en) The method and system of image watermark insertion and retrospect
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
CN110266682B (en) Data encryption method and device, mobile terminal and decryption method
CN108199847B (en) Digital security processing method, computer device, and storage medium
JP2016528845A (en) ID authentication system, apparatus, method, and ID authentication request apparatus
CN112738051B (en) Data information encryption method, system and computer readable storage medium
CN108868367B (en) Intelligent lock device
CN110690956A (en) Bidirectional authentication method and system, server and terminal
CN107483432A (en) File encryption processing method and processing device
CN111163164B (en) Cloud desktop secure transmission method and device based on Roc chip
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN113722741A (en) Data encryption method and device and data decryption method and device
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
CN116455572B (en) Data encryption method, device and equipment
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN110912683B (en) Password storage method and device and password verification method and device
CN110968878B (en) Information transmission method, system, electronic equipment and readable medium
CN110598427A (en) Data processing method, system and storage medium
CN106972928B (en) Bastion machine private key management method, device and system
CN115348093A (en) Picture verification method and device, storage medium and picture verification equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination