CN115348095A - Login verification method and device, electronic equipment and storage medium - Google Patents

Login verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115348095A
CN115348095A CN202210991332.5A CN202210991332A CN115348095A CN 115348095 A CN115348095 A CN 115348095A CN 202210991332 A CN202210991332 A CN 202210991332A CN 115348095 A CN115348095 A CN 115348095A
Authority
CN
China
Prior art keywords
verification
question
user
image
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210991332.5A
Other languages
Chinese (zh)
Inventor
徐鹏鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ccx Credit Technology Co ltd
Original Assignee
Ccx Credit Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ccx Credit Technology Co ltd filed Critical Ccx Credit Technology Co ltd
Priority to CN202210991332.5A priority Critical patent/CN115348095A/en
Publication of CN115348095A publication Critical patent/CN115348095A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Abstract

The embodiment of the invention provides a login verification method, a login verification device, electronic equipment and a storage medium, wherein the method comprises the following steps: generating a verification image, a verification question and a correct answer of the verification question in response to a login operation of a user, wherein the verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated based on the shape and/or color of at least one graphic unit in the verification image; presenting the authentication image and an authentication question to the user such that the user inputs an authentication answer to the authentication question; and judging that the user passes the verification if the verification answer is consistent with the correct answer. The embodiment of the invention realizes the improvement of the login verification efficiency.

Description

Login verification method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of internet application technologies, and in particular, to a login verification method and apparatus, an electronic device, and a storage medium.
Background
Authentication codes are a public, fully automated program that distinguishes whether a user is a computer or a person, and are now commonly used in the login scenario for internet applications. At present, login verification is mostly realized based on a mobile phone number of a user, namely, an enterprise short message including a verification code is sent to the user, so that the user inputs the received verification code to a login interface to verify identity, and a hacker can be effectively prevented from carrying out continuous login attempts on a certain specific registered user in a mode of violence breaking through a specific program. However, the login authentication method has certain problems, on one hand, the interaction between the front end and the back end is needed, the influence of the fluency degree of network signals is caused, and the flow is easy to be blocked; and the other side needs a certain service cost for sending the enterprise short message to the user, so the login verification method has lower overall efficiency and higher cost.
Disclosure of Invention
Embodiments of the present invention provide a login verification method, a login verification device, an electronic device, and a storage medium, so as to improve efficiency of login verification. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a login verification method, where the method includes:
generating a verification image, a verification question and a correct answer of the verification question in response to a login operation of a user, wherein the verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated based on the shape and/or color of at least one graphic unit in the verification image;
displaying the verification image and a verification question to the user so that the user inputs a verification answer to the verification question;
and judging that the user passes the verification if the verification answer is consistent with the correct answer.
In one embodiment of the invention, the method further comprises:
sending an instruction to the user indicating whether to reset the verification question if the verification answer and the correct answer are not consistent;
and when a reset instruction which is sent by the user and indicates that the verification problem is reset is received, returning to the execution step: and generating a verification image, a verification question and a correct answer of the verification question.
In an embodiment of the present invention, the generating an authentication image, an authentication question, and a correct answer to the authentication question in response to a login operation of a user includes:
selecting at least two graphic units from a preset graphic database to obtain a target graphic unit;
selecting at least two colors from a preset color database to obtain a target color;
distributing the target color to the target graphic unit to obtain the verification image;
generating the verification question based on shapes and/or colors of at least two of the target graphical elements in the verification image;
and obtaining a correct answer of the verification question according to the verification question.
In an embodiment of the present invention, the generating an authentication image, an authentication question, and a correct answer to the authentication question in response to a login operation of a user includes:
and responding to login verification operation after the user inputs a verification mobile phone number, and generating a verification image, a verification question and a correct answer of the verification question.
In one embodiment of the present invention, the shape of the graphic unit is at least one of a square, a triangle, and a circle;
the color of the graphic unit is at least one of red, orange, yellow, green, cyan, blue and purple.
In a second aspect, an embodiment of the present invention provides a login authentication apparatus, where the apparatus includes:
the verification generation module is used for responding to login operation of a user and generating a verification image, a verification question and a correct answer of the verification question, wherein the verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is generated based on the shape and/or color of at least one graphic unit in the verification image;
the verification display module is used for displaying the verification image and a verification question to the user so that the user inputs a verification answer aiming at the verification question;
and the verification judging module is used for judging that the user passes the verification under the condition that the verification answer is consistent with the correct answer.
In one embodiment of the present invention, the apparatus further comprises:
the instruction sending module is used for sending an instruction indicating whether to reset the verification question to the user under the condition that the verification answer is inconsistent with the correct answer;
the repeated execution module is used for returning to the execution step under the condition of receiving a reset instruction which is sent by the user and represents resetting the verification problem: and generating a verification image, a verification question and a correct answer of the verification question.
In an embodiment of the present invention, the verification generation module is specifically configured to:
selecting at least two graphic units from a preset graphic database to obtain a target graphic unit;
selecting at least two colors from a preset color database to obtain a target color;
distributing the target color to the target graphic unit to obtain the verification image;
generating the verification question based on shapes and/or colors of at least two of the target graphical elements in the verification image;
and obtaining a correct answer of the verification question according to the verification question.
In an embodiment of the present invention, the verification generation module is specifically configured to:
and responding to the login verification operation after the user inputs the verification mobile phone number, and generating a verification image, a verification question and a correct answer of the verification question.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
and a processor for implementing any of the above-described login authentication method steps when executing the program stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements any of the login authentication method steps described above.
Embodiments of the present invention further provide a computer program product including instructions, which when run on a computer, cause the computer to perform any of the above-mentioned login authentication methods.
The embodiment of the invention has the following beneficial effects:
the login verification method provided by the embodiment of the invention firstly responds to the login operation of a user to generate a verification image, a verification question and a correct answer to the verification question, wherein the verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated on the basis of the shape and/or color of at least one graphic unit in the verification image. The authentication image and the authentication question are then presented to the user so that the user enters an authentication answer to the authentication question. And in the case that the verification answer is consistent with the correct answer, judging that the user passes the verification. The embodiment of the invention can realize login verification without sending enterprise short messages to the user, and eliminates the steps of calling related interfaces and front-back end interaction, so that the login verification is not influenced by network signals any more, the smoothness and efficiency of the login verification are improved, and the user experience is further improved. Meanwhile, the cost required by enterprise short messages is saved.
Of course, it is not necessary for any product or method to achieve all of the above-described advantages at the same time for practicing the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by referring to these drawings.
Fig. 1a is a schematic flowchart of a first login verification method according to an embodiment of the present invention;
FIG. 1b is an exemplary diagram of a login verification interface presented to a user according to an embodiment of the present invention;
FIG. 1c is an exemplary diagram of a verification interface showing a verification image and a verification question to a user according to an embodiment of the present invention;
FIG. 1d is an exemplary diagram illustrating a prompt interface indicating that verification is passed or successful for a user according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a second login verification method according to an embodiment of the present invention;
fig. 3 is a possible implementation manner of step S11 provided in the embodiment of the present invention;
fig. 4 is a schematic structural diagram of a login authentication apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device for implementing a login authentication method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived from the embodiments given herein by one of ordinary skill in the art, are within the scope of the invention.
Since login authentication in the related art often needs to send a login authentication short message to a user, the login authentication is affected by the smoothness of network signals, flow interruption is easy to occur, and the efficiency is low. And sending the login authentication short message requires a certain cost. In order to solve the above problems, embodiments of the present invention provide a login authentication method, a login authentication device, an electronic device, and a storage medium, and the login authentication method is described in detail below with specific embodiments.
The method provided by the embodiment of the invention is applied to the intelligent terminal, can be implemented by the intelligent terminal, and can be used for servers, computers, mobile phones and the like in the actual use process.
Referring to fig. 1a, an embodiment of the present invention provides a flowchart of a first login authentication method, including:
step S11: and responding to the login operation of the user, and generating an authentication image, an authentication question and a correct answer of the authentication question.
The verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification problem is generated based on the shape and/or color of at least one graphic unit in the verification image.
The verification image, the verification question and the correct answer to the verification question are generated in response to the login operation of the user, and in one example, the verification image, the verification question and the correct answer to the verification question may be generated when the login operation of the user is performed to a certain operation progress, for example, after the user performs operations of confirming the verification, approving the verification and the like.
In an embodiment of the present invention, the generating an authentication image, an authentication question, and a correct answer to the authentication question in response to a login operation of a user includes:
and responding to login verification operation after the user inputs a verification mobile phone number, and generating a verification image, a verification question and a correct answer of the verification question.
After the user inputs the verification mobile phone number for verification, the user performs a certain login verification operation, which may be after the user clicks a confirmation key indicating verification, in one example. At this time, in response to the login authentication operation of the user, an authentication image, an authentication question, and a correct answer to the authentication question are generated.
In one example, a login verification interface presented to a user may be as shown in FIG. 1 b.
The graphic units are images with definite regular shapes, such as squares, triangles, circles, diamonds, pentagons, and the like, and meanwhile, the graphic units correspond to respective colors, and different graphic units may correspond to different colors or may have the same color.
After generating the verification image, a verification question is generated based on the verification image. The verification problem is generated based on the shape or color of the graphic element in the verification image, or generated based on the shape and color together, for example, the shape or color of the graphic element is identified, the shape and color of a plurality of graphic elements are calculated, and the like. The verification problem may be generated based on the shape and color of one graphic element, or generated based on the shape and color of more than one graphic element.
After generating the verification question, a correct answer to the verification question is also generated based on the generated verification question.
Step S12: the authentication image and an authentication question are presented to the user such that the user inputs an authentication answer to the authentication question.
After the verification image, the verification question, and the correct answer to the verification question are generated, the verification image and the verification question are presented to the user, and specifically, an input position for inputting the verification answer is also presented to the user, so that the user inputs the verification answer on the input position after determining the verification answer based on the verification image.
In one example, a verification interface that presents a verification image and verification questions to a user may be as shown in FIG. 1 c.
Step S13: and judging that the user passes the verification under the condition that the verification answer is consistent with the correct answer.
After the user inputs the verification answer, the verification answer and the correct answer of the verification question are compared, and under the condition that the verification answer and the correct answer of the verification question are completely consistent, the user is judged to pass the verification, and at the moment, a prompt interface showing that the verification passes or the verification succeeds is displayed for the user.
In one example, a prompt interface to the user indicating that the verification passed or that the verification succeeded may be as shown in FIG. 1 d.
In one example, the answers of different writing methods may have the same meaning, for example, 1 answer is identical to 1 answer, and one indicated meaning is identical, when comparing the verification answer with the correct answer, whether the meaning of the verification answer is identical to that of the correct answer is determined, and if so, the user is determined to be verified.
In another example, when the authentication image, the authentication question, and the input position for inputting the authentication answer are presented to the user, a request for the authentication answer, for example, a request for inputting an answer using arabic numerals, a request for inputting an answer using chinese characters, or the like, may also be presented near the input position for inputting the authentication answer.
As can be seen from the above, in the login verification method provided in the embodiment of the present invention, a verification image, a verification question, and a correct answer to the verification question are generated in response to a login operation of a user, where the verification image includes a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated based on the shape and/or color of at least one graphic unit in the verification image. The authentication image and the authentication question are then presented to the user so that the user enters an authentication answer to the authentication question. And judging that the user passes the verification under the condition that the verification answer is consistent with the correct answer. According to the embodiment of the invention, the login verification can be realized without sending enterprise short messages to the user, and the steps of calling related interfaces and front-back end interaction are eliminated, so that the login verification is not influenced by network signals any more, the smoothness and efficiency of the login verification are improved, and the user experience is further improved. Meanwhile, the cost required by enterprise short messages is saved.
In an embodiment of the present invention, as shown in fig. 2, fig. 2 provides a schematic flowchart of a second login authentication method, where the method further includes:
step S21: sending an instruction to the user indicating whether to reset the verification question if the verification answer and the correct answer are not consistent;
step S22: and when a reset instruction which is sent by the user and indicates that the verification problem is reset is received, returning to the execution step: and generating a verification image, a verification question and a correct answer of the verification question.
In the case where the verification answer input by the user is inconsistent with the correct answer, specifically, in the case where the meanings of the verification answer and the correct answer are inconsistent, it is determined that the user has failed in verification. After determining that the user authentication has failed, an instruction indicating that the authentication has failed and the authentication is re-performed is sent to the user. In addition, an instruction indicating whether to reset the verification question is sent to the user, so that the user can select to reset the verification question or not, and input a new verification answer for re-verification.
If the user selects the verification resetting problem, after a resetting instruction which is sent by the user and represents the verification resetting problem is received, a new verification image, the verification problem and a correct answer of the verification problem are regenerated, the newly generated verification image and the verification problem are displayed to the user, and verification is carried out again.
Therefore, the login authentication method provided by the embodiment of the invention judges that the user authentication fails under the condition that the authentication answer is inconsistent with the correct answer, and at the moment, the user can select to reset the authentication problem, so that the login authentication process does not need to be always stuck to the same authentication problem, and the efficiency of the user login authentication is further improved.
In one possible implementation manner, as shown in fig. 3, the generating of the verification image, the verification question and the correct answer to the verification question in response to the login operation of the user in step S11 includes:
step S31: selecting at least two graphic units from a preset graphic database to obtain a target graphic unit;
step S32: selecting at least two colors from a preset color database to obtain a target color;
step S33: distributing the target color to the target graphic unit to obtain the verification image;
step S34: generating the verification question based on shapes and/or colors of at least two of the target graphical elements in the verification image;
step S35: and obtaining a correct answer of the verification question according to the verification question.
The preset graph database and the preset color database are preset databases and are used for generating verification images. When the verification image is generated, two or more graphic units are selected from a preset graphic database as target graphic units, two or more colors are selected from a preset color database as target colors, and then the target colors are distributed to the target graphic units.
After the target color is distributed to the target graphic unit, the target graphic unit after the target color is distributed is arranged and combined to obtain the verification image.
Specifically, the target graphic unit is selected from the preset graphic database, the target color is selected from the preset color database, the target color is allocated to the target graphic unit, and the target graphic units after the target color is allocated are arranged and combined randomly, which can be performed according to actual requirements.
In an embodiment of the present invention, the shape of the graphic unit is at least one of a square, a triangle and a circle, that is, the shape of the graphic unit has one or more of a square, a triangle and a circle; the color of the graphic unit is at least one of red, orange, yellow, green, cyan, blue and purple, namely the color of the graphic unit is one or more of red, orange, yellow, green, cyan, blue and purple.
As can be seen from the above, the login verification method provided in the embodiment of the present invention, in response to the login operation of the user, selects the target graphic unit from the preset graphic database, selects the target color from the preset color database, and allocates the target color to the target graphic unit, thereby obtaining the verification image, so that the generated verification image is completely random, thereby ensuring the randomness of the verification image and improving the security of the login verification.
Referring to fig. 4, an embodiment of the present invention further provides a schematic structural diagram of a login authentication device, where the login authentication device includes:
a verification generation module 401, configured to generate a verification image, a verification question, and a correct answer to the verification question in response to a login operation of a user, where the verification image includes a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated based on a shape and/or a color of at least one graphic unit in the verification image;
a verification display module 402, configured to display the verification image and the verification question to the user, so that the user inputs a verification answer to the verification question;
a verification determination module 403, configured to determine that the user passes verification if the verification answer is consistent with the correct answer.
As can be seen from the above, the login verification apparatus provided in the embodiment of the present invention first generates a verification image, a verification question, and a correct answer to the verification question in response to the login operation of the user, where the verification image includes a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated based on the shape and/or color of at least one graphic unit in the verification image. The authentication image and the authentication question are then presented to the user so that the user enters an authentication answer to the authentication question. And judging that the user passes the verification under the condition that the verification answer is consistent with the correct answer. The embodiment of the invention can realize login verification without sending enterprise short messages to the user, and eliminates the steps of calling related interfaces and front-back end interaction, so that the login verification is not influenced by network signals any more, the smoothness and efficiency of the login verification are improved, and the user experience is further improved. Meanwhile, the cost required by enterprise short messages is saved.
In one embodiment of the invention, the apparatus further comprises:
the instruction sending module is used for sending an instruction indicating whether to reset the verification question to the user under the condition that the verification answer is inconsistent with the correct answer;
the repeated execution module is used for returning to the execution step under the condition of receiving a reset instruction which is sent by the user and represents that the verification problem is reset: and generating a verification image, a verification question and a correct answer of the verification question.
Therefore, the login authentication device provided by the embodiment of the invention judges that the user authentication fails under the condition that the authentication answer is inconsistent with the correct answer, and at the moment, the user can select to reset the authentication problem, so that the login authentication process does not need to be always blocked on the same authentication problem, and the efficiency of the user login authentication is further improved.
In an embodiment of the present invention, the verification generation module 401 is specifically configured to:
selecting at least two graphic units from a preset graphic database to obtain a target graphic unit;
selecting at least two colors from a preset color database to obtain a target color;
distributing the target color to the target graphic unit to obtain the verification image;
generating the verification question based on shapes and/or colors of at least two of the target graphical elements in the verification image;
and obtaining a correct answer of the verification question according to the verification question.
As can be seen from the above, the login verification apparatus provided in the embodiment of the present invention, in response to the login operation of the user, selects the target graphic unit from the preset graphic database, selects the target color from the preset color database, and allocates the target color to the target graphic unit, thereby obtaining the verification image, so that the generated verification image is completely random, thereby ensuring the randomness of the verification image, and improving the security of the login verification.
In an embodiment of the present invention, the verification generation module 401 is specifically configured to:
and responding to the login verification operation after the user inputs the verification mobile phone number, and generating a verification image, a verification question and a correct answer of the verification question.
An embodiment of the present invention further provides an electronic device, as shown in fig. 5, which includes a processor 501, a communication interface 502, a memory 503 and a communication bus 504, where the processor 501, the communication interface 502 and the memory 503 complete mutual communication through the communication bus 504,
a memory 503 for storing a computer program;
the processor 501 is configured to implement any of the above-described login authentication methods when executing the program stored in the memory 503.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this is not intended to represent only one bus or type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In a further embodiment of the present invention, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any of the above login authentication methods.
In a further embodiment provided by the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the login authentication methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to be performed in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on differences from other embodiments. In particular, as for the device, the electronic apparatus, and the storage medium embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (11)

1. A login authentication method, the method comprising:
generating a verification image, a verification question and a correct answer of the verification question in response to a login operation of a user, wherein the verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is a question generated based on the shape and/or color of at least one graphic unit in the verification image;
displaying the verification image and a verification question to the user so that the user inputs a verification answer to the verification question;
and judging that the user passes the verification if the verification answer is consistent with the correct answer.
2. The method of claim 1, further comprising:
in the case that the verification answer and the correct answer are not identical, sending an instruction to the user to indicate whether to reset the verification question;
and when a reset instruction which is sent by the user and indicates that the verification problem is reset is received, returning to the execution step: and generating a verification image, a verification question and a correct answer of the verification question.
3. The method of claim 1, wherein generating an authentication image, an authentication question, and a correct answer to the authentication question in response to a login operation by a user comprises:
selecting at least two graphic units from a preset graphic database to obtain a target graphic unit;
selecting at least two colors from a preset color database to obtain a target color;
distributing the target color to the target graphic unit to obtain the verification image;
generating the verification question based on shapes and/or colors of at least two of the target graphical elements in the verification image;
and obtaining a correct answer of the verification question according to the verification question.
4. The method of claim 1, wherein generating an authentication image, an authentication question, and a correct answer to the authentication question in response to a login operation by a user comprises:
and responding to login verification operation after the user inputs a verification mobile phone number, and generating a verification image, a verification question and a correct answer of the verification question.
5. The method of claim 1,
the shape of the graphic unit is at least one of a square, a triangle and a circle;
the color of the graphic unit is at least one of red, orange, yellow, green, cyan, blue and purple.
6. A login authentication apparatus, the apparatus comprising:
the verification generation module is used for responding to login operation of a user and generating a verification image, a verification question and a correct answer of the verification question, wherein the verification image comprises a plurality of graphic units, each graphic unit corresponds to a respective shape and color, and the verification question is generated based on the shape and/or color of at least one graphic unit in the verification image;
the verification display module is used for displaying the verification image and a verification question to the user so that the user inputs a verification answer aiming at the verification question;
and the verification judging module is used for judging that the user passes the verification under the condition that the verification answer is consistent with the correct answer.
7. The apparatus of claim 6, further comprising:
the instruction sending module is used for sending an instruction indicating whether to reset the verification question to the user under the condition that the verification answer is inconsistent with the correct answer;
the repeated execution module is used for returning to the execution step under the condition of receiving a reset instruction which is sent by the user and represents that the verification problem is reset: and generating a verification image, a verification question and a correct answer of the verification question.
8. The apparatus of claim 6, wherein the verification generation module is specifically configured to:
selecting at least two graphic units from a preset graphic database to obtain a target graphic unit;
selecting at least two colors from a preset color database to obtain a target color;
distributing the target color to the target graphic unit to obtain the verification image;
generating the verification question based on shapes and/or colors of at least two of the target graphical elements in the verification image;
and obtaining a correct answer of the verification question according to the verification question.
9. The apparatus of claim 6, wherein the verification generation module is specifically configured to:
and responding to the login verification operation after the user inputs the verification mobile phone number, and generating a verification image, a verification question and a correct answer of the verification question.
10. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
11. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-5.
CN202210991332.5A 2022-08-18 2022-08-18 Login verification method and device, electronic equipment and storage medium Pending CN115348095A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210991332.5A CN115348095A (en) 2022-08-18 2022-08-18 Login verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210991332.5A CN115348095A (en) 2022-08-18 2022-08-18 Login verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115348095A true CN115348095A (en) 2022-11-15

Family

ID=83951128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210991332.5A Pending CN115348095A (en) 2022-08-18 2022-08-18 Login verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115348095A (en)

Similar Documents

Publication Publication Date Title
US11463447B2 (en) Application platform with flexible permissioning
AU2017203608B2 (en) Mobile human challenge-response test
CN106453209B (en) Identity verification method and device
US20130144786A1 (en) Providing verification of user identification information
US10448247B2 (en) Method and apparatus for information verification
CN106372940A (en) Identity authentication method based on block chain network, server and terminal device
KR20190014124A (en) Two factor authentication
US20140157382A1 (en) Observable authentication methods and apparatus
CN112187702A (en) Method and device for verifying client
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
US20210359991A1 (en) Rich one-time password message
US20220191202A1 (en) Consent-based authorization system
CN111783049A (en) User information processing method and system based on block chain
CN113179282A (en) Method and device for merging account numbers and server
CN115348095A (en) Login verification method and device, electronic equipment and storage medium
CN106534041B (en) Verification method, verification platform and client
US20170206530A1 (en) Method and system for call authentication and providing reliability
CN108418829B (en) Account login verification method and device, computer equipment and storage medium
CN111177661A (en) Copyright authentication method for building information model component and related product
CN113806825B (en) Verification method and device, storage medium and electronic equipment
CN112069231B (en) User information processing method and device, storage medium and electronic equipment
CN113132925B (en) Short message authentication method, system, short message gateway equipment and terminal equipment
CN114584978B (en) Value added service authentication method, device, equipment and readable medium
KR102281580B1 (en) Authentication system and method of performing authentication in authentication system
Lee The Research-Practice Gap in User Authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination