CN115842634A - Verification method, device, equipment and storage medium - Google Patents

Verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN115842634A
CN115842634A CN202310136193.2A CN202310136193A CN115842634A CN 115842634 A CN115842634 A CN 115842634A CN 202310136193 A CN202310136193 A CN 202310136193A CN 115842634 A CN115842634 A CN 115842634A
Authority
CN
China
Prior art keywords
verification
terminal
puzzles
verification code
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310136193.2A
Other languages
Chinese (zh)
Other versions
CN115842634B (en
Inventor
王朝飞
李春明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aspire Technologies Shenzhen Ltd
Original Assignee
Aspire Technologies Shenzhen Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aspire Technologies Shenzhen Ltd filed Critical Aspire Technologies Shenzhen Ltd
Priority to CN202310136193.2A priority Critical patent/CN115842634B/en
Publication of CN115842634A publication Critical patent/CN115842634A/en
Application granted granted Critical
Publication of CN115842634B publication Critical patent/CN115842634B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a verification method, a device, equipment and a storage medium, wherein the verification method comprises the following steps: generating N first puzzles and first verification codes which are sequenced according to a first sequence based on an acquired verification request sent by a terminal; carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to the second sequence; sending the N first puzzles sequenced according to the second sequence to the terminal; receiving a second verification code sent by the terminal; sending a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code. In the invention, the user needs to determine the second verification code according to the sequence of the N first puzzles, so that the risk of the verification code being cracked by an automatic program is reduced, and the safety of the verification process is improved.

Description

Verification method, device, equipment and storage medium
Technical Field
The present invention relates to the field of communication security technologies, and in particular, to a verification method, an apparatus, a device, and a storage medium.
Background
At present, in order to prevent malicious password cracking and effectively prevent hacker attacks, an additional verification code input is usually added in specific operations such as user login and user registration to verify whether the operation is a normal service operation. For example, the validation code includes a randomly generated digital validation code, a computed validation code in which two or more digits are combined with an operation symbol, and so forth.
However, the existing verification code still has a risk of being cracked by an automated program, and therefore, how to provide a verification method with higher security is a technical problem to be solved in the field.
Disclosure of Invention
The invention mainly aims to provide a verification method, a verification device, verification equipment and a storage medium, and aims to solve the technical problem that the security of the verification method in the prior art is low.
To achieve the above object, in a first aspect, the present invention provides a verification method, including:
generating N first puzzles and first verification codes which are sequenced according to a first sequence based on an acquired verification request sent by a terminal; each first tile is associated with a character, the first captcha being determined based on N characters ordered in a first order, N being a positive integer greater than 1;
carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to a second sequence;
sending the N first puzzles sequenced according to the second sequence to the terminal;
receiving a second verification code sent by the terminal, wherein the second verification code is determined according to the N first puzzles sequenced according to the second sequence;
sending a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code.
In a second aspect, the present invention also provides an authentication apparatus, the apparatus comprising:
the generation module is used for generating N first puzzles and first verification codes which are sequenced according to a first sequence based on the acquired verification request sent by the terminal; each first tile is associated with a character, the first verification code being determined based on N characters ordered in a first order, N being a positive integer greater than 1;
the processing module is used for carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to a second sequence;
a first sending module, configured to send the N first tiles sorted according to the second order to the terminal;
a receiving module, configured to receive a second verification code sent by the terminal, where the second verification code is determined according to the N first puzzles sorted according to the second order;
the second sending module is used for sending the verification result to the terminal; the verification result is determined based on the first verification code and the second verification code.
In a third aspect, the present invention also provides an electronic device, which includes a memory, a processor, and a program or instructions stored on the memory and executable on the processor, wherein the processor executes the program or instructions to implement the steps of the authentication method as described above.
In a fourth aspect, the present invention also provides a computer readable storage medium having stored thereon a data processing program which, when executed by a processor, implements the steps of the authentication method as described above.
The invention provides a verification method, a device, equipment and a storage medium, wherein the verification method comprises the following steps: generating N first puzzles and first verification codes which are sequenced according to a first sequence based on an acquired verification request sent by a terminal; each first tile is associated with a character, the first captcha is determined based on N characters ordered in a first order, N being a positive integer greater than 1; carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to the second sequence; sending the N first puzzles sequenced according to the second sequence to the terminal; receiving a second verification code sent by the terminal, wherein the second verification code is determined according to the N first puzzles sequenced according to a second sequence; sending a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code. In the present invention, the verification result is determined based on a first verification code determined based on the N first tiles sorted in the first order and a second verification code determined by the user based on the N first tiles sorted in the second order. Therefore, the user needs to determine the second verification code according to the sequence of the N first puzzles, so that the risk that the verification code is cracked by an automatic program is reduced, and the safety of the verification process is improved.
Drawings
FIG. 1 is a schematic diagram of an apparatus in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a verification method provided by an embodiment of the present invention;
FIG. 3 is a diagram illustrating a first puzzle according to an embodiment of the present invention;
FIG. 4 is a second illustration of the first puzzle according to the second embodiment of the present invention;
FIG. 5 is a schematic diagram of an application flow of a verification method provided in an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of an authentication apparatus provided in an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal is a mobile device, and the terminal can also be other terminal devices with a storage function.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and optionally the user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001 described previously.
Optionally, the terminal may further include a camera, a Wi-Fi module, and the like, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 mainly includes an input unit such as a keyboard, which includes a wireless keyboard and a wired keyboard, and is used to connect to a client and perform data communication with the client; and the processor 1001 may be configured to call the authentication program stored in the memory 1005 and perform the following operations:
generating N first puzzles and first verification codes which are sequenced according to a first sequence based on an acquired verification request sent by a terminal;
carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to a second sequence;
sending the N first puzzles sequenced according to the second sequence to the terminal;
receiving a second verification code sent by the terminal;
sending a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code.
Further, the processor 1001 may call the authentication program stored in the memory 1005, and further perform the following operations:
determining a picture randomly selected from a preset picture library as a target picture;
cutting the target picture to obtain N first puzzles which are sequenced according to a first sequence;
randomly numbering each first jigsaw puzzle to obtain a character associated with each first puzzle;
and sorting the characters associated with each first puzzle according to the first sequence to obtain a first verification code.
Further, the processor 1001 may call the authentication program stored in the memory 1005, and further perform the following operations:
receiving N first puzzles which are sent by the terminal and are sequenced according to a third sequence;
and sorting the characters associated with each first puzzle according to the third sequence to obtain a second verification code.
Further, the processor 1001 may call the authentication program stored in the memory 1005, and further perform the following operations:
and receiving a second verification code input by the user.
Further, the processor 1001 may call the authentication program stored in the memory 1005, and further perform the following operations:
and executing the service operation corresponding to the verification request under the condition that the verification result represents that the verification is successful.
Further, the processor 1001 may call the authentication program stored in the memory 1005, and further perform the following operations:
and sending prompt information to the terminal under the condition that the verification result represents that the verification fails.
Further, the processor 1001 may call the authentication program stored in the memory 1005, and further perform the following operations:
sending the N first puzzles sorted according to the second sequence and the request identification associated with the verification request to the terminal;
the receiving the second verification code sent by the terminal comprises:
and receiving a second verification code and the request identification sent by the terminal.
The specific embodiment of the terminal is basically the same as the embodiments of the verification method described below, and details are not described herein.
The present invention provides a verification method, and it should be understood that the verification method provided by the present invention can be applied to a server side, and in the need of clearly explaining the technical solution, the following description will take the example that the verification method provided by the present invention is applied to the server side as an example. Referring to fig. 2, fig. 2 is a schematic flow chart of a verification method according to an embodiment of the present invention. The verification method provided by the embodiment of the invention comprises the following steps:
s110, based on the acquired verification request sent by the terminal, N first puzzles and first verification codes which are sequenced according to a first sequence are generated.
The terminal is also called a client, and it should be understood that the client is in communication connection with the server.
In this step, the terminal sends a verification request to the server, where the verification request is a request for verifying the user identity sent by the user through the terminal to execute the service operation.
After receiving the verification request, the server generates N first tiles and a first verification code, which are sorted according to a first order, where the first order may be understood as an initial order corresponding to the N first tiles, each first tile is associated with one character, the first verification code is determined based on the N characters sorted according to the first order, and N is a positive integer greater than 1.
For a specific implementation of how to generate N first tiles and first verification codes sorted according to the first order, please refer to the following embodiments.
S120, the N first puzzles sorted according to the first sequence are subjected to disorder processing, and the N first puzzles sorted according to the second sequence are obtained.
In this step, the server performs out-of-order processing on the N first puzzles sorted according to the first order, that is, the sorting among the N first puzzles is disturbed, so as to obtain N first puzzles sorted according to the second order.
For ease of understanding, referring to FIG. 3, FIG. 3 is a schematic diagram illustrating N first tiles sorted in a second order. The application scenario shown in fig. 3 includes 6 first tiles, each associated with one character, as described above, and in the application scenario shown in fig. 3, in top-down, left-to-right order, the first tile is associated with the character "2", the second first tile is associated with the character "b", the third first tile is associated with the character "f", the fourth first tile is associated with the character "9", the fifth first tile is associated with the character "6", and the sixth first tile is associated with the character "g".
S130, the N first puzzles sorted according to the second sequence are sent to the terminal.
In this step, after obtaining the N first tiles sorted according to the second order, the server sends the N first tiles sorted according to the second order to the terminal.
And S140, receiving a second verification code sent by the terminal.
In this step, the terminal determines the second verification code according to the received N first puzzles sorted according to the second order, and sends the second verification code to the server. It should be understood that, please refer to the following examples for specific embodiments of how to determine the second verification code.
S150, sending the verification result to the terminal.
After receiving the second verification code, the server determines a verification result according to the second verification code and the first verification code generated in step S110, and sends the verification result to the terminal, where the verification result is determined based on the first verification code and the second verification code.
It should be understood that the verification result includes a verification failure and a verification success, wherein the verification failure indicates that the terminal fails the user verification; the successful verification characterizes that the terminal passes the user verification.
The invention provides a verification method, a device, equipment and a storage medium, wherein the verification method comprises the following steps: generating N first puzzles and first verification codes which are sequenced according to a first sequence based on an acquired verification request sent by a terminal; each first tile is associated with a character, the first captcha is determined based on N characters ordered in a first order, N being a positive integer greater than 1; carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to the second sequence; sending the N first puzzles sequenced according to the second sequence to a terminal; receiving a second verification code sent by the terminal, wherein the second verification code is determined according to the N first puzzles sequenced according to a second sequence; sending a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code. In the present invention, the verification result is determined based on a first verification code determined based on the N first tiles sorted in the first order and a second verification code determined by the user based on the N first tiles sorted in the second order. Therefore, the user needs to determine the second verification code according to the sequence of the N first puzzles, so that the risk that the verification code is cracked by an automatic program is reduced, and the safety of the verification process is improved.
Optionally, the generating N first tiles and the first verification code sorted in the first order includes:
determining a picture randomly selected from a preset picture library as a target picture;
cutting the target picture to obtain N first puzzles sequenced according to a first sequence;
randomly numbering each first jigsaw puzzle to obtain a character associated with each first puzzle;
and sorting the characters associated with each first puzzle according to the first sequence to obtain a first verification code.
It should be noted that, the server is preset with a gallery, and the gallery stores a plurality of pictures.
In this embodiment, after receiving the verification request, a picture is randomly selected from the gallery, and the picture is determined as the target picture.
Further, the target picture is divided to obtain N first tiles, and each first tile is randomly numbered, that is, for each first tile, the characters associated with the first tile are randomly arranged, so as to obtain the characters associated with each first tile.
And sorting the characters associated with each first puzzle according to the sorting of the N first puzzles, namely the first sequence, so as to obtain the first verification code.
For ease of understanding, referring to FIG. 4, FIG. 4 is a schematic diagram illustrating N first tiles sorted in a first order. The application scenario shown in fig. 4 includes 6 first tiles, and in the application scenario shown in fig. 4, in order from top to bottom and from left to right, a first tile is associated with the character "2", a second first tile is associated with the character "9", a third first tile is associated with the character "6", a fourth first tile is associated with the character "b", a fifth first tile is associated with the character "f", and a sixth first tile is associated with the character "g". As such, the first verification code may be determined to be 296bfg based on the ranking and associated characters of the first tile.
It should be understood that the application scenario shown in fig. 4 and the application scenario shown in fig. 3 may be the same scenario, in other words, the 6 first tiles in the application scenario shown in fig. 4 are sorted according to the initial order, i.e. the first order, and after the 6 first tiles shown in fig. 4 are subjected to out-of-order processing, the 6 first tiles in the application scenario shown in fig. 3 are obtained.
Optionally, the receiving the second verification code sent by the terminal includes:
receiving N first puzzles which are sent by the terminal and are sequenced according to a third sequence; and sorting the characters associated with each first puzzle according to the third sequence to obtain a second verification code.
And the server side receives the second verification code sent by the terminal after sending the N first puzzles which are subjected to out-of-order processing and are sorted according to the second order to the terminal. In an optional embodiment, the server receives N first tiles sent by the terminal and sorted according to the third order. Specifically, after receiving the N first tiles sorted according to the second order, the client may perform a related operation on the client, such as a sliding operation, adjust the sorting of the N first tiles, reorder the N first tiles, obtain the N first tiles sorted according to the third order, and send the N first tiles sorted according to the third order to the server.
As described above, each first tile is associated with a character, such that the characters associated with each first tile may be sorted according to a third order to obtain a second verification code.
In this embodiment, the process of reordering the N first puzzles ordered according to the second order is interesting, so as to improve the user experience.
Optionally, the receiving the second verification code sent by the terminal includes:
receiving a second verification code input by a user;
wherein the second verification code is determined by the user reordering the N first tiles ordered in the second order.
And the server side receives the second verification code sent by the terminal after sending the N first puzzles which are subjected to disorder processing and are sorted according to the second sequence to the terminal.
Another optional implementation manner is that the user directly inputs the second verification code at the terminal, and sends the second verification code to the server.
Optionally, the terminal displays an input box, and the user may determine the second verification code according to the reordered third order and the associated character of each first tile after reordering the N first tiles ordered according to the second order, and input the second verification code in the input box.
Optionally, after sending the verification result to the terminal, the method further includes:
and under the condition that the verification result represents that the verification is successful, executing the service operation corresponding to the verification request.
In this embodiment, if the second verification code sent by the terminal and the first verification code generated by the server are the same verification code, it indicates that the user identity verification is successful, and the server executes the service operation corresponding to the verification request, or receives an operation instruction sent by the terminal subsequently and executes the service operation indicated by the operation instruction.
Optionally, after sending the verification result to the terminal, the method further includes:
and sending prompt information to the terminal under the condition that the verification result represents that the verification fails, wherein the prompt information is used for representing that the verification fails.
In this embodiment, if the second verification code sent by the terminal and the first verification code generated by the server are not the same verification code, it indicates that the user identity verification fails, and the server sends a prompt message to the terminal, where the prompt message is used to characterize the verification failure.
Optionally, the prompt message includes, but is not limited to, text message, voice message, or video message.
Optionally, the sending the N first tiles sorted according to the second order to the terminal includes:
sending the N first puzzles sorted according to the second sequence and a request identifier associated with the verification request to the terminal;
the receiving the second verification code sent by the terminal comprises:
and receiving a second verification code and the request identification sent by the terminal.
It should be understood that, after receiving the authentication request sent by the terminal, the server may generate a request identifier, which is also referred to as a request unique ID, based on the authentication request.
After the server generates the first verification code, the server may store the first verification code and the request identifier in a key value database (KV) format.
In this embodiment, the server side synchronously sends the request identifier to the terminal in the process of sending the N first puzzles sorted according to the second order to the terminal. And the terminal synchronously sends the request identifier to the server in the process of sending the second verification code to the server.
In order to facilitate understanding of the overall technical solution provided by the present invention, please refer to fig. 5, as shown in fig. 5, a server receives a verification request sent by a terminal, and generates a request identifier; randomly selecting a target picture from a picture library, and cutting the target picture into N first puzzles which are sequenced according to a first sequence; randomly numbering each first puzzle; splicing the serial numbers of the N first splicing pictures according to a first sequence to obtain a first verification code; sending the disordered N first puzzles and the request identifier to a terminal; the terminal page stores the request identification and displays N first puzzles sequenced according to a second sequence; a user drags N first puzzles for splicing; splicing the numbers of the first splicing pictures according to the spliced arrangement sequence to obtain a second verification code; the terminal sends the request identifier and the second verification code to the server for verification; if the first verification code is consistent with the second verification code, the verification is determined to be passed; and if the first verification code is inconsistent with the second verification code, rejecting the user request.
In addition, an embodiment of the present invention further provides a verification apparatus, please refer to fig. 6, where fig. 6 is a schematic structural diagram of the verification apparatus provided in the embodiment of the present invention.
As shown in fig. 6, the authentication apparatus 200 includes:
a generating module 210, configured to generate N first puzzles and first verification codes, which are sorted according to a first order, based on an obtained verification request sent by a terminal; each first tile is associated with a character, the first captcha being determined based on N characters ordered in a first order, N being a positive integer greater than 1;
a processing module 220, configured to perform out-of-order processing on the N first puzzles sorted according to the first order, to obtain N first puzzles sorted according to a second order;
a first sending module 230, configured to send the N first tiles ordered according to the second order to the terminal;
a receiving module 240, configured to receive a second verification code sent by the terminal, where the second verification code is determined according to the N first puzzles sorted according to the second order;
a second sending module 250, configured to send a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code.
Optionally, the generating module 210 is specifically configured to:
determining a picture randomly selected from a preset picture library as a target picture;
cutting the target picture to obtain N first puzzles which are sequenced according to a first sequence;
randomly numbering each first jigsaw puzzle to obtain characters associated with each first jigsaw puzzle;
and sorting the characters associated with each first puzzle according to the first sequence to obtain a first verification code.
Optionally, the receiving module is specifically configured to:
receiving N first puzzles which are sent by the terminal and are sequenced according to a third sequence; the N first puzzles ordered according to the third order are obtained by reordering the N first puzzles ordered according to the second order based on a user;
and sorting the characters associated with each first puzzle according to the third sequence to obtain a second verification code.
Optionally, the receiving module is further specifically configured to:
receiving a second verification code input by a user;
wherein the second verification code is determined by the user reordering the N first tiles ordered in the second order.
Optionally, the verification apparatus 200 further comprises:
and executing the service operation corresponding to the verification request under the condition that the verification result represents that the verification is successful.
Optionally, the verification apparatus 200 further comprises:
and sending prompt information to the terminal under the condition that the verification result represents that the verification fails, wherein the prompt information is used for representing that the verification fails.
Optionally, the first sending module 230 is specifically configured to:
sending the N first puzzles sorted according to the second sequence and the request identification associated with the verification request to the terminal;
optionally, the receiving module 240 is further specifically configured to:
and receiving a second verification code and the request identification sent by the terminal.
The verification apparatus 200 is capable of implementing the processes of the method embodiment of fig. 2 in the embodiment of the present invention, and can achieve the same technical effects, which are not repeated herein.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, where a verification program is stored on the computer-readable storage medium, and the verification program, when executed by a processor, implements each step in the verification method, which is not described repeatedly herein.
The specific embodiment of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the verification method described above, and is not repeated herein.
An embodiment of the present invention further provides an electronic device, as shown in fig. 7, including a processor 310, a communication interface 320, a memory 330, and a communication bus 340, where the processor 310, the communication interface 320, and the memory 330 complete mutual communication through the communication bus 340.
The memory 330 is used for storing computer programs; when executed by the processor 310, the computer program realizes the steps of the above-mentioned authentication method, and can achieve the same technical effects, which are not repeated herein.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this is not intended to represent only one bus or type of bus.
The communication interface is used for communication between the terminal and other equipment.
The Memory may include Random Access Memory (RAM) or may include non-volatile Memory (non-volatile), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The processor may be a general-purpose processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or system comprising the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method of authentication, comprising:
generating N first puzzles and first verification codes which are sequenced according to a first sequence based on an acquired verification request sent by a terminal; each first tile is associated with a character, the first captcha being determined based on N characters ordered in a first order, N being a positive integer greater than 1;
carrying out disorder processing on the N first puzzles sorted according to the first sequence to obtain N first puzzles sorted according to a second sequence;
sending the N first puzzles sequenced according to the second sequence to the terminal;
receiving a second verification code sent by the terminal, wherein the second verification code is determined according to the N first puzzles sequenced according to the second sequence;
sending a verification result to the terminal; the verification result is determined based on the first verification code and the second verification code.
2. The method of claim 1, wherein generating the N first tiles and the first verification code sorted in the first order comprises:
determining a picture randomly selected from a preset picture library as a target picture;
cutting the target picture to obtain N first puzzles which are sequenced according to a first sequence;
randomly numbering each first jigsaw puzzle to obtain a character associated with each first puzzle;
and sorting the characters associated with each first puzzle according to the first sequence to obtain a first verification code.
3. The method of claim 1, wherein the receiving the second verification code sent by the terminal comprises:
receiving N first puzzles which are sent by the terminal and are sequenced according to a third sequence; the N first puzzles ordered according to the third order are obtained by reordering the N first puzzles ordered according to the second order based on a user;
and sorting the characters associated with each first puzzle according to the third sequence to obtain a second verification code.
4. The method of claim 1, wherein the receiving the second verification code sent by the terminal comprises:
receiving a second verification code input by a user;
wherein the second verification code is determined by the user reordering the N first tiles ordered in the second order.
5. The method of claim 1, wherein after sending the verification result to the terminal, the method further comprises:
and under the condition that the verification result represents that the verification is successful, executing the service operation corresponding to the verification request.
6. The method of claim 1, wherein after sending the verification result to the terminal, the method further comprises:
and sending prompt information to the terminal under the condition that the verification result represents that the verification fails, wherein the prompt information is used for representing that the verification fails.
7. The method according to any of claims 1-6, wherein said sending the N first tiles ordered in the second order to the terminal comprises:
sending the N first puzzles sorted according to the second sequence and the request identification associated with the verification request to the terminal;
the receiving the second verification code sent by the terminal comprises:
and receiving a second verification code and the request identification sent by the terminal.
8. An authentication apparatus, comprising:
the generation module is used for generating N first puzzles and first verification codes which are sequenced according to a first sequence based on the acquired verification request sent by the terminal; each first tile is associated with a character, the first captcha being determined based on N characters ordered in a first order, N being a positive integer greater than 1;
the processing module is used for carrying out disorder processing on the N first puzzles sequenced according to the first sequence to obtain N first puzzles sequenced according to a second sequence;
a first sending module, configured to send the N first puzzles sorted according to the second order to the terminal;
a receiving module, configured to receive a second verification code sent by the terminal, where the second verification code is determined according to the N first puzzles sorted according to the second order;
the second sending module is used for sending the verification result to the terminal; the verification result is determined based on the first verification code and the second verification code.
9. An electronic device comprising a memory, a processor and a program or instructions stored on the memory and executable on the processor, wherein the processor implements the steps of the authentication method according to any one of claims 1 to 7 when executing the program or instructions.
10. A readable storage medium on which a program or instructions are stored, characterized in that the program or instructions, when executed by a processor, carry out the steps of the authentication method according to any one of claims 1 to 7.
CN202310136193.2A 2023-02-20 2023-02-20 Verification method, device, equipment and storage medium Active CN115842634B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310136193.2A CN115842634B (en) 2023-02-20 2023-02-20 Verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310136193.2A CN115842634B (en) 2023-02-20 2023-02-20 Verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115842634A true CN115842634A (en) 2023-03-24
CN115842634B CN115842634B (en) 2023-07-28

Family

ID=85579939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310136193.2A Active CN115842634B (en) 2023-02-20 2023-02-20 Verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115842634B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598802A (en) * 2015-02-13 2015-05-06 北京京东尚科信息技术有限公司 Verification method and system based on puzzle
CN104660549A (en) * 2013-11-19 2015-05-27 深圳市腾讯计算机系统有限公司 Identity verification method and device
EP2977926A1 (en) * 2014-07-25 2016-01-27 Xiaomi Inc. Method and device for verification using verification code
CN105323218A (en) * 2014-06-30 2016-02-10 腾讯科技(深圳)有限公司 Identity verifying method and device
CN113158167A (en) * 2021-04-30 2021-07-23 腾讯音乐娱乐科技(深圳)有限公司 Verification code implementation method, electronic device and computer-readable storage medium
CN115174122A (en) * 2022-07-18 2022-10-11 湖北天融信网络安全技术有限公司 Verification code generation method, verification code verification method, device, equipment and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660549A (en) * 2013-11-19 2015-05-27 深圳市腾讯计算机系统有限公司 Identity verification method and device
CN105323218A (en) * 2014-06-30 2016-02-10 腾讯科技(深圳)有限公司 Identity verifying method and device
EP2977926A1 (en) * 2014-07-25 2016-01-27 Xiaomi Inc. Method and device for verification using verification code
CN104598802A (en) * 2015-02-13 2015-05-06 北京京东尚科信息技术有限公司 Verification method and system based on puzzle
WO2016127717A1 (en) * 2015-02-13 2016-08-18 北京京东尚科信息技术有限公司 Checking method and system based on puzzle
CN113158167A (en) * 2021-04-30 2021-07-23 腾讯音乐娱乐科技(深圳)有限公司 Verification code implementation method, electronic device and computer-readable storage medium
CN115174122A (en) * 2022-07-18 2022-10-11 湖北天融信网络安全技术有限公司 Verification code generation method, verification code verification method, device, equipment and medium

Also Published As

Publication number Publication date
CN115842634B (en) 2023-07-28

Similar Documents

Publication Publication Date Title
CN108200050B (en) Single sign-on server, method and computer readable storage medium
CN108011863B (en) Method and device for identifying brute force cracking
CN105323065B (en) Security verification method and device
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
US10834067B2 (en) Method of access by a telecommunications terminal to a database hosted by a service platform that is accessible via a telecommunications network
CN110691085B (en) Login method, login device, password management system and computer readable medium
CN112235321B (en) Short message verification code anti-brushing method and device
CN112822222A (en) Login verification method, automatic login verification method, server side and client side
CN112073289B (en) Instant messaging control method and device
CN109104430B (en) Identity authentication method, identity authentication device and computer readable storage medium
CN112448956B (en) Authority processing method and device of short message verification code and computer equipment
CN110765441A (en) Method, device and medium for safe login
CN111885043B (en) Internet account login method, system, equipment and storage medium
CN111709007A (en) User authentication method, device and equipment
CN113038399A (en) Method, electronic device and storage medium for quickly verifying user identity through 5G message
CN113239397A (en) Information access method, device, computer equipment and medium
US11134080B2 (en) Method for authenticating a terminal equipment, device, server equipment and related computer program
CN104079527A (en) Information processing method and electronic equipment
CN115842634B (en) Verification method, device, equipment and storage medium
CN106161388B (en) Information verification method, server and system
CN108182355B (en) Login verification method, server and computer readable storage medium
CN107613496B (en) Queuing method, system and authentication server
CN106327187B (en) Information processing method and device
CN105025482B (en) Communication information processing method and equipment thereof
CN113422687A (en) Verification method, verification server and verification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant