CN117390614A - Verification method, device, equipment and medium based on dynamic picture - Google Patents

Verification method, device, equipment and medium based on dynamic picture Download PDF

Info

Publication number
CN117390614A
CN117390614A CN202311393874.3A CN202311393874A CN117390614A CN 117390614 A CN117390614 A CN 117390614A CN 202311393874 A CN202311393874 A CN 202311393874A CN 117390614 A CN117390614 A CN 117390614A
Authority
CN
China
Prior art keywords
picture
verification
user
dynamic
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311393874.3A
Other languages
Chinese (zh)
Inventor
张明凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202311393874.3A priority Critical patent/CN117390614A/en
Publication of CN117390614A publication Critical patent/CN117390614A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a verification method, a device, equipment and a medium based on dynamic pictures, wherein a first number of target labels are randomly extracted from action labels corresponding to each dynamic picture pool in response to a verification request of a user, and the dynamic picture pool corresponding to each target label is determined as a target picture pool; randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set; determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture; generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs; displaying the verification picture set and the prompting keyword to a user, and detecting second numbered data corresponding to the dynamic picture selected by the user; and if the first number data is consistent with the second number data, determining that the verification is passed. The user authentication method and device can improve the safety and reliability of user authentication and improve the use experience of the user. The method and the device can be widely applied to the field of information technology.

Description

Verification method, device, equipment and medium based on dynamic picture
Technical Field
The application relates to the field of information technology, in particular to a verification method, device, equipment and medium based on a dynamic picture.
Background
With the development of information technology, more and more Internet applications are developed, so that the Internet applications are widely applied to various industries, and convenience is brought to the work, life and entertainment of people. In the current internet application, in order to cope with network attacks and verify the identity of users, verification code technology has been widely used.
In the related art, the verification codes commonly used in the market at present mainly comprise a mobile phone verification code, a picture verification code and a text verification code. Although the mobile phone verification code can ensure one number and one code, and the real name system of the mobile phone number, a part of abnormal users can be intercepted at the login end. However, in the use process, the limitation of the mobile phone verification code cannot be monitored conveniently and flexibly. Although the picture verification code and the text verification code are flexible, with the improvement of hardware technology and the progress of cracking technology, the possibility of violent cracking exists, illegal users cannot be effectively restrained, application developers have to increase the difficulty of the verification code, users often face the situation of multiple verification failures, and the user experience is poor.
In view of the above, there is a need to solve the problems in the related art.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the related art to a certain extent.
Therefore, an object of the embodiments of the present application is to provide a verification method based on a dynamic picture, which can improve the security and reliability of user verification and improve the use experience of a user.
Another object of an embodiment of the present application is to provide a moving picture based authentication apparatus.
In order to achieve the technical purpose, the technical scheme adopted by the embodiment of the application comprises the following steps:
on the one hand, the embodiment of the application provides a verification method based on a dynamic picture, which comprises the following steps:
responding to a verification request of a user, randomly extracting a first number of target labels from action labels corresponding to each dynamic picture pool, and determining the dynamic picture pool corresponding to each target label as a target picture pool;
randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set;
determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture;
Generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs;
displaying the verification picture set and the prompting keyword to the user, and detecting second numbered data corresponding to the dynamic picture selected by the user;
and if the first number data is consistent with the second number data, determining that the user verification is passed.
In addition, the verification method based on the dynamic picture according to the embodiment of the application may further have the following additional technical features:
further, in one embodiment of the present application, the authentication request is triggered by:
detecting touch screen operation of the user on terminal equipment, and triggering the verification request according to the touch screen operation;
or, acquiring the voice data of the user, performing voice recognition on the voice data, and triggering the verification request according to the voice recognition result.
Further, in one embodiment of the present application, the method further comprises:
acquiring a plurality of dynamic pictures;
performing motion recognition on the dynamic pictures, and determining motion recognition results corresponding to the dynamic pictures;
dividing the dynamic pictures corresponding to the same action recognition result into a dynamic picture pool, and determining an action label corresponding to the dynamic picture pool according to the action recognition result.
Further, in one embodiment of the present application, the method further comprises:
generating serial number data of each dynamic picture;
and storing the number data in a two-dimensional storage mode.
Further, in an embodiment of the present application, the storing the number data by means of two-dimensional storage includes:
the numbering data is stored in two dimensions by multi-field storage, multi-table storage or in a key manner.
Further, in one embodiment of the present application, the method further comprises:
and if the first number data is inconsistent with the second number data, determining that the user verification is not passed, and returning to the step of randomly extracting the first number of target labels from the action labels corresponding to each dynamic picture pool for re-verification.
Further, in an embodiment of the present application, after the step of presenting the verification photo set and the prompting keyword to the user, the method further includes:
detecting accumulated time length for displaying the verification picture set and the prompting keywords to the user;
if the accumulated time length reaches a preset time threshold and the operation of selecting the dynamic pictures by the user is not detected, determining that the user verification is not passed, and returning to the step of randomly extracting the first number of target labels from the action labels corresponding to each dynamic picture pool for re-verification.
On the other hand, an embodiment of the present application provides a verification device based on a moving picture, including:
the response unit is used for responding to the verification request of the user, randomly extracting a first number of target labels from the action labels corresponding to each dynamic picture pool, and determining the dynamic picture pool corresponding to each target label as a target picture pool;
the extraction unit is used for randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set;
a recording unit, configured to determine one moving picture in the verification picture set as a target picture, and record first number data corresponding to the target picture;
the generating unit is used for generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs;
the detection unit is used for displaying the verification picture set and the prompting keyword to the user and detecting second numbered data corresponding to the dynamic picture selected by the user;
and the processing unit is used for determining that the user verification passes if the first number data is consistent with the second number data.
In another aspect, an embodiment of the present application provides an electronic device, including:
At least one processor;
at least one memory for storing at least one program;
the at least one program, when executed by the at least one processor, causes the at least one processor to implement the aforementioned moving picture based authentication method.
In another aspect, embodiments of the present application also provide a computer-readable storage medium in which a processor-executable program is stored, which when executed by a processor is configured to implement the aforementioned moving picture-based authentication method.
The advantages and benefits of the present application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the present application.
The embodiment of the application provides a verification method, a device, equipment and a medium based on dynamic pictures, wherein a first number of target labels are randomly extracted from action labels corresponding to each dynamic picture pool in response to a verification request of a user, and each dynamic picture pool corresponding to each target label is determined to be a target picture pool; randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set; determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture; generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs; displaying the verification picture set and the prompting keyword to the user, and detecting second numbered data corresponding to the dynamic picture selected by the user; and if the first number data is consistent with the second number data, determining that the user verification is passed. The method in the embodiment of the application reasonably solves the defects that the existing verification code is easy to crack and inflexible, can improve the safety and reliability of user verification, has low complexity of the whole verification process, is simple and efficient, and can improve the use experience of users.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description is made with reference to the accompanying drawings of the embodiments of the present application or the related technical solutions in the prior art, it should be understood that, in the following description, the drawings are only for convenience and clarity to describe some embodiments in the technical solutions of the present application, and other drawings may be obtained according to these drawings without any inventive effort for those skilled in the art.
Fig. 1 is a schematic view of an implementation environment of a verification method based on a moving picture according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a verification method based on a dynamic picture according to an embodiment of the present application;
fig. 3 is an interface schematic diagram of a terminal device provided in an embodiment of the present application;
fig. 4 is a schematic flow chart of establishing a dynamic picture pool according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a processing flow of numbered data of a dynamic diagram according to an embodiment of the present application;
fig. 6 is a flowchart of another verification method based on moving pictures according to an embodiment of the present application;
fig. 7 is a schematic flowchart of a specific implementation of a verification method based on a dynamic picture according to an embodiment of the present application;
FIG. 8 is a schematic diagram of an interface for displaying moving pictures and prompting keywords according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a verification device based on a moving picture according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application. The step numbers in the following embodiments are set for convenience of illustration only, and the order between the steps is not limited in any way, and the execution order of the steps in the embodiments may be adaptively adjusted according to the understanding of those skilled in the art.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the present application.
1) Verification code, a security mechanism for verifying the identity of a user. The main purpose of the verification code is to prevent a malicious user from automatically registering or logging in an application program, and account rights are acquired by automatically inputting a user name and a password. By using the authentication code, the application can ensure that only the actual user can access its services. The passcode is typically displayed on a screen at the time of user registration or login, and the user needs to enter this string. Some verification codes may also contain image or audio elements to increase their security.
2) Artificial intelligence (Artificial Intelligence, AI), is a theory, method, technique, and application system that simulates, extends, and extends human intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, obtains knowledge, and uses the knowledge to obtain optimal results. In other words, artificial intelligence is an integrated technology of computer science that attempts to understand the essence of intelligence and to produce a new intelligent machine that can react in a similar way to human intelligence. Artificial intelligence, i.e. research on design principles and implementation methods of various intelligent machines, enables the machines to have functions of sensing, reasoning and decision. The artificial intelligence technology is a comprehensive subject, and relates to the technology with wide fields, namely the technology with a hardware level and the technology with a software level. Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
3) Machine Learning (ML), which is a multi-domain interdisciplinary, involves multiple disciplines such as probability theory, statistics, approximation theory, convex analysis, algorithm complexity theory, etc., and is a special study of how a computer simulates or implements Learning behavior of a human being to acquire new knowledge or skills, and reorganizes the existing knowledge structure to continuously improve its own performance. Machine learning is the core of artificial intelligence and is the fundamental approach to make computers have intelligence, which is applied throughout various fields of artificial intelligence, and machine learning (deep learning) generally includes technologies such as artificial neural networks, confidence networks, reinforcement learning, transfer learning, induction learning, teaching learning, and the like.
With the development of information technology, more and more Internet applications are developed, so that the Internet applications are widely applied to various industries, and convenience is brought to the work, life and entertainment of people. In the current internet application, in order to cope with network attacks and verify the identity of users, verification code technology has been widely used.
In the related art, the verification codes commonly used in the market at present mainly comprise a mobile phone verification code, a picture verification code and a text verification code. Although the mobile phone verification code can ensure one number and one code, and the real name system of the mobile phone number, a part of abnormal users can be intercepted at the login end. However, in the use process, the limitation of the mobile phone verification code cannot be monitored conveniently and flexibly. Although the picture verification code and the text verification code are flexible, with the improvement of hardware technology and the progress of cracking technology, the possibility of violent cracking exists, illegal users cannot be effectively restrained, application developers have to increase the difficulty of the verification code, users often face the situation of multiple verification failures, and the user experience is poor.
In view of this, in the embodiments of the present application, a verification method, an apparatus, a device, and a medium based on a moving picture are provided, in response to a verification request of a user, a first number of target tags are randomly extracted from action tags corresponding to each moving picture pool, and a moving picture pool corresponding to each target tag is determined as a target picture pool; randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set; determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture; generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs; displaying the verification picture set and the prompting keyword to the user, and detecting second numbered data corresponding to the dynamic picture selected by the user; and if the first number data is consistent with the second number data, determining that the user verification is passed. The method in the embodiment of the application reasonably solves the defects that the existing verification code is easy to crack and inflexible, can improve the safety and reliability of user verification, has low complexity of the whole verification process, is simple and efficient, and can improve the use experience of users.
Referring to fig. 1, fig. 1 shows a schematic diagram of an implementation environment of a verification method based on a moving picture according to an embodiment of the present application. In this implementation environment, the main hardware and software body includes a terminal device 110 and a background server 120.
In this embodiment of the present application, the terminal device 110 may have a related application installed therein, and the application may be used to implement various functions, such as shopping, game, social interaction, etc., which is not limited in this application. And the type of the platform end of the specific deployment of the application program can be flexibly set according to the requirement. In some embodiments, the platform end of the application may include a desktop end on which a desktop application using an operating system such as Windows, mac OS, etc. may run; in some embodiments, the platform end of the application program may include a mobile end, on which a mobile application program using a mobile operating system such as iOS and Android may be running; in some embodiments, the platform side of the application may include a Web page (Web) side on which the application may be run based on various types of browsers; in some embodiments, the platform end of the application program may include an applet end, on which various portable applications implemented based on the host application program, that is, applets, are run, which also belong to a deployment form of the application program, and in this embodiment, the specific kind of the host application program is not limited.
In the embodiment of the present application, the background server 120 may be a background server of the application program. The terminal device 110 and the background server 120 can be in communication connection with each other, and the background server 120 can be used for processing service data related to application programs and realizing related application program functions through interaction with the terminal device 110. The verification method based on the dynamic picture provided in the embodiment of the present application may be implemented by the terminal device 110 alone, or may be implemented based on interaction between the terminal device 110 and the background server 120.
Illustratively, taking an example of implementing the authentication method provided in the embodiment of the present application based on the interaction between the terminal device 110 and the background server 120, in the embodiment of the present application, the terminal device 110 may receive the authentication request of the user and send the authentication request of the user to the background server 120. The background server 120 may randomly extract a first number of target tags from the action tags corresponding to each of the moving picture pools, and determine the moving picture pool corresponding to each of the target tags as a target picture pool; randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set; determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture; and generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs. Then, the background server 120 may send the verification picture set and the prompting keyword to the terminal device 110, and the terminal device 110 may display the verification picture set and the prompting keyword to the user, and detect second number data corresponding to the dynamic picture selected by the user; if the first number data and the second number data are consistent, the user authentication can be determined to pass.
The terminal device 110 of the above embodiment may include, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart watch, and a vehicle-mounted terminal.
The background server 120 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), basic cloud computing services such as big data and artificial intelligence platforms, and the like.
A communication connection may be established between the terminal device 110 and the background server 120 through a wireless network or a wired network. The wireless network or wired network may be configured as the internet, using standard communication techniques and/or protocols, or any other network including, for example, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or wireless network, a private network, or any combination of virtual private networks. The software and hardware main bodies may be connected by the same communication method or by different communication methods, which is not particularly limited in this application.
Of course, it can be understood that the implementation environment in fig. 1 is only some optional application scenarios of the dynamic picture-based verification method provided in the embodiments of the present application, and the actual application is not fixed to the software and hardware environment shown in fig. 1.
In the following, a verification method based on a moving picture provided in the embodiment of the present application is described and explained in conjunction with the foregoing description of an implementation environment.
Referring to fig. 2, fig. 2 is a schematic diagram of a dynamic picture-based verification method according to an embodiment of the present application, where the dynamic picture-based verification method includes, but is not limited to:
step 210, responding to a verification request of a user, randomly extracting a first number of target labels from action labels corresponding to each dynamic picture pool, and determining the dynamic picture pool corresponding to each target label as a target picture pool;
in this step, when the user uses the application program, a situation that the user needs to verify the identity may be encountered, and at this time, the user may trigger a request, and the request is referred to as a verification request. The terminal device may receive the verification request and trigger a corresponding verification procedure. Specifically, in the embodiment of the present application, when the user triggers the verification request, the first number of target tags may be randomly extracted from the action tags corresponding to each dynamic picture pool. Here, the moving picture pools refer to resource pools for storing moving pictures, and the number of the moving picture pools may be multiple, where each moving picture pool is used to store moving pictures of one action category, where the action category may be used as an action tag corresponding to the moving picture pool, and different moving picture pools may correspond to different action tags, for example, may correspond to action tags such as dance, singing, running, long jump, and the like. In this embodiment of the present application, a first number of action tags may be randomly extracted from a plurality of action tags as a target tag, specifically, the present application is not limited to the total number of action tags and the specific size of the first number, for example, there are 100 action tags altogether, and the first number may be 4.
In this step, after determining the target tags, the dynamic picture pool corresponding to each target tag may be determined as the target picture pool. Thus, a first number of target picture pools can be obtained, and each target picture pool stores a plurality of action pictures corresponding to one target label. In the embodiment of the present application, the number of motion pictures stored in one motion picture pool is not limited.
It should be noted that, in the embodiment of the present application, the larger the value of the first number is, the larger the number of moving pictures in the verification picture set to be displayed later is, the higher the security of verification is relatively, but the data processing amount is increased, and the time period for the user to judge and verify may be increased, so that the user needs to deal with the situation as appropriate. In general, the first number may be selected to be between 4 and 8, which is not limited in this application.
In the embodiment of the application, the specific situation that the user needs to trigger the verification request is not limited. For example, in some embodiments, the user may be required to authenticate when attempting to register or log into an application. Here, the application will typically require the user to provide some login information, such as a user name, password, email address, etc. To ensure the security of such information, the user may be required to perform authentication to distinguish whether the user is a person or an intruded computer, and the user needs to pass the authentication of the authentication code to complete the registration or login operation. In some embodiments, when a user attempts to modify personal information, the application may require the user to verify to ensure that the user is himself. In some embodiments, the application may require the user to verify when the user attempts to perform a sensitive operation, such as modifying a password, deleting an account, etc. In the embodiment of the application program, by requiring the user to perform verification operation, the application program can ensure that only the real user can access the service, thereby improving the safety and reliability of the application program.
Step 220, randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set;
in this step, after determining the target picture pools, a moving picture may be randomly extracted from each target picture pool, and the obtained moving pictures are recorded as a verification picture set. It can be understood that, in the embodiment of the present application, the number of the target picture pools is the first number, and therefore, the number of the moving pictures in the obtained verification picture set is also the first number.
In the embodiment of the application, when random selection of the dynamic picture is realized, the random selection can be realized through a random number generator. For example, the total number of the moving pictures in the target picture pool can be acquired first, then a value ranging from 1 to the total number of the moving pictures in the target picture pool is generated by using a random number generator, and the moving pictures with the sorting positions in the target picture pool at the generated value are determined as the selected moving pictures. Here, there may be a difference in the total number of moving pictures in different target picture pools, and thus, the random number generator may set different random number upper limit values for different target picture pools, which is not limited in this application.
Step 230, determining one moving picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture;
in this step, after the verification picture set is extracted, one moving picture in the verification picture set may be randomly determined as a target picture, and the number data corresponding to the target picture is recorded. Here, each moving picture corresponds to one number data, and the number data corresponding to different moving pictures is different. In the embodiments of the present application, the data form and length of the numbering data are not limited, for example, in some embodiments, the numbering data may be of a purely numerical type, and in some embodiments, other characters may be included in the numbering data besides numerals.
Similarly, in the embodiment of the present application, when determining the target picture from the verification picture set, the determination may also be performed by means of a random number generator. Here, each moving picture in the verification picture set may be ordered, with the sequence number from 1 to the first number; the upper limit value of the random number can be constrained to be the first number, and when a random number is generated, a dynamic picture with the corresponding sequence number of the random number is determined to be a target picture.
Step 240, generating a prompting keyword according to an action tag corresponding to the dynamic picture pool to which the target picture belongs;
in this step, after the target picture is determined, a prompting keyword may be generated according to an action tag corresponding to the dynamic picture pool to which the target picture belongs. Specifically, in the embodiment of the present application, the target picture is derived from a target picture pool, and the target picture pool corresponds to a unique action tag, so that the action tag can be determined according to the target picture. A hint keyword may then be generated from the action tag.
In the embodiment of the application, the prompting keyword is used for subsequent picture verification, namely prompting the user to select a dynamic picture for executing the related action. In generating the hint keywords from the action tags, in some embodiments, the action tags may be set directly to hint keywords; in some embodiments, information having a meaning similar to that of the action tag may also be selected as the prompting keyword. Of course, it should be noted here that the prompt keywords generated by different action tags should be different, and this application is not limited specifically.
In the step, some related prompting keywords are generated according to action labels corresponding to a dynamic picture pool to which the target picture belongs. Thus, the application program can use the prompt keywords to help the user to better understand the verification task, so that the correct dynamic picture is selected to complete verification.
Step 250, displaying the verification picture set and the prompting keyword to the user, and detecting second numbered data corresponding to the dynamic picture selected by the user;
in this step, after the prompting keyword is obtained, the verification picture set and the prompting keyword may be displayed to the user, so as to remind the user to select a correct dynamic picture to complete the verification task. After the user sees the verification picture set and the prompting keywords, the user can distinguish which dynamic picture in the verification picture set accords with the description of the prompting keywords according to the prompting keywords, so that relevant selection operation is made. In the embodiment of the application, based on the dynamic picture selected by the user, the corresponding number data can be determined and recorded as the second number data.
Step 260, if the first number data is consistent with the second number data, determining that the user verification passes.
In this step, after determining the second number data corresponding to the moving picture selected by the user, whether the user passes the verification may be further determined according to whether the first number data is identical to the second number data. Specifically, it can be understood that in the embodiment of the present application, if the determined first number data and the determined second number data are consistent, it is explained that the user selects the correct dynamic picture specified in advance according to the prompting keyword, so that it can be determined that the user passes the verification of the dynamic picture, and the verification result is passed; in contrast, if the determined first number data and the determined second number data are inconsistent, it is indicated that the user does not select the correct dynamic picture, and therefore, it can be determined that the user fails the verification of the dynamic picture, and the verification result is failed. Here, when the user authentication fails, the step of randomly extracting the first number of target tags from the action tags corresponding to the respective moving picture pools may be returned again for re-authentication, and the number of times that the user authentication fails may be recorded, and if the user continuous authentication fails for a period of time, the forced offline processing may be performed on the user or the authentication request of the user may not be passed.
It can be understood that, in the verification method based on the dynamic picture provided in the embodiment of the present application, in response to a verification request of a user, a first number of target tags are randomly extracted from action tags corresponding to each dynamic picture pool, and each dynamic picture pool corresponding to each target tag is determined as a target picture pool; randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set; determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture; generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs; displaying the verification picture set and the prompting keyword to the user, and detecting second numbered data corresponding to the dynamic picture selected by the user; and if the first number data is consistent with the second number data, determining that the user verification is passed. The method in the embodiment of the application reasonably solves the defects that the existing verification code is easy to crack and inflexible, can improve the safety and reliability of user verification, has low complexity of the whole verification process, is simple and efficient, and can improve the use experience of users.
Specifically, in some embodiments, the authentication request is triggered by:
detecting touch screen operation of the user on terminal equipment, and triggering the verification request according to the touch screen operation;
or, acquiring the voice data of the user, performing voice recognition on the voice data, and triggering the verification request according to the voice recognition result.
In the embodiment of the application, the specific trigger logic of the verification request is not limited. For example, the terminal device may receive an interaction instruction of the user with the relevant component, and trigger the verification request according to the interaction instruction. Here, the related component may be a component configured by an underlying system of the terminal device or a component configured in an application program, and the implementation form may be flexibly set as required. For example, in some embodiments, the component may be a component in the terminal device having a voice interaction function, which may identify voice data of the user through a voice recognition technology, and the user may trigger a verification request of a certain map application program by performing voice interaction with the terminal device, such as speaking "turn on map navigation function" to the terminal device. For the speech recognition algorithm adopted in the embodiment of the present application, the implementation may be performed with reference to related technologies, which is not described in detail in the present application.
In some embodiments, the component may also be a touch component, for example, referring to fig. 3, fig. 3 is an interface schematic diagram of a terminal device provided in an embodiment of the present application, as shown in fig. 3, a plurality of applications are installed on a certain terminal device, and icons corresponding to the plurality of applications are displayed on a screen 310 of the terminal device. At this time, the user clicks the icon 311 of the corresponding application program on the terminal device screen 310, i.e., can be regarded as an interactive instruction triggering the authentication request.
Of course, it can be understood that, in some embodiments, the received operations of touching, sliding, etc. of the user in the specified screen area of the terminal device may also be used as an interaction instruction for triggering the verification request, which is not specifically limited in this application.
Specifically, in some embodiments, referring to fig. 4, the moving picture-based verification method in the embodiments of the present application further includes:
step 410, obtaining a plurality of dynamic pictures;
step 420, performing motion recognition on the dynamic pictures, and determining motion recognition results corresponding to the dynamic pictures;
step 430, dividing the dynamic pictures corresponding to the same action recognition result into a dynamic picture pool, and determining an action label corresponding to the dynamic picture pool according to the action recognition result.
In the embodiment of the application, the application of identifying the dynamic pictures and dividing the dynamic pictures into the dynamic picture pools is also provided. Specifically, in the embodiment of the present application, a plurality of moving pictures may be acquired first, where this may be achieved by acquiring moving pictures from various sources (e.g., networks, databases, file systems, etc.), and the acquired moving pictures may be in any form, for example JPEG, PNG, GIF, etc., which is not limited in this application. Then, motion recognition can be performed on the dynamic pictures, and motion recognition results corresponding to the dynamic pictures are determined. In the embodiment of the application, the method can be realized by using a motion recognition algorithm, wherein the motion recognition algorithm analyzes the motion in the dynamic picture and determines the type and the characteristics of the motion. Specifically, in the embodiment of the application, a related model can be built based on a machine learning or deep learning algorithm in an artificial intelligence technology, and action recognition is realized through the model. The present application is not limited to a particular model class and algorithm.
In the embodiment of the application, the dynamic pictures corresponding to the same action recognition result can be divided into a dynamic picture pool, and the action label corresponding to the dynamic picture pool is determined according to the action recognition result. This can be achieved by using a manager, which can divide the moving pictures into different moving picture pools according to the motion recognition results, so that each moving picture in one moving picture pool corresponds to the same motion recognition result, and the motion recognition result can be determined as a motion label corresponding to the moving picture pool. In the embodiment of the application, the action tag may be in any form, such as "running", "swimming", "dancing", and the like, according to the difference of the action recognition results.
It can be appreciated that in the embodiment of the present application, a custom-sized dynamic picture pool may be created in the above manner. The dynamic picture pools are created in advance, so that the response time of the program can be greatly shortened, the occupation of server resources is reduced, the overall function use is basically perceived to be zero, and the use experience of a user can be improved. For small and medium-sized or startup internet companies, the total amount of moving pictures or the total number of moving picture pools can be appropriately reduced, thereby facilitating low-cost use of the function.
Specifically, in some embodiments, referring to fig. 5, the method further comprises:
step 510, generating serial number data of each dynamic picture;
step 520, storing the number data in a two-dimensional storage manner.
In the embodiment of the application, the number data of the dynamic picture may be stored in a two-dimensional manner, for example, the number data may be stored in a multi-field manner, a multi-table manner, or in a key manner. Specifically, for multi-field storage: each numbered data may contain one or more fields, each field representing a portion of the data content; multi-table storage refers to the fact that data may be stored in a plurality of tables, each table representing a portion of the data content. In two-dimensional storage, one or more fields, referred to as keys, may also be used as unique identifiers for the data records. In the embodiment of the application, the number data is reasonably prevented from being acquired by the outside through a two-dimensional storage mode, so that hidden danger of violently cracking the verification code is avoided. In the two-dimensional storage mode, even if the partial serial number data is acquired, the complete data cannot be obtained, and the use of the system is effectively protected.
Specifically, in some embodiments, referring to fig. 6, after the step of presenting the verification photo set and the hint keyword to the user, the method further includes:
step 610, detecting accumulated duration of displaying the verification picture set and the prompting keywords to the user;
and 620, if the accumulated time length reaches a preset time threshold and the operation of selecting the dynamic pictures by the user is not detected, determining that the user verification is not passed, and returning to the step of randomly extracting the first number of target labels from the action labels corresponding to each dynamic picture pool for re-verification.
In the embodiment of the application, the feedback time of the user can be restrained, so that the possibility of violent cracking is reduced. Specifically, when the verification picture set and the prompting keyword are displayed to the user, the accumulated duration can be calculated from the time node for starting the display, if the accumulated duration reaches a preset time threshold value, and if the operation of selecting the dynamic picture by the user is not detected within the period of time, the user is considered to be failed to feed back in time currently, the current user verification is determined not to pass, and the step of randomly extracting the first number of target labels from the action labels corresponding to each dynamic picture pool is continuously returned for re-verification. Also, as described above, the number of times that the user authentication is not passed may be recorded, and if the number of times that the user is continuously authenticated not passed or not passed reaches a set value for a certain period of time, the user may be subjected to forced offline processing or not passed the user's authentication request.
The following describes and illustrates the technical solution of the present application in conjunction with a specific application scenario example.
The verification method based on the dynamic picture, which is described in the embodiment of the application, reasonably solves the defect that the existing verification code is easy to crack and inflexible, and improves the authenticity of the verification user; in practical application, the dynamic picture pool can be set in advance, so that the running speed of the whole system is not influenced. In addition, the method is simple and convenient to call as a whole, and can be used as a tool class for extraction; due to its low coupling characteristics, it can be used in a variety of fields. The method in the embodiment of the present application is simple and efficient to implement, has relatively wide adaptability, and referring to fig. 7, for example, the following is a specific implementation flow of the present application:
the first step: generating a dynamic picture pool in advance, setting action labels and number data for pictures in the dynamic picture pool, wherein the same dynamic picture pool corresponds to the same action labels, and the number data corresponding to each dynamic picture is different, for example: the action label of the dynamic picture 1 is dance, and the number data is 123450;
and a second step of: from a pre-generated motion picture pool, 4 different motion labels are randomly extracted, for example: dance, singing, running, long jump. One randomly extracted from the 4 different dynamic picture pools (i.e., target picture pools) is used as a verification picture (i.e., target picture). Storing the number data of the target picture into a redis database, wherein the data structure in the redis database is { user token, number data }; setting an action label corresponding to the target picture as a prompting keyword of a user;
And a third step of: displaying the extracted dynamic pictures and the extracted prompting keywords; referring to fig. 8, in the embodiment of the present application, the prompting keyword may be determined according to an action tag corresponding to a randomly selected target picture, for example, may be dance.
Fourth step: the user clicks and selects related dynamic pictures according to the prompting keywords, and the redis data of the user is queried according to the token of the current user, and the queried numbered data (namely first numbered data) is matched with the numbered data (namely second numbered data) of the clicked dynamic picture;
fifth step: the number data is successfully matched, and the user is confirmed to be a real user, so that the operation can be continued.
Sixth step: and (3) if the number data is failed to match or is not clicked for a long time, repeating the second step and the third step, and canceling the data in the redis to regenerate the target picture and the prompting keyword.
Seventh step: and the number data is excessively matched or the expiration time is expired, and the number data is judged to be a non-real user, so that the user is forced to be off line or the user is not required to pass the verification request.
It can be understood that in the embodiment of the application, the dynamic picture is taken by the dynamic picture pool and displayed to the user, and the user can effectively check whether the dynamic picture is a real user by prompting the keyword to click the dynamic picture in response. The human brain can quickly calculate the dynamic picture, and the correct picture can be quickly selected in the effective time. If the dynamic picture is violently cracked, for the current hardware, a great deal of time and resources are required for cracking a plurality of dynamic pictures at one time, and the final judgment result is difficult to be accurate and is not suitable for a scene of cracking the verification code, which needs a great deal of use. Therefore, the method in the embodiment of the application can improve the safety and reliability of user verification and improve the use experience of the user.
A moving picture-based authentication apparatus according to an embodiment of the present application is described below with reference to the accompanying drawings.
Referring to fig. 9, a moving picture-based authentication apparatus provided in an embodiment of the present application includes:
a response unit 910, configured to randomly extract a first number of target tags from the action tags corresponding to each of the moving picture pools in response to a verification request of a user, and determine the moving picture pool corresponding to each of the target tags as a target picture pool;
an extracting unit 920, configured to randomly extract a moving picture from each of the target picture pools to obtain a verification picture set;
a recording unit 930, configured to determine one moving picture in the verification picture set as a target picture, and record first number data corresponding to the target picture;
a generating unit 940, configured to generate a prompting keyword according to an action tag corresponding to the dynamic picture pool to which the target picture belongs;
a detection unit 950, configured to display the verification picture set and the prompting keyword to the user, and detect second number data corresponding to the dynamic picture selected by the user;
a processing unit 960 configured to determine that the user authentication passes if the first number data and the second number data are identical.
It can be understood that the content in the above method embodiment is applicable to the embodiment of the present device, and the specific functions implemented by the embodiment of the present device are the same as those of the embodiment of the above method, and the achieved beneficial effects are the same as those of the embodiment of the above method.
Referring to fig. 10, an embodiment of the present application provides an electronic device, including:
at least one processor 1010;
at least one memory 1020 for storing at least one program;
the at least one program, when executed by the at least one processor 1010, causes the at least one processor 1010 to implement a dynamic picture based authentication method.
Similarly, the content in the above method embodiment is applicable to the present electronic device embodiment, and the functions specifically implemented by the present electronic device embodiment are the same as those of the above method embodiment, and the beneficial effects achieved by the present electronic device embodiment are the same as those achieved by the above method embodiment.
The present embodiment also provides a computer-readable storage medium in which a program executable by the processor 1010 is stored, the program executable by the processor 1010 being configured to perform the above-described moving picture-based authentication method when executed by the processor 1010.
Similarly, the content in the above method embodiment is applicable to the present computer-readable storage medium embodiment, and the functions specifically implemented by the present computer-readable storage medium embodiment are the same as those of the above method embodiment, and the beneficial effects achieved by the above method embodiment are the same as those achieved by the above method embodiment.
In some alternative embodiments, the functions/acts noted in the block diagrams may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Furthermore, the embodiments presented and described in the flowcharts of this application are provided by way of example in order to provide a more thorough understanding of the technology. The disclosed methods are not limited to the operations and logic flows presented herein. Alternative embodiments are contemplated in which the order of various operations is changed, and in which sub-operations described as part of a larger operation are performed independently.
Furthermore, while the present application is described in the context of functional modules, it should be appreciated that, unless otherwise indicated, one or more of the functions and/or features may be integrated in a single physical device and/or software module or one or more of the functions and/or features may be implemented in separate physical devices or software modules. It will also be appreciated that a detailed discussion of the actual implementation of each module is not necessary to an understanding of the present application. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be apparent to those skilled in the art from consideration of their attributes, functions and internal relationships. Thus, those of ordinary skill in the art will be able to implement the present application as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative and are not intended to be limiting upon the scope of the application, which is to be defined by the appended claims and their full scope of equivalents.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing an apparatus (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
In the foregoing description of the present specification, descriptions of the terms "one embodiment/example", "another embodiment/example", "certain embodiments/examples", and the like, are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the principles and spirit of the application, the scope of which is defined by the claims and their equivalents.
While the preferred embodiments of the present application have been described in detail, the present application is not limited to the embodiments, and various equivalent modifications and substitutions can be made by those skilled in the art without departing from the spirit of the present application, and these equivalent modifications and substitutions are intended to be included in the scope of the present application as defined in the appended claims.

Claims (10)

1. A dynamic picture-based authentication method, comprising:
responding to a verification request of a user, randomly extracting a first number of target labels from action labels corresponding to each dynamic picture pool, and determining the dynamic picture pool corresponding to each target label as a target picture pool;
randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set;
determining one dynamic picture in the verification picture set as a target picture, and recording first number data corresponding to the target picture;
generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs;
displaying the verification picture set and the prompting keyword to the user, and detecting second numbered data corresponding to the dynamic picture selected by the user;
and if the first number data is consistent with the second number data, determining that the user verification is passed.
2. The moving picture-based authentication method according to claim 1, wherein the authentication request is triggered by:
detecting touch screen operation of the user on terminal equipment, and triggering the verification request according to the touch screen operation;
Or, acquiring the voice data of the user, performing voice recognition on the voice data, and triggering the verification request according to the voice recognition result.
3. The moving picture-based authentication method according to claim 1, wherein the method further comprises:
acquiring a plurality of dynamic pictures;
performing motion recognition on the dynamic pictures, and determining motion recognition results corresponding to the dynamic pictures;
dividing the dynamic pictures corresponding to the same action recognition result into a dynamic picture pool, and determining an action label corresponding to the dynamic picture pool according to the action recognition result.
4. A moving picture based authentication method according to claim 3, further comprising:
generating serial number data of each dynamic picture;
and storing the number data in a two-dimensional storage mode.
5. The moving picture based authentication method according to claim 4, wherein the storing the number data by means of two-dimensional storage includes:
the numbering data is stored in two dimensions by multi-field storage, multi-table storage or in a key manner.
6. The moving picture-based authentication method according to any one of claims 1 to 5, wherein the method further comprises:
and if the first number data is inconsistent with the second number data, determining that the user verification is not passed, and returning to the step of randomly extracting the first number of target labels from the action labels corresponding to each dynamic picture pool for re-verification.
7. The moving picture-based authentication method according to any one of claims 1 to 5, wherein after the step of presenting the authentication picture set and the hint keyword to the user, the method further comprises:
detecting accumulated time length for displaying the verification picture set and the prompting keywords to the user;
if the accumulated time length reaches a preset time threshold and the operation of selecting the dynamic pictures by the user is not detected, determining that the user verification is not passed, and returning to the step of randomly extracting the first number of target labels from the action labels corresponding to each dynamic picture pool for re-verification.
8. A moving picture-based authentication apparatus, comprising:
the response unit is used for responding to the verification request of the user, randomly extracting a first number of target labels from the action labels corresponding to each dynamic picture pool, and determining the dynamic picture pool corresponding to each target label as a target picture pool;
The extraction unit is used for randomly extracting a dynamic picture from each target picture pool to obtain a verification picture set;
a recording unit, configured to determine one moving picture in the verification picture set as a target picture, and record first number data corresponding to the target picture;
the generating unit is used for generating a prompting keyword according to the action label corresponding to the dynamic picture pool to which the target picture belongs;
the detection unit is used for displaying the verification picture set and the prompting keyword to the user and detecting second numbered data corresponding to the dynamic picture selected by the user;
and the processing unit is used for determining that the user verification passes if the first number data is consistent with the second number data.
9. An electronic device, comprising:
at least one processor;
at least one memory for storing at least one program;
the at least one program, when executed by the at least one processor, causes the at least one processor to implement the moving picture based authentication method as claimed in any one of claims 1-7.
10. A computer-readable storage medium having stored therein a program executable by a processor, characterized in that: the processor executable program when executed by a processor is for implementing a moving picture based authentication method as claimed in any one of claims 1-7.
CN202311393874.3A 2023-10-25 2023-10-25 Verification method, device, equipment and medium based on dynamic picture Pending CN117390614A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311393874.3A CN117390614A (en) 2023-10-25 2023-10-25 Verification method, device, equipment and medium based on dynamic picture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311393874.3A CN117390614A (en) 2023-10-25 2023-10-25 Verification method, device, equipment and medium based on dynamic picture

Publications (1)

Publication Number Publication Date
CN117390614A true CN117390614A (en) 2024-01-12

Family

ID=89467994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311393874.3A Pending CN117390614A (en) 2023-10-25 2023-10-25 Verification method, device, equipment and medium based on dynamic picture

Country Status (1)

Country Link
CN (1) CN117390614A (en)

Similar Documents

Publication Publication Date Title
TWI592820B (en) Man-machine recognition method and system
US9317676B2 (en) Image-based CAPTCHA exploiting context in object recognition
Moradi et al. CAPTCHA and its Alternatives: A Review
US11188720B2 (en) Computing system including virtual agent bot providing semantic topic model-based response
CN104135365B (en) Method, server and the client that access request is verified
EP3140978B1 (en) Method and system for generating verification codes
Kumar et al. A systematic survey on CAPTCHA recognition: types, creation and breaking techniques
CN102255913A (en) Verification-security-level-based audio verification code provision method and equipment
CN109271762B (en) User authentication method and device based on slider verification code
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
WO2013106925A1 (en) Determining repeat website users via browser uniqueness tracking
CN111241873A (en) Image reproduction detection method, training method of model thereof, payment method and payment device
CN106330915A (en) Voice verification processing method and device
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN105681344A (en) Verification code recognition system and method
CN107808082B (en) Electronic device, data access verification method, and computer-readable storage medium
CN117390614A (en) Verification method, device, equipment and medium based on dynamic picture
US20220292171A1 (en) User authentication using original and modified images
CN111008373B (en) Intelligent question-answering processing method and device, computer readable medium and electronic equipment
CN114298714A (en) Account identity authentication method and device, electronic equipment and storage medium
CN114444047A (en) Identity authentication method, device, equipment and storage medium based on virtual reality
EP3572961B1 (en) Method and system for continuous verification of user identity in an online service using multi-biometric data
Baluni et al. Two-step CAPTCHA: using a simple two step turing test to differentiate between humans and Bots
Terada et al. Is Puzzle-Based CAPTCHA Secure Against Attacks Based on CNN?
RU2815478C1 (en) Authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination