WO2016127717A1 - Checking method and system based on puzzle - Google Patents
Checking method and system based on puzzle Download PDFInfo
- Publication number
- WO2016127717A1 WO2016127717A1 PCT/CN2015/099763 CN2015099763W WO2016127717A1 WO 2016127717 A1 WO2016127717 A1 WO 2016127717A1 CN 2015099763 W CN2015099763 W CN 2015099763W WO 2016127717 A1 WO2016127717 A1 WO 2016127717A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- divided pictures
- picture
- order
- verification
- pictures
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Definitions
- encrypting the random order comprises sequentially extracting elements from the letters and/or numbers randomly for each of the random sequences to form a corresponding 3 to 5 digit plus password,
- the individual encryption codes are combined into the encrypted random order.
- the method further includes: transmitting the verification picture, the plurality of divided pictures, and the encrypted random order to the user terminal, to receiving the arrangement order of the plurality of divided pictures submitted by the user The time between the restrictions.
- the verification picture can be a picture of any shape, such as a rectangle, a circle, a trapezoid, an ellipse, a triangle, and the like.
- the picture cutting device may cut the verification picture into N divided pictures, where N is a positive integer greater than 1, and wherein each of the N divided pictures can have the same or different size and/or shape.
- the verification picture can be cut into 4, 6, 8, and 9 divided pictures.
- the shape of the divided picture may be a rectangle, a trapezoid, a triangle, or any other irregular shape, etc., as long as the combination of all the divided pictures can restore the verification picture.
- the method further includes: a time limit device, configured to send the verification sequence, the plurality of divided pictures, and the encrypted random sequence to the user terminal, to receive the sequence of the plurality of divided pictures submitted by the user. The time between them is limited. If the order of the multiple divided pictures submitted by the user has not been received within a limited time, the verification process is terminated.
- a time limit device configured to send the verification sequence, the plurality of divided pictures, and the encrypted random sequence to the user terminal, to receive the sequence of the plurality of divided pictures submitted by the user. The time between them is limited. If the order of the multiple divided pictures submitted by the user has not been received within a limited time, the verification process is terminated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
A checking method and system based on a puzzle. The method comprises: cutting a verification picture into a plurality of divided pictures (201) to obtain an original order of the plurality of divided pictures; randomly processing the original order to obtain a random order of the plurality of divided pictures, and encrypting the random order to obtain the encrypted random order; sending the verification picture, the plurality of divided pictures and the encrypted random order to a user terminal, and receiving an arrangement order of the plurality of divided pictures submitted by a user; and checking whether the arrangement order of the plurality of divided pictures is the same as the original order of the plurality of divided pictures.
Description
本发明涉及一种基于拼图的校验方法和系统。The invention relates to a puzzle-based verification method and system.
互联网行业现如今发展越来越快,在这个开放的时代,互联网公司期望可以更好的和用户进行交互,在这些交互中,诸如注册,发帖等形式被越来越多的使用,同时也被越来越多的不法份子看重,利用一些非法的途径牟利,为了能更好的保护和用户的交互,和数据安全性,一种以拼图形式的校验方法孕育而生。The Internet industry is now growing faster and faster. In this era of openness, Internet companies expect to be able to interact better with users. In these interactions, forms such as registration and posting are being used more and more. More and more unscrupulous people value it and use some illegal ways to make profits. In order to better protect and interact with users, and data security, a verification method based on puzzles is born.
目前现有验证方法,比较常见的包括例如验证码和文字识别。目前的技术方案比较单一,通过识别一张图片内的数码或者文字来加以验证。这样的技术方案被破解的成本较低,验证安全性也较低。Currently available verification methods, such as verification code and text recognition, are more common. The current technical solution is relatively simple and is verified by identifying the number or text in a picture. Such technical solutions are less costly to crack and verify security is lower.
发明内容Summary of the invention
鉴于本领域中存在的上述问题,本发明提出了一种新颖的基于拼图的校验方法和系统。基于拼图的形式,系统自动将验证图片切割为分割图片,并且变换随机地产生的加密码,增加破解难度和成本,提高验证安全性。In view of the above problems in the art, the present invention proposes a novel puzzle-based verification method and system. Based on the form of the puzzle, the system automatically cuts the verification picture into divided pictures, and transforms the randomly generated encryption code to increase the difficulty and cost of the crack and improve the verification security.
根据本发明的一个方面,提供了一种基于拼图的校验方法。所述方法包括:将验证图片切割为多个分割图片,以获得所述多个分割图片的原始顺序;对所述原始顺序进行随机处理,以获得所述多个分割图片的随机顺序,并对所述随机顺序进行加密,以获得加密的随机顺序;将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,并接收由用户提交的所述多个分割图片的排列顺序;并且校验所述多个分割图片的排列顺序是否与所述多个分割图片的原始顺序
相同。According to an aspect of the present invention, a puzzle-based verification method is provided. The method includes: cutting a verification picture into a plurality of divided pictures to obtain an original sequence of the plurality of divided pictures; performing random processing on the original order to obtain a random order of the plurality of divided pictures, and Encrypting in a random order to obtain an encrypted random sequence; transmitting the verification picture, the plurality of divided pictures, and an encrypted random order to a user terminal, and receiving an arrangement of the plurality of divided pictures submitted by a user And determining whether an arrangement order of the plurality of divided pictures and an original order of the plurality of divided pictures
the same.
根据本发明的一个实施例,其中所述验证图片为任意形状的图片。According to an embodiment of the invention, wherein the verification picture is a picture of an arbitrary shape.
根据本发明的一个实施例,还包括:将所述验证图片切割为N个分割图片,其中N为大于1的正整数,并且其中所述N个分割图片中的每一个均能够具有相同或不同的大小和/或形状。According to an embodiment of the present invention, the method further includes: cutting the verification picture into N divided pictures, where N is a positive integer greater than 1, and wherein each of the N divided pictures can have the same or different The size and / or shape.
根据本发明的一个实施例,其中对所述随机顺序进行加密包括为所述随机顺序中的每一个数字依次随机地从字母和/或数字中抽取元素,组成对应的3至5位加密码,并将各个加密码组合为所述加密的随机顺序。According to an embodiment of the invention, wherein encrypting the random order comprises sequentially extracting elements from the letters and/or numbers randomly for each of the random sequences to form a corresponding 3 to 5 digit plus password, The individual encryption codes are combined into the encrypted random order.
根据本发明的一个实施例,还包括:对在将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,到接收由用户提交的所述多个分割图片的排列顺序之间的时间进行限制。According to an embodiment of the present invention, the method further includes: transmitting the verification picture, the plurality of divided pictures, and the encrypted random order to the user terminal, to receiving the arrangement order of the plurality of divided pictures submitted by the user The time between the restrictions.
根据本发明的另一个方面,提供了一种基于拼图的校验系统。所述系统包括:图片切割装置,用于将验证图片切割为多个分割图片,以获得所述多个分割图片的原始顺序;图片加密装置,用于对所述原始顺序进行随机处理,以获得所述多个分割图片的随机顺序,并对所述随机顺序进行加密,以获得加密的随机顺序;通信装置,用于将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,并接收由用户提交的所述多个分割图片的排列顺序;以及校验装置,用于校验由用户提交的所述多个分割图片的排列顺序是否与所述多个分割图片的原始顺序相同。According to another aspect of the present invention, a puzzle-based verification system is provided. The system includes: a picture cutting device, configured to cut a verification picture into a plurality of divided pictures to obtain an original sequence of the plurality of divided pictures; and a picture encryption device configured to randomly process the original order to obtain a random sequence of the plurality of divided pictures, and encrypting the random order to obtain an encrypted random sequence; and a communication device, configured to send the verification picture, the plurality of divided pictures, and an encrypted random order to a user terminal, and receiving an arrangement order of the plurality of divided pictures submitted by a user; and checking means for verifying whether an arrangement order of the plurality of divided pictures submitted by the user is related to the plurality of divided pictures The original order is the same.
根据本发明的一个实施例,其中所述验证图片为任意形状的图片。According to an embodiment of the invention, wherein the verification picture is a picture of an arbitrary shape.
根据本发明的一个实施例,其中所述图片切割装置将所述验证图
片切割为N个分割图片,其中N为大于1的正整数,并且其中所述N个分割图片中的每一个均能够具有相同或不同的大小和/或形状。According to an embodiment of the present invention, wherein the picture cutting device sets the verification map
The slice is cut into N divided pictures, where N is a positive integer greater than 1, and wherein each of the N divided pictures can have the same or different size and/or shape.
根据本发明的一个实施例,其中所述图片加密装置为所述随机顺序中的每一个数字依次随机地从字母和/或数字中抽取元素,组成对应的3至5位加密码,并将各个加密码组合为所述加密的随机顺序。According to an embodiment of the present invention, wherein the picture encrypting means sequentially extracts elements from the letters and/or numbers randomly for each of the random sequences to form a corresponding 3 to 5 digits plus a password, and each Adding a password combination is the random order of the encryption.
根据本发明的一个实施例,还包括:限时装置,用于对在将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,到接收由用户提交的所述多个分割图片的排列顺序之间的时间进行限制。According to an embodiment of the present invention, the method further includes: a time limit device, configured to send the verification picture, the plurality of divided pictures, and the encrypted random order to the user terminal, to receive the multiple submitted by the user The time between the order in which the pictures are divided is limited.
附图用于更好地理解本发明,并不构成对本发明的不当限定。其中:The drawings are intended to provide a better understanding of the invention and are not intended to limit the invention. among them:
图1是根据本发明实施例的一种基于拼图的校验系统10的示意框图;1 is a schematic block diagram of a puzzle-based verification system 10 in accordance with an embodiment of the present invention;
图2是根据本发明实施例的一种基于拼图的校验方法的示意流程图。2 is a schematic flow chart of a puzzle-based verification method in accordance with an embodiment of the present invention.
以下结合附图对本发明的示范性实施例做出说明,其中包括本发明实施例的各种细节以助于理解,应当将它们认为仅仅是示范性的。因此,本领域普通技术人员应当认识到,可以对这里描述的实施例做出各种改变和修改,而不会背离本发明的范围和精神。同样,为了清楚和简明,以下的描述中省略了对公知功能和结构的描述。The exemplary embodiments of the present invention are described with reference to the accompanying drawings, and are in the Therefore, it will be apparent to those skilled in the art that various modifications and changes may be made to the embodiments described herein without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
在根据本发明的基于拼图的校验方法和系统中所涉及的拼图是将一张图片分成N张小的图片并且打乱这些小图片顺序,然后根据N张小图的每张之间的关联性进行恢复,以重复获得原始的图片。在根据
本发明的基于拼图的校验方法和系统中,用于验证的图片,即被分割的图片被称为“验证图片”,而分割后的图片,即所谓的小图片,被称为“分割图片”。The puzzle involved in the puzzle-based verification method and system according to the present invention divides a picture into N small pictures and scrambles the order of the small pictures, and then performs the correlation between each of the N small pictures. Restore to repeat the original picture. In accordance with
In the puzzle-based verification method and system of the present invention, the picture for verification, that is, the divided picture is called “verification picture”, and the divided picture, so-called small picture, is called “segment picture”. ".
图1是根据本发明实施例的一种基于拼图的校验系统10的示意框图。如图1所示,基于拼图的校验系统10包括:图片切割装置110,用于将验证图片切割为多个分割图片,以获得多个分割图片的原始顺序;图片加密装置120,用于对原始顺序进行随机处理,以获得多个分割图片的随机顺序,并对随机顺序进行加密,以获得加密的随机顺序;通信装置130,用于将验证图片、多个分割图片和加密的随机顺序发送到用户终端,并接收由用户提交的多个分割图片的排列顺序;以及校验装置140,用于校验由用户提交的多个分割图片的排列顺序是否与多个分割图片的原始顺序相同。1 is a schematic block diagram of a puzzle-based verification system 10 in accordance with an embodiment of the present invention. As shown in FIG. 1, the puzzle-based verification system 10 includes: a picture cutting device 110 for cutting a verification picture into a plurality of divided pictures to obtain an original sequence of a plurality of divided pictures; and a picture encryption device 120 for The original sequence is randomly processed to obtain a random order of the plurality of divided pictures, and the random order is encrypted to obtain an encrypted random sequence; the communication device 130 is configured to send the verification picture, the plurality of divided pictures, and the encrypted random order Go to the user terminal and receive an arrangement order of the plurality of divided pictures submitted by the user; and the verification device 140 is configured to check whether the arrangement order of the plurality of divided pictures submitted by the user is the same as the original order of the plurality of divided pictures.
根据本发明的实施例的系统10,其中验证图片可以为任意形状的图片,例如矩形、圆形、梯形、椭圆形、三角形等。其中图片切割装置可以将验证图片切割为N个分割图片,其中N为大于1的正整数,并且其中N个分割图片中的每一个均能够具有相同或不同的大小和/或形状。例如可以将验证图片切割为4、6、8、9个分割图片。例如分割图片的形状可以为矩形、梯形、三角形,或者是其他任意的不规则形状等等,只要全部分割图片的组合能够还原验证图片即可。 System 10 in accordance with an embodiment of the present invention, wherein the verification picture can be a picture of any shape, such as a rectangle, a circle, a trapezoid, an ellipse, a triangle, and the like. Wherein the picture cutting device may cut the verification picture into N divided pictures, where N is a positive integer greater than 1, and wherein each of the N divided pictures can have the same or different size and/or shape. For example, the verification picture can be cut into 4, 6, 8, and 9 divided pictures. For example, the shape of the divided picture may be a rectangle, a trapezoid, a triangle, or any other irregular shape, etc., as long as the combination of all the divided pictures can restore the verification picture.
根据本发明的一个实施例,其中图片加密装置为随机顺序中的每一个数字依次随机地从字母和/或数字中抽取元素,组成对应的3至5位加密码,例如对于数字1、2和3,分别进行3、4和5位的加密,则随机地得到例如1=>2c31、2=>sr1、3=>2sz34,并将各个加密码组合为加密的随机顺序。以下用9张分割图片为例进一步具体加以说明。例如将验证图片切割为9个1-9的原始顺序,即原始顺序:123456789之后,对原始顺序进行随机处理,以获得9个分割图片的随机顺序,例如852473196。然后依次对随机顺序进行如上所述的加密,以获得加
密的随机顺序,即首先对8随机地从字母和/或数字中抽取例如3个元素,获得对应的加密码dj6。依次对其余的数字52473196进行加密,并且将获得的总共9个加密码组合为加密的随机顺序。According to an embodiment of the present invention, wherein the picture encrypting means sequentially extracts elements from the letters and/or numbers in a random order, respectively, to form corresponding 3 to 5 bit plus codes, for example, for numbers 1, 2 and 3. Perform encryption of 3, 4, and 5 bits, respectively, and randomly obtain, for example, 1=>2c31, 2=>sr1, 3=>2sz34, and combine the respective encryption codes into an encrypted random order. The following uses nine divided pictures as an example to further explain the details. For example, the verification picture is cut into nine original sequences of 1-9, that is, the original order: 123456789, and the original order is randomly processed to obtain a random order of 9 divided pictures, for example, 852473196. Then sequentially perform the encryption as described above on the random order to obtain the addition.
A dense random order, that is, first, for example, 8 elements are randomly extracted from letters and/or numbers, and the corresponding encryption code dj6 is obtained. The remaining digits 52473196 are encrypted in turn, and the total of 9 added passwords are combined into an encrypted random order.
根据本发明的一个实施例,还包括:限时装置,用于对在将验证图片、多个分割图片和加密的随机顺序发送到用户终端,到接收由用户提交的多个分割图片的排列顺序之间的时间进行限制。如果在限定的时间内,还没有接收到用户提交的多个分割图片的排列顺序,则终止验证过程According to an embodiment of the present invention, the method further includes: a time limit device, configured to send the verification sequence, the plurality of divided pictures, and the encrypted random sequence to the user terminal, to receive the sequence of the plurality of divided pictures submitted by the user. The time between them is limited. If the order of the multiple divided pictures submitted by the user has not been received within a limited time, the verification process is terminated.
图2是根据本发明实施例的一种基于拼图的校验方法的示意流程图。如图2所示,基于拼图的校验方法包括:步骤201,其中将验证图片切割为多个分割图片,以获得多个分割图片的原始顺序;步骤202,其中对原始顺序进行随机处理,以获得多个分割图片的随机顺序,并对随机顺序进行加密,以获得加密的随机顺序;步骤203,其中将验证图片、多个分割图片和加密的随机顺序发送到用户终端,并接收由用户提交的多个分割图片的排列顺序;以及步骤204,其中校验多个分割图片的排列顺序是否与多个分割图片的原始顺序相同。2 is a schematic flow chart of a puzzle-based verification method in accordance with an embodiment of the present invention. As shown in FIG. 2, the puzzle-based verification method includes: step 201, wherein the verification picture is cut into a plurality of divided pictures to obtain an original sequence of the plurality of divided pictures; and step 202, wherein the original order is randomly processed to Obtaining a random sequence of the plurality of divided pictures, and encrypting the random order to obtain an encrypted random order; Step 203, wherein the verification picture, the plurality of divided pictures, and the encrypted random order are sent to the user terminal, and the receiving is submitted by the user An arrangement order of the plurality of divided pictures; and a step 204 of checking whether the arrangement order of the plurality of divided pictures is the same as the original order of the plurality of divided pictures.
根据本发明的一个实施例,基于拼图的校验方法包括还包括:对在将验证图片、多个分割图片和加密的随机顺序发送到用户终端,到接收由用户提交的多个分割图片的排列顺序之间的时间进行限制的步骤。According to an embodiment of the present invention, the puzzle-based verification method further includes: transmitting the random sequence of the verification picture, the plurality of divided pictures, and the encryption to the user terminal, to receiving the arrangement of the plurality of divided pictures submitted by the user The step of limiting the time between sequences.
上述具体实施方式,并不构成对本发明保护范围的限制。本领域技术人员应该明白的是,取决于设计要求和其他因素,可以发生各种各样的修改、组合、子组合和替代。任何在本发明的精神和原则之内所作的修改、等同替换和改进等,均应包含在本发明保护范围之内。
The above specific embodiments do not constitute a limitation of the scope of the present invention. Those skilled in the art will appreciate that a wide variety of modifications, combinations, sub-combinations and substitutions can occur depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and scope of the invention are intended to be included within the scope of the invention.
Claims (10)
- 一种基于拼图的校验方法,包括:A puzzle-based verification method, including:将验证图片切割为多个分割图片,以获得所述多个分割图片的原始顺序;Cutting the verification picture into a plurality of divided pictures to obtain an original sequence of the plurality of divided pictures;对所述原始顺序进行随机处理,以获得所述多个分割图片的随机顺序,并对所述随机顺序进行加密,以获得加密的随机顺序;Performing random processing on the original sequence to obtain a random order of the plurality of divided pictures, and encrypting the random order to obtain an encrypted random order;将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,并接收由用户提交的所述多个分割图片的排列顺序;并且Transmitting the verification picture, the plurality of divided pictures, and the encrypted random order to the user terminal, and receiving an arrangement order of the plurality of divided pictures submitted by the user; and校验所述多个分割图片的排列顺序是否与所述多个分割图片的原始顺序相同。Verifying whether the arrangement order of the plurality of divided pictures is the same as the original order of the plurality of divided pictures.
- 根据权利要求1所述的方法,其中所述验证图片为任意形状的图片。The method of claim 1 wherein said verification picture is a picture of any shape.
- 根据权利要求1所述的方法,还包括:将所述验证图片切割为N个分割图片,其中N为大于1的正整数,并且其中所述N个分割图片中的每一个均能够具有相同或不同的大小和/或形状。The method of claim 1, further comprising: cutting the verification picture into N divided pictures, wherein N is a positive integer greater than 1, and wherein each of the N divided pictures can have the same or Different sizes and / or shapes.
- 根据权利要求1所述的方法,其中对所述随机顺序进行加密包括为所述随机顺序中的每一个数字依次随机地从字母和/或数字中抽取元素,组成对应的3至5位加密码,并将各个加密码组合为所述加密的随机顺序。The method of claim 1 wherein encrypting said random order comprises sequentially extracting elements from letters and/or numbers randomly for each of said random sequences to form a corresponding 3 to 5 digit plus password And combine each encryption code into the encrypted random order.
- 根据权利要求1所述的方法,还包括:对在将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,到接收由用户提交的所述多个分割图片的排列顺序之间的时间进行限制。The method of claim 1, further comprising: transmitting the verification picture, the plurality of divided pictures, and the encrypted random order to the user terminal to receiving the arrangement of the plurality of divided pictures submitted by the user The time between sequences is limited.
- 一种基于拼图的校验系统,包括:A puzzle-based verification system that includes:图片切割装置,用于将验证图片切割为多个分割图片,以获得所 述多个分割图片的原始顺序;a picture cutting device for cutting a verification picture into a plurality of divided pictures to obtain a Describe the original order of the plurality of divided pictures;图片加密装置,用于对所述原始顺序进行随机处理,以获得所述多个分割图片的随机顺序,并对所述随机顺序进行加密,以获得加密的随机顺序;a picture encryption device, configured to perform random processing on the original sequence to obtain a random order of the plurality of divided pictures, and encrypt the random order to obtain an encrypted random sequence;通信装置,用于将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,并接收由用户提交的所述多个分割图片的排列顺序;以及a communication device, configured to send the verification picture, the plurality of divided pictures, and an encrypted random sequence to a user terminal, and receive an arrangement order of the plurality of divided pictures submitted by a user;校验装置,用于校验由用户提交的所述多个分割图片的排列顺序是否与所述多个分割图片的原始顺序相同。And a verification device, configured to check whether an arrangement order of the plurality of divided pictures submitted by the user is the same as an original order of the plurality of divided pictures.
- 根据权利要求6所述的系统,其中所述验证图片为任意形状的图片。The system of claim 6 wherein said verification picture is a picture of any shape.
- 根据权利要求6所述的系统,其中所述图片切割装置将所述验证图片切割为N个分割图片,其中N为大于1的正整数,并且其中所述N个分割图片中的每一个均能够具有相同或不同的大小和/或形状。The system according to claim 6, wherein said picture cutting means cuts said verification picture into N divided pictures, wherein N is a positive integer greater than 1, and wherein each of said N divided pictures is capable Have the same or different sizes and/or shapes.
- 根据权利要求6所述的系统,其中所述图片加密装置为所述随机顺序中的每一个数字依次随机地从字母和/或数字中抽取元素,组成对应的3至5位加密码,并将各个加密码组合为所述加密的随机顺序。The system according to claim 6, wherein said picture encrypting means sequentially extracts elements from the letters and/or numbers randomly for each of said random sequences to form a corresponding 3 to 5 digits plus a password, and Each cryptographic combination is a random order of the encryption.
- 根据权利要求6所述的系统,还包括:限时装置,用于对在将所述验证图片、所述多个分割图片和加密的随机顺序发送到用户终端,到接收由用户提交的所述多个分割图片的排列顺序之间的时间进行限制。 The system according to claim 6, further comprising: time limiting means for transmitting the verification picture, the plurality of divided pictures and the encrypted random order to the user terminal, to receiving the plurality of submissions by the user The time between the order in which the divided pictures are arranged is limited.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510078781.0 | 2015-02-13 | ||
CN201510078781.0A CN104598802A (en) | 2015-02-13 | 2015-02-13 | Verification method and system based on puzzle |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016127717A1 true WO2016127717A1 (en) | 2016-08-18 |
Family
ID=53124580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/099763 WO2016127717A1 (en) | 2015-02-13 | 2015-12-30 | Checking method and system based on puzzle |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN104598802A (en) |
HK (1) | HK1208922A1 (en) |
WO (1) | WO2016127717A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112163993A (en) * | 2020-08-21 | 2021-01-01 | 北京字节跳动网络技术有限公司 | Image processing method, device, equipment and storage medium |
CN112580012A (en) * | 2020-12-25 | 2021-03-30 | 广州凡科互联网科技股份有限公司 | Man-machine identification method based on sliding jigsaw verification code |
CN115842634A (en) * | 2023-02-20 | 2023-03-24 | 卓望数码技术(深圳)有限公司 | Verification method, device, equipment and storage medium |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104598802A (en) * | 2015-02-13 | 2015-05-06 | 北京京东尚科信息技术有限公司 | Verification method and system based on puzzle |
CN106295264A (en) * | 2015-05-21 | 2017-01-04 | 阿里巴巴集团控股有限公司 | The recognition methods of a kind of operation and system |
CN105046123B (en) * | 2015-07-15 | 2018-12-21 | 惠州市茂荣智能科技有限公司 | It is a kind of to realize cipher safety system and its setting method using picture |
CN105354463B (en) * | 2015-09-30 | 2018-06-15 | 宇龙计算机通信科技(深圳)有限公司 | A kind of fingerprint identification method and mobile terminal |
CN105511759B (en) * | 2015-12-14 | 2020-01-31 | 联想(北京)有限公司 | image processing method and electronic equipment |
CN106023284A (en) * | 2016-05-09 | 2016-10-12 | 深圳市博悦生活用品有限公司 | Jigsaw learning method and jigsaw learning system |
CN107784219B (en) * | 2016-08-25 | 2019-04-30 | 腾讯科技(深圳)有限公司 | A kind of character identifying code implementation method, device and terminal |
CN106529248B (en) * | 2016-10-20 | 2020-02-07 | 广东小天才科技有限公司 | User terminal unlocking method and device and user terminal |
CN106686009A (en) * | 2017-03-03 | 2017-05-17 | 苏州仙度网络科技有限公司 | Identity verifying method, device and system |
CN107832473A (en) * | 2017-11-30 | 2018-03-23 | 奕响(大连)科技有限公司 | A kind of picture similar decision method after non-equal proportion stretching |
CN107886134A (en) * | 2017-11-30 | 2018-04-06 | 奕响(大连)科技有限公司 | A kind of local creative similar decision method of picture |
CN109523557B (en) * | 2018-10-11 | 2023-06-16 | 南宁因果科技有限公司 | Image semantic segmentation labeling method, device and storage medium |
CN110191426B (en) * | 2019-05-17 | 2021-03-09 | 维沃移动通信有限公司 | Information sharing method and terminal |
CN111027041B (en) * | 2019-11-28 | 2022-07-15 | 武汉极意网络科技有限公司 | Verification picture configuration method and system |
CN111443846B (en) * | 2020-04-23 | 2021-12-21 | 维沃移动通信有限公司 | Red packet processing method, electronic device and storage medium |
CN112337078B (en) * | 2020-11-06 | 2022-07-01 | 湖南新云网科技有限公司 | Jigsaw display method, system and computer readable storage medium |
CN114422652B (en) * | 2022-03-28 | 2022-06-03 | 北京中科飞鸿科技股份有限公司 | Large-angle imaging reconnaissance system |
CN115017530B (en) * | 2022-08-08 | 2022-12-16 | 创云融达信息技术(天津)股份有限公司 | Data security storage device and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040096058A1 (en) * | 2001-04-27 | 2004-05-20 | Young-Sun Cho | Apparatus and method for encrypting/decrypting information on basic element by element basis and encryption/decryption system using the same |
CN102592254A (en) * | 2011-10-25 | 2012-07-18 | 上海博路信息技术有限公司 | Identifying code system based on image splicing |
CN103078745A (en) * | 2013-02-04 | 2013-05-01 | 马骏 | Logon authentication code based on picture |
CN103312512A (en) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | Image verification code generating method, image verification code generating device, identity verification method and identity verification device |
CN104598802A (en) * | 2015-02-13 | 2015-05-06 | 北京京东尚科信息技术有限公司 | Verification method and system based on puzzle |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4171284B2 (en) * | 2002-11-05 | 2008-10-22 | Hoya株式会社 | Scanning optical system |
CN101183463B (en) * | 2007-12-19 | 2010-06-09 | 腾讯科技(深圳)有限公司 | Picture validation code generating method and device |
CN103731403B (en) * | 2012-10-12 | 2017-06-23 | 阿里巴巴集团控股有限公司 | A kind of identifying code generates system and method |
CN103188263A (en) * | 2013-03-22 | 2013-07-03 | 百度在线网络技术(北京)有限公司 | Verification method, system and device |
-
2015
- 2015-02-13 CN CN201510078781.0A patent/CN104598802A/en active Pending
- 2015-09-25 HK HK15109471.2A patent/HK1208922A1/en unknown
- 2015-12-30 WO PCT/CN2015/099763 patent/WO2016127717A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040096058A1 (en) * | 2001-04-27 | 2004-05-20 | Young-Sun Cho | Apparatus and method for encrypting/decrypting information on basic element by element basis and encryption/decryption system using the same |
CN102592254A (en) * | 2011-10-25 | 2012-07-18 | 上海博路信息技术有限公司 | Identifying code system based on image splicing |
CN103078745A (en) * | 2013-02-04 | 2013-05-01 | 马骏 | Logon authentication code based on picture |
CN103312512A (en) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | Image verification code generating method, image verification code generating device, identity verification method and identity verification device |
CN104598802A (en) * | 2015-02-13 | 2015-05-06 | 北京京东尚科信息技术有限公司 | Verification method and system based on puzzle |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112163993A (en) * | 2020-08-21 | 2021-01-01 | 北京字节跳动网络技术有限公司 | Image processing method, device, equipment and storage medium |
CN112580012A (en) * | 2020-12-25 | 2021-03-30 | 广州凡科互联网科技股份有限公司 | Man-machine identification method based on sliding jigsaw verification code |
CN115842634A (en) * | 2023-02-20 | 2023-03-24 | 卓望数码技术(深圳)有限公司 | Verification method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN104598802A (en) | 2015-05-06 |
HK1208922A1 (en) | 2016-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016127717A1 (en) | Checking method and system based on puzzle | |
US11516201B2 (en) | Encryption and decryption techniques using shuffle function | |
TWI683567B (en) | Security verification method, device, server and terminal | |
US10122710B2 (en) | Binding a data transaction to a person's identity using biometrics | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
US10476672B2 (en) | Fragmented encryption of a secret | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
TWI522841B (en) | Anonymity authentication method in multi-server environments | |
CN106817346B (en) | Data transmission method and device and electronic equipment | |
CN107294964B (en) | Information transmission method | |
CN102684877A (en) | Method and device for carrying out user information processing | |
KR101739203B1 (en) | Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption | |
CN105282090B (en) | A kind of open URL scrambled method of anti-unauthorized access on internet | |
CN108667815A (en) | Block chain secret key encipher-decipher method, device and terminal based on bio-identification | |
WO2017181518A1 (en) | Method, apparatus and system for encrypting communication | |
CN106576047B (en) | Make Password Operations from the method and apparatus of malicious modification | |
CN105812366A (en) | Server, anti-crawler system and anti-crawler verification method | |
JP2016519544A5 (en) | ||
KR102028151B1 (en) | Encryption method and system using authorization key of device | |
Mandlekar et al. | Survey on fog computing mitigating data theft attacks in cloud | |
CN107395350B (en) | Method and system for generating key and key handle and intelligent key safety equipment | |
CN112380404B (en) | Data filtering method, device and system | |
CN109936438A (en) | A kind of method of Internet of things system terminal device secure accessing certification | |
CN110061973B (en) | Authorization method and device | |
CN103457721B (en) | A kind of method and device of Mass production password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15881865 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 05/12/2017) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15881865 Country of ref document: EP Kind code of ref document: A1 |