WO2018059127A1 - 一种安全验证的方法及装置 - Google Patents
一种安全验证的方法及装置 Download PDFInfo
- Publication number
- WO2018059127A1 WO2018059127A1 PCT/CN2017/096192 CN2017096192W WO2018059127A1 WO 2018059127 A1 WO2018059127 A1 WO 2018059127A1 CN 2017096192 W CN2017096192 W CN 2017096192W WO 2018059127 A1 WO2018059127 A1 WO 2018059127A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tile
- verification
- tile element
- target
- terminal
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Definitions
- the present application relates to, but is not limited to, the field of communications, and more particularly to a method and apparatus for security verification.
- the verification codes currently used for security verification are mainly divided into the following types:
- the first generation verification code our common image verification code, voice verification code, computer vision and speech recognition problems that are difficult to handle with this type of machine.
- the knowledge verification code needs to be manually processed.
- the graphic verification code is easily recognized by the machine. If the difficulty of the graphics is improved to decipher, it has certain use for the user. Restricted, and it takes time and effort to operate.
- Non-knowledge verification codes do not require human thinking, do not interrupt user operations, and provide a better user experience.
- OCR Optical Character Recognition
- Embodiments of the present invention are intended to provide a method and apparatus for security verification that can perform security High security verification.
- An embodiment of the present invention provides a method for security verification, where the method includes:
- the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the method before sending the verification instruction, the method further includes:
- the determining that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element includes:
- the tile information of the verification tile element is consistent with the tile information of the target tile element; wherein the tile information includes at least one of a tile identifier and a location identifier.
- the method further includes:
- the method further includes:
- the second tile processing instruction is a processing instruction having a preset relationship with the first tile processing instruction.
- the method further includes:
- the embodiment of the invention provides a security verification method, and the method includes:
- the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the tile information of the verification tile element is carried in the verification response and sent to the first terminal.
- the method further includes:
- the method further includes:
- the method further includes:
- the method further includes:
- the target tile element and the interference tile element are displayed in a second display window.
- An embodiment of the present invention provides a device for security verification, where the device includes: a first sending unit, a first receiving unit, and a verification unit;
- the first sending unit is configured to send a verification command to the second terminal, where the check
- the certificate instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the first receiving unit is configured to acquire, when receiving the verification response corresponding to the verification instruction, the tile information carried by the verification response;
- the verification unit is configured to determine that the verification is successful when it is determined that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element.
- the apparatus further includes: a dividing unit, configured to:
- the verification unit determines that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element, and includes:
- the tile information includes at least one of a tile identifier and a location identifier.
- the apparatus further includes: a tile processing unit, configured to:
- the verification unit is further configured to:
- the second tile processing instruction is a processing instruction having a preset relationship with the first tile processing instruction.
- the apparatus further includes: a first protocol determining unit, configured to:
- An embodiment of the present invention provides a security verification apparatus, where the apparatus includes: a second receiving unit, a selecting unit, and a second sending unit;
- the second receiving unit is configured to receive a verification instruction from the first terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the selecting unit is configured to receive a selection operation, and determine a verification tile element from the target tile element and the interference tile element based on the selection operation;
- the second sending unit is configured to send the tile information of the verification tile element to the first terminal in a verification response.
- the second receiving unit is further configured to:
- the second sending unit is further configured to: carry the second tile processing instruction corresponding to the second sliding operation received by the verification tile element, in the verification response, to send to the first a terminal; wherein the target tile element is a tile element after performing tile processing.
- the apparatus further includes: a second protocol determining unit, configured to:
- the device further includes: a display unit, configured to:
- the target tile element and the interference tile element are displayed in a second display window.
- the embodiment of the invention further provides a computer readable storage medium storing computer executable instructions, the method for implementing the above security verification when the computer executable instructions are executed by the processor.
- a method and apparatus for security verification sends a verification command to a second terminal, where the verification instruction carries: a reference tile element of an original picture, a target tile element of an original picture, and at least one interference a tile element; when receiving the verification response corresponding to the verification instruction, acquiring the tile information carried by the verification response; determining the verification tile element corresponding to the tile information carried by the verification response and the target image When the block elements are consistent, it is determined that the verification is successful.
- the reference tile element, the target tile element and the interference interference tile element included in the original picture are sent together to the second terminal under verification, and are received from the second terminal.
- the verification tile element and the target tile element are compared.
- the target tile element makes it impossible to automate the matching, thus providing a verification scheme that can counter the machine and improve the security of the verification process.
- FIG. 1 is a schematic flowchart diagram of a method for security verification according to Embodiment 1 of the present invention
- FIG. 2 is a schematic flowchart of a method for security verification according to Embodiment 2 of the present invention
- FIG. 3 is a schematic diagram of arrangement of reference block elements according to Embodiment 2 of the present invention.
- FIG. 4 is a schematic diagram of arrangement of another reference block element according to Embodiment 2 of the present invention.
- FIG. 5 is a schematic diagram of a target tile element without block processing and tile processing according to Embodiment 2 of the present invention.
- FIG. 6 is a schematic diagram of information interaction between a source terminal and a target terminal in a device search phase and a protocol discovery phase according to Embodiment 3 of the present invention
- FIG. 7 is a schematic flowchart of an identity verification process of a source terminal and a target terminal according to Embodiment 3 of the present invention.
- FIG. 8 is a schematic diagram showing an interface display of a target terminal according to Embodiment 3 of the present invention.
- FIG. 9 is a schematic structural diagram of a security verification apparatus according to Embodiment 4 of the present invention.
- FIG. 10 is a schematic structural diagram of another security verification apparatus according to Embodiment 4 of the present invention.
- FIG. 11 is a schematic structural diagram of a security verification apparatus according to Embodiment 5 of the present invention.
- FIG. 12 is a schematic structural diagram of a security verification apparatus according to Embodiment 6 of the present invention.
- FIG. 13 is a schematic structural diagram of another security verification apparatus according to Embodiment 6 of the present invention.
- a first embodiment of the present invention provides a method for security verification, which is applied to a first terminal. As shown in FIG. 1, the method includes:
- the first terminal as the master of the security verification, initiates a process of security verification by transmitting a verification command to the second terminal.
- the first terminal may include a terminal such as a server, a router, a computer, a mobile phone, or the like.
- the first terminal sends a verification command to the second terminal as the sharing terminal as the source terminal.
- the method further includes: dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the target is at least two tile elements Other tile elements other than tile elements are reference tile elements.
- the original picture is a complete picture, and the original picture is divided into M parts of the tile element, M>1, part of the M parts is used as the target tile element, and the M parts are excluded from the target tile element.
- the tile element acts as a reference tile element.
- the target tile element is located at a vacant position of the reference tile element relative to the original picture. That is, when the original picture is displayed on the second terminal, the position corresponding to the target tile element in the original picture is vacant, and only the reference tile element is displayed.
- the target tile element may be one or more, and when there are multiple target tile elements, the corresponding target tile element may be identified by different identifiers.
- the interference tile element is used to display the target tile in a display window as a distracting factor for the user to find the target tile element on the second terminal.
- the method further includes: receiving a first sliding operation; performing a tile processing on the target tile element according to the first tile processing instruction of the first sliding operation; wherein the first sliding operation is the first terminal The sliding operation received.
- the first sliding operation of the user may be received, and the target tile element is processed according to the tile processing instruction corresponding to the first sliding operation.
- the sliding operation may include a click, a double click, a left stroke, a right stroke, a grab, and the like
- the corresponding tile processing instruction may include: a rotation, a flip, and the like, and may operate according to a sliding track, a pressure, and the like of the sliding operation.
- the parameter determines a processing parameter such as a direction and an angle corresponding to the block processing instruction, so that the target tile element performs different tile processing according to different sliding operations, for example, when the received sliding operation is sliding upward, the corresponding tile
- the processing instruction is upward flipping, and the target tile element is up-turned; when the received sliding operation is sliding downward, the corresponding tile processing instruction is flipped downward, and the target tile element is flipped down;
- the received sliding operation is a left rotation operation
- the corresponding tile processing instruction is rotated 90 degrees to the left, and the target tile element is rotated 90 degrees to the left.
- the target tile element that is not processed by the tile may be sent, or may be the target tile element processed by the tile.
- the reference block element that is sent may include multiple reference tile elements.
- the verification instruction may carry location information of each reference tile element, where the location information is displayed in the second terminal after being sent to the second terminal.
- Location information The location information corresponding to each reference tile element may be determined according to the location of each reference tile element in the original picture. In the process of determining the location information, the location information may be determined according to the corresponding position of each reference tile element in the original picture, or may be determined by the location obtained by scrambling each reference tile element in the original picture. location information.
- each target tile element and the interference tile element may be respectively identified by the target tile element identifier and the interference tile element identifier, where the target tile identifier is sent. Can also be multiple, and through the corresponding tile identification, bit The tile information such as the identifier is displayed.
- the sorting information of the target tile element and the reference tile element may also be carried, so that the second terminal sorts and displays the target tile element and the reference tile element according to the sorting information.
- the reference tile element, the target tile element, and the interference tile element can be distinguished by different picture tags.
- the second terminal After receiving the verification instruction sent by the first terminal, the second terminal parses the verification instruction, obtains a reference tile element, a target tile element, and an interference tile element carried by the verification instruction, and displays the tile elements.
- the second terminal displays the reference tile element and the target tile element, the reference tile element is displayed in one display window, and the target tile element and the interference tile element are displayed together in another window.
- the second terminal determines the verification tile element, the tile information of the verification tile element is transmitted to the first terminal by the verification response as a response to the verification instruction.
- the verification response is analyzed to obtain the tile information carried by the verification instruction.
- the tile element carried by the verification instruction is an identifier of the target tile element selected by the second terminal according to the selection operation received by the second terminal and the tile element in the interference tile element, and is used to represent the user on the second terminal.
- the tile information may include a tile identifier or a location identifier.
- the first terminal determines, according to the tile information carried in the verification response, the verification tile element selected by the user, compares the verification tile element with the target tile element, and determines whether the verification tile element is consistent with the target tile element, when consistent If the second terminal is selected correctly, it is determined that the verification is successful.
- the verification success message may be sent to the second terminal.
- the verification success message may be a notification message indicating that the verification is successful, or may be used to indicate that the terminal performs the operation. The command is processed to notify the second terminal that the verification is successful.
- determining that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element comprises: determining tile information of the verification tile element and the target image The tile information of the block element is consistent; wherein the tile information includes at least one of a tile identifier and a location identifier.
- the verification tile element and the reference tile element can be placed by placing the verification tile element in the vacancy position of the reference tile relative to the original image, that is, placing the verification tile element at a position corresponding to the target tile element.
- a complete original picture is synthesized. In the case that a complete original picture can be synthesized, it is determined that the verification tile element is a target tile element to be selected, and the verification tile element is consistent with the target tile element, otherwise it is inconsistent.
- the method further includes: determining, according to the sliding track information carried by the verification response, the second image a block processing instruction; determining that the second tile processing instruction is a processing instruction having a preset relationship with the first tile processing instruction.
- the second tile processing instruction is a tile processing instruction transmitted from the second terminal according to the user's operation. Performing a tile processing on the verification tile element according to the second tile processing instruction, so that the selected object is a target tile that is processed by the tile, and can again pass the tile corresponding to the second tile processing instruction. After processing, it returns to the initial state without block processing.
- the first tile processing instruction and the second tile processing instruction having a preset relationship may be stored in the terminal in advance, and when the second tile processing instruction is received, whether the received second tile processing instruction is A processing instruction having a preset relationship with the stored first tile processing instruction. At this time, not only the verification tile element selected by the user through the second terminal is determined as the target tile element, but also the tile processing in which the first terminal is located to verify the tile element is correctly identified.
- the received verification tile element may also be directly consistent with the target tile element according to the tile information.
- the method further includes: sending a protocol search instruction; receiving a search response instruction corresponding to the protocol search instruction, where the search response instruction carries protocol type information of the second terminal. And calling a protocol corresponding to the protocol type information to establish a connection with the second terminal.
- the protocols used by the two need to be consistent, so that the two can perform normal communication.
- the first terminal establishes a session channel with the second terminal, and sends a protocol search command through the session channel, so that the second terminal determines the protocol type supported by the second terminal according to the received protocol search instruction, and searches for the protocol.
- the protocol type information corresponding to the negotiation type is sent to the first terminal, so that the first terminal can adjust the protocol type used when communicating with the second terminal according to the protocol type supported by the second terminal.
- the first terminal can support multiple protocol types to perform protocol adaptation for different second terminals.
- the verification instruction carries a plurality of target tile elements.
- the number of verification tile elements carried in the received verification response is the same as the number of target tile elements, and is different.
- the identity identifies the target tile element that is compared to the validation tile element.
- the identifier may be a tile identifier, or may be sort information or location information corresponding to each target tile element.
- the verification failure message may be sent to the second terminal to prompt the verification failure, and the re-authentication instruction is sent to the second terminal again.
- the re-authentication instruction is The device does not carry each tile element, and acquires the verification tile identifier for performing the selection operation again to the second terminal.
- the second terminal is subjected to exceeding the input limit and the user authority is locked, and is automatically unlocked after a period of time.
- a method for security verification is provided, which is applied to a second terminal. As shown in FIG. 2, the method includes:
- S201 Receive a verification instruction from the first terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the resolution verification instruction acquires the reference tile element, the target tile element, and the interference tile element carried by the verification instruction, and at this time, the reference tile element is displayed at a first display window, and vacating a position corresponding to the target tile element in the first window, displaying the target tile element and the interference tile element in a second display window.
- the reference tile element may be displayed in the first display window according to the location information of the reference tile element carried by the verification instruction. For example, the original picture is divided into 3*3 nine equal parts, respectively A to I, where A, B, C, E, G, H, and I are reference block elements, and D and F are target tile elements.
- the target tile element When in the first display window, the target tile element The corresponding position is vacant and only the reference tile element is displayed.
- the display is as shown in FIG. 3.
- the display of the reference tile element is as shown in FIG.
- S202 Receive a selection operation, and determine a verification tile element from the target tile element and the interference tile element based on the selection operation.
- the user's selection operation is received, where the selection operation is the user's selection operation in the second window, and the selected verification tile element is determined from the target tile element and the interference tile element based on the selection operation.
- the selection operation is the user's selection operation in the second window
- the selected verification tile element is determined from the target tile element and the interference tile element based on the selection operation.
- the target tile element displayed by the second window may be a tile element after the tile processing according to the tile processing instruction.
- the target tile element displayed by the second window is the target tile element processed by the tile.
- the target tile element is F
- the tile processing instruction is downward flipping as an example, the target tile element not processed by the tile and the target tile element processed by the tile are as shown in FIG. 5 .
- the tile information of the verification tile element selected in S202 is sent to the first terminal by the verification response for verification by the first terminal.
- the verification success message is received, where the verification success message is sent when the first terminal determines that the verification tile element is consistent with the tile element, and the first terminal verification succeeds.
- the method further includes: carrying, in the verification response, sliding operation information corresponding to the second sliding operation received by the verification tile element to the first terminal; wherein the target tile element The tile element after the tile processing.
- the target tile element is a tile element after the tile processing
- a second sliding operation for verifying the tile element and a sliding operation corresponding to the second sliding operation may be received while receiving the selection operation.
- the information is sent to the first terminal by the verification response, so that the first terminal determines the second tile processing instruction according to the received sliding operation information, and processes the verification tile element.
- the method Before receiving the verification instruction of the first terminal, the method further includes: receiving a protocol search instruction, querying a protocol type supported by the second terminal, and carrying the protocol type information corresponding to the protocol type in the search response instruction. Send to the first terminal.
- the first terminal establishes a session channel with the second terminal, and sends a protocol search command to the second terminal through the session channel.
- the second terminal determines the protocol type supported by the protocol according to the received protocol search command, and The protocol type information corresponding to the protocol type of the protocol is sent to the first terminal by using the search response, so that the first terminal can adjust the protocol type used when communicating with the second terminal according to the protocol type supported by the second terminal.
- the multi-screen interaction is used as an application scenario, and the interaction between the first terminal and the second terminal is divided into a plurality of different stages to describe the security verification method provided by the embodiment of the present invention.
- the target terminal is the second terminal.
- the interaction between the source terminal and the target terminal is divided into three phases: a device search phase, a protocol discovery phase, and a verification phase.
- the source terminal establishes a preliminary connection with the device to be accessed (target terminal) in the same local area network through a simple search protocol: for example, a session channel.
- the source terminal sends a multi-screen interaction request instruction to the target terminal, and the user responds to the source terminal after receiving the instruction, and returns the acceptance or rejection result.
- the source terminal sends a protocol search command to the target terminal, and the target terminal returns the protocol type supported by itself to the source terminal.
- the terminal invokes the communication protocol from the bottom layer according to the type of the return protocol, and establishes a connection with the corresponding target terminal.
- the device search phase and protocol discovery phase are shown in Figure 6, including:
- the source terminal and the target terminal establish a session channel through the WAN.
- the source terminal establishes a local area network session port, and notifies the target terminal of the port information, and sends a multi-screen interaction request instruction.
- the target terminal returns a result to the source terminal, and performs a timeout setting.
- the source terminal returns a protocol type, and prepares to perform data transmission, waiting for the source terminal to send data.
- the source terminal identifies the protocol type, and invokes the underlying protocol to start communicating with the target terminal.
- the source terminal sends related and irrelevant pictures for identity verification to the target terminal.
- the correlation and irrelevance are referred to herein as the original picture, wherein the related picture includes a reference tile element and a target tile element, and the irrelevant picture includes an interference tile element.
- the source terminal performs user access selection again, selects the device that it is allowed to access, and triggers the identity verification process, as shown in FIG.
- the identity verification selects access rights according to the device ID or other identifiers, and the rights include permitting continuous access to the multi-screen interactive system, denying access, only viewing and not sharing, and sharing with each other.
- the source terminal sets a puzzle and saves the sliding decoding information.
- the source terminal divides a good picture (original picture) into N*N equal parts, extracts one of them as the target tile element, and extracts the extracted picture with the M group unrelated picture (interfering tile element) Put them together, record their position information and keep them, and record the sliding action of the target reference block as the basis for unlocking.
- the display interface of the target terminal is as shown in FIG. 8, where the target tile element and the interference tile element are The order is disrupted. The user needs to select the missing piece in the first window above and drag it to the top to complete the puzzle.
- the source terminal saves the above action process to simplify the subsequent verification process.
- the source terminal sends related pictures and irrelevant pictures.
- the source terminal When performing verification, the source terminal sends the selected picture (including the target picture and other irrelevant pictures) to the target device.
- the target terminal selects a target image, that is, a sliding action, and returns to the source terminal.
- the target device After the target device receives the pictures, the picture information selected by the user, that is, the ID information, is returned according to the user's selection operation, and the sliding track corresponding to the operation of the user is returned to the source terminal.
- the source terminal determines, according to the received ID information and the saved operation, whether the picture is missing. When it is determined to be YES, S705 is executed to trigger multi-screen sharing. If no, the process S706 is performed to determine whether the number of times exceeds the limit. If the number of times is not exceeded, the process proceeds to S703, and an error message is returned to allow the user to reselect the picture.
- the limit number X is set (the number of times can be limited to a reasonable value, taking 3 as an example), when the verification fails, and it is judged whether the number of times exceeds the limit.
- S707 is executed, the access is denied, and the target is locked.
- the user's operation input limit of the terminal that is, the user right is locked, and is automatically unlocked after a period of time.
- the image used may be a bmp bitmap or a black and white image to facilitate operations such as transmission and compression.
- mutual authentication can be performed by connecting with multiple target terminals at the same time.
- the same wireless transmission protocol such as WiFi
- the method provided by the embodiment of the present invention integrates various protocols in the source terminal in advance, defines a format for sharing the content, and if yes, sends an on-screen request, and the protocol list can set a whitelist that can be used for source terminal selection, for controlling Monitoring of permissions.
- the source terminal can obtain information such as the device name, ID, and a list of services that can be shared by the user equipment.
- the best protocol and communication channel are selected for the connection through the source terminal to ensure channel security.
- the final authentication of the target terminal on the connection is performed by using the verification method of the sliding of the puzzle.
- a picture is preset in the source terminal, part of it is extracted, and other unrelated pictures are combined for the user to identify and select, and the correct picture can be matched.
- a complete picture The source terminal pre-saves its picture position and sliding operation, and sends a selectable picture to the device that is allowed to access, and the user selects the missing piece in the puzzle and returns it to the source terminal.
- the source terminal determines whether the picture is a missing part of the puzzle according to a pre-saved swipe operation. Return the judgment result to the end of the goal End, the result is yes, you can enter the sharing interface.
- the verification method provided by the embodiment of the invention is a multi-image splicing sliding verification code, and the behavior-based sliding verification has high security, and the graphic verification code can be manually coded on the coding platform, which is faster and better, and the sliding verification is performed.
- the code is not easy to access the coding platform.
- the sliding interface is designed to make the user experience smoother.
- the method provided by the embodiment of the present invention can ensure the security problem that multiple smart mobile terminals (other devices such as mobile phones or pads) can access the same multi-screen interactive system, and allow devices of different platforms to simultaneously access.
- the security verification is performed again by the authentication method of the sliding puzzle to prevent the machine from being cracked, and the security is high.
- various protocols are integrated in the system of the source terminal to facilitate user access, and no external devices are needed, so that cross-platform multi-screen interaction can be overcome.
- the source terminal searches for the surrounding user information, and the searched device agrees or rejects the connection, and the user who agrees to connect also feeds back his or her personal information, and the source terminal invokes the underlying protocol according to the personal information of the user to be accessed, establishes a simple communication channel, and starts to One step communication.
- WIreless-Fidelity WIreless-Fidelity
- the sliding puzzle verification module is triggered, and the source terminal first sends several pictures for verifying the identity to the accessed device, and the device that receives the image selects the target image, and returns the ID of the target image, the sliding operation information, and the like. .
- the source terminal receives the correct verification picture, the authentication is completed. If the verification picture is selected incorrectly, the source terminal prompts the user to verify the picture selection error information, and re-selects, and if the selected number of times exceeds the limit number, the user is locked. The source terminal then judges whether to continue waiting for verification or to reject the input directly.
- the sliding action setting can be set to left, right, grab, double click Jumping and other forms, not limited to the form of the setting.
- the form of authentication is diversified, and malicious programs are difficult to unlock.
- the target image can be set by itself to increase the difficulty of the puzzle.
- the existing fingerprint technology (or eye pattern technology) may be added, and the user's fingerprint (or eye pattern) may be directly accessed as long as the user's fingerprint (or eye pattern) is consistent with the source terminal preset.
- the form of the puzzle is not limited, and the sequence of the disordered pictures can be re-homed to verify whether the user is a machine or a person in the environment.
- the image format used for incoming authentication is not limited, and bmp bitmaps, jpg format images, etc. can be selected.
- the embodiment of the present invention further provides a device for security verification, which is applied to the first terminal.
- the device includes: a first sending unit 901, and a first a receiving unit 902 and a verification unit 903; wherein
- the first sending unit 901 is configured to send a verification instruction to the second terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the first receiving unit 902 is configured to acquire, when receiving the verification response corresponding to the verification instruction, the tile information carried by the verification response;
- the verification unit 903 is configured to determine that the verification is successful when the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element.
- the apparatus further includes: a dividing unit 904, configured to: divide the original picture into at least two tile elements; wherein at least one tile element is a target tile element, the at least two The tile elements other than the target tile element in the tile element are reference tile elements.
- a dividing unit 904 configured to: divide the original picture into at least two tile elements; wherein at least one tile element is a target tile element, the at least two The tile elements other than the target tile element in the tile element are reference tile elements.
- Determining, by the verification unit 903, that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element comprises: determining tile information of the verification tile element and the target tile element The tile information is consistent; wherein the tile information includes at least one of a tile identifier and a location identifier.
- the apparatus further includes: a tile processing unit 905, configured to: receive a first sliding operation; and target the target according to the first tile processing instruction corresponding to the first sliding operation Tile elements are tiled.
- a tile processing unit 905 configured to: receive a first sliding operation; and target the target according to the first tile processing instruction corresponding to the first sliding operation Tile elements are tiled.
- the verification unit 903 is further configured to: determine a second tile processing instruction according to the sliding track information carried by the verification response; and determine that the second tile processing instruction has a preset with the first tile processing instruction Processing instructions for the relationship.
- the device further includes: a first protocol determining unit 906, configured to: send a protocol search command; receive a search response command corresponding to the protocol search command, where the search response command carries the second The protocol type information of the terminal; the protocol corresponding to the protocol type information is invoked to establish a connection with the second terminal.
- a first protocol determining unit 906 configured to: send a protocol search command; receive a search response command corresponding to the protocol search command, where the search response command carries the second The protocol type information of the terminal; the protocol corresponding to the protocol type information is invoked to establish a connection with the second terminal.
- the security verification apparatus provided in the fifth embodiment is further described by the security verification apparatus in the scenario of multi-screen interaction.
- the apparatus is applied to the source terminal, where the source terminal needs to integrate multiple transmission protocols.
- the device can be divided into four modules: a device discovery module 1101, a device analysis module 1102, an identity verification module 1103, and a multi-screen interaction module 1104.
- the process of the target terminal securely accessing the source terminal can be divided into three phases: communication channel establishment, identity security verification, and security control access.
- the target terminal may be a plurality of target terminals.
- the device discovery module 1101 is configured to discover the to-be-accessed device (target terminal) that can be used to access the multi-screen interaction for sharing in the same local area network environment, and collect basic information of the target terminal, including the device name, ID, and supported transmission protocol. Wait.
- the device analysis module 1102 is configured to perform basic information analysis on the accessed device, select an optimal transport channel and protocol, and invoke a pre-integrated related protocol according to the analysis result.
- the authentication module 1103 performs final authentication on the accessed device and allocates rights to ensure that there is no random access to the device.
- the multi-screen interaction module 1104 is triggered to share the multi-screen, and the target terminal is shared with pictures, videos and the like.
- the identity verification module 1103 in this embodiment corresponds to the first sending unit 901, the first receiving unit 902, the verifying unit 903, the dividing unit 904, and the tile processing unit 905, the device discovery module 1101, and the device analysis module in the fifth embodiment.
- 1102 corresponds to the first protocol determining unit 906 in the fifth embodiment.
- the security verification method provided by the foregoing embodiment 2 is implemented.
- the embodiment of the present invention further provides a device for security verification, which is applied to the second terminal.
- the device includes: a second receiving unit 1201, and a selecting unit 1202. And a second transmitting unit 1203; wherein
- the second receiving unit 1201 is configured to receive a verification instruction from the first terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interference tile element;
- the selecting unit 1202 is configured to receive a selection operation, and determine a verification tile element from the target tile element and the interference tile element based on the selection operation;
- the second sending unit 1203 is configured to send the tile information of the verification tile element to the first terminal in a verification response.
- the second receiving unit 1201 is further configured to: receive a verification success message; wherein the verification success message is sent when the first terminal determines that the verification tile element is consistent with the target tile element.
- the second sending unit 1203 is further configured to: carry the second tile processing instruction corresponding to the second sliding operation received by the verification tile element, in the verification response, to the first terminal;
- the target tile element is the tile element after the tile processing.
- the apparatus further includes: a second protocol determining unit 1204, configured to: receive a protocol search command, query a protocol type supported by the protocol, and carry protocol type information corresponding to the protocol type in the search The response command is sent to the first terminal.
- a second protocol determining unit 1204 configured to: receive a protocol search command, query a protocol type supported by the protocol, and carry protocol type information corresponding to the protocol type in the search The response command is sent to the first terminal.
- the apparatus further includes: a display unit 1205, configured to: display the reference tile element in a first display window, and corresponding to the target tile element in the first window Position vacancy; displaying the target tile element and the interference tile element in a second display window.
- a display unit 1205 configured to: display the reference tile element in a first display window, and corresponding to the target tile element in the first window Position vacancy; displaying the target tile element and the interference tile element in a second display window.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- the reference tile element, the target tile element, and the interference interference tile element included in the original picture are sent together to the second terminal that is verified, and The verification block element received by the second terminal is compared with the target tile element.
- the target elements that make up the original image make it impossible to automate the matching, providing an authentication scheme that can counter the machine and improve the security of the verification process.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种安全验证的方法,包括:发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;其中,所述参考图块元素和所述目标图块元素构成所述原始图片;当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
Description
本申请涉及但不限于通信领域,尤指一种安全验证的方法及装置。
在“互联网+”的时代背景下,三网融合技术要想稳步的发展,电脑、PC和平板、手机等的多屏融合技术是主要的突破方向,市场的需求推动着相关技术的诞生,关于如何安全的实现内容、网络和终端的融合,仍然有许多的发展方向。
目前用于安全验证的验证码主要分为下面几种:
(1)标准验证码(知识型验证码)
即第一代验证码,我们常见的图像验证码、语音验证码,这一类有机器难以处理的计算机视觉及语音识别问题。对于用于身份验证的验证码来说,知识型的验证码需要人工处理,随着技术的发展图形验证码已很容易被机器识别,若把图形难度提高来反破译,对于用户有一定的使用限制,且操作起来费时费力。
(2)无知识型验证码
基于人类固有的生物特征以及操作的环境信息综合决策,来判断是人类还是机器。非知识型的验证码无需人类思考,不会中断用户操作,能够提供更好的用户体验。随着技术的发展,OCR(Optical Character Recognition,光学字符识别)技术已经可以轻松破译验证码,身份验证变得不再如想象的那般安全。
发明概述
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例希望提供一种安全验证的方法及装置,能够进行安全性
高的安全验证。
本发明实施例提供一种安全验证的方法,所述方法包括:
发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;
当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
在上述方案中,在发送验证指令之前,所述方法还包括:
将所述原始图片划分为至少两个图块元素;其中,至少一个图块元素为目标图块元素,所述至少两个图块元素中除所述目标图块元素以外的其他图块元素为参考图块元素。
在上述方案中,所述确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致包括:
确定所述验证图块元素的图块信息与所述目标图块元素的图块信息一致;其中,所述图块信息包括图块标识和位置标识中的至少之一。
在上述方案中,所述方法还包括:
接收第一滑动操作;根据所述第一滑动操作对应的第一图块处理指令对所述目标图块元素进行图块处理。
在上述方案中,在确定验证成功之前,所述方法还包括:
根据所述验证响应携带的滑动轨迹信息确定第二图块处理指令;
确定所述第二图块处理指令为与所述第一图块处理指令具有预设关系的处理指令。
在上述方案中,所述方法还包括:
发送协议搜索指令;
接收所述协议搜索指令对应的搜索响应指令,所述搜索响应指令携带有所述第二终端的协议类型信息;
调用所述协议类型信息对应的协议与所述第二终端建立连接。
本发明实施例提供一种安全验证方法,所述方法包括:
接收来自第一终端的验证指令;其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
接收选择操作,基于所述选择操作从所述目标图块元素和所述干扰图块元素中确定验证图块元素;
将所述验证图块元素的图块信息携带在验证响应中发送至所述第一终端。
在上述方案中,所述方法还包括:
接收验证成功消息;其中,所述验证成功消息为第一终端确定所述验证图块元素与所述目标图块元素一致时发送。
在上述方案中,所述方法还包括:
将所述验证图块元素接收到的第二滑动操作对应滑动操作信息携带在所述验证响应中发送至所述第一终端;其中,所述目标图块元素为进行图块处理后的图块元素。
在上述方案中,所述方法还包括:
接收协议搜索指令,查询自身所支持的协议类型;
将所述协议类型对应的协议类型信息携带在所述搜索响应指令中发送至所述第一终端。
在上述方案中,所述方法还包括:
将所述参考图块元素显示在第一显示窗口,并在所述第一窗口中将所述目标图块元素对应的位置空缺;
将所述目标图块元素和所述干扰图块元素显示在第二显示窗口。
本发明实施例提供一种安全验证的装置,所述装置包括:第一发送单元、第一接收单元以及验证单元;其中,
所述第一发送单元,设置为发送验证指令至第二终端,其中,所述验
证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
所述第一接收单元,设置为当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;
所述验证单元,设置为当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
在上述方案中,所述装置还包括:划分单元,设置为:
将所述原始图片划分为至少两个图块元素;其中,至少一个图块元素为目标图块元素,所述至少两个图块元素中除所述目标图块元素以外的其他图块元素为参考图块元素。
在上述方案中,所述验证单元确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致包括:
确定所述验证图块元素的图块信息与所述目标图块元素的图块信息一致;
其中,所述图块信息包括图块标识和位置标识中的至少之一。
在上述方案中,所述装置还包括:图块处理单元,设置为:
接收第一滑动操作;
根据所述第一滑动操作对应的第一图块处理指令对所述目标图块元素进行图块处理。
在上述方案中,所述验证单元还设置为:
根据所述验证响应携带的滑动轨迹信息确定第二图块处理指令;
确定所述第二图块处理指令为与所述第一图块处理指令具有预设关系的处理指令。
在上述方案中,所述装置还包括:第一协议确定单元,设置为:
发送协议搜索指令;
接收所述协议搜索指令对应的搜索响应指令,所述搜索响应指令携带有所述第二终端的协议类型信息;
调用所述协议类型信息对应的协议与所述第二终端建立连接。
本发明实施例提供一种安全验证装置,所述装置包括:第二接收单元、选择单元和第二发送单元;其中,
所述第二接收单元,设置为接收来自第一终端的验证指令;其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
所述选择单元,设置为接收选择操作,基于所述选择操作从所述目标图块元素和所述干扰图块元素中确定验证图块元素;
所述第二发送单元,设置为将所述验证图块元素的图块信息携带在验证响应中发送至所述第一终端。
在上述方案中,所述第二接收单元还设置为:
接收验证成功消息;其中,所述验证成功消息为第一终端确定所述验证图块元素与所述目标图块元素一致时发送。
在上述方案中,所述第二发送单元还设置为:将所述验证图块元素接收到的第二滑动操作对应的第二图块处理指令携带在所述验证响应中发送至所述第一终端;其中,所述目标图块元素为进行图块处理后的图块元素。
在上述方案中,所述装置还包括:第二协议确定单元,设置为:
接收协议搜索指令,查询自身所支持的协议类型;
将所述协议类型对应的协议类型信息携带在所述搜索响应指令中发送至所述第一终端。
在上述方案中,所述装置还包括:显示单元,设置为:
将所述参考图块元素显示在第一显示窗口,并在所述第一窗口中将所述目标图块元素对应的位置空缺;
将所述目标图块元素和所述干扰图块元素显示在第二显示窗口。
本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现上述安全验证的方法。
本发明实施例的一种安全验证的方法及装置,发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。如此,在进行安全验证的过程中,将原始图片所包括的参考图块元素、目标图块元素以及进行干扰的干扰图块元素一起发送至接受验证的第二终端,并通过从第二终端接收的验证图块元素和目标图块元素进行比对,当二者一致时,确定验证成功,使得机器难以从目标图块元素和干扰图块元素中查找出与参考图块元素能够组成原始图片的目标元素,使得及其无法自动完成匹配,从而提供能够对抗机器的验证方案,提高验证过程的安全性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例一提供的安全验证的方法的流程示意图;
图2为本发明实施例二提供的安全验证的方法的流程示意图;
图3为本发明实施例二提供的一种参考图块元素的排列示意图;
图4为本发明实施例二提供的另一种参考图块元素的排列示意图;
图5为本发明实施例二提供的未经图块处理和经过图块处理的目标图块元素的示意图;
图6为本发明实施例三提供的源终端与目标终端的设备搜索阶段和协议发现阶段的信息交互示意图;
图7为本发明实施例三提供的源终端与目标终端的身份验证过程的流程示意图;
图8为本发明实施例三提供的目标终端的界面显示示意图;
图9为本发明实施例四提供的一种安全验证装置的结构示意图;
图10为本发明实施例四提供的另一种安全验证装置的结构示意图;
图11为本发明实施例五提供的一种安全验证装置的结构示意图;
图12为本发明实施例六提供的一种安全验证装置的结构示意图;
图13为本发明实施例六提供的另一种安全验证装置的结构示意图。
详述
下面结合附图对本发明实施例作进一步的详细描述。
实施例一
本发明实施例一提供一种安全验证的方法,应用于第一终端,如图1所示,所述方法包括:
S101、发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
这里,第一终端作为安全验证的主控方,通过向第二终端发送验证指令发起安全验证的过程。这里,第一终端可包括:服务器、路由器、电脑、手机等终端。在多屏互动的场景下,第一终端作为源终端向作为共享端的第二终端发送验证指令。
在发送验证指令之前,所述方法还包括:将所述原始图片划分为至少两个图块元素;其中,至少一个图块元素为目标图块元素,所述至少两个图块元素中除目标图块元素以外的其他图块元素为参考图块元素。其中,原始图片为一张完整的图片,将该原始图片分为M份图块元素,M>1,将M份中的一部分作为目标图块元素,将M份中除目标图块元素以外的图块元素作为参考图块元素。当第一终端将参考元素、目标元素图块发送至第二终端时,对于参考图块元素来说,目标图块元素位于参考图块元素相对于原始图片的空缺位置。即在第二终端上显示原始图片时,将原始图片中的目标图块元素对应的位置空缺,只显示参考图块元素。
这里,目标图块元素可为一个或多个,当目标图块元素为多个时,可通过不同的标识来识别对应的目标图块元素。
当确定参考图块元素和目标图块元素后,获取至少一个与目标图块元
素非相关的干扰图块元素,这里,干扰图块元素用于和目标图块显示在一显示窗口,作为用户在第二终端上查找目标图块元素的干扰因素。
这里,所述方法还包括:接收第一滑动操作;根据所述第一滑动操作的第一图块处理指令对所述目标图块元素进行图块处理;其中,第一滑动操作为第一终端接收的滑动操作。在确定目标图块元素后,可以接收用户的第一滑动操作,根据第一滑动操作对应的图块处理指令对目标图块元素进行处理。其中,滑动操作可包括单击、双击、左划、右划、抓取等操作,对应的图块处理指令可包括:旋转、翻转等处理指令,可根据滑动操作的滑动轨迹、压力大小等操作参数确定图块处理指令对应的方向、角度等处理参数,从而根据不同的滑动操作都目标图块元素进行不同的图块处理,比如:当接收到的滑动操作为向上滑动时,对应的图块处理指令为向上翻转,对目标图块元素进行向上翻转处理;当接收到的滑动操作为向下滑动时,对应的图块处理指令为向下翻转,对目标图块元素进行向下翻转处理;当接收到的滑动操作为左旋转操作时,对应的图块处理指令为向左旋转90度,对目标图块元素进行向左旋转90度处理。
这里,第一终端向第二终端发送目标图块元素时,可发送未经图块处理的目标图块元素,也可为经过图块处理的目标图块元素。
当第一终端需要对第二终端进行验证时,获取参考图块元素、目标图块元素和干扰图块元素,并触发生成验证指令,将获取的这些图块元素携带在验证指令中发送给第一终端。其中,发送的参考图块元素可包括多个参考图块元素,此时,验证指令可携带各参考图块元素的位置信息,这里的位置信息为发送到第二终端后在第二终端中显示的位置信息。其中,各参考图块元素对应的位置信息可根据各参考图块元素在原始图片中的位置确定。在确定位置信息的过程中,可依照各参考图块元素在原始图片中的对应位置来确定位置信息,也可将各参考图块元素在原始图片中原来对应位置打乱后得到的位置来确定位置信息。
通过验证指令发送目标图块元素和参考图块元素时,可通过目标图块元素标识和干扰图块元素标识来分别标识各目标图块元素和干扰图块元素,这里,发送的目标图块标识也可为多个,并通过对应的图块标识、位
置标识等图块信息进行表示。在验证指令中,还可携带目标图块元素和参考图块元素的排序信息,使得第二终端根据该排序信息对目标图块元素和参考图块元素进行排序显示。
这里,在验证指令中,可通过不同的图片标签来区分参考图块元素、目标图块元素和干扰图块元素。
当第二终端接收到第一终端发送的验证指令后,解析验证指令,得到验证指令携带的参考图块元素、目标图块元素和干扰图块元素,并将这些图块元素进行显示。当第二终端将参考图块元素和目标图块元素进行显示时,将参考图块元素显示在一个显示窗口,将目标图块元素和干扰图块元素一起显示在另一窗口。当第二终端确定验证图块元素时,通过验证响应将验证图块元素的图块信息发送至第一终端,作为对验证指令的响应。
S102、当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;
当第一终端接收到验证响应时,对验证响应进行分析得到验证指令携带的图块信息。这里,验证指令携带的图块元素为第二终端根据第二终端接收的选择操作选择的目标图块元素和干扰图块元素中的图块元素的标识,用于表征用户的在第二终端上从目标图块元素和干扰图块元素中所选择的验证图块元素。这里,图块信息可包括图块标识或位置标识。
S103、当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
第一终端根据验证响应携带的图块信息确定用户所选择的验证图块元素,将验证图块元素与目标图块元素进行对比,确定验证图块元素是否和目标图块元素一致,当一致时,则表明第二终端的选择正确,确定验证成功,此时,可向第二终端发送验证成功消息,这里,该验证成功消息可为指示验证成功的通知消息,也可为指示终端执行操作的处理命令,以通知第二终端此次验证成功。
这里,确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致包括:确定所述验证图块元素的图块信息与所述目标图
块元素的图块信息一致;其中,所述图块信息包括图块标识和位置标识中的至少之一。
这里,也可通过将验证图块元素放置在参考图块相对于原始图片的空缺位置,即将验证图块元素放置在目标图块元素对应的位置,确定验证图块元素与参考图块元素是否能够合成完整的原始图片,在能够合成完整的原始图片的情况下,确定验证图块元素为需要选择的目标图块元素,验证图块元素与所述目标图块元素一致,否则不一致。
当第一终端发送的目标图块元素为经过图块处理的目标图块元素时,在确定验证成功之前,所述方法还包括:根据所述验证响应携带的滑动轨迹信息确定所述第二图块处理指令;确定所述第二图块处理指令为与所述第一图块处理指令具有预设关系的处理指令。这里,第二图块处理指令为从第二终端根据用户的操作发送的图块处理指令。根据第二图块处理指令对所述验证图块元素进行图块处理,使得被选择的对象是经过图块处理的目标图块的情况下,能够再次经过第二图块处理指令对应的图块处理后回到未经图块处理的初始状态。这里,可提前在终端中存储具有预设关系的第一图块处理指令与第二图块处理指令,当接收到第二图块处理指令时,查找接收到的第二图块处理指令是否为与存储的第一图块处理指令具有预设关系的处理指令。此时,不仅确定用户通过第二终端选择的验证图块元素为目标图块元素,并且,正确的识别出第一终端对验证图块元素所在的图块处理。
当第二终端显示的目标图块元素经过图块处理时,也可直接根据图块信息来确定接收的验证图块元素与目标图块元素一致。
在本发明实施例中,所述方法还包括:发送协议搜索指令;接收所述协议搜索指令对应的搜索响应指令,所述搜索响应指令携带有所述第二终端的协议类型信息。调用所述协议类型信息对应的协议与所述第二终端建立连接。这里,在第一终端与第二终端发送验证指令之前,需要将二者使用的协议保持一致,从而使得二者能够进行正常的通信。此时,第一终端与第二终端建立会话通道,通过会话通道发送协议搜索指令,使得第二终端根据接收到的协议搜索指令确定自身支持的协议类型,并将搜索到的协
议类型对应的协议类型信息发送至第一终端,使得第一终端能够根据第二终端所支持的协议类型调整与第二终端进行通信时所使用的协议类型。
这里,第一终端可支持多种协议类型,以针对不同的第二终端进行协议的自适应。
在本发明实施例中,验证指令携带的目标图块元素可为多个,此时,接收到的验证响应中携带的验证图块元素的数量与目标图块元素的数量相同,并通过不同的标识确定与该验证图块元素进行对比的目标图块元素。该标识可为图块标识,也可为排序信息或各目标图块元素对应的位置信息等。
在实际使用中,当第一终端验证失败后,可向第二终端发送验证失败消息,以提示此次验证失败,并向再次向第二终端发送再次验证指令,此时,在该再次验证指令中,不携带各图块元素,向第二终端获取再次进行选择操作的验证图块标识。通过多次验证失败之后,对第二终端执行超出输入限制且锁定用户权限,一段时间后自动解锁。
实施例二
在本发明实施例中,提供一种安全验证的方法,应用于第二终端,如图2所示,所述方法包括:
S201、接收来自第一终端的验证指令;其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
当第二终端接收到来自第一终端的验证指令时,解析验证指令获取验证指令携带的参考图块元素、目标图块元素以及干扰图块元素,此时,将所述参考图块元素显示在第一显示窗口,并在第一窗口中将所述目标图块元素对应的位置空缺,将所述目标图块元素和所述干扰图块元素显示在第二显示窗口。这里,在显示的过程中,可根据验证指令携带的参考图块元素的位置信息将参考图块元素在第一显示窗口进行显示。例如:将原始图片分为3*3九等份,分别为A至I,其中,A、B、C、E、G、H、I为参考图块元素,D、F为目标图块元素,当在第一显示窗口中,目标图块元素的
对应的位置空缺,只显示参考图块元素。其中,当参考图块元素依照各参考图块元素在原始图片中的对应位置来确定位置信息时,显示如图3所示。当将各参考图块元素在原始图片中原来对应位置打乱后得到的位置来确定位置信息时,参考图块元素的显示如图4所示。
S202、接收选择操作,基于所述选择操作从所述目标图块元素和所述干扰图块元素中确定验证图块元素;
此时,接收用户的选择操作,这里的选择操作为用户在第二窗口中的选择操作,基于选择操作从目标图块元素和干扰图块元素确定选择的验证图块元素。这里,当第一窗口中显示的参考图块元素相对于原始图片具有多个目标图块元素的空缺位置时,对应各空缺位置选择对应的验证图块元素。
这里,第二窗口显示的目标图块元素可为根据图块处理指令进行图块处理后的图块元素。当第一终端的验证指令携带的目标图块元素经过图块处理时,第二窗口显示的目标图块元素为经过图块处理的目标图块元素。这里,以目标图块元素为F,图块处理指令为向下翻转为例,未经图块处理的目标图块元素和经过图块处理的目标图块元素如图5所示。
S203、将所述验证图块元素的图块信息携带在验证响应中发送至所述第一终端。
将S202中选择的验证图块元素的图块信息通过验证响应发送至第一终端,供第一终端进行验证。当第一终端验证成功时,接收验证成功消息,其中,所述验证成功消息为第一终端确定所述验证图块元素与所述图块元素一致时发送,此时,第一终端验证成功。
这里,所述方法还包括:将所述验证图块元素接收到的第二滑动操作对应的滑动操作信息携带在所述验证响应中发送至所述第一终端;其中,所述目标图块元素为进行图块处理后的图块元素。其中,当目标图块元素为进行图块处理后的图块元素时,在接收选择操作的同时,还可接收针对验证图块元素的第二滑动操作,并将第二滑动操作对应的滑动操作信息通过验证响应发送至第一终端,使得第一终端根据接收的滑动操作信息确定第二图块处理指令,对验证图块元素进行处理。
第二终端在接收第一终端的验证指令之前,所述方法还包括:接收协议搜索指令,查询自身所支持的协议类型;将所述协议类型对应的协议类型信息携带在所述搜索响应指令中发送至所述第一终端。
这里,第一终端与第二终端建立会话通道,通过会话通道发送协议搜索指令给第二终端,第二终端接收到协议搜索指令后,根据接收到的协议搜索指令确定自身支持的协议类型,并将自身的协议类型对应的协议类型信息通过搜索响应发送给第一终端,使得第一终端能够根据第二终端所支持的协议类型调整与第二终端进行通信时所使用的协议类型。
实施例三
在该实施例中,以进行多屏互动为应用场景,将第一终端和第二终端之间的交互分为多个不同的阶段对本发明实施例提供的安全验证方法进行描述,其中,源终端为第一终端,目标终端为第二终端。
这里,源终端与目标终端之间的交互分为三个阶段:设备搜索阶段、协议发现阶段和验证阶段,
1、在设备搜索阶段:源终端通过简单搜索协议,与同一局域网内的待接入设备(目标终端)建立初步连接:比如会话通道。源终端向目标终端发送多屏互动请求指令,用户在接受到指令后对源终端进行应答,返回接受或拒绝结果。
2、在协议发现阶段,源终端发送协议搜索指令给目标终端,目标终端将自身支持的协议类型返回给源终端。终端根据返回协议类型,从底层调用通信协议,再与对应的目标终端建立连接。
设备搜索阶段和协议发现阶段如图6所示,包括:
S601、源终端与目标终端通过广域网建立会话通道。
S602、源终端建立局域网会话端口,将端口信息告诉目标终端,并发送多屏互动请求指令。
S603、目标终端向源终端返回结果,并进行超时设置。
S604、源终端得到结果后,继续向目标终端发送协议搜索指令。
S605、源终端返回协议类型,并准备进行数据传输,等待源终端发送
数据。
S606、源终端识别协议类型,并调用底层协议开始与目标终端进行通信。
S607、源终端向目标终端发送用于身份验证的相关和无关图片。这里所说的相关和无关针对原始图片而言,其中,相关图片包括参考图块元素和目标图块元素,无关图片包括干扰图块元素。
3、在身份验证阶段,源终端与目标终端建立连接后,再次由源终端进行用户接入选择,选择其允许接入的设备,触发身份验证过程,如图7所示,
这里,身份验证根据设备ID或其他标识选择接入权限,其权限包括准许继续接入多屏互动系统、拒绝接入、只能看不能分享,可以互相分享。
S701、源终端设置拼图并保存滑动解码信息;
例如,源终端将一张完好的图片(原始图片),分成N*N等份,抠出其中一块作为目标图块元素,并将抠出的图片与M组非相关的图片(干扰图块元素)放在一起,记录其位置信息并保留,并记录目标参考图块的滑动动作,作为解锁的依据。
这里,以原始图片划分为3*3拼图为例,随机抠出其中一块,其中所示为一个缺了一块的背景图片,空缺位置为抠取的位置,对应的图片为目标图块元素,具有图片的位置对应的图片为参考图块元素。这里,并预置了几张无关的图片作为干扰图块元素。这里,当源终端将参考图块元素、目标图块元素和参考图块图块元素发送至目标终端后,目标终端的显示界面如图8所示,这里,目标图块元素和干扰图块元素的顺序是打乱的。用户需要在下面的窗口中选出上面的第一窗口缺少的那块碎片,并拖到上面完成拼图。
源终端保存以上动作过程,用以简化后续验证过程。
S702、源终端发送相关图片和无关图片;
当进行验证时,源终端将用于选择的图片(包括目标图片及其它无关图片)发送给目标设备。
S703、目标终端选择目标图片即滑动动作并返回至源终端;
当目标设备接收到这些图片后,根据用户的选择操作将用户选择的图片信息,也就是ID信息并将用户的操作对应的滑动轨迹返回给源终端。
S704、源终端根据接收的ID信息及保存的动作判断是否为缺失的那块图片。当确定是时则执行S705触发多屏共享。当否时执行S706判断是否超出限定次数,在未超出限定次数时继续执行S703,并返回错误提示,让用户重新选择图片。
这里,设置限定次数X(次数可限制为某一合理的数值,以3为例),当验证失败时,并判断是否超出限定次数,当超出限定次数时,执行S707,拒绝接入,锁定目标终端的用户操作输入限制,即锁定用户权限,一段时间后自动解锁。
在实际使用中,采用的图像可为bmp位图,也可为黑白图像,以方便传输和压缩等操作。
在实际使用中,对于一个源终端,可同时与多个目标终端通过连接进行交互验证。这里,对于同一局域网的终端进行安全验证时,使用相同的无线传输协议,如WiFi。
通过本发明实施例提供的方法,预先在源终端集成各种协议,定义共享可内容的格式,若满足则发送同屏请求,协议列表中可设置可用于源终端选择的白名单,用于控制权限的监控。源终端能够得到用户设备的设备名称、ID以及可共享的服务列表等信息。通过源终端为连接选择最佳协议及通信信道,以保障信道安全。最后通过用拼图滑动的验证方式对连接上的目标终端进行最终的身份验证。
本文所述滑动拼图验证的方式,在进行多屏互动时,在源终端预先预置一张图片,抠出其中一部分,和其他无关图片组合在一起供用户识别选择,选择正确的图片则能够拼出完整的图片。源终端对其图片位置和滑动操作预先保存,对允许接入的设备,发送可供选择的图片,由用户选择出拼图中缺失的那张,并返回给源终端。源终端根据预先保存的划动操作,对此图片进行判断,是否为拼图的缺失部分。将判断结果返回到目标终
端,结果为是的便可以进入分享界面。
本发明实施例提供的验证方法是多图拼接的滑动验证码,基于行为的滑动验证安全性高,相比图形验证码可以放在打码平台上人工打码,多快好省,而滑动验证码不容易接入打码平台。滑动界面的设计使得用户体验更加流畅。
通过本发明实施例提供的方法,能够保障多个智能移动端(手机或pad等其他设备都可)接入到同一多屏互动系统中的安全性问题,在允许不同平台的设备同时接入的同时,在建立通信连接后通过滑动拼图的身份验证方式再次进行安全性验证,防止机器破解,具有较高的安全性。这里,对于源终端的系统中集成各种协议方便用户取用,无需其他外置设备,因此可以克服跨平台的多屏互动。
实施例四
本实施例中,对本发明实施例提供的安全验证方法的使用进行举例说明。
当用户想要同时接入几台移动设备进行视频、图片等资料进行分享时,首先要连接同一wifi(WIreless-Fidelity,无线保真),使所有设备处于同一个局域网内,主动分享的用户通过源终端搜索周围的用户信息,被搜索到设备同意或拒绝连接,同意连接的用户同时反馈自己的个人信息,源终端根据待接入用户的个人信息调用底层协议,建立简单的通信信道,开始下一步通信。
建立连接后,触发滑动拼图验证模块,源终端首先向接入的设备发送用于验证身份的几张图片,收到图片的设备选择出目标图片,并返回目标图片的ID、滑动操作信息等信息。当源终端接收到正确的验证图片时,身份验证完毕。若验证图片选择错误,源终端提示用户验证图片选择错误信息,并进行重新选择,超过限定次数还没有选择正确的,对该用户进行锁定。然后源终端对其进行判断,是继续等待验证还是直接拒绝输入。
已经验证通过的设备,直接跳转到多屏互动分界面进行分享。
在实际应用中,滑动动作设置,可设定为左划,右划,抓取,双击后
跳跃等形式,不拘泥于形式的设定上。使得验证形式多样化,恶意程序难以解锁。目标图像可自行设定旋转角度,来增加拼图动作难度。
在身份验证过程中可已加入现在已有的指纹技术(或眼纹技术),只要用户的指纹(或眼纹)与源终端预置的一致,用户可直接接入。
这里,拼图的形式不限,可以将顺序打乱的图片集,重新归位,用以验证用户是机器还是所处环境中的人。用于进项身份验证的图像格式不限,可选择bmp位图,jpg格式图像等。
实施例五
为实现上述实施例一提供的安全验证方法,本发明实施例还提供一种安全验证的装置,应用于第一终端,如图9所示,所述装置包括:第一发送单元901、第一接收单元902以及验证单元903;其中,
第一发送单元901,设置为发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
第一接收单元902,设置为当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;
验证单元903,设置为根据所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
如图10所示,所述装置还包括:划分单元904,设置为:将所述原始图片划分为至少两个图块元素;其中,至少一个图块元素为目标图块元素,所述至少两个图块元素中除所述目标图块元素以外的其他图块元素为参考图块元素。
所述验证单元903确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致包括:确定所述验证图块元素的图块信息与所述目标图块元素的图块信息一致;其中,所述图块信息包括图块标识和位置标识中的至少之一。
如图10所示,所述装置还包括:图块处理单元905,设置为:接收第一滑动操作;根据所述第一滑动操作对应的第一图块处理指令对所述目标
图块元素进行图块处理。
相应地,验证单元903还设置为:根据所述验证响应携带的滑动轨迹信息确定第二图块处理指令;确定所述第二图块处理指令为与所述第一图块处理指令具有预设关系的处理指令。
如图10所示,所述装置还包括:第一协议确定单元906,设置为:发送协议搜索指令;接收所述协议搜索指令对应的搜索响应指令,所述搜索响应指令携带有所述第二终端的协议类型信息;调用所述协议类型信息对应的协议与所述第二终端建立连接。
实施例六
在实施例六中,通过多屏互动的场景下的安全验证装置对实施例五提供的安全验证装置进行进一步描述,该装置应用于源终端中,这里,源终端需要集成多种传输协议。
如图11所示,该装置可分为四个个模块:设备发现模块1101、设备分析模块1102、身份验证模块1103、多屏互动模块1104。其中,目标终端安全接入源终端的过程可分为三个阶段:通信信道建立、身份安全验证和安全控制访问。这里,目标终端可为多个目标终端。
设备发现模块1101,设置为发现同一局域网环境中可以用于接入多屏互动进行分享的待接入设备(目标终端),搜集目标终端的基本信息,包括设备的名称、ID、支持的传输协议等。
设备分析模块1102,设置为对接入的设备进行基本信息分析,选择最佳的传输信道和协议,并根据分析结果调用预先集成的相关协议。
身份验证模块1103,对接入的设备做最终的身份验证,并分配权限,保证无乱入设备。同时触发多屏互动模块1104,进行多屏分享,给目标终端分享图片、视频等资料。
本实施例中的身份验证模块1103对应于实施例五中的第一发送单元901、第一接收单元902、验证单元903、划分单元904以及图块处理单元905,设备发现模块1101、设备分析模块1102对应于实施例五中的第一协议确定单元906。
实施例七
实现上述实施例二提供的安全验证方法,本发明实施例还提供一种安全验证的装置,应用于第二终端,如图12所示,所述装置包括:第二接收单元1201、选择单元1202和第二发送单元1203;其中,
第二接收单元1201,设置为接收来自第一终端的验证指令;其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;
选择单元1202,设置为接收选择操作,基于所述选择操作从所述目标图块元素和所述干扰图块元素中确定验证图块元素;
第二发送单元1203,设置为将所述验证图块元素的图块信息携带在验证响应中发送至所述第一终端。
第二接收单元1201还设置为:接收验证成功消息;其中,所述验证成功消息为第一终端确定所述验证图块元素与所述目标图块元素一致时发送。
第二发送单元1203还设置为:将所述验证图块元素接收到的第二滑动操作对应的第二图块处理指令携带在所述验证响应中发送至所述第一终端;其中,所述目标图块元素为进行图块处理后的图块元素。
如图13所示,所述装置还包括:第二协议确定单元1204,设置为:接收协议搜索指令,查询自身所支持的协议类型;将所述协议类型对应的协议类型信息携带在所述搜索响应指令中发送至所述第一终端。
如图13所示,所述装置还包括:显示单元1205,设置为:将所述参考图块元素显示在第一显示窗口,并在所述第一窗口中将所述目标图块元素对应的位置空缺;将所述目标图块元素和所述干扰图块元素显示在第二显示窗口。
本申请是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算
机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本发明的实施例而已,并非用于限定本申请的保护范围。
通过本发明实施例,在进行安全验证的过程中,将原始图片所包括的参考图块元素、目标图块元素以及进行干扰的干扰图块元素一起发送至接受验证的第二终端,并通过从第二终端接收的验证图块元素和目标图块元素进行比对,当二者一致时,确定验证成功,使得机器难以从目标图块元素和干扰图块元素中查找出与参考图块元素能够组成原始图片的目标元素,使得及其无法自动完成匹配,从而提供能够对抗机器的验证方案,提高验证过程的安全性。
Claims (22)
- 一种安全验证的方法,所述方法包括:发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
- 根据权利要求1所述的方法,其中,在发送验证指令之前,所述方法还包括:将所述原始图片划分为至少两个图块元素;其中,至少一个图块元素为目标图块元素,所述至少两个图块元素中除所述目标图块元素以外的其他图块元素为参考图块元素。
- 根据权利要求1所述的方法,其中,所述确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致包括:确定所述验证图块元素的图块信息与所述目标图块元素的图块信息一致;其中,所述图块信息包括图块标识和位置标识中的至少之一。
- 根据权利要求1所述的方法,所述方法还包括:接收第一滑动操作;根据所述第一滑动操作对应的第一图块处理指令对所述目标图块元素进行图块处理。
- 根据权利要求4所述的方法,其中,在确定验证成功之前,所述方法还包括:根据所述验证响应携带的滑动轨迹信息确定第二图块处理指令;确定所述第二图块处理指令为与所述第一图块处理指令具有预设关系的处理指令。
- 根据权利要求1所述的方法,所述方法还包括:发送协议搜索指令;接收所述协议搜索指令对应的搜索响应指令,所述搜索响应指令携带有所述第二终端的协议类型信息;调用所述协议类型信息对应的协议与所述第二终端建立连接。
- 一种安全验证方法,所述方法包括:接收来自第一终端的验证指令;其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;接收选择操作,基于所述选择操作从所述目标图块元素和所述干扰图块元素中确定验证图块元素;将所述验证图块元素的图块信息携带在验证响应中发送至所述第一终端。
- 根据权利要求7所述的方法,所述方法还包括:接收验证成功消息;其中,所述验证成功消息为第一终端确定所述验证图块元素与所述目标图块元素一致时发送。
- 根据权利要求7所述的方法,所述方法还包括:将所述验证图块元素接收到的第二滑动操作对应滑动操作信息携带在所述验证响应中发送至所述第一终端;其中,所述目标图块元素为进行图块处理后的图块元素。
- 根据权利要求7所述的方法,所述方法还包括:接收协议搜索指令,查询自身所支持的协议类型;将所述协议类型对应的协议类型信息携带在所述搜索响应指令中发送至所述第一终端。
- 根据权利要求7所述的方法,所述方法还包括:将所述参考图块元素显示在第一显示窗口,并在所述第一窗口中将所述目标图块元素对应的位置空缺;将所述目标图块元素和所述干扰图块元素显示在第二显示窗口。
- 一种安全验证的装置,所述装置包括:第一发送单元、第一接收单元以及验证单元;其中,所述第一发送单元,设置为发送验证指令至第二终端,其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;所述第一接收单元,设置为当接收到所述验证指令对应的验证响应时,获取所述验证响应携带的图块信息;所述验证单元,设置为当确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致时,确定验证成功。
- 根据权利要求12所述的装置,所述装置还包括:划分单元,设置为:将所述原始图片划分为至少两个图块元素;其中,至少一个图块元素为目标图块元素,所述至少两个图块元素中除所述目标图块元素以外的其他图块元素为参考图块元素。
- 根据权利要求12所述的装置,其中,所述验证单元确定所述验证响应携带的图块信息对应的验证图块元素与所述目标图块元素一致包括:确定所述验证图块元素的图块信息与所述目标图块元素的图块信息一致;其中,所述图块信息包括图块标识和位置标识中的至少之一。
- 根据权利要求12所述的装置,所述装置还包括:图块处理单元,设置为:接收第一滑动操作;根据所述第一滑动操作对应的第一图块处理指令对所述目标图块元素进行图块处理。
- 根据权利要求15所述的装置,其中,所述验证单元还设置为:根据所述验证响应携带的滑动轨迹信息确定第二图块处理指令;确定所述第二图块处理指令为与所述第一图块处理指令具有预设关系 的处理指令。
- 根据权利要求12所述的装置,所述装置还包括:第一协议确定单元,设置为:发送协议搜索指令;接收所述协议搜索指令对应的搜索响应指令,所述搜索响应指令携带有所述第二终端的协议类型信息;调用所述协议类型信息对应的协议与所述第二终端建立连接。
- 一种安全验证装置,所述装置包括:第二接收单元、选择单元和第二发送单元;其中,所述第二接收单元,设置为接收来自第一终端的验证指令;其中,所述验证指令携带有:原始图片的参考图块元素、原始图片的目标图块元素以及至少一个干扰图块元素;所述选择单元,设置为接收选择操作,基于所述选择操作从所述目标图块元素和所述干扰图块元素中确定验证图块元素;所述第二发送单元,设置为将所述验证图块元素的图块信息携带在验证响应中发送至所述第一终端。
- 根据权利要求18所述的装置,其中,所述第二接收单元还设置为:接收验证成功消息;其中,所述验证成功消息为第一终端确定所述验证图块元素与所述目标图块元素一致时发送。
- 根据权利要求18所述的装置,其中,所述第二发送单元还设置为:将所述验证图块元素接收到的第二滑动操作对应的第二图块处理指令携带在所述验证响应中发送至所述第一终端;其中,所述目标图块元素为进行图块处理后的图块元素。
- 根据权利要求18所述的装置,所述装置还包括:第二协议确定单元,设置为:接收协议搜索指令,查询自身所支持的协议类型;将所述协议类型对应的协议类型信息携带在所述搜索响应指令中发送 至所述第一终端。
- 根据权利要求18所述的装置,所述装置还包括:显示单元,设置为:将所述参考图块元素显示在第一显示窗口,并在所述第一窗口中将所述目标图块元素对应的位置空缺;将所述目标图块元素和所述干扰图块元素显示在第二显示窗口。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610856756.5A CN107872435A (zh) | 2016-09-27 | 2016-09-27 | 一种安全验证的方法及装置 |
CN201610856756.5 | 2016-09-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018059127A1 true WO2018059127A1 (zh) | 2018-04-05 |
Family
ID=61752256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/096192 WO2018059127A1 (zh) | 2016-09-27 | 2017-08-07 | 一种安全验证的方法及装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107872435A (zh) |
WO (1) | WO2018059127A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583178A (zh) * | 2018-10-09 | 2019-04-05 | 阿里巴巴集团控股有限公司 | 一种会议协同参与方法及系统 |
CN114626048A (zh) * | 2022-03-18 | 2022-06-14 | 国韵信息科技(济南)有限公司 | 一种基于验证码识别的计算机登录系统及方法 |
CN109800559B (zh) * | 2019-01-02 | 2024-01-16 | 平安科技(深圳)有限公司 | 滑块验证码的生成方法、装置、计算机设备及存储介质 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110826046A (zh) * | 2019-11-04 | 2020-02-21 | 北京锐安科技有限公司 | 一种网站登录的方法、装置、设备及存储介质 |
CN113422687B (zh) * | 2021-06-24 | 2023-02-28 | 中国农业银行股份有限公司 | 一种验证方法、验证服务器和验证系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312512A (zh) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | 一种图片验证码的生成方法及装置、身份验证方法及装置 |
CN104468123A (zh) * | 2014-12-12 | 2015-03-25 | 浪潮(北京)电子信息产业有限公司 | 一种身份认证方法及装置 |
CN104580104A (zh) * | 2013-10-24 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | 身份验证的方法、装置及系统 |
WO2015074474A1 (zh) * | 2013-11-19 | 2015-05-28 | 腾讯科技(深圳)有限公司 | 验证方法、装置及系统 |
-
2016
- 2016-09-27 CN CN201610856756.5A patent/CN107872435A/zh active Pending
-
2017
- 2017-08-07 WO PCT/CN2017/096192 patent/WO2018059127A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312512A (zh) * | 2013-06-07 | 2013-09-18 | 深圳第七大道网络技术有限公司 | 一种图片验证码的生成方法及装置、身份验证方法及装置 |
CN104580104A (zh) * | 2013-10-24 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | 身份验证的方法、装置及系统 |
WO2015074474A1 (zh) * | 2013-11-19 | 2015-05-28 | 腾讯科技(深圳)有限公司 | 验证方法、装置及系统 |
CN104468123A (zh) * | 2014-12-12 | 2015-03-25 | 浪潮(北京)电子信息产业有限公司 | 一种身份认证方法及装置 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583178A (zh) * | 2018-10-09 | 2019-04-05 | 阿里巴巴集团控股有限公司 | 一种会议协同参与方法及系统 |
CN109583178B (zh) * | 2018-10-09 | 2023-03-10 | 创新先进技术有限公司 | 一种会议协同参与方法及系统 |
CN109800559B (zh) * | 2019-01-02 | 2024-01-16 | 平安科技(深圳)有限公司 | 滑块验证码的生成方法、装置、计算机设备及存储介质 |
CN114626048A (zh) * | 2022-03-18 | 2022-06-14 | 国韵信息科技(济南)有限公司 | 一种基于验证码识别的计算机登录系统及方法 |
CN114626048B (zh) * | 2022-03-18 | 2023-10-13 | 中软国际科技服务有限公司 | 一种基于验证码识别的计算机登录系统及方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107872435A (zh) | 2018-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018059127A1 (zh) | 一种安全验证的方法及装置 | |
CN106233662B (zh) | 基于用户的接近来限制与计算设备的用户交互 | |
US10362613B2 (en) | Pairing management method, recording medium, and terminal apparatus | |
US8807426B1 (en) | Mobile computing device authentication using scannable images | |
CA2994055C (en) | System and method for electronically providing legal instrument | |
US9781105B2 (en) | Fallback identity authentication techniques | |
CN105323065B (zh) | 一种安全验证方法及装置 | |
TWI616821B (zh) | Bar code generation method, bar code based authentication method and related terminal | |
US9077713B1 (en) | Typeless secure login to web-based services | |
CN110493232A (zh) | 计算设备的自动用户注册和解锁 | |
US11017121B2 (en) | Information authentication method, apparatus, storage medium and virtual reality device based on virtual reality scenario | |
US20240296215A1 (en) | Secure authentication | |
KR102353189B1 (ko) | 동적 2d 코드를 활용한 인증장치 및 그 장치의 구동방법 | |
US20220129530A1 (en) | Method for controlling an access device and an access system | |
KR101654797B1 (ko) | 피싱 대응 상호 작용 캡차 시스템 | |
JP2020140735A (ja) | コンテンツアクセスに対するカメラベースのユーザ認証のための装置および方法 | |
WO2018006326A1 (zh) | 一种通过移动终端和图片密码验证智能门禁的方法及系统 | |
US9213816B2 (en) | Protocol for biometric device capture and quality analysis | |
CN106921632B (zh) | 无线热点接入控制方法及装置 | |
US10509899B2 (en) | Information device operating system, information device operating method and program for operating information device based on authentication | |
EP3495949B1 (en) | Virtual reality-based information verification method, device, data storage medium, and virtual reality apparatus | |
CN105354467A (zh) | 基于耳廓识别的移动终端用户模式启动方法及移动终端 | |
CN106452766B (zh) | 一种密码的找回方法及装置 | |
JP7342504B2 (ja) | 情報処理装置、システム、プロビジョニングデータを生成する方法、およびプログラム | |
TW201543938A (zh) | 快速安全連線建立方法與無線存取點裝置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17854580 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17854580 Country of ref document: EP Kind code of ref document: A1 |