WO2018103564A1 - 一种基于验证码的校验方法及装置 - Google Patents

一种基于验证码的校验方法及装置 Download PDF

Info

Publication number
WO2018103564A1
WO2018103564A1 PCT/CN2017/113595 CN2017113595W WO2018103564A1 WO 2018103564 A1 WO2018103564 A1 WO 2018103564A1 CN 2017113595 W CN2017113595 W CN 2017113595W WO 2018103564 A1 WO2018103564 A1 WO 2018103564A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
character
character string
verification code
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/113595
Other languages
English (en)
French (fr)
Chinese (zh)
Inventor
修超
王磊
陈星�
李传智
张永志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to PL17879427T priority Critical patent/PL3554000T3/pl
Priority to ES17879427T priority patent/ES2882535T3/es
Priority to EP17879427.7A priority patent/EP3554000B1/en
Priority to KR1020197019777A priority patent/KR102194072B1/ko
Priority to JP2019531108A priority patent/JP6894511B2/ja
Priority to SG11201905215TA priority patent/SG11201905215TA/en
Publication of WO2018103564A1 publication Critical patent/WO2018103564A1/zh
Priority to US16/393,839 priority patent/US10719599B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a verification method and apparatus based on a verification code.
  • the verification code (Completely Automated Public Turing test to tell Computers and Humens Apart, CAPTCHA, also known as the fully automatic distinction between computer and human Turing test) has been widely used as a security verification method. It is possible to distinguish whether the operator is a user or an illegal program, and the verification code can prevent illegal operations such as malicious attempt to log in to the user account, enumeration of the user password, or script control for swiping, speaking, and the like.
  • the display mode adopted by the verification code is more and more complicated and varied, and is usually displayed in the following manner: Method 1, as shown in FIG. 1a, the verification code uses numbers. Or textual expressions, and add background to the captcha display area, or distorted for numbers or text to enhance the interference level of the captcha.
  • Method 1 as shown in FIG. 1a, the verification code uses numbers. Or textual expressions, and add background to the captcha display area, or distorted for numbers or text to enhance the interference level of the captcha.
  • FIG. 1b multiple pictures and prompt information are provided, so that the user identifies a corresponding number of specific pictures from multiple similar pictures based on the prompt information.
  • the verification code adopts a relatively complicated display manner, and although it can interfere with the automatic identification of the illegal script, it also increases the interference to the user, in other words, when the above verification code is displayed to the user.
  • the probability of user identification error increases. Once an error occurs, the user needs to refresh the verification code and continue to recognize the newly generated verification code until it passes the verification.
  • the above verification process in the prior art may take a long time, especially in the case of identifying an error, which will cause the user to repeat the verification.
  • the embodiment of the present application provides a verification code verification method for solving a user in the prior art.
  • the possibility that the verification code identifies a large error causes the verification process to take a long time.
  • the embodiment of the present application provides a verification code-based verification device, which is used to solve the problem that the verification process is prone to be long and the verification process takes a long time.
  • Receiving a module receiving a verification request
  • the replacement module replaces part or all of the variable characters with the alternate characters according to the pre-established correspondence between the variable characters and the alternate characters to obtain the second character string;
  • the verification module generates a verification code according to the second character string, and performs verification on the user corresponding to the verification request.
  • the server performs a character replacement operation on the verification code.
  • the verification code generated by the character replacement method does not affect the user's knowledge. Meaning, and the characters in the verification code of the embodiment of the present application do not adopt such methods as glyph distortion, color conversion, adding background, etc., so that the user can identify the verification code more conveniently and accurately, and for the computer program,
  • the verification code after the character is replaced It can contain multiple types of characters and does not conform to the usual grammar, which makes it difficult for a computer program to effectively recognize the content represented by the verification code according to the recognition algorithm, thereby effectively reducing the possibility of the computer program performing an illegal operation.
  • the verification method provided in the embodiment of the present application improves the identifiability of the verification code, so that the user can intuitively know the meaning of the representation, thereby increasing user identification.
  • the accuracy of the verification code reduces the time consuming of the verification process. At the same time, it increases the difficulty in recognizing the verification code by the computer program, and can effectively reduce the possibility of illegal operation of the computer program.
  • FIG. 1a and 1b are schematic diagrams of verification codes in the prior art
  • FIG. 2a is a schematic structural diagram of a verification code based verification process according to an embodiment of the present application
  • 2b is a schematic diagram of a verification code based verification process provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of generating a character replacement verification code according to an embodiment of the present disclosure
  • 4a and 4b are schematic diagrams of verification interfaces of different verification modes provided by embodiments of the present application.
  • FIG. 5 is a schematic structural diagram of a verification code based verification apparatus according to an embodiment of the present application.
  • the verification process may be based on the architecture shown in FIG. 2a, and the verification process may be implemented by a server in the background of the online service provider, where the online service provider includes but is not limited to: a website Business providers that can provide online services, such as telecom operators and data centers.
  • the server used to implement the verification process may specifically be a security maintenance function server, such as a security center server in the background of the online service provider. This does not constitute a limitation on the present application.
  • the servers in the background of the online system are collectively referred to as: servers.
  • the user can be understood as an operator who uses the service provided by the online service provider. It should be noted that in the verification scenario in the embodiment of the present application, the legal operator should be a natural person and illegal.
  • the operators are computer scripts, programs, and the like.
  • FIG. 1 a verification code based verification process in the implementation of the present application is shown, and the process specifically includes the following steps:
  • the verification request is usually generated after the trigger is triggered.
  • the verification may be triggered by the user, or may be triggered by the server according to the needs of the actual application.
  • the user may actively send a verification request.
  • the verification request is used to trigger a verification process of the verification code.
  • the verification process of the verification code can be applied in the scenario of account login, in other words, when the user enters the login interface (for example, the account login interface of the website), the user can be regarded as issuing a verification.
  • the request accordingly, the server receives a verification request sent by the user.
  • the server may perform identity verification on the user according to the corresponding security rules, such as: the server actively generates the verification code according to the set period; or the server determines that some operations of the user are risky. At this time, the verification code is actively generated, and a verification is initiated to the user to determine that the operator is not issued by the computer program.
  • the server may perform identity verification on the user according to the corresponding security rules, such as: the server actively generates the verification code according to the set period; or the server determines that some operations of the user are risky.
  • the verification code is actively generated, and a verification is initiated to the user to determine that the operator is not issued by the computer program.
  • this does not constitute a limitation on the present application.
  • S102 Acquire a pre-generated first character string after receiving the verification request.
  • the first string includes at least one variable character.
  • the first character string can be understood as a calibration character string composed of numbers, characters, and the like and having an indication function.
  • the calibrated string is easier to be recognized by the computer program, thereby increasing the risk of the verification process. Therefore, in the embodiment of the present application, the first character string includes a variable character, and the variable character can be replaced with other characters to play a role of interference.
  • the alternate character that is, a character that can belong to the same category as the variable character, for example, the alternate character and the variable character belong to a Chinese character, an English character, a numeric character, or may belong to a different character category from the variable character.
  • a Chinese character can be converted into a pinyin, such as: converting "red” to "hong”, and as another way, converting a certain character (or phrase) into Homophones (or phrases), such as: Convert "blue” to "blue”.
  • the meaning of the second character string after the character replacement does not change, that is, the corresponding character of the verification code can still be known to the user, and the corresponding code can be executed according to the verification code. Operation.
  • S104 Generate a verification code according to the second character string, and perform verification on the user corresponding to the verification request.
  • the verification code may be displayed in a format such as a picture or a text message in an actual operation, and is used to instruct the user to perform a specific operation, and does not constitute a limitation on the present application.
  • the verification code generated by the second character string can play a disturbing role, compared with the prior art, which relies on glyph distortion, discoloration, background, etc.
  • the meaning of the verification code replaced by the character in the embodiment of the present application does not change, and the user can be informed of the meaning of the verification code by not adopting an excessively complicated change manner. This makes it easier for the user to identify and, in addition, the difficulty of machine recognition due to character substitution.
  • the verification code After the foregoing content, after the verification code is generated, it can be targeted to the corresponding operator (ie, the user). A check is made to distinguish whether the operator is a user or a computer program.
  • the verification code may be displayed to the user in a corresponding verification interface (such as a login interface), and the user performs a corresponding operation according to the verification code, according to the calibration school.
  • the verification information verifies the user's operation.
  • the server of the service provider performs the character replacement operation on the verification code in the process of verifying the user, and the verification code generated by the character replacement method does not affect the individual of the user.
  • the user is aware of the meaning therein, and the characters in the verification code of the embodiment of the present application do not adopt such methods as glyph distortion, color conversion, adding background, etc., so that the user can recognize the verification code more conveniently and accurately, and for the computer program.
  • the character verification code after the character replacement may contain multiple types of characters, and does not conform to the usual syntax, thereby making it difficult for the computer program to effectively recognize the content represented by the verification code according to the recognition algorithm, thereby effectively reducing the content.
  • the verification method provided in the embodiment of the present application improves the identifiability of the verification code, so that the user can intuitively know the meaning of the representation, thereby increasing user identification.
  • the accuracy of the verification code reduces the time consuming of the verification process. At the same time, it increases the difficulty in recognizing the verification code by the computer program, and can effectively reduce the possibility of illegal operation of the computer program.
  • the characters in the verification code are substantially homophonic or synonymously replaced, that is, in advance Establishing a correspondence between the variable character and the alternate character, specifically: determining, for any variable character, at least one homophonic character and/or synonym character of the variable character, and determining the homophone character and/or synonym A character is used as an alternate character of the variable character, and a correspondence with the variable character is established.
  • the first character string described in the above content can be considered to be generated in advance according to the corresponding verification code generation rule, and stored in the database on the server side, and its schematic diagram is shown in FIG. 3.
  • a verification code string is a character string composed of Chinese characters "enter two Chinese characters", assuming that all six Chinese characters in the string are Variable characters, in actual operation, only two of the variable characters "two” and “han” can be replaced, assuming that the two variable characters respectively have their own alternate characters: "two" and "weld", Thus, the second character string after replacing the variable character with the spare character becomes: "Enter two welding words”.
  • variable string corresponds to different alternate characters
  • a hybrid alternative can also be used, such as: replacing the first string “select two red balls” with “xuan select two hongs” begging".
  • the verification code may be generated according to the second character string after the character replacement, and the verification code is generated according to the second character string, and the method further includes: generating a verification code of the specified format according to the second character string.
  • the specified format includes at least one of a picture format and a text format.
  • the user usually performs certain operations according to the verification code. For example, the user inputs a corresponding character string according to the verification code, or the user performs an operation according to the behavior indicated by the verification code. Whether the user inputs a string or performs some kind of operation, the server side needs to perform verification. In order to ensure the accuracy of the verification, the verification standard will be determined on the server side. It can be understood that the calibration verification information is a verification standard, and only the user's operation conforms to the verification standard before passing the verification.
  • the user can input a corresponding character string according to the verification code displayed in the verification interface.
  • the calibration verification information is the first character string
  • the school is The user corresponding to the verification request performs verification, which includes: generating an input area on the interface for verifying the user, and acquiring a to-be-checked character string input by the user according to the verification code in the input area, according to The first character string is used to check the to-be-checked character string.
  • the verification interface in this mode is shown, and it can be seen that the verification interface is The verification code and the corresponding input area are included, and the user inputs a corresponding character string in the input area according to the verification code to perform verification.
  • the user according to the verification code “hong color” the verification code is the first Second string
  • the verification code is the first Second string
  • the user may perform a corresponding verification operation according to the verification code displayed in the verification interface.
  • the calibration verification information includes: a preset The standard operation information is used to verify the user corresponding to the verification request, which includes: generating an operable verification code display area on the interface for verifying the user, and obtaining the user in the verification code display area And verifying, according to the calibration operation information, the operation information to be verified according to the operation information to be verified corresponding to the operation to be verified performed by the verification code.
  • the verification interface includes an authentication code display area that is operable and carries a verification code.
  • the user can perform the verification according to the behavior indicated by the verification code.
  • the code display area issues a corresponding operation to be verified.
  • the standard operation information is clicked for the operation controls "2" and "4", the user clicks on the verification code "click on the number of ou in the figure below", After the operation controls "2" and "4" in the verification code display area are clicked, they can pass the verification.
  • the embodiment of the present application further provides a verification device based on the verification code.
  • the verification device is disposed on a server side of a service provider, and the device includes:
  • the receiving module 501 receives a verification request.
  • the obtaining module 502 after receiving the verification request, acquiring a pre-generated first character string; wherein the first character string includes at least one variable character;
  • the replacement module 503 according to the correspondence between the pre-established variable character and the spare character, will be part of Or replacing all variable characters with alternate characters to obtain a second character string;
  • the verification module 504 generates a verification code according to the second character string, and performs verification on the user corresponding to the verification request.
  • the apparatus further includes: an establishing module 505, for each variable character, determining at least one homophonic character and/or synonym character of the variable character, and determining the determined homophone character and/or synonym character as the Changing the alternate character of the character and establishing a correspondence with the variable character.
  • the verification module 504 generates a verification code of a specified format according to the second character string.
  • the specified format includes at least one of a picture format and a text format.
  • the verification module 504 generates an input area on the interface for verifying the user, and acquires a to-be-checked character string input by the user according to the verification code in the input area, according to the first character string. And verifying the to-be-checked character string.
  • the verification module 504 generates an operable verification code display area on the interface for verifying the user, and obtains an operation to be verified according to the verification code performed by the user in the verification code display area. Corresponding operation information to be verified, and verifying the operation information to be verified according to preset calibration operation information.
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor.
  • computer readable program code eg, software or firmware
  • examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
  • the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
  • Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
  • a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
  • the system, device, module or unit illustrated in the above embodiments may be specifically implemented by a computer chip or a real Realized by a body, or by a product with a certain function.
  • a typical implementation device is a computer.
  • the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the application can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular transactions or implement particular abstract data types.
  • the present application can also be practiced in distributed computing environments where transactions are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)
  • Document Processing Apparatus (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)
  • Storage Device Security (AREA)
PCT/CN2017/113595 2016-12-08 2017-11-29 一种基于验证码的校验方法及装置 Ceased WO2018103564A1 (zh)

Priority Applications (7)

Application Number Priority Date Filing Date Title
PL17879427T PL3554000T3 (pl) 2016-12-08 2017-11-29 Sposób i urządzenie do weryfikacji oparte na kodzie walidacyjnym
ES17879427T ES2882535T3 (es) 2016-12-08 2017-11-29 Método y dispositivo de verificación basados en código de validación
EP17879427.7A EP3554000B1 (en) 2016-12-08 2017-11-29 Validation code based verification method and device
KR1020197019777A KR102194072B1 (ko) 2016-12-08 2017-11-29 검증 코드에 기초한 검증 방법 및 장치
JP2019531108A JP6894511B2 (ja) 2016-12-08 2017-11-29 検証コードに基づく検証方法および装置
SG11201905215TA SG11201905215TA (en) 2016-12-08 2017-11-29 Method and Apparatus for Verification Based on Verification Code
US16/393,839 US10719599B2 (en) 2016-12-08 2019-04-24 Verification code generation to improve recognition accuracy by a person and recognition difficulty by a computer program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611125263.0A CN106899411B (zh) 2016-12-08 2016-12-08 一种基于验证码的校验方法及装置
CN201611125263.0 2016-12-08

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/393,839 Continuation US10719599B2 (en) 2016-12-08 2019-04-24 Verification code generation to improve recognition accuracy by a person and recognition difficulty by a computer program

Publications (1)

Publication Number Publication Date
WO2018103564A1 true WO2018103564A1 (zh) 2018-06-14

Family

ID=59197816

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/113595 Ceased WO2018103564A1 (zh) 2016-12-08 2017-11-29 一种基于验证码的校验方法及装置

Country Status (10)

Country Link
US (1) US10719599B2 (enExample)
EP (1) EP3554000B1 (enExample)
JP (1) JP6894511B2 (enExample)
KR (1) KR102194072B1 (enExample)
CN (1) CN106899411B (enExample)
ES (1) ES2882535T3 (enExample)
PL (1) PL3554000T3 (enExample)
SG (1) SG11201905215TA (enExample)
TW (1) TWI756266B (enExample)
WO (1) WO2018103564A1 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117058687A (zh) * 2023-07-21 2023-11-14 广州盈风网络科技有限公司 一种文字分类验证方法、装置、设备及存储介质

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899411B (zh) * 2016-12-08 2021-09-21 创新先进技术有限公司 一种基于验证码的校验方法及装置
CN109087368B (zh) * 2018-06-14 2023-04-07 创新先进技术有限公司 一种字符串图形化方法和装置
CN109117624A (zh) * 2018-08-03 2019-01-01 上海掌门科技有限公司 生成验证码图像的方法、电子设备和计算机可读介质
CN109359274B (zh) * 2018-09-14 2023-05-02 蚂蚁金服(杭州)网络技术有限公司 一种对批量生成的字符串进行识别的方法、装置及设备
CN109635256B (zh) * 2018-12-20 2023-07-11 上海掌门科技有限公司 用于校验数据的方法和装置
US10496809B1 (en) 2019-07-09 2019-12-03 Capital One Services, Llc Generating a challenge-response for authentication using relations among objects
US10614207B1 (en) * 2019-07-09 2020-04-07 Capital One Services, Llc Generating captcha images using variations of the same object
CN110677239B (zh) * 2019-08-26 2022-09-06 深圳市共进电子股份有限公司 一种验证码生成方法及装置
CN111177688B (zh) * 2019-12-26 2022-10-14 微梦创科网络科技(中国)有限公司 一种基于形似语言混合字体的安全认证方法及装置
CN111611767B (zh) * 2020-05-21 2023-04-25 北京百度网讯科技有限公司 验证方法和装置
CN111953647B (zh) * 2020-06-22 2022-09-27 北京百度网讯科技有限公司 安全校验方法、装置、电子设备和存储介质
CN111966669B (zh) * 2020-06-29 2024-03-15 浪潮通用软件有限公司 一种报表数据校验方法、设备及介质
CN112566126B (zh) * 2020-12-02 2022-04-26 支付宝(杭州)信息技术有限公司 一种设备之间的连接方法、装置及设备
CN112685725B (zh) * 2020-12-30 2022-12-06 上海掌门科技有限公司 一种安全验证的方法与设备
CN112966252B (zh) * 2021-04-26 2023-11-24 平安国际智慧城市科技股份有限公司 一种基于密码技术的客户端验证方法、装置、电子设备及介质
CN113191776A (zh) * 2021-04-30 2021-07-30 中国银行股份有限公司 基于手机银行的用户分类方法及装置
CN114465762A (zh) * 2021-12-24 2022-05-10 安徽航天信息有限公司 一种基于语境的验证码生成方法、装置及存储介质
CN115037515A (zh) * 2022-04-29 2022-09-09 北京龙腾佳讯科技股份公司 开放数据网中无状态验证码验证方法、装置及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796252A (zh) * 2014-01-20 2015-07-22 北京大学 可变数据标签防伪的方法、装置及其认证的方法、系统
KR101647027B1 (ko) * 2015-03-02 2016-08-23 주식회사 사람들과사람들 기준지점 기반의 가변형 패턴을 이용한 사용자 인증 장치 및 그 방법
CN106156597A (zh) * 2015-04-16 2016-11-23 深圳市腾讯计算机系统有限公司 一种验证码的实现方法,及装置
CN106899411A (zh) * 2016-12-08 2017-06-27 阿里巴巴集团控股有限公司 一种基于验证码的校验方法及装置

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7890426B2 (en) 2004-11-19 2011-02-15 Vectorsgi, Inc. Method and system for verifying check images
US7552467B2 (en) * 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
US20110055585A1 (en) * 2008-07-25 2011-03-03 Kok-Wah Lee Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering
CN101895542B (zh) * 2010-07-05 2013-03-20 北京畅游时空软件技术有限公司 一种验证码的获取方法及装置
CN102075507A (zh) * 2010-07-30 2011-05-25 百度在线网络技术(北京)有限公司 一种用于基于词句验证图进行用户验证的方法与设备
CN102687160B (zh) * 2010-08-31 2015-12-16 乐天株式会社 应答判定装置、应答判定方法、以及应答判定系统
CN101976430A (zh) * 2010-10-29 2011-02-16 赵俊平 一种图片验证码生成方法及其系统
US8885931B2 (en) * 2011-01-26 2014-11-11 Microsoft Corporation Mitigating use of machine solvable HIPs
JP2014078079A (ja) * 2012-10-09 2014-05-01 Sharp Corp サーバ装置および認証システム
US8978121B2 (en) * 2013-01-04 2015-03-10 Gary Stephen Shuster Cognitive-based CAPTCHA system
CN104283682A (zh) * 2013-07-08 2015-01-14 深圳市腾讯计算机系统有限公司 一种利用验证码进行校验的方法、装置及系统
US9202076B1 (en) * 2013-07-26 2015-12-01 Symantec Corporation Systems and methods for sharing data stored on secure third-party storage platforms
US10061914B2 (en) * 2014-11-14 2018-08-28 Mcafee, Llc Account recovery protocol
TWI546693B (zh) 2014-12-10 2016-08-21 英業達股份有限公司 整合驗證碼及密碼的登入系統及其方法
CN104794385A (zh) 2015-03-03 2015-07-22 新浪网技术(中国)有限公司 一种信息验证方法及装置
CN104883351B (zh) 2015-03-13 2019-02-12 小米科技有限责任公司 多因子认证方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796252A (zh) * 2014-01-20 2015-07-22 北京大学 可变数据标签防伪的方法、装置及其认证的方法、系统
KR101647027B1 (ko) * 2015-03-02 2016-08-23 주식회사 사람들과사람들 기준지점 기반의 가변형 패턴을 이용한 사용자 인증 장치 및 그 방법
CN106156597A (zh) * 2015-04-16 2016-11-23 深圳市腾讯计算机系统有限公司 一种验证码的实现方法,及装置
CN106899411A (zh) * 2016-12-08 2017-06-27 阿里巴巴集团控股有限公司 一种基于验证码的校验方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3554000A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117058687A (zh) * 2023-07-21 2023-11-14 广州盈风网络科技有限公司 一种文字分类验证方法、装置、设备及存储介质

Also Published As

Publication number Publication date
TW201822048A (zh) 2018-06-16
SG11201905215TA (en) 2019-08-27
ES2882535T3 (es) 2021-12-02
JP2020501279A (ja) 2020-01-16
EP3554000A1 (en) 2019-10-16
TWI756266B (zh) 2022-03-01
CN106899411B (zh) 2021-09-21
PL3554000T3 (pl) 2021-11-02
US20190251243A1 (en) 2019-08-15
US10719599B2 (en) 2020-07-21
EP3554000B1 (en) 2021-05-19
CN106899411A (zh) 2017-06-27
KR20190091529A (ko) 2019-08-06
KR102194072B1 (ko) 2020-12-23
EP3554000A4 (en) 2019-11-06
JP6894511B2 (ja) 2021-06-30

Similar Documents

Publication Publication Date Title
WO2018103564A1 (zh) 一种基于验证码的校验方法及装置
US12056685B2 (en) Using on-demand applications to process encrypted data from a contactless card
TWI724326B (zh) 業務授權的方法、裝置及設備
TWI752228B (zh) 資訊驗證處理方法、裝置、系統、客戶端及伺服器
TW201918920A (zh) 聲紋認證方法、帳號註冊方法及裝置
WO2020238230A1 (zh) 一种获取银行卡签约要素信息的方法、系统及设备
TW202109323A (zh) 操作用戶識別方法、裝置及設備
US11461503B2 (en) Service processing method and apparatus
WO2021174969A1 (zh) 一种校验方法、装置以及设备
CN107025393A (zh) 一种资源调用的方法及装置
US20240338958A1 (en) Synthetic data fine-tuned optical character recognition engine for extensible markup language document reconstruction
US10270771B1 (en) Mid-session live user authentication
US20180314683A1 (en) Method and device for processing natural language
CN107483534B (zh) 一种业务处理的方法及装置
TWI732139B (zh) 數位物件唯一識別碼(doi)展示和交易資訊校驗方法、裝置及設備
HK1238438B (zh) 一种基於验证码的校验方法及装置
HK1238438A1 (en) Verification method and apparatus based on verification code
HK1238438A (en) Verification method and apparatus based on verification code
CN113495835B (zh) 代码校验方法、装置、计算机设备和存储介质
US20220051092A1 (en) System and methods for translating error messages
HK1247749A1 (zh) 一种业务处理的方法及装置
TWM500291U (zh) 電子裝置與伺服器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17879427

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019531108

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20197019777

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017879427

Country of ref document: EP

Effective date: 20190708