WO2018103564A1 - 一种基于验证码的校验方法及装置 - Google Patents
一种基于验证码的校验方法及装置 Download PDFInfo
- Publication number
- WO2018103564A1 WO2018103564A1 PCT/CN2017/113595 CN2017113595W WO2018103564A1 WO 2018103564 A1 WO2018103564 A1 WO 2018103564A1 CN 2017113595 W CN2017113595 W CN 2017113595W WO 2018103564 A1 WO2018103564 A1 WO 2018103564A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification
- character
- character string
- verification code
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present application relates to the field of computer technologies, and in particular, to a verification method and apparatus based on a verification code.
- the verification code (Completely Automated Public Turing test to tell Computers and Humens Apart, CAPTCHA, also known as the fully automatic distinction between computer and human Turing test) has been widely used as a security verification method. It is possible to distinguish whether the operator is a user or an illegal program, and the verification code can prevent illegal operations such as malicious attempt to log in to the user account, enumeration of the user password, or script control for swiping, speaking, and the like.
- the display mode adopted by the verification code is more and more complicated and varied, and is usually displayed in the following manner: Method 1, as shown in FIG. 1a, the verification code uses numbers. Or textual expressions, and add background to the captcha display area, or distorted for numbers or text to enhance the interference level of the captcha.
- Method 1 as shown in FIG. 1a, the verification code uses numbers. Or textual expressions, and add background to the captcha display area, or distorted for numbers or text to enhance the interference level of the captcha.
- FIG. 1b multiple pictures and prompt information are provided, so that the user identifies a corresponding number of specific pictures from multiple similar pictures based on the prompt information.
- the verification code adopts a relatively complicated display manner, and although it can interfere with the automatic identification of the illegal script, it also increases the interference to the user, in other words, when the above verification code is displayed to the user.
- the probability of user identification error increases. Once an error occurs, the user needs to refresh the verification code and continue to recognize the newly generated verification code until it passes the verification.
- the above verification process in the prior art may take a long time, especially in the case of identifying an error, which will cause the user to repeat the verification.
- the embodiment of the present application provides a verification code verification method for solving a user in the prior art.
- the possibility that the verification code identifies a large error causes the verification process to take a long time.
- the embodiment of the present application provides a verification code-based verification device, which is used to solve the problem that the verification process is prone to be long and the verification process takes a long time.
- Receiving a module receiving a verification request
- the replacement module replaces part or all of the variable characters with the alternate characters according to the pre-established correspondence between the variable characters and the alternate characters to obtain the second character string;
- the verification module generates a verification code according to the second character string, and performs verification on the user corresponding to the verification request.
- the server performs a character replacement operation on the verification code.
- the verification code generated by the character replacement method does not affect the user's knowledge. Meaning, and the characters in the verification code of the embodiment of the present application do not adopt such methods as glyph distortion, color conversion, adding background, etc., so that the user can identify the verification code more conveniently and accurately, and for the computer program,
- the verification code after the character is replaced It can contain multiple types of characters and does not conform to the usual grammar, which makes it difficult for a computer program to effectively recognize the content represented by the verification code according to the recognition algorithm, thereby effectively reducing the possibility of the computer program performing an illegal operation.
- the verification method provided in the embodiment of the present application improves the identifiability of the verification code, so that the user can intuitively know the meaning of the representation, thereby increasing user identification.
- the accuracy of the verification code reduces the time consuming of the verification process. At the same time, it increases the difficulty in recognizing the verification code by the computer program, and can effectively reduce the possibility of illegal operation of the computer program.
- FIG. 1a and 1b are schematic diagrams of verification codes in the prior art
- FIG. 2a is a schematic structural diagram of a verification code based verification process according to an embodiment of the present application
- 2b is a schematic diagram of a verification code based verification process provided by an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of generating a character replacement verification code according to an embodiment of the present disclosure
- 4a and 4b are schematic diagrams of verification interfaces of different verification modes provided by embodiments of the present application.
- FIG. 5 is a schematic structural diagram of a verification code based verification apparatus according to an embodiment of the present application.
- the verification process may be based on the architecture shown in FIG. 2a, and the verification process may be implemented by a server in the background of the online service provider, where the online service provider includes but is not limited to: a website Business providers that can provide online services, such as telecom operators and data centers.
- the server used to implement the verification process may specifically be a security maintenance function server, such as a security center server in the background of the online service provider. This does not constitute a limitation on the present application.
- the servers in the background of the online system are collectively referred to as: servers.
- the user can be understood as an operator who uses the service provided by the online service provider. It should be noted that in the verification scenario in the embodiment of the present application, the legal operator should be a natural person and illegal.
- the operators are computer scripts, programs, and the like.
- FIG. 1 a verification code based verification process in the implementation of the present application is shown, and the process specifically includes the following steps:
- the verification request is usually generated after the trigger is triggered.
- the verification may be triggered by the user, or may be triggered by the server according to the needs of the actual application.
- the user may actively send a verification request.
- the verification request is used to trigger a verification process of the verification code.
- the verification process of the verification code can be applied in the scenario of account login, in other words, when the user enters the login interface (for example, the account login interface of the website), the user can be regarded as issuing a verification.
- the request accordingly, the server receives a verification request sent by the user.
- the server may perform identity verification on the user according to the corresponding security rules, such as: the server actively generates the verification code according to the set period; or the server determines that some operations of the user are risky. At this time, the verification code is actively generated, and a verification is initiated to the user to determine that the operator is not issued by the computer program.
- the server may perform identity verification on the user according to the corresponding security rules, such as: the server actively generates the verification code according to the set period; or the server determines that some operations of the user are risky.
- the verification code is actively generated, and a verification is initiated to the user to determine that the operator is not issued by the computer program.
- this does not constitute a limitation on the present application.
- S102 Acquire a pre-generated first character string after receiving the verification request.
- the first string includes at least one variable character.
- the first character string can be understood as a calibration character string composed of numbers, characters, and the like and having an indication function.
- the calibrated string is easier to be recognized by the computer program, thereby increasing the risk of the verification process. Therefore, in the embodiment of the present application, the first character string includes a variable character, and the variable character can be replaced with other characters to play a role of interference.
- the alternate character that is, a character that can belong to the same category as the variable character, for example, the alternate character and the variable character belong to a Chinese character, an English character, a numeric character, or may belong to a different character category from the variable character.
- a Chinese character can be converted into a pinyin, such as: converting "red” to "hong”, and as another way, converting a certain character (or phrase) into Homophones (or phrases), such as: Convert "blue” to "blue”.
- the meaning of the second character string after the character replacement does not change, that is, the corresponding character of the verification code can still be known to the user, and the corresponding code can be executed according to the verification code. Operation.
- S104 Generate a verification code according to the second character string, and perform verification on the user corresponding to the verification request.
- the verification code may be displayed in a format such as a picture or a text message in an actual operation, and is used to instruct the user to perform a specific operation, and does not constitute a limitation on the present application.
- the verification code generated by the second character string can play a disturbing role, compared with the prior art, which relies on glyph distortion, discoloration, background, etc.
- the meaning of the verification code replaced by the character in the embodiment of the present application does not change, and the user can be informed of the meaning of the verification code by not adopting an excessively complicated change manner. This makes it easier for the user to identify and, in addition, the difficulty of machine recognition due to character substitution.
- the verification code After the foregoing content, after the verification code is generated, it can be targeted to the corresponding operator (ie, the user). A check is made to distinguish whether the operator is a user or a computer program.
- the verification code may be displayed to the user in a corresponding verification interface (such as a login interface), and the user performs a corresponding operation according to the verification code, according to the calibration school.
- the verification information verifies the user's operation.
- the server of the service provider performs the character replacement operation on the verification code in the process of verifying the user, and the verification code generated by the character replacement method does not affect the individual of the user.
- the user is aware of the meaning therein, and the characters in the verification code of the embodiment of the present application do not adopt such methods as glyph distortion, color conversion, adding background, etc., so that the user can recognize the verification code more conveniently and accurately, and for the computer program.
- the character verification code after the character replacement may contain multiple types of characters, and does not conform to the usual syntax, thereby making it difficult for the computer program to effectively recognize the content represented by the verification code according to the recognition algorithm, thereby effectively reducing the content.
- the verification method provided in the embodiment of the present application improves the identifiability of the verification code, so that the user can intuitively know the meaning of the representation, thereby increasing user identification.
- the accuracy of the verification code reduces the time consuming of the verification process. At the same time, it increases the difficulty in recognizing the verification code by the computer program, and can effectively reduce the possibility of illegal operation of the computer program.
- the characters in the verification code are substantially homophonic or synonymously replaced, that is, in advance Establishing a correspondence between the variable character and the alternate character, specifically: determining, for any variable character, at least one homophonic character and/or synonym character of the variable character, and determining the homophone character and/or synonym A character is used as an alternate character of the variable character, and a correspondence with the variable character is established.
- the first character string described in the above content can be considered to be generated in advance according to the corresponding verification code generation rule, and stored in the database on the server side, and its schematic diagram is shown in FIG. 3.
- a verification code string is a character string composed of Chinese characters "enter two Chinese characters", assuming that all six Chinese characters in the string are Variable characters, in actual operation, only two of the variable characters "two” and “han” can be replaced, assuming that the two variable characters respectively have their own alternate characters: "two" and "weld", Thus, the second character string after replacing the variable character with the spare character becomes: "Enter two welding words”.
- variable string corresponds to different alternate characters
- a hybrid alternative can also be used, such as: replacing the first string “select two red balls” with “xuan select two hongs” begging".
- the verification code may be generated according to the second character string after the character replacement, and the verification code is generated according to the second character string, and the method further includes: generating a verification code of the specified format according to the second character string.
- the specified format includes at least one of a picture format and a text format.
- the user usually performs certain operations according to the verification code. For example, the user inputs a corresponding character string according to the verification code, or the user performs an operation according to the behavior indicated by the verification code. Whether the user inputs a string or performs some kind of operation, the server side needs to perform verification. In order to ensure the accuracy of the verification, the verification standard will be determined on the server side. It can be understood that the calibration verification information is a verification standard, and only the user's operation conforms to the verification standard before passing the verification.
- the user can input a corresponding character string according to the verification code displayed in the verification interface.
- the calibration verification information is the first character string
- the school is The user corresponding to the verification request performs verification, which includes: generating an input area on the interface for verifying the user, and acquiring a to-be-checked character string input by the user according to the verification code in the input area, according to The first character string is used to check the to-be-checked character string.
- the verification interface in this mode is shown, and it can be seen that the verification interface is The verification code and the corresponding input area are included, and the user inputs a corresponding character string in the input area according to the verification code to perform verification.
- the user according to the verification code “hong color” the verification code is the first Second string
- the verification code is the first Second string
- the user may perform a corresponding verification operation according to the verification code displayed in the verification interface.
- the calibration verification information includes: a preset The standard operation information is used to verify the user corresponding to the verification request, which includes: generating an operable verification code display area on the interface for verifying the user, and obtaining the user in the verification code display area And verifying, according to the calibration operation information, the operation information to be verified according to the operation information to be verified corresponding to the operation to be verified performed by the verification code.
- the verification interface includes an authentication code display area that is operable and carries a verification code.
- the user can perform the verification according to the behavior indicated by the verification code.
- the code display area issues a corresponding operation to be verified.
- the standard operation information is clicked for the operation controls "2" and "4", the user clicks on the verification code "click on the number of ou in the figure below", After the operation controls "2" and "4" in the verification code display area are clicked, they can pass the verification.
- the embodiment of the present application further provides a verification device based on the verification code.
- the verification device is disposed on a server side of a service provider, and the device includes:
- the receiving module 501 receives a verification request.
- the obtaining module 502 after receiving the verification request, acquiring a pre-generated first character string; wherein the first character string includes at least one variable character;
- the replacement module 503 according to the correspondence between the pre-established variable character and the spare character, will be part of Or replacing all variable characters with alternate characters to obtain a second character string;
- the verification module 504 generates a verification code according to the second character string, and performs verification on the user corresponding to the verification request.
- the apparatus further includes: an establishing module 505, for each variable character, determining at least one homophonic character and/or synonym character of the variable character, and determining the determined homophone character and/or synonym character as the Changing the alternate character of the character and establishing a correspondence with the variable character.
- the verification module 504 generates a verification code of a specified format according to the second character string.
- the specified format includes at least one of a picture format and a text format.
- the verification module 504 generates an input area on the interface for verifying the user, and acquires a to-be-checked character string input by the user according to the verification code in the input area, according to the first character string. And verifying the to-be-checked character string.
- the verification module 504 generates an operable verification code display area on the interface for verifying the user, and obtains an operation to be verified according to the verification code performed by the user in the verification code display area. Corresponding operation information to be verified, and verifying the operation information to be verified according to preset calibration operation information.
- PLD Programmable Logic Device
- FPGA Field Programmable Gate Array
- HDL Hardware Description Language
- ABEL Advanced Boolean Expression Language
- AHDL Altera Hardware Description Language
- HDCal JHDL
- Lava Lava
- Lola MyHDL
- PALASM RHDL
- VHDL Very-High-Speed Integrated Circuit Hardware Description Language
- Verilog Verilog
- the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor.
- computer readable program code eg, software or firmware
- examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
- the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
- Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
- a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
- the system, device, module or unit illustrated in the above embodiments may be specifically implemented by a computer chip or a real Realized by a body, or by a product with a certain function.
- a typical implementation device is a computer.
- the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- the application can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
- program modules include routines, programs, objects, components, data structures, and the like that perform particular transactions or implement particular abstract data types.
- the present application can also be practiced in distributed computing environments where transactions are performed by remote processing devices that are connected through a communication network.
- program modules can be located in both local and remote computer storage media including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- User Interface Of Digital Computer (AREA)
- Document Processing Apparatus (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
- 一种基于验证码的校验方法,其特征在于,所述方法包括:接收校验请求;当接收到所述校验请求后,获取预先生成的第一字符串;其中,所述第一字符串中包含至少一个可变字符;根据预先建立的可变字符与备用字符的对应关系,将部分或全部可变字符替换为备用字符,得到第二字符串;根据所述第二字符串生成验证码,对所述校验请求所对应的用户进行校验。
- 如权利要求1所述的方法,其特征在于,预先建立可变字符与备用字符的对应关系,具体包括:针对任一可变字符,确定该可变字符的至少一个同音字符和/或同义字符;将确定的所述同音字符和/或同义字符作为该可变字符的备用字符,并建立与所述可变字符的对应关系。
- 如权利要求2所述的方法,其特征在于,根据所述第二字符串生成验证码,具体包括:根据所述第二字符串,生成指定格式的验证码;其中,所述指定格式包括:图片格式、文本格式中的至少一种。
- 如权利要求1所述的方法,其特征在于,对所述校验请求所对应的用户进行校验,具体包括:在对用户进行校验的界面上,生成输入区域;获取用户在所述输入区域内根据所述验证码所输入的待校验字符串;根据所述第一字符串,对所述待校验字符串进行校验。
- 如权利要求1所述的方法,其特征在于,对所述校验请求所对应的用户进行校验,具体包括:在对用户进行校验的界面上,生成可操作的验证码展示区;获取所述用户在验证码展示区内,根据所述验证码所执行的待校验操作所对应的待校验操作信息;根据预设的标定操作信息,对所述待校验操作信息进行校验。
- 一种基于验证码的校验装置,其特征在于,所述装置包括:接收模块,接收校验请求;获取模块,当接收到所述校验请求后,获取预先生成的第一字符串;其中,所述第一字符串中包含至少一个可变字符;替换模块,根据预先建立的可变字符与备用字符的对应关系,将部分或全部可变字符替换为备用字符,得到第二字符串;校验模块,根据所述第二字符串生成验证码,对所述校验请求所对应的用户进行校验。
- 如权利要求6所述的装置,其特征在于,所述装置还包括:建立模块,针对任一可变字符,确定该可变字符的至少一个同音字符和/或同义字符,将确定的所述同音字符和/或同义字符作为该可变字符的备用字符,并建立与所述可变字符的对应关系。
- 如权利要求7所述的装置,其特征在于,所述校验模块,根据所述第二字符串,生成指定格式的验证码;其中,所述指定格式包括:图片格式、文本格式中的至少一种。
- 如权利要求6所述的装置,其特征在于,所述校验模块,在对用户进行校验的界面上,生成输入区域,获取用户在所述输入区域内根据所述验证码所输入的待校验字符串,根据所述第一字符串,对所述待校验字符串进行校验。
- 如权利要求6所述的装置,其特征在于,所述校验模块,在对用户进行校验的界面上,生成可操作的验证码展示区,获取所述用户在验证码展示区内,根据所述验证码所执行的待校验操作所对应的待校验操作信息,根据预设的标定操作信息,对所述待校验操作信息进行校验。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG11201905215TA SG11201905215TA (en) | 2016-12-08 | 2017-11-29 | Method and Apparatus for Verification Based on Verification Code |
EP17879427.7A EP3554000B1 (en) | 2016-12-08 | 2017-11-29 | Validation code based verification method and device |
ES17879427T ES2882535T3 (es) | 2016-12-08 | 2017-11-29 | Método y dispositivo de verificación basados en código de validación |
JP2019531108A JP6894511B2 (ja) | 2016-12-08 | 2017-11-29 | 検証コードに基づく検証方法および装置 |
KR1020197019777A KR102194072B1 (ko) | 2016-12-08 | 2017-11-29 | 검증 코드에 기초한 검증 방법 및 장치 |
PL17879427T PL3554000T3 (pl) | 2016-12-08 | 2017-11-29 | Sposób i urządzenie do weryfikacji oparte na kodzie walidacyjnym |
US16/393,839 US10719599B2 (en) | 2016-12-08 | 2019-04-24 | Verification code generation to improve recognition accuracy by a person and recognition difficulty by a computer program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611125263.0A CN106899411B (zh) | 2016-12-08 | 2016-12-08 | 一种基于验证码的校验方法及装置 |
CN201611125263.0 | 2016-12-08 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/393,839 Continuation US10719599B2 (en) | 2016-12-08 | 2019-04-24 | Verification code generation to improve recognition accuracy by a person and recognition difficulty by a computer program |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018103564A1 true WO2018103564A1 (zh) | 2018-06-14 |
Family
ID=59197816
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/113595 WO2018103564A1 (zh) | 2016-12-08 | 2017-11-29 | 一种基于验证码的校验方法及装置 |
Country Status (10)
Country | Link |
---|---|
US (1) | US10719599B2 (zh) |
EP (1) | EP3554000B1 (zh) |
JP (1) | JP6894511B2 (zh) |
KR (1) | KR102194072B1 (zh) |
CN (1) | CN106899411B (zh) |
ES (1) | ES2882535T3 (zh) |
PL (1) | PL3554000T3 (zh) |
SG (1) | SG11201905215TA (zh) |
TW (1) | TWI756266B (zh) |
WO (1) | WO2018103564A1 (zh) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899411B (zh) * | 2016-12-08 | 2021-09-21 | 创新先进技术有限公司 | 一种基于验证码的校验方法及装置 |
CN109087368B (zh) * | 2018-06-14 | 2023-04-07 | 创新先进技术有限公司 | 一种字符串图形化方法和装置 |
CN109117624A (zh) * | 2018-08-03 | 2019-01-01 | 上海掌门科技有限公司 | 生成验证码图像的方法、电子设备和计算机可读介质 |
CN109359274B (zh) * | 2018-09-14 | 2023-05-02 | 蚂蚁金服(杭州)网络技术有限公司 | 一种对批量生成的字符串进行识别的方法、装置及设备 |
CN109635256B (zh) * | 2018-12-20 | 2023-07-11 | 上海掌门科技有限公司 | 用于校验数据的方法和装置 |
US10496809B1 (en) | 2019-07-09 | 2019-12-03 | Capital One Services, Llc | Generating a challenge-response for authentication using relations among objects |
US10614207B1 (en) * | 2019-07-09 | 2020-04-07 | Capital One Services, Llc | Generating captcha images using variations of the same object |
CN110677239B (zh) * | 2019-08-26 | 2022-09-06 | 深圳市共进电子股份有限公司 | 一种验证码生成方法及装置 |
CN111177688B (zh) * | 2019-12-26 | 2022-10-14 | 微梦创科网络科技(中国)有限公司 | 一种基于形似语言混合字体的安全认证方法及装置 |
CN111611767B (zh) * | 2020-05-21 | 2023-04-25 | 北京百度网讯科技有限公司 | 验证方法和装置 |
CN111953647B (zh) * | 2020-06-22 | 2022-09-27 | 北京百度网讯科技有限公司 | 安全校验方法、装置、电子设备和存储介质 |
CN111966669B (zh) * | 2020-06-29 | 2024-03-15 | 浪潮通用软件有限公司 | 一种报表数据校验方法、设备及介质 |
CN114980099B (zh) * | 2020-12-02 | 2023-11-17 | 支付宝(杭州)信息技术有限公司 | 一种设备之间的连接方法、装置及设备 |
CN112685725B (zh) * | 2020-12-30 | 2022-12-06 | 上海掌门科技有限公司 | 一种安全验证的方法与设备 |
CN112966252B (zh) * | 2021-04-26 | 2023-11-24 | 平安国际智慧城市科技股份有限公司 | 一种基于密码技术的客户端验证方法、装置、电子设备及介质 |
CN114465762A (zh) * | 2021-12-24 | 2022-05-10 | 安徽航天信息有限公司 | 一种基于语境的验证码生成方法、装置及存储介质 |
CN115037515A (zh) * | 2022-04-29 | 2022-09-09 | 北京龙腾佳讯科技股份公司 | 开放数据网中无状态验证码验证方法、装置及电子设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104796252A (zh) * | 2014-01-20 | 2015-07-22 | 北京大学 | 可变数据标签防伪的方法、装置及其认证的方法、系统 |
KR101647027B1 (ko) * | 2015-03-02 | 2016-08-23 | 주식회사 사람들과사람들 | 기준지점 기반의 가변형 패턴을 이용한 사용자 인증 장치 및 그 방법 |
CN106156597A (zh) * | 2015-04-16 | 2016-11-23 | 深圳市腾讯计算机系统有限公司 | 一种验证码的实现方法,及装置 |
CN106899411A (zh) * | 2016-12-08 | 2017-06-27 | 阿里巴巴集团控股有限公司 | 一种基于验证码的校验方法及装置 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7890426B2 (en) | 2004-11-19 | 2011-02-15 | Vectorsgi, Inc. | Method and system for verifying check images |
US7552467B2 (en) * | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
US20110055585A1 (en) * | 2008-07-25 | 2011-03-03 | Kok-Wah Lee | Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering |
CN101895542B (zh) * | 2010-07-05 | 2013-03-20 | 北京畅游时空软件技术有限公司 | 一种验证码的获取方法及装置 |
CN102075507A (zh) * | 2010-07-30 | 2011-05-25 | 百度在线网络技术(北京)有限公司 | 一种用于基于词句验证图进行用户验证的方法与设备 |
WO2012029519A1 (ja) * | 2010-08-31 | 2012-03-08 | 楽天株式会社 | 応答判定装置、応答判定方法、応答判定プログラム、記録媒体、および、応答判定システム |
CN101976430A (zh) * | 2010-10-29 | 2011-02-16 | 赵俊平 | 一种图片验证码生成方法及其系统 |
US8885931B2 (en) * | 2011-01-26 | 2014-11-11 | Microsoft Corporation | Mitigating use of machine solvable HIPs |
WO2014107618A1 (en) * | 2013-01-04 | 2014-07-10 | Gary Stephen Shuster | Cognitive-based captcha system |
CN104283682A (zh) * | 2013-07-08 | 2015-01-14 | 深圳市腾讯计算机系统有限公司 | 一种利用验证码进行校验的方法、装置及系统 |
US9202076B1 (en) * | 2013-07-26 | 2015-12-01 | Symantec Corporation | Systems and methods for sharing data stored on secure third-party storage platforms |
US10061914B2 (en) * | 2014-11-14 | 2018-08-28 | Mcafee, Llc | Account recovery protocol |
TWI546693B (zh) | 2014-12-10 | 2016-08-21 | 英業達股份有限公司 | 整合驗證碼及密碼的登入系統及其方法 |
CN104794385A (zh) | 2015-03-03 | 2015-07-22 | 新浪网技术(中国)有限公司 | 一种信息验证方法及装置 |
CN104883351B (zh) | 2015-03-13 | 2019-02-12 | 小米科技有限责任公司 | 多因子认证方法和装置 |
-
2016
- 2016-12-08 CN CN201611125263.0A patent/CN106899411B/zh active Active
-
2017
- 2017-09-21 TW TW106132402A patent/TWI756266B/zh active
- 2017-11-29 PL PL17879427T patent/PL3554000T3/pl unknown
- 2017-11-29 JP JP2019531108A patent/JP6894511B2/ja active Active
- 2017-11-29 SG SG11201905215TA patent/SG11201905215TA/en unknown
- 2017-11-29 ES ES17879427T patent/ES2882535T3/es active Active
- 2017-11-29 WO PCT/CN2017/113595 patent/WO2018103564A1/zh unknown
- 2017-11-29 KR KR1020197019777A patent/KR102194072B1/ko active IP Right Grant
- 2017-11-29 EP EP17879427.7A patent/EP3554000B1/en active Active
-
2019
- 2019-04-24 US US16/393,839 patent/US10719599B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104796252A (zh) * | 2014-01-20 | 2015-07-22 | 北京大学 | 可变数据标签防伪的方法、装置及其认证的方法、系统 |
KR101647027B1 (ko) * | 2015-03-02 | 2016-08-23 | 주식회사 사람들과사람들 | 기준지점 기반의 가변형 패턴을 이용한 사용자 인증 장치 및 그 방법 |
CN106156597A (zh) * | 2015-04-16 | 2016-11-23 | 深圳市腾讯计算机系统有限公司 | 一种验证码的实现方法,及装置 |
CN106899411A (zh) * | 2016-12-08 | 2017-06-27 | 阿里巴巴集团控股有限公司 | 一种基于验证码的校验方法及装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3554000A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP3554000A4 (en) | 2019-11-06 |
EP3554000A1 (en) | 2019-10-16 |
KR102194072B1 (ko) | 2020-12-23 |
KR20190091529A (ko) | 2019-08-06 |
ES2882535T3 (es) | 2021-12-02 |
EP3554000B1 (en) | 2021-05-19 |
JP2020501279A (ja) | 2020-01-16 |
US10719599B2 (en) | 2020-07-21 |
US20190251243A1 (en) | 2019-08-15 |
CN106899411A (zh) | 2017-06-27 |
TW201822048A (zh) | 2018-06-16 |
JP6894511B2 (ja) | 2021-06-30 |
PL3554000T3 (pl) | 2021-11-02 |
CN106899411B (zh) | 2021-09-21 |
SG11201905215TA (en) | 2019-08-27 |
TWI756266B (zh) | 2022-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018103564A1 (zh) | 一种基于验证码的校验方法及装置 | |
AU2020215026B2 (en) | Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms | |
TWI724326B (zh) | 業務授權的方法、裝置及設備 | |
TW201918920A (zh) | 聲紋認證方法、帳號註冊方法及裝置 | |
TWI752228B (zh) | 資訊驗證處理方法、裝置、系統、客戶端及伺服器 | |
US10554657B1 (en) | Using an audio interface device to authenticate another device | |
WO2020238230A1 (zh) | 一种获取银行卡签约要素信息的方法、系统及设备 | |
Edu et al. | SkillVet: automated traceability analysis of Amazon Alexa skills | |
TW201629821A (zh) | 驗證使用者身份的方法、系統、用戶端及伺服器 | |
TW202109323A (zh) | 操作用戶識別方法、裝置及設備 | |
WO2021174969A1 (zh) | 一种校验方法、装置以及设备 | |
CN107025393A (zh) | 一种资源调用的方法及装置 | |
US20210397682A1 (en) | Secure Service Interaction | |
US11461503B2 (en) | Service processing method and apparatus | |
US10270771B1 (en) | Mid-session live user authentication | |
CN107483534B (zh) | 一种业务处理的方法及装置 | |
TWI732139B (zh) | 數位物件唯一識別碼(doi)展示和交易資訊校驗方法、裝置及設備 | |
CN104199778B (zh) | 测试软件注册算法错误的方法 | |
US20220051092A1 (en) | System and methods for translating error messages | |
TWM500291U (zh) | 電子裝置與伺服器 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17879427 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019531108 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197019777 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017879427 Country of ref document: EP Effective date: 20190708 |