WO2020134113A1 - 存储器、基于推理的验证码实现方法、装置和设备 - Google Patents

存储器、基于推理的验证码实现方法、装置和设备 Download PDF

Info

Publication number
WO2020134113A1
WO2020134113A1 PCT/CN2019/100469 CN2019100469W WO2020134113A1 WO 2020134113 A1 WO2020134113 A1 WO 2020134113A1 CN 2019100469 W CN2019100469 W CN 2019100469W WO 2020134113 A1 WO2020134113 A1 WO 2020134113A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification
objects
verification
verification code
user
Prior art date
Application number
PCT/CN2019/100469
Other languages
English (en)
French (fr)
Inventor
陈国庆
Original Assignee
武汉极意网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 武汉极意网络科技有限公司 filed Critical 武汉极意网络科技有限公司
Publication of WO2020134113A1 publication Critical patent/WO2020134113A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Definitions

  • the present application relates to the field of Internet information security, and in particular, to a memory, a method, an apparatus, and a device for implementing a verification code based on inference.
  • Verification code also known as a fully automatic Turing test that distinguishes computers from humans (Completely Automated Public Turing test to tell Computers and Humans Apart , CAPTCHA), is a public fully automatic program that distinguishes whether a user is a computer or a person.
  • the verification of the user's identity through the verification code technology can filter out malicious behaviors such as malicious password cracking, ticket sweeping, and forum irrigation.
  • verification codes have undergone various forms and technological innovations; the more popular forms include early character recognition verification codes, and the occurrence of sliding caused by the mouse dragging slider Trajectory to verify the method.
  • This method breaks through the previous scheme of static image verification codes, and establishes a behavior model to determine whether the corresponding access track belongs to a user or a machine script.
  • This kind of verification form trajectory collection is from the starting point of the slider to the target position, which is roughly a straight line trajectory, and the overall pixel length is about 220px. Suppose that each pixel collects a track point, so at most 220 track points need to be collected.
  • the purpose of the present application is to provide a memory, an inference-based verification code implementation method, device, and equipment, so as to overcome the shortcomings of a higher probability of being cracked by a computer when performing the verification code.
  • the present application provides a method for implementing a verification code based on inference, including the steps of:
  • the identification objects each include identification attributes in multiple dimensions;
  • the identification attributes include the identification object name, color, and One of the materials and any combination thereof;
  • the preset inference question includes a plurality of identification objects according to identification attributes of the identification objects and/or positional relationships between the identification objects Determining the target recognition object, and an operation prompt for the target recognition object;
  • the identified attributes further include:
  • One of the size, shape and type of the recognition object and any combination thereof is the size, shape and type of the recognition object and any combination thereof.
  • the determining the target recognition object from the plurality of recognition objects according to the recognition attributes of the recognition objects and/or the positional relationship between the recognition objects includes:
  • the user is asked to determine the reference identification object according to the description of the identification attribute; then the target identification object is inferred according to the positional relationship between the reference identification object and the target identification object.
  • the determining the target recognition object from the plurality of recognition objects according to the recognition attributes of the recognition objects and/or the positional relationship between the recognition objects includes:
  • the user is asked to determine the reference identification object according to the identification attribute; then the target identification object is inferred based on the positional relationship between the reference identification object and the target identification object and the description of the identification attribute.
  • the operation prompt for the target recognition object includes:
  • the positional relationship between the recognition objects includes:
  • each of the recognition objects is arranged in a plane composition, the relative up, down, left, and right positional relationship between adjacent recognition objects.
  • the positional relationship between the recognition objects includes:
  • the present application also provides an inference-based verification code implementation device, including:
  • An arranging unit for acquiring a plurality of identification objects, and arranging the plurality of identification objects in the verification operation area according to a preset position relationship;
  • the identification objects all include identification attributes of multiple dimensions;
  • the identification attributes include the identification objects One of the name, color and material of the or any combination thereof;
  • the title prompt unit is used to generate a verification instruction including a preset reasoning topic in the verification prompt area;
  • the preset reasoning topic includes the identification attributes of the identification object and/or the positional relationship between the identification objects. Determining the target identification object among the identification objects, and an operation prompt for the target identification object;
  • the judging unit is used to judge whether the user's determination and operation of the target recognition object are correct according to the user's mouse operation event;
  • the result generation module is used to generate a verification result according to the judgment result.
  • an embodiment of the present application further provides a memory, the memory includes a non-transitory computer-readable storage medium, the non-transitory computer-readable storage medium stores computer-executable instructions, the computer Executable instructions are used to perform the methods described in the above aspects and achieve the same technical effect.
  • the embodiments of the present application also provide an inference-based verification code implementation device.
  • the verification code implementation device includes a computer program stored on a memory, and the computer program includes program instructions. When the program When the instructions are executed by a computer, the computer is caused to perform the methods described in the above aspects and achieve the same technical effect.
  • the memory provided by the embodiments of the present application, the method, device and equipment for implementing the reasoning-based verification code first set up multiple identification objects with multi-dimensional identification attributes; in this way, when performing user verification, multiple verification objects are arranged in the verification area
  • the user can not only recognize the identification attributes of each identified object, such as the name, color and material of the item, but also be able to learn the positional relationship between the identified objects; for this reason, in the embodiments of the present application, It also generates verification instructions including preset inference questions in the verification prompt area; for example, the preset inference questions can be identification from multiple identification objects whose name is "box", material is "wood”, and color is "yellow” Recognize the object adjacent to the left of the object and click on it; thus prompting the user to determine the target recognition object from multiple recognition objects according to the reasoning topic and perform the corresponding operation.
  • the verification code in the prior art is a method of stitching pictures by dragging a slider to a certain length, and its motion trajectory is a one-dimensional straight line; the verification answer is a straight trajectory with different lengths, so a malicious computer program can pass Every verification length can be obtained by traversing all straight lines. In this way, there is a potential possibility for cracking the verification code, that is, in the prior art, the probability that the verification code is cracked by a malicious computer program is high.
  • the malicious program will not be able to obtain the user's operation behavior through traversal; therefore, through the embodiment of the present application, the probability of the malicious computer program passing the verification can be effectively reduced, which in turn improves the identity verification safety.
  • FIG. 1 is a schematic diagram of steps of a method for implementing an inference-based verification code provided by an embodiment of the present application
  • FIG. 2 is a schematic diagram of a verification picture provided by an embodiment of this application.
  • FIG. 3 is another schematic diagram of the verification picture provided by the embodiment of the present application.
  • FIG. 4 is another schematic diagram of the verification picture provided by the embodiment of the present application.
  • FIG. 5 is another schematic diagram of the verification picture provided by the embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a device for implementing a verification code based on inference provided by an embodiment of the present application
  • FIG. 7 is a schematic diagram of a hardware structure of a device for implementing an inference-based verification code provided by an embodiment of the present application.
  • FIG. 1 shows a flowchart of a method for implementing an inference-based verification code provided by an embodiment of the present application.
  • the method may be executed by an electronic device, such as a network device, a terminal device, or a server device.
  • the method may be performed by software or hardware installed in a network device, terminal device, or server device.
  • the server includes but is not limited to: a single server, a server cluster, etc. Referring to FIGS. 1 to 5, the method includes the following steps.
  • the identification objects include identification attributes in multiple dimensions; the identification attributes include the identification object name, color, and One of the materials and any combination of them.
  • the recognition object refers to something that people can recognize, such as some daily necessities, or as shown in FIG. 2, some commonly used graphics (including flat graphics and three-dimensional graphics); the recognition object may have The identification attributes of multiple dimensions, for example, each identification object has its own name, color, and material; in practical applications; the identification attributes can also include multiple types, such as the size, shape, and type of items.
  • multiple identification objects are arranged, which are identified from the multiple identification objects through description methods such as blue cylinders, green cones, yellow balls, and yellow cubes.
  • description methods such as blue cylinders, green cones, yellow balls, and yellow cubes.
  • a specific identification object such as blue cylinders, green cones, yellow balls, and yellow cubes.
  • the preset inference questions include multiple identifications based on identification attributes of the identified objects and/or positional relationships between the identified objects Among the objects, a target recognition object is determined, and an operation prompt for the target recognition object is given.
  • the verification description in Figure 2 reads: " Please click on the cylinder closest to the yellow sphere"; based on this description, the user can infer that the target recognition object should be located in the larger blue cylinder on the left side of the picture; at the same time, the user also knows that the target recognition object needs to be clicked .
  • the preset reasoning topic in the verification instructions may be set by first asking the user to determine the reference recognition object based on the description of the recognition attribute; then based on the reference recognition The positional relationship between the object and the target recognition object infers the target recognition object.
  • the preset inference questions may include: “First find the yellow ball (refer to the identification object), and then find the object closest to it”.
  • the preset reasoning topic in the verification instructions can also be set by asking the user to determine the reference identification object based on the identification attribute; then inferring from the positional relationship between the reference identification object and the target identification object and the description of the identification attribute Target recognition objects.
  • the default inference questions may include: “First find the yellow ball (refer to the identification object), and then find the cylinder closest to it".
  • the operation prompt for the target recognition object can be the operation behavior of clicking or dragging the target recognition object; in this way, a complete preset reasoning topic can be written as: "First find the yellow ball (reference Identify the object), and find the cylinder closest to it, and then click on the cylinder", or, "First find the yellow ball (refer to the identification object), and find the cylinder closest to it, and then drag the cylinder ".
  • the specific writing method of the preset reasoning topic in the embodiment of the present application can be set according to habits, and no specific format is limited here, as long as it includes identifying objects based on a reference Inferring the content of the target recognition object based on the positional relationship of, should be regarded as falling within the expression scope of the embodiments of the present application.
  • the positional relationship between the identification objects mentioned in the embodiments of the present application may specifically include: after each identification object is arranged in a plane composition, the relative up, down, left, and right positional relationship between adjacent identification objects; or, After the arrangement of each recognition object and the three-dimensional composition, the positional relationship between the front, back, up, down, left and right between adjacent recognition objects.
  • each recognition object in the verification picture of the verification operation area is visually on the same plane, and at this time, the positional relationship between the recognition objects may include, The relative up, down, left and right positional relationship between adjacent recognition objects.
  • the square is above the circle and the triangle is to the left of the circle.
  • each recognition object visually also has a front-to-back positional relationship.
  • the positional relationship between the identification objects It may include the front, back, up, down, left, and right positional relationship between adjacent recognition objects.
  • the green cone is behind the yellow cube and the yellow ball is behind the front of the yellow cube.
  • Figures 2 to 4 are the display content of the same verification picture in different links of the verification process. Each identification object is in a different figure, and the identification attributes displayed are unchanged; Figure 2 is used for The text part describing the color attributes of the recognition objects: "blue”, “green” and “yellow”, which will not appear in the verification picture in actual application, and is only for the convenience of explaining each recognition object in the drawing in FIG. 2 Color attributes.
  • S13 Determine whether the user's determination and operation of the target recognition object are correct according to the user's mouse operation event.
  • the user When the user performs the determination and corresponding operation of the target identification object in the verification operation area according to the prompt of the verification instruction, by acquiring the user's mouse operation event, it can be determined whether the user's determination and operation of the target identification object is correct. In other words, it can be judged whether the user finds the correct target recognition object, and whether the user has performed the correct operation on the target recognition object.
  • the identity verification method in the implementation of this application may be that, after the verification starts, the verification operation area that the user will see may be as shown in FIG. 2; Verification description After selecting the correct target recognition object, the verification operation area identifies the user's selection result as shown in Figure 3 (the target recognition object is a blue cylinder, in Figure 3, there is a circle on it After the user performs the corresponding operation (click), as shown in Figure 4, you can prompt the user to verify related information in a preset prompt bar (as shown in Figure 4, the lower part of the verification operation area The content is the prompt bar of "3.4 seconds more than 77% of users" to remind users of the verification results of this verification.
  • the embodiments of the present application first set up multiple identification objects with multi-dimensional identification attributes; in this way, when performing user authentication, after multiple identification objects are arranged in the verification area, the user can not only distinguish each identification object
  • the identification attributes of the object such as the name, color, and material of the item, can also know the positional relationship between the identification objects; for this reason, in the embodiment of the present application, the verification prompt area is also generated to include a preset reasoning question Description of verification; for example, the default reasoning question may be, from multiple identification objects, the identification object whose name is "box”, material is "wooden", and color is "yellow” is the adjacent identification object on the left and click on it ; This prompts the user to determine the target recognition object from multiple recognition objects and perform the corresponding operation according to the reasoning topic.
  • the verification code in the prior art is a method of stitching pictures by dragging a slider to a certain length, and its motion trajectory is a one-dimensional straight line; the verification answer is a straight trajectory with different lengths, so a malicious computer program can pass Every verification length can be obtained by traversing all straight lines. In this way, there is a potential possibility for cracking the verification code, that is, in the prior art, the probability that the verification code is cracked by a malicious computer program is high.
  • the device for implementing a verification code is a device corresponding to the method for implementing an inference-based verification code in Embodiment 1, that is, through virtual
  • the method of the device implements the reasoning-based verification code implementation method in Embodiment 1, and each virtual module constituting the reasoning-based verification code implementation device may be executed by an electronic device, such as a network device, a terminal device, or a server.
  • the inference-based verification code implementation device in the embodiment of the present application includes: an arrangement unit 01 for acquiring a plurality of identification objects, and arranging the plurality of identification objects in the verification operation area according to a preset position relationship;
  • the identification objects all include identification attributes in multiple dimensions;
  • the identification attributes include one or any combination of the identification object's name, color, and material;
  • the question prompting unit 02 is used to generate a preset reasoning topic in the verification prompt area Verification description of the;
  • the preset reasoning topic includes determining a target recognition object from a plurality of the recognition objects according to the recognition attributes of the recognition objects and/or the positional relationship between the recognition objects, and The operation prompt of the target recognition object;
  • the judgment unit 03 is used to judge whether the user's determination and operation of the target recognition object is correct according to the user's mouse operation event;
  • the result generation module 04 is used to generate a verification result according to the judgment result.
  • the memory may be a non-transitory (non-volatile) computer storage medium.
  • the computer storage medium stores computer-executable instructions.
  • the computer-executable instructions may perform any of the foregoing method implementations.
  • the reasoning-based verification code implements the steps of the method and achieves the same technical effect.
  • Embodiments of the present application provide an inference-based verification code implementation device.
  • the memory included in the inference-based verification code implementation device includes a corresponding computer program product, and the program instructions included in the computer program product are executed by a computer. , Enabling the computer to execute the reasoning-based verification code implementation method described in the above aspects, and achieve the same technical effect.
  • FIG. 7 is a schematic diagram of a hardware structure of an inference-based verification code implementation device as an electronic device according to an embodiment of the present application.
  • the device includes one or more processors 610 and a memory 620. Take a processor 610 as an example.
  • the device may further include: an input device 630 and an output device 640.
  • the processor 610, the memory 620, the input device 630, and the output device 640 may be connected through a bus or in other ways. In FIG. 7, connection through a bus is used as an example.
  • the memory 620 is a non-transitory computer-readable storage medium and can be used to store non-transitory software programs, non-transitory computer executable programs, and modules.
  • the processor 610 executes non-transitory software programs, instructions, and modules stored in the memory 620 to execute various functional applications and data processing of the electronic device, that is, to implement the processing methods of the foregoing method embodiments.
  • the memory 620 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data, and the like.
  • the memory 620 may include a high-speed random access memory, and may also include a non-transitory memory, such as at least one magnetic disk storage device, a flash memory device, or other non-transitory solid-state storage devices.
  • the memory 620 may optionally include memories remotely provided with respect to the processor 610, and these remote memories may be connected to the processing device through a network. Examples of the aforementioned network include, but are not limited to, the Internet, intranet, local area network, mobile communication network, and combinations thereof.
  • the input device 630 can receive input digital or character information, and generate signal input.
  • the output device 640 may include a display device such as a display screen.
  • the one or more modules are stored in the memory 620, and when executed by the one or more processors 610, execute:
  • the identification objects all include identification attributes in multiple dimensions;
  • the identification attributes include identification One of the name, color and material of the object and any combination thereof;
  • the preset inference question includes a plurality of identification objects according to identification attributes of the identification objects and/or positional relationships between the identification objects Determining the target recognition object, and an operation prompt for the target recognition object;
  • the electronic devices in the embodiments of the present application exist in various forms, including but not limited to the following devices.
  • Mobile communication equipment The characteristic of this type of equipment is that it has mobile communication functions, and its main goal is to provide voice and data communication.
  • Such terminals include: smart phones (such as iPhone series smart phones developed by Apple), multimedia phones, functional phones, and low-end phones.
  • Ultra-mobile personal computer equipment This type of equipment belongs to the category of personal computers, has computing and processing functions, and generally has the characteristics of mobile Internet access.
  • Such terminals include: Pocket PC (Personal Digital Assistant (PDA), mobile Internet devices (Mobile Internet Device, MID) and Ultra-mobile Personal Computer (UMPC) devices, such as the iPad series of tablet computers designed by Apple.
  • PDA Personal Digital Assistant
  • MID Mobile Internet Device
  • UMPC Ultra-mobile Personal Computer
  • Portable entertainment devices These devices can display and play multimedia content. Such devices include: audio and video players (such as the Apple player designed by Apple (internet portable audio device, iPod)), handheld game consoles, e-books, and smart toys and portable car navigation devices.
  • audio and video players such as the Apple player designed by Apple (internet portable audio device, iPod)
  • Apple Apple (internet portable audio device, iPod)
  • handheld game consoles such as the Apple player designed by Apple (internet portable audio device, iPod)
  • e-books such as the Apple player designed by Apple (internet portable audio device, iPod)
  • smart toys and portable car navigation devices such as the Apple player designed by Apple (internet portable audio device, iPod)
  • Server a device that provides computing services.
  • the composition of the server includes a processor, hard disk, memory, system bus, etc.
  • the server is similar to a general-purpose computer architecture, but due to the need to provide highly reliable services, the processing power and stability , Reliability, security, scalability, manageability and other aspects are higher.
  • the device embodiments described above are only schematics, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located One place, or it can be distributed to multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each embodiment can be implemented by means of software plus a general hardware platform, and of course, it can also be implemented by hardware.
  • the above technical solutions can be embodied in the form of software products in essence or part of contributions to related technologies, and the computer software products can be stored in computer-readable storage media, such as ROM/RAM, magnetic disks , CD-ROM, etc., including several instructions to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in the various embodiments or some parts of the embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本申请公开了存储器、基于推理的验证码实现方法、装置和设备,其中所述验证码实现方法包括在验证操作区加载多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于所述验证操作区;在验证提示区生成包括预设推理题目的验证说明;根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;根据判断结果生成验证结果。本申请使得恶意程序将无法通过遍历的方式来获得用户的操作行为;因此,通过本申请实施例,可以有效的降低恶意计算机程序通过验证的几率,进而也就提高了身份验证的安全性。

Description

存储器、基于推理的验证码实现方法、装置和设备
本申请要求于2018年12月28日提交中国专利局、申请号为201811626605.6、发明名称为“存储器、基于推理的验证码实现方法、装置和设备”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本申请涉及一种互联网信息安全领域,特别是涉及存储器、基于推理的验证码实现方法、装置和设备。
背景技术
验证码,又称全自动区分计算机和人类的图灵测试(Completely Automated Public Turing test to tell Computers and Humans Apart ,CAPTCHA),是一种区分用户是计算机还是人的公共全自动程序。
通过验证码技术对用户身份进行验证,可以滤除恶意破解密码、刷票和论坛灌水等恶意行为。
验证码作为人机识别的一项重要技术和应用,经历了多种形式和技术革新;比较普及的形式包括早期的字符识别验证码,以及,出现了采集鼠标拖动滑块时所产生的滑动轨迹来验证的方法。这种方法突破了以往静态图片验证码的方案,通过建立行为模型来判定对应的访问轨迹是属于真是用户还是机器脚本。这种验证形式的轨迹采集,是从滑块起始点位置到目标位置,大致是一条直线轨迹,整体的像素长度在220px左右。假设每一个像素点采集一个轨迹点,这样最多也就需要采集220个轨迹点。
发明人经过研究发现,现有技术中至少还存在以下缺陷:
随着计算机的图形识别技术和处理能力的不断发展,从而导致上述现有技术中的验证码实现方式被计算机破解的几率较高,从而造成用户身份认证的安全隐患。
公开于该背景技术部分的信息仅仅旨在增加对本申请的总体背景的理解,而不应当被视为承认或以任何形式暗示该信息构成已为本领域一般技术人员所公知的现有技术。
发明内容
本申请的目的在于提供了存储器、基于推理的验证码实现方法、装置和设备,从而克服在进行验证码时被计算机破解的几率较高的缺点。
为实现上述目的,根据本申请的第一方面,本申请提供了一种基于推理的验证码实现方法,包括步骤:
获取多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于验证操作区;所述辨识对象均包括多个维度的辨识属性;所述辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合;
在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示;
根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;
根据判断结果生成验证结果。
进一步,上述技术方案中,所述获辨识属性还包括:
所述辨识对象的大小、形状和种类中的一种及其任意组合。
进一步,上述技术方案中,所述根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标识别对象,包括:
请用户根据辨识属性的描述判断出参考辨识对象;然后根据所述参考辨识对象和目标辨识对象的位置关系推断出目标辨识对象。
进一步,上述技术方案中,所述根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标识别对象,包括:
请用户根据辨识属性来判断出参考辨识对象;然后根据所述参考辨识对象和目标辨识对象的位置关系,以及辨识属性的描述推断出目标辨识对象。
进一步,上述技术方案中,所述对所述目标辨识对象的操作提示包括:
对于所述目标辨识对象的点击或拖动。
进一步,上述技术方案中,所述辨识对象之间的位置关系,包括:
各所述辨识对象布置平面构图后,相邻辨识对象之间相对的上、下、左和右的位置关系。
进一步,上述技术方案中,所述辨识对象之间的位置关系,包括:
各所述辨识对象布置与三维立体构图后,相邻辨识对象之间的前、后、上、下、左和右的位置关系。
根据本申请的第二方面,本申请还提供了一种基于推理的验证码实现装置,包括:
布置单元,用于获取多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于验证操作区;所述辨识对象均包括多个维度的辨识属性;所述辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合;
题目提示单元,用于在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示;
判断单元,用于根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;
结果生成模块,用于根据判断结果生成验证结果。
为解决以上技术问题,本申请实施例还提供了一种存储器,所述存储器包括非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于执行以上各个方面所述的方法,并实现相同的技术效果。
为解决以上技术问题,本申请实施例还提供了一种基于推理的验证码实现设备,所述验证码实现设备包括存储在存储器上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行以上各个方面所述的方法,并实现相同的技术效果。
有益效果
本申请实施例提供的存储器、基于推理的验证码实现方法、装置和设备,首先设置了分别具有多维度辨识属性的多个辨识对象;这样,在进行用户验证时,在验证区布置了多个辨识对象后,用户不但能够分辨每个辨识对象所具有的辨识属性,如,物品的名称、颜色和材质等,还能够获知辨识对象之间的位置关系;为此,在本申请实施例中,还在验证提示区生成包括预设推理题目的验证说明;比如,预设推理题目可以是,从多个辨识对象中确定名称是“盒子”、材质是“木质”,颜色是“黄色”的辨识对象的左边相邻的辨识对象并点击它;从而提示用户按照推理题目从多个辨识对象中确定目标辨识对象并执行相应的操作。
现有技术中的验证码,是通过拖动滑块一定的长度来拼接图片的验证方式中,其运动轨迹为一维的直线;验证答案是具有不同长度直线轨迹,因此,恶意计算机程序可以通过遍历所有直线长度即可获得每一次的验证结果。这样,就为破解验证码带来潜在的可能性,即,现有技术中,验证码被计算机恶意程序破解的几率较高。
通过本申请实施例,使得恶意程序将无法通过遍历的方式来获得用户的操作行为;因此,通过本申请实施例,可以有效的降低恶意计算机程序通过验证的几率,进而也就提高了身份验证的安全性。
根据下面参考附图对示例性实施例的详细说明,本申请的其它特征及方面将变得清楚。
附图说明
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。
图1为本申请实施例提供的基于推理的验证码实现方法的步骤示意图;
图2为本申请实施例提供的验证图片的示意图;
图3为本申请实施例提供的验证图片的又一示意图;
图4为本申请实施例提供的验证图片的又一示意图;
图5为本申请实施例提供的验证图片的又一示意图;
图6为本申请实施例提供的基于推理的验证码实现装置的结构示意图;
图7为本申请实施例提供的基于推理的验证码实现设备硬件结构示意图。
具体实施方式
下面结合附图,对本申请的具体实施方式进行详细描述,但应当理解本申请的保护范围并不受具体实施方式的限制。
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。除非另有其它明确表示,否则在整个说明书和权利要求书中,术语“包括”或其变换如“包含”或“包括有”等等将被理解为包括所陈述的元件或组成部分,而并未排除其它元件或其它组成部分。
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。
另外,为了更好的说明本申请,在下文的具体实施方式中给出了众多的具体细节。本领域技术人员应当理解,没有某些具体细节,本申请同样可以实施。在一些实例中,对于本领域技术人员熟知的方法、手段、元件未作详细描述,以便于凸显本申请的主旨。
实施例1
图1示出本申请实施例提供的基于推理的验证码实现方法的流程图,该方法可以由电子设备执行,例如网络设备、终端设备或服务端设备等。换言之,所述方法可以由安装在网络设备、终端设备或服务端设备的软件或硬件来执行。所述服务端包括但不限于:单台服务器、服务器集群等。参考图1至图5,该方法包括以下步骤。
S11、在验证操作区加载多个辨识对象,并将多个辨识对象按照预设位置关系布置于验证操作区;辨识对象均包括多个维度的辨识属性;辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合。
在本申请实施例中,辨识对象是指人们能够识别的事物,比如可以是一些日常用品,也可以如图2所示,是一些常用的图形(包括平面图形和立体图形);辨识对象可以具有多个维度的辨识属性,比如每个辨识对象都具有其自己的名称、颜色和材质;在实际应用中;辨识属性还可以包括有多种,比如是物品的大小、形状、和种类等等。
以图2为例,在其验证操作区,布置有多个辨识对象,通过蓝色的圆柱体、绿色的圆锥体、黄色的圆球以及黄色正方体等描述方式来从多个辨识对象中标识出某一特定的辨识对象。
S12、在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示。
图2中的验证说明的内容为:“ 请点击最靠近黄色圆球的圆柱体”;用户根据该描述,可以推理出目标辨识对象应当位于图片中左侧那个蓝色的较大的圆柱体;同时,用户还知道需要点击该目标辨识对象。
进一步的,为了能够快速而准确的引导用户找到目标辨识对象,验证说明中的预设推理题目的设定方式可以是,首先请用户根据辨识属性的描述判断出参考辨识对象;然后再根据参考辨识对象和目标辨识对象的位置关系推断出目标辨识对象。举例来说,预设推理题目可以包括:“先找到黄色圆球(参考辨识对象),再找到距离它最近的物体”。
此外,验证说明中的预设推理题目的设定方式还可以是,请用户根据辨识属性来判断出参考辨识对象;然后根据参考辨识对象和目标辨识对象的位置关系,以及辨识属性的描述推断出目标辨识对象。举例来说,预设推理题目可以包括:“先找到黄色圆球(参考辨识对象),再找到距离它最近的圆柱体”。
在实际应用中,对目标辨识对象的操作提示可以是对于目标辨识对象的点击或拖动等操作行为;这样,一个完整的预设推理题目的撰写方式可以是:“先找到黄色圆球(参考辨识对象),并找到距离它最近的圆柱体,然后点击该圆柱体”,或是,“先找到黄色圆球(参考辨识对象),并找到距离它最近的圆柱体,然后拖动该圆柱体”。
需要说明的是,本申请实施例中的预设推理题目的具体行文方式,本领域人员可以根据习惯设定,在此并不做具体的格式上的限定,只要是包括了根据一个参考辨识对象的位置关系推理出目标辨识对象的内容,即应视为落入本申请实施例的表达范围。
本申请实施例中提及的辨识对象之间的位置关系,具体可以包括:各辨识对象布置平面构图后,相邻辨识对象之间相对的上、下、左和右的位置关系;或是,各辨识对象布置与三维立体构图后,相邻辨识对象之间的前、后、上、下、左和右的位置关系。
具体来说,参考图5,当验证操作区的验证图片中多个辨识对象为平面构图的时候,在视觉上各辨识对象均处于同一平面,此时,辨识对象之间的位置关系可以包括,相邻辨识对象之间相对的上、下、左和右的位置关系。举例来说,图5中,正方形在圆形的上面,三角形在圆形的左边。
参考图2至图4,当验证操作区的验证图片中多个辨识对象为三维立体构图的时候,在视觉上各辨识对象还具有了前后的位置关系,此时,辨识对象之间的位置关系可以包括,相邻辨识对象之间的前、后、上、下、左和右的位置关系。举例来说,参考图2中的,绿色圆锥体在黄色正方体的后面,黄色圆球在黄色正方体的前面的后面。
需要说明的是,图2至图4为同一个验证图片在验证过程中不同环节的显示内容,每个辨识对象在不同的图中,其显示出的辨识属性不变;图2中的用于说明辨识对象的颜色属性的文字部分:“蓝色”、“绿色”和“黄色”,在实际应用中的验证图片中并不会出现,在图2中只是为了便于说明附图中各个辨识对象的颜色属性。
S13、根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确。
当用户根据验证说明的提示,在验证操作区进行了目标辨识对象的确定和相应的操作,通过获取用户的鼠标操作事件,可以判断用户对于目标辨识对象的确定和操作是否正确。也就是说可以判断用户是否找到的正确的目标辨识对象,以及,用户是否对目标辨识对象进行了正确的操作。
S14、根据判断结果生成验证结果。
当判断结果为是的时候,认为用户端的验证操作是由用户人工操作实现的,因此验证通过;当判断结果为否的时候,认为用户端的这些操作可能并非由用户人工实现,因此验证失败。
以图2至图4为中所示出验证操作区为例,本申请实施中的身份验证方式可以是,验证开始后,用户会所看到的验证操作区可以如图2所示;当用户根据验证说明选定了正确的目标辨识对象后,验证操作区如图3所示标识出了用户的选定结果(目标辨识对象为蓝色的圆柱体,在图3中,其上有一个圆形的标识标志);当用户执行了相应的操作(点击)以后,如图4所示,可以在一个预设的提示栏中提示用户验证相关的信息(如图4中,其验证操作区的下部内容为“3.4秒的速度超多77%的用户”的提示栏)来提示用户本次验证的验证结果。
综上所述,本申请实施例首先设置了分别具有多维度辨识属性的多个辨识对象;这样,在进行用户验证时,在验证区布置了多个辨识对象后,用户不但能够分辨每个辨识对象所具有的辨识属性,如,物品的名称、颜色和材质等,还能够获知辨识对象之间的位置关系;为此,在本申请实施例中,还在验证提示区生成包括预设推理题目的验证说明;比如,预设推理题目可以是,从多个辨识对象中确定名称是“盒子”、材质是“木质”,颜色是“黄色”的辨识对象的左边相邻的辨识对象并点击它;从而提示用户按照推理题目从多个辨识对象中确定目标辨识对象并执行相应的操作。
现有技术中的验证码,是通过拖动滑块一定的长度来拼接图片的验证方式中,其运动轨迹为一维的直线;验证答案是具有不同长度直线轨迹,因此,恶意计算机程序可以通过遍历所有直线长度即可获得每一次的验证结果。这样,就为破解验证码带来潜在的可能性,即,现有技术中,验证码被计算机恶意程序破解的几率较高。
实施例2
图6示出本申请实施例提供的基于推理的验证码实现装置的结构示意图,所述验证码实现装置为与实施例1中所述基于推理的验证码实现方法对应的装置,即,通过虚拟装置的方式实现实施例1中所基于推理的验证码实现方法,构成所述基于推理的验证码实现装置的各个虚拟模块可以由电子设备执行,例如网络设备、终端设备、或服务器。
具体来说,本申请实施例中的基于推理的验证码实现装置包括:布置单元01用于获取多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于验证操作区;所述辨识对象均包括多个维度的辨识属性;所述辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合;题目提示单元02用于在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示;判断单元03用于根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;结果生成模块04用于根据判断结果生成验证结果。
由于本申请实施例中基于推理的验证码实现装置的工作原理和有益效果已经在实施例1中的基于推理的验证码实现方法中也进行了记载和说明,因此可以相互参照。
实施例3
本申请实施例提供了一种存储器,所述存储器可以是非暂态(非易失性)计算机存储介质,所述计算机存储介质存储有计算机可执行指令,该计算机可执行指令可执行上述任意方法实施例中基于推理的验证码实现方法的各个步骤,并实现相同的技术效果。
实施例4
本申请实施例提供了一种基于推理的验证码实现设备,基于推理的验证码实现设备所包括的存储器中,包括有相应的计算机程序产品,所述计算机程序产品所包括程序指令被计算机执行时,可使所述计算机执行以上各个方面所述的基于推理的验证码实现方法,并实现相同的技术效果。
图7是本申请实施例作为电子设备的基于推理的验证码实现设备的硬件结构示意图,如图7所示,该设备包括一个或多个处理器610以及存储器620。以一个处理器610为例。该设备还可以包括:输入装置630和输出装置640。
处理器610、存储器620、输入装置630和输出装置640可以通过总线或者其他方式连接,图7中以通过总线连接为例。
存储器620作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序、非暂态计算机可执行程序以及模块。处理器610通过运行存储在存储器620中的非暂态软件程序、指令以及模块,从而执行电子设备的各种功能应用以及数据处理,即实现上述方法实施例的处理方法。
存储器620可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储数据等。此外,存储器620可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施例中,存储器620可选包括相对于处理器610远程设置的存储器,这些远程存储器可以通过网络连接至处理装置。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置630可接收输入的数字或字符信息,以及产生信号输入。输出装置640可包括显示屏等显示设备。
所述一个或者多个模块存储在所述存储器620中,当被所述一个或者多个处理器610执行时,执行:
在验证操作区加载多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于所述验证操作区;所述辨识对象均包括多个维度的辨识属性;所述辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合;
在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示;
根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;
根据判断结果生成验证结果。
上述产品可执行本申请实施例所提供的方法,具备执行方法相应的功能模块和有益效果。未在本实施例中详尽描述的技术细节,可参见本申请实施例所提供的方法。
本申请实施例的电子设备以多种形式存在,包括但不限于以下设备。
(1)移动通信设备:这类设备的特点是具备移动通信功能,并且以提供话音、数据通信为主要目标。这类终端包括:智能手机(例如苹果公司研发的iPhone系列的智能手机)、多媒体手机、功能性手机,以及低端手机等。
(2)超移动个人计算机设备:这类设备属于个人计算机的范畴,有计算和处理功能,一般也具备移动上网特性。这类终端包括:掌上电脑(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)和超级移动个人计算机(Ultra-mobile Personal Computer,UMPC)设备等,例如苹果公司设计的iPad系列的平板电脑。
(3)便携式娱乐设备:这类设备可以显示和播放多媒体内容。该类设备包括:音频、视频播放器(例如苹果公司设计的苹果播放器(internet portable audio device,iPod)),掌上游戏机,电子书,以及智能玩具和便携式车载导航设备。
(4)服务器:提供计算服务的设备,服务器的构成包括处理器、硬盘、内存、系统总线等,服务器和通用的计算机架构类似,但是由于需要提供高可靠的服务,因此在处理能力、稳定性、可靠性、安全性、可扩展性、可管理性等方面要求较高。
(5)其他具有数据交互功能的电子装置。
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (10)

  1. 一种基于推理的验证码实现方法,其特征在于,包括步骤:
    在验证操作区加载多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于所述验证操作区;所述辨识对象均包括多个维度的辨识属性;所述辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合;
    在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示;
    根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;
    根据判断结果生成验证结果。
  2. 根据权利要求1所述的基于推理的验证码实现方法,其特征在于,所述获辨识属性还包括:
    所述辨识对象的大小、形状和种类中的一种及其任意组合。
  3. 根据权利要求1中所述的基于推理的验证码实现方法,其特征在于,所述根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标识别对象,包括:
    请用户根据辨识属性的描述判断出参考辨识对象;然后根据所述参考辨识对象和目标辨识对象的位置关系推断出目标辨识对象。
  4. 根据权利要求1中所述的基于推理的验证码实现方法,其特征在于,所述根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标识别对象,包括:
    请用户根据辨识属性来判断出参考辨识对象;然后根据所述参考辨识对象和目标辨识对象的位置关系,以及辨识属性的描述推断出目标辨识对象。
  5. 根据权利要求1中所述的基于推理的验证码实现方法,其特征在于,所述对所述目标辨识对象的操作提示包括:
    对于所述目标辨识对象的点击或拖动。
  6. 根据权利要求1中所述的基于推理的验证码实现方法,其特征在于,所述辨识对象之间的位置关系,包括:
    各所述辨识对象布置平面构图后,相邻辨识对象之间相对的上、下、左和右的位置关系。
  7. 根据权利要求1中所述的基于推理的验证码实现方法,其特征在于,所述辨识对象之间的位置关系,包括:
    各所述辨识对象布置与三维立体构图后,相邻辨识对象之间的前、后、上、下、左和右的位置关系。
  8. 一种基于推理的验证码实现装置,其特征在于,包括:
    布置单元,用于获取多个辨识对象,并将所述多个辨识对象按照预设位置关系布置于验证操作区;所述辨识对象均包括多个维度的辨识属性;所述辨识属性包括辨识对象的名称、颜色和材质中的一种及其任意组合;
    题目提示单元,用于在验证提示区生成包括预设推理题目的验证说明;所述预设推理题目包括根据所述辨识对象的辨识属性和/或所述辨识对象之间的位置关系,从多个所述辨识对象中确定目标辨识对象,以及,对所述目标辨识对象的操作提示;
    判断单元,用于根据用户的鼠标操作事件判断用户对于目标辨识对象的确定和操作是否正确;
    结果生成模块,用于根据判断结果生成验证结果。
  9. 一种存储器,其特征在于,包括指令集,所述指令集适于处理器执行如权利要求1至7中任一所述基于推理的验证码实现方法中的步骤。
  10. 一种基于推理的验证码实现设备,其特征在于,包括总线、通信模块、处理器和如权利要求9中所述存储器;
    所述总线用于连接所述存储器、所述通信模块和所述处理器;
    所述通信模块用于与客户端进行通信;
    所述处理器用于执行所述存储器中的指令集。
PCT/CN2019/100469 2018-12-28 2019-08-14 存储器、基于推理的验证码实现方法、装置和设备 WO2020134113A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811626605.6 2018-12-28
CN201811626605.6A CN111382413A (zh) 2018-12-28 2018-12-28 存储器、基于推理的验证码实现方法、装置和设备

Publications (1)

Publication Number Publication Date
WO2020134113A1 true WO2020134113A1 (zh) 2020-07-02

Family

ID=71126097

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/100469 WO2020134113A1 (zh) 2018-12-28 2019-08-14 存储器、基于推理的验证码实现方法、装置和设备

Country Status (2)

Country Link
CN (1) CN111382413A (zh)
WO (1) WO2020134113A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013165317A1 (en) * 2012-05-03 2013-11-07 C3S Pte. Ltd. Method and system for protecting a password during an authentication process
CN103902875A (zh) * 2014-03-04 2014-07-02 百度在线网络技术(北京)有限公司 验证码图片的生成方法和装置及验证方法和装置
CN106936575A (zh) * 2015-12-29 2017-07-07 张仁平 一种让智能化程序难以识别的验证码系统
CN107229857A (zh) * 2016-03-25 2017-10-03 宇龙计算机通信科技(深圳)有限公司 一种验证码的生成方法和装置
CN109670291A (zh) * 2017-10-17 2019-04-23 腾讯科技(深圳)有限公司 一种验证码的实现方法、装置及存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095726B (zh) * 2014-05-08 2018-05-11 阿里巴巴集团控股有限公司 生成验证码的方法及装置
CN105787340B (zh) * 2016-03-18 2018-09-18 厦门大学嘉庚学院 基于文本粘连与视觉补偿的图片验证码实现方法
CN107317805A (zh) * 2017-06-21 2017-11-03 北京洋浦伟业科技发展有限公司 一种验证码验证方法及装置
CN108159700B (zh) * 2018-01-23 2021-09-24 网易(杭州)网络有限公司 生成验证码的方法、装置、存储介质、处理器及终端
CN108512850A (zh) * 2018-04-02 2018-09-07 广东能龙教育股份有限公司 一种基于问答题目的智能验证码的处理方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013165317A1 (en) * 2012-05-03 2013-11-07 C3S Pte. Ltd. Method and system for protecting a password during an authentication process
CN103902875A (zh) * 2014-03-04 2014-07-02 百度在线网络技术(北京)有限公司 验证码图片的生成方法和装置及验证方法和装置
CN106936575A (zh) * 2015-12-29 2017-07-07 张仁平 一种让智能化程序难以识别的验证码系统
CN107229857A (zh) * 2016-03-25 2017-10-03 宇龙计算机通信科技(深圳)有限公司 一种验证码的生成方法和装置
CN109670291A (zh) * 2017-10-17 2019-04-23 腾讯科技(深圳)有限公司 一种验证码的实现方法、装置及存储介质

Also Published As

Publication number Publication date
CN111382413A (zh) 2020-07-07

Similar Documents

Publication Publication Date Title
WO2020164281A1 (zh) 基于文字定位识别的表格解析方法、介质及计算机设备
WO2020189884A1 (en) Machine learning-based approach to demographic attribute inference using time-sensitive features
CN104298910B (zh) 便携式电子装置及互动式人脸登入方法
WO2020134114A1 (zh) 存储器、验证码实现方法、装置和设备
WO2017160133A2 (ko) 게시물 랭킹설정 방법 및 이를 위한 서비스 서버
WO2019164119A1 (ko) 전자 장치 및 그 제어 방법
WO2015126022A1 (ko) 완구 조립영상 제공방법
EP3408752A1 (en) Object management and visualization using a computing device
CN110413249A (zh) 声音输入装置以及远程交互系统
WO2015093754A1 (ko) 전자 장치에서 연결 정보를 공유하는 방법 및 장치
WO2020134113A1 (zh) 存储器、基于推理的验证码实现方法、装置和设备
WO2021017277A1 (zh) 一种图片截取方法、装置及计算机存储介质
WO2018182072A1 (ko) 가상현실 및 증강현실 콘텐츠에서 학습 데이터를 추출하는 시스템 및 방법
CN112016077A (zh) 一种基于滑动轨迹模拟的页面信息获取方法、装置和电子设备
WO2023011300A1 (zh) 记录观看视频的人脸表情的方法和装置
WO2019225799A1 (ko) 딥러닝 생성 모델을 이용한 사용자 정보 삭제 방법 및 장치
WO2019194569A1 (ko) 이미지 검색 방법, 장치 및 컴퓨터 프로그램
WO2011115412A2 (en) Apparatus and method for producing user-defined golf course, server for producing user-defined golf course and virtual golf simulation method using the golf course
WO2014014232A1 (ko) 게임 방식 캡차 장치 및 방법
WO2018034509A1 (ko) 웹 브라우저에서 구현되는 웹사이트 제작 방법 및 시스템
WO2020062655A1 (zh) 爬虫识别方法、装置、设备及非易失性可读存储介质
WO2022105097A1 (zh) 视频流处理方法及装置、电子设备、存储介质及计算机程序
WO2019033718A1 (zh) 第三方信息通知方法、系统及计算机可读存储介质
WO2021149923A1 (ko) 영상 검색 제공 방법 및 장치
WO2024101667A1 (ko) 미디어 파일로부터 추출한 텍스트를 이용하여 미디어 메시지를 검색하는 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19905966

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19905966

Country of ref document: EP

Kind code of ref document: A1