WO2020155772A1 - 验证图片发送方法、合成方法及装置、存储介质和终端 - Google Patents

验证图片发送方法、合成方法及装置、存储介质和终端 Download PDF

Info

Publication number
WO2020155772A1
WO2020155772A1 PCT/CN2019/118391 CN2019118391W WO2020155772A1 WO 2020155772 A1 WO2020155772 A1 WO 2020155772A1 CN 2019118391 W CN2019118391 W CN 2019118391W WO 2020155772 A1 WO2020155772 A1 WO 2020155772A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
picture
pictures
verification
number sequence
Prior art date
Application number
PCT/CN2019/118391
Other languages
English (en)
French (fr)
Inventor
黎立桂
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020155772A1 publication Critical patent/WO2020155772A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • This application relates to the field of computer technology. Specifically, this application relates to a verification image sending method, synthesis method and device, storage medium and terminal.
  • Image verification is a commonly used verification method, so increasing the difficulty of machine recognition of images is an important checkpoint for ensuring defense security.
  • the existing image verification methods have the following problems:
  • the original verification picture is not disturbed, and the machine can directly obtain the original picture; the machine can decrypt the verification data of the picture after identifying the readable instructions. For example, through crawler technology, the path of the original picture is captured, and then the original picture is binarized by cracking the readable instructions to obtain the coordinate data of the verification data in the original picture; and further forging the verification data, You can launch a malicious attack through the checkpoint verified by the picture.
  • the password for restoring on the client is fixed, or the rule of generating the password is fixed, or even the password is not restored, which will cause the picture data to be easily leaked and cause the risk of leakage.
  • the password is fixed, or the original verification picture is disrupted but the law of the password remains the same, some illegal users can crack all the passwords once and for all through one cracking. The cracking cost is low and it is difficult to achieve effective prevention effects.
  • the image is distorted and the user experience is not good. For example, if horizontal and vertical lines appear in the restored picture, or the colors at the splicing area are distorted, these are the image effects of pictures that have not been spliced and broken up.
  • this application proposes a verification picture sending method, synthesis method and device, storage medium and terminal to solve the problem of picture verification security in the prior art.
  • the verification image sending method proposed in this application includes:
  • the terminal uses the random number sequence to decrypt each of the extended sub-picture data to obtain several extended sub-pictures, or obtains a decrypted number sequence through a preset mapping or calculation method, and decrypts each of the extended sub-picture data to obtain the corresponding And cut off the N pixels at the edge of each extended sub-picture to obtain a number of sub-pictures, where N is a positive integer; combine the several sub-pictures into a verification picture.
  • the N pixels expanded outward are pure color pixels.
  • This application also proposes a verification image synthesis method, including the steps:
  • the several sub-pictures are combined into a verification picture.
  • This application also proposes a verification picture sending device, which includes:
  • the verification request receiving module is used to receive the verification request of the terminal
  • a random number sequence generating module configured to generate a set of random number sequence according to the verification request
  • the extended sub-picture module is used to divide the verification picture into several sub-pictures, and expand each sub-picture outward by N pixels to obtain several extended sub-pictures, where N is a positive integer;
  • a data encryption module configured to use the random number sequence to encrypt each of the extended sub-pictures to obtain several extended sub-picture data
  • the data sending module is configured to send the random number sequence and a plurality of the extended sub-picture data to the terminal, wherein the random number sequence and the plurality of the extended sub-picture data are sent in the same way, or different Send in the manner; so that the terminal uses the random number sequence to decrypt each of the extended sub-picture data to obtain several extended sub-pictures, or obtain a decrypted number sequence through a preset mapping or calculation method, and decrypt each of the extended sub-pictures Picture data to obtain several corresponding extended sub-pictures; and cut off the N pixels at the edge of each extended sub-picture to obtain several sub-pictures, where N is a positive integer; combine the several sub-pictures into a verification picture .
  • This application also proposes a verification picture synthesis device, which includes:
  • the verification data receiving module is used to receive a random number sequence and a number of extended sub-picture data sent by the server.
  • the random number sequence is generated by the server according to a verification request, and the extended sub-picture data is obtained by the server by the following method: dividing the verification picture into A number of sub-pictures, each of the sub-pictures is expanded out by N pixels to obtain a number of extended sub-pictures, where N is a positive integer;
  • the data decryption module is used to decrypt each of the extended sub-picture data by using the random number sequence to obtain several extended sub-pictures, or obtain a decrypted number sequence through a preset mapping or calculation method, and decrypt each of the extended sub-picture data , To get the corresponding extended sub-pictures;
  • the picture interception module is used to intercept N pixels at the edge of each extended sub-picture to obtain several sub-pictures, where N is a positive integer;
  • the picture synthesis module is used to synthesize the several sub-pictures into a verification picture.
  • This application also proposes a computer-readable storage medium on which computer-readable instructions are stored, characterized in that, when the readable instructions are executed by a processor, the verification picture sending method described in any one of the foregoing is implemented; or,
  • This application also proposes a computer device, characterized in that the computer device includes:
  • One or more processors are One or more processors;
  • the storage device is used to store one or more readable instructions
  • the one or more processors When the one or more readable instructions are executed by the one or more processors, the one or more processors implement the verification picture sending method according to any one of the foregoing; or,
  • the one or more processors When the one or more readable instructions are executed by the one or more processors, the one or more processors implement the verification picture synthesis method described in any one of the foregoing.
  • the verification picture sending method of the present application can divide the verification picture into a number of extended sub-pictures that extend out by N pixels, so that the extended sub-pictures discard the N pixels of edge extension when the terminal restores and splices, and only retains
  • the size of the original sub-pictures avoids the problem of splicing distortion when the terminal synthesizes the verification pictures through the compression algorithm, and improves the display quality of the verification pictures.
  • the verification picture synthesis method of this application can decrypt each of the extended sub-picture data after receiving the random number sequence and several extended sub-picture data to obtain several corresponding extended sub-pictures, and then cut each of the Extend the N pixels at the edge of the sub-picture to obtain the original sub-picture, thereby splicing a distortion-free verification picture at the splicing place, and improving the display quality of the verification picture.
  • FIG. 1 is a schematic flowchart of an embodiment of a method for sending a verification picture according to the application
  • FIG. 2 is a schematic flowchart of an embodiment of a method for synthesizing a verification picture according to the application;
  • FIG. 3 is a schematic diagram of modules of an embodiment of an apparatus for sending a verified picture according to the application
  • FIG. 4 is a schematic diagram of modules of an embodiment of an apparatus for verifying picture synthesis according to this application;
  • Fig. 5 is a schematic structural diagram of an embodiment of a computer device of this application.
  • terminal and terminal equipment used herein include both wireless signal receiver equipment, which only has wireless signal receiver equipment without transmitting capability, and also includes receiving and transmitting hardware equipment.
  • Such equipment may include: cellular or other communication equipment with a single-line display or multi-line display or cellular or other communication equipment without a multi-line display; PCS (Personal Communications Service, personal communication system), which can combine voice, data processing, fax and/or data communication capabilities; PDA (Personal Digital Assistant, personal digital assistant), which can include radio frequency receivers, pagers, Internet/Intranet access, web browsers, notepads, calendars and/or GPS (Global Positioning System (Global Positioning System) receiver; a conventional laptop and/or palmtop computer or other device, which has and/or includes a radio frequency receiver, a conventional laptop and/or palmtop computer or other device.
  • PCS Personal Communications Service
  • PDA Personal Digital Assistant
  • GPS Global Positioning System (Global Positioning System) receiver
  • a conventional laptop and/or palmtop computer or other device which has and/or includes a radio frequency receiver, a conventional laptop and/or palmtop computer or other device.
  • terminal and terminal equipment used here may be portable, transportable, installed in vehicles (aviation, sea and/or land), or suitable and/or configured to operate locally, and/or In a distributed form, it runs on the earth and/or any other location in space.
  • the "terminal” and “terminal equipment” used here can also be communication terminals, Internet terminals, music/video playback terminals, such as PDA, MID (Mobile Internet Device, mobile Internet device) and/or mobile phone with music/video playback function, it can also be a smart TV, set-top box and other devices.
  • This application proposes a verification picture sending method, which is used to improve the security of the verification picture.
  • the embodiment shown in FIG. 1 includes the following steps:
  • Step S10 Receive a verification request from the terminal;
  • Step S20 Generate a set of random number sequence according to the verification request;
  • Step S30 Split the verification picture into a number of sub-pictures, and expand each sub-picture by N pixels to obtain Several extended sub-pictures, where N is a positive integer;
  • Step S40 Use the random number sequence to encrypt each of the extended sub-pictures to obtain several extended sub-picture data;
  • Step S50 Send the random number sequence to the terminal And a number of the extended sub-picture data.
  • each step is as follows:
  • Step S10 Receive a verification request from the terminal.
  • the user When the user performs network operations on the terminal, for example: logging in application-readable instructions, inputting application-readable instructions, executing special permissions, etc., the user will send an operation instruction request to the corresponding server.
  • machine users are used to send operation instructions to the service; for example, the machine user sends a login request, retrying the password in a short period of time according to a certain mathematical law, and using the login mobile phone number as the user name To achieve the purpose of brute-force cracking of the account.
  • This kind of machine users sending login requests will occupy a lot of server resources, causing the server to respond slowly, or even fail to respond to the user's normal request instructions.
  • the instruction to send a verification request can be triggered at the same time, so that the server can obtain a targeted response from the terminal, thereby identifying whether the user of the terminal is a real user or a machine. user. Therefore, the verification request described in this application can be triggered when the user performs a different operation request. For example, when the user initiates a password retrieval operation, the verification request can be sent to the server together with the password retrieval request to pass the verification request Make the server confirm whether the current request to retrieve the password is a non-machine user.
  • the terminal may be a mobile terminal, or a desktop computer or other equipment.
  • the verification method corresponding to the verification request may be determined by the server, and may also be included in the verification request. That is, the server may determine the verification method according to the verification request, so the verification request sent by the terminal may directly include the verification method.
  • the verification methods include multiple verification methods such as static picture identification verification and sliding block splicing verification.
  • Step S20 Generate a set of random number series according to the verification request.
  • the random number sequence is a sequence for encrypting the verification picture. If the verification picture is not encrypted, the machine user can directly obtain the original verification picture, and the verification data of the picture can be decrypted by the machine recognition readable instruction. For example: the path of the verification picture is captured by crawler technology, and then the verification picture is binarized by cracking the readable instructions to obtain the coordinate data of the verification data in the verification picture; then the verification data can be further forged. Through the verification of image verification, malicious attacks are launched. Or for example: the password for the split verification image to be restored on the client side is fixed, or the rules for generating the restoration password are fixed, or even there is no restoration password, so that the verification image data is easy to leak.
  • the random number sequence in this embodiment can be calculated by a random algorithm, or obtained by performing preset random processing on the data corresponding to the verification request. For example, a pair of keys is generated by a symmetric algorithm or an asymmetric algorithm, and one of the keys is used as the random number sequence to encrypt the verification picture, and the other key is used to decrypt the encrypted verification picture. Since the random number sequence used for encryption is not fixed, the recovery password of the terminal also changes accordingly, thereby greatly improving the security of the verification image on the terminal.
  • different random algorithms can be used to generate a random number sequence.
  • the verification request can correspond to a simpler verification picture, such as the recognition of static numbers or Chinese characters; when the terminal is operated frequently, for example, If a request for downloading data is sent multiple times in a short period of time, the verification request sent when the request for downloading data is sent can correspond to a more complicated verification picture, such as the identification of multiple similar items.
  • the server when the user's operating environment is relatively secure, the server can use a simpler encryption method to encrypt the verification picture, so as to simplify the encryption process on the server side and the decryption process on the terminal and improve the verification efficiency.
  • the server when the user’s operating environment is more complex or there is a certain risk of data leakage, the server can use a more complex encryption method to encrypt the verification image to improve the security level of the verification image and prevent machine users from passing through the machine. Identify the way to obtain the verification picture information. Therefore, in an embodiment of the present application, the verification request of the receiving terminal may specifically include:
  • Step S11 receiving the verification request of the terminal and the environmental parameter data of the terminal;
  • the generating a set of random number sequence according to the verification request specifically includes:
  • Step S21 Generate a set of random number series according to the environmental parameter data and the verification request.
  • the environmental parameter data can reflect the operating environment safety of the terminal to a certain extent.
  • the user when the terminal is the latest genuine operating system and installed with anti-virus software, the user’s operating environment can be regarded as an environment with a higher security level; when the terminal is a relatively backward operating system and data monitoring software is installed, the user can be The operating environment is regarded as a lower security level environment.
  • the environmental parameter data can be obtained through a terminal application readable instruction, or through a plug-in in a readable instruction sending a verification request.
  • a set of random numbers can be generated according to the user’s environmental parameter data and the verification request to adjust the encryption method of the verification picture, by increasing the encryption level of the verification picture to prevent the machine user from obtaining the verification picture information, or by reducing the verification
  • the encryption level of the picture is to simplify the decryption process of the terminal, which not only achieves the purpose of improving the security of the verification picture information, but also achieves the purpose of optimizing the user experience.
  • Step S30 divide the verification picture into several sub-pictures, and expand each sub-picture outward by N pixels to obtain several extended sub-pictures, where N is a positive integer.
  • the terminal's compression and restoration of the verification picture is generally non-fidelity compression, so when the verification picture is divided and shuffled and then synthesized into a complete verification picture, the verification picture is a compressed non-fidelity picture format; if two pictures are synthesized
  • the color difference of the pixels in the adjacent area of the sub-picture is obvious, and the image compression algorithm will make the colors of the two adjacent pixels tend to be close.
  • the splicing place of two adjacent sub-pictures must have a color difference, which results in distortion of the picture edge at the splicing place of the verification picture due to compression.
  • the originally separated sub-pictures are expanded out by N pixels to obtain the corresponding expanded sub-pictures.
  • the N pixels of edge expansion are discarded, and only the size of the original sub-picture is cut for splicing. , So as to ensure that the compressed N pixels are edge-expanded, and these N pixels are just discarded in the splicing process, so this step expands the N pixels outward to ensure that the spliced verification image is not distorted.
  • the N pixels that expand outward are pure color boundaries to take into account the display effect of the terminal and the terminal Display performance.
  • the pure color boundary can intelligently divide the area that needs to be rendered, and can easily distinguish the edge area of each sub-image that needs to be removed, so that the restored verification image The display effect is more clear and true.
  • a simpler verification picture can be sent to the terminal to simplify the user's verification operation, improve verification efficiency, and enhance user experience.
  • a more complicated verification picture may be sent to the terminal to improve the verification level of the machine user.
  • Step S40 Use the random number sequence to encrypt each of the extended sub-pictures to obtain several extended sub-picture data.
  • the random number sequence is used to encrypt each of the extended sub-pictures to obtain encrypted data of several extended sub-pictures. If the data of the verification image is leaked to a third party during the transmission process, since the third party cannot know the decryption method or decryption rules, the correct verification image information cannot be obtained, thereby ensuring the security of the verification image during the transmission process. Since the random number sequence is a changing sequence in each encryption process, the data decrypted by the terminal each time also changes synchronously, which also ensures the security of the corresponding terminal during the decryption process, and no machine user passes through once. Cracking can crack all the problems of restoring passwords for verifying pictures.
  • the encryption method can use existing high-strength encryption algorithms such as AES256, SM2, SM3, etc., and the encryption algorithms are all existing technologies, and will not be repeated here.
  • Step S50 Send the random number sequence and several extended sub-picture data to the terminal.
  • the encrypted extended sub-picture data will be sent to the corresponding terminal so that the terminal can obtain the required verification picture; at the same time, the random number sequence will also be sent to the terminal so that the terminal can use the random number sequence to The extended sub-picture data is decrypted.
  • the random number sequence and the plurality of extended sub-picture data can be sent in the same way, or can be sent in different ways. For example, the random number sequence may be sent in one thread, and the extended sub-picture data may be sent in another thread; or the random number sequence may be sent first in the same thread, and then each of the extended sub-picture data may be sent one by one , So that the terminal can decrypt each received extended sub-picture data one by one through the random number sequence.
  • the verification picture can be divided into a number of extended sub-pictures that extend out by N pixels, so that the extended sub-pictures discard the N pixels of edge extension when the terminal restores and splice, and only the size of the original sub-picture is retained, thereby
  • the problem of splicing distortion when the terminal synthesizes the verification picture through the compression algorithm is avoided, and the display quality of the verification picture is improved.
  • this application also proposes a verification picture synthesis method, which includes the following steps:
  • Step S60 Receive a random number sequence and several extended sub-picture data sent by the server, where the random number sequence is generated by the server according to the verification request, and the extended sub-picture data is obtained by the server by the following method: dividing the verification picture into several sub-pictures, Expand each of the sub-pictures by N pixels to obtain several extended sub-pictures, where N is a positive integer; Step S70: Use the random number sequence to decrypt each of the extended sub-picture data to obtain several extended sub-pictures Picture; Step S80: cut off the N pixels at the edge of each extended sub-picture to obtain several sub-pictures, where N is a positive integer; Step S90: combine the several sub-pictures into a verification picture.
  • the terminal When the terminal receives the random number sequence and several extended sub-picture data sent by the server, it can directly use the random number sequence to decrypt each of the extended sub-picture data to obtain several extended sub-pictures, or through preset mapping or calculation
  • the method obtains the decrypted sequence, and decrypts each of the extended sub-picture data to obtain corresponding extended sub-pictures. Since the edge of each extended sub-picture has N pixels extended, the synthesis method needs to cut off the N pixels at the edge of each extended sub-picture first to obtain several original sub-pictures, and then combine the original sub-pictures Synthesize into a verification picture, thereby obtaining a verification picture without distortion at the splicing boundary.
  • the synthesis method described in this embodiment is used in combination with the foregoing verification picture sending method to form a verification picture interaction system that can display high-quality verification pictures between the terminal and the server.
  • the existing jpg compressed picture format can be used; that is, the synthesis of the several sub-pictures into the verification picture specifically includes:
  • JPEG Joint Photographic Experts Group
  • JPEG is the first international digital image compression standard established by the International Standards Organization and the International Telephone and Circuit Advisory Committee for still images. It is a common image format.
  • This embodiment adopts the universal jpg format as the display mode of the verification picture, so that this application can be applied to almost all existing terminals with display functions, and the scope of application of this application is improved.
  • the method may further include:
  • the seam of the verification picture is the edge position when the adjacent sub pictures are spliced.
  • the verification picture can be processed by rendering to make the display of the verification picture clearer, or increase the background color. Verify the difficulty of identifying the picture and increase the security of the verification.
  • the expanded pure color pixels still remain at the seam, it may be that the number of expanded pixels does not match the number of truncated pixels, resulting in errors in the stitching of the verification pictures.
  • the pure color pixels can be eliminated through the subsequent rendering process or image compression processing, thereby further improving the stitching quality.
  • this application also proposes a verification picture interaction system, which includes the steps:
  • Step S12 The server receives the verification request of the terminal;
  • Step S20 Generate a set of random number sequence according to the verification request;
  • Step S30 Split the verification picture into several sub-pictures, and expand each of the sub-pictures by N pixels, Obtain several extended sub-pictures, where N is a positive integer;
  • Step S40 Use the random number sequence to encrypt each of the extended sub-pictures to obtain several extended sub-picture data
  • Step S50 Send the random number sequence and several of the extended sub-picture data to the terminal
  • Step S61 The terminal receives a random number sequence and several extended sub-picture data sent by the server, the random number sequence is generated by the server according to a verification request, and the extended sub-picture data is obtained by the server by the following method: the verification picture is divided into several sub-pictures , Expand each sub-picture outward by N pixels to obtain several extended sub-pictures, where N is a positive integer; step S70: use the random number sequence to decrypt each of the extended sub-picture data to obtain several extensions Sub-picture; Step S80: cut off the N pixels of the edge of each extended sub-picture to obtain several sub-pictures, where N is a positive integer; Step S90: combine the several sub-pictures into a verification picture.
  • the verification picture restoration password of the verification picture interaction system of this embodiment is not fixed, which increases the difficulty of cracking the verification picture; moreover, by expanding the pixels of the sub-pictures, it can be ensured that the splicing of the expanded sub-pictures will not be distorted during splicing, which improves The display effect and fidelity of the goose array pictures are improved to ensure a good user experience.
  • this application also proposes a verification picture sending device. As shown in FIG. 3, the device includes:
  • the verification request receiving module 10 is used to receive the verification request of the terminal; the random number sequence generating module 20 is used to generate a set of random number sequence according to the verification request; the extended sub-picture module 30 is used to divide the verification picture into several sub-pictures, Expand each sub-picture out by N pixels to obtain several extended sub-pictures, where N is a positive integer; the data encryption module 40 is configured to encrypt each of the extended sub-pictures by using the random number sequence to obtain A number of extended sub-picture data; a data sending module 50, configured to send the random number sequence and a number of the extended sub-picture data to the terminal.
  • this application also proposes a verification picture synthesis device. As shown in FIG. 4, the device includes:
  • the verification data receiving module 60 is configured to receive a random number sequence and several extended sub-picture data sent by the server.
  • the random number sequence is generated by the server according to a verification request, and the extended sub-picture data is obtained by the server by the following method: Is a number of sub-pictures, each of the sub-pictures is expanded by N pixels to obtain a number of extended sub-pictures, where N is a positive integer; the data decryption module 70 is used to decrypt each of the extended sub-pictures by using the random number sequence Sub-picture data to obtain several extended sub-pictures; the picture interception module 80 is used to cut off the N pixels at the edge of each extended sub-picture to obtain several sub-pictures, where N is a positive integer; the picture synthesis module 90 uses To synthesize the several sub-pictures into a verification picture.
  • the embodiment of the present application also provides a computer-readable storage medium on which computer-readable instructions are stored, and when the readable instructions are executed by a processor, the method for sending a verification picture according to any one of the foregoing is implemented; or, the readable When the instructions are executed by the processor, the verification picture synthesis method described in any one of the foregoing is implemented.
  • the storage medium includes but not limited to any type of disk (including floppy disk, hard disk, optical disk, CD-ROM, and magneto-optical disk), ROM (Read-Only Memory, read-only memory), RAM (Random AcceSS Memory, random memory), EPROM (EraSable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically EraSable Programmable Read-Only Memory, electrically erasable programmable read-only memory), flash memory, magnetic card or optical card. That is, the storage medium includes any medium that stores or transmits information in a readable form by a device (for example, a computer). It can be a read-only memory, magnetic disk or optical disk, etc.
  • An embodiment of the present application also provides a computer device, which includes:
  • One or more processors a storage device for storing one or more readable instructions, when the one or more readable instructions are executed by the one or more processors, the one or more processing The device implements the verification picture sending method described in any one of the foregoing; or, when the one or more readable instructions are executed by the one or more processors, the one or more processors implement any one of the foregoing The verification picture synthesis method described in the item.
  • the terminal can include mobile phones, tablets, PDAs (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminals), on-board computers, servers and other arbitrary terminal equipment, taking the terminal as a mobile phone as an example:
  • FIG. 5 shows a block diagram of a part of the structure of a mobile phone related to a computer device as a terminal in an embodiment of the present application.
  • the mobile phone includes: radio frequency (Radio Frequency (RF) circuit 1510, memory 1520, input unit 1530, display unit 1540, sensor 1550, audio circuit 1560, wireless fidelity (wireless fidelity) Fidelity, Wi-Fi) module 1570, processor 1580, power supply 1590 and other components.
  • RF Radio Frequency
  • the RF circuit 1510 can be used for receiving and sending signals during the process of sending and receiving information or talking. In particular, after receiving the downlink information of the base station, it is processed by the processor 1580; in addition, the designed uplink data is sent to the base station.
  • the RF circuit 1510 includes but is not limited to an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), duplexer, etc.
  • the RF circuit 1510 can also communicate with the network and other devices through wireless communication.
  • the above wireless communication can use any communication standard or protocol, including but not limited to Global System for Mobile Communications (Global System of Mobile communication, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), e-mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GSM Global System of Mobile communication
  • GSM Global System of Mobile communication
  • GSM Global System of Mobile communication
  • GSM Global System of Mobile communication
  • GSM Global System of Mobile communication
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the memory 1520 may be used to store software readable instructions and modules.
  • the processor 1580 executes various functional applications and data processing of the mobile phone by running the software readable instructions and modules stored in the memory 1520.
  • the memory 1520 may mainly include a storage readable instruction area and a storage data area, where the storage readable instruction area may store an operating system, at least one application readable instruction required by a function (such as social applications, etc.), etc.; the storage data area may store Data created based on the use of the mobile phone (such as verifying picture decryption data, etc.), etc.
  • the memory 1520 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the input unit 1530 may be used to receive inputted digital or character information, and generate key signal input related to user settings and function control of the mobile phone.
  • the input unit 1530 may include a touch panel 1531 and other input devices 1532.
  • the touch panel 1531 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 1531 or near the touch panel 1531. Operation), and drive the corresponding connection device according to the preset program.
  • the touch panel 1531 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 1580, and can receive and execute the commands sent by the processor 1580.
  • the touch panel 1531 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the input unit 1530 may also include other input devices 1532.
  • other input devices 1532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick.
  • the display unit 1540 may be used to display information input by the user or information provided to the user and various menus of the mobile phone.
  • the display unit 1540 may include a display panel 1541.
  • a liquid crystal display Liquid Crystal Display, LCD
  • Organic Light-Emitting Diode Organic Light-Emitting Diode, OLED
  • the touch panel 1531 can cover the display panel 1541. When the touch panel 1531 detects a touch operation on or near it, it transmits it to the processor 1580 to determine the type of the touch event, and then the processor 1580 responds to the touch event. The type provides corresponding visual output on the display panel 1541.
  • the touch panel 1531 and the display panel 1541 are used as two independent components to implement the input and input functions of the mobile phone, but in some embodiments, the touch panel 1531 and the display panel 1541 can be integrated. Realize the input and output functions of mobile phones.
  • the mobile phone may also include at least one sensor 1550, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor can include an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 1541 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 1541 and/or when the mobile phone is moved to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when it is stationary.
  • the audio circuit 1560, the speaker 1561, and the microphone 1562 can provide an audio interface between the user and the mobile phone.
  • the audio circuit 1560 can transmit the electrical signal converted from the received audio data to the speaker 1561, which is converted into a voiceprint signal output by the speaker 1561; on the other hand, the microphone 1562 converts the collected voiceprint signal into an electrical signal,
  • the circuit 1560 converts it into audio data after receiving it, and then processes the audio data output processor 1580, and sends it to another mobile phone via the RF circuit 1510, or outputs the audio data to the memory 1520 for further processing.
  • Wi-Fi is a short-range wireless transmission technology.
  • the mobile phone can help users send and receive e-mails, browse web pages, and access streaming media through the Wi-Fi module 1570. It provides users with wireless broadband Internet access.
  • FIG. 5 shows the Wi-Fi module 1570, it is understandable that it is not a necessary component of the mobile phone, and can be omitted as required without changing the essence of the invention.
  • the processor 1580 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. It runs or executes software readable instructions and/or modules stored in the memory 1520, and calls data stored in the memory 1520. , To perform various functions of the mobile phone and process data to monitor the mobile phone as a whole.
  • the processor 1580 may include one or more processing units; preferably, the processor 1580 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, and application readable For instructions, the modem processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 1580.
  • the mobile phone also includes a power supply 1590 (such as a battery) for supplying power to various components.
  • a power supply 1590 (such as a battery) for supplying power to various components.
  • the power supply can be logically connected to the processor 1580 through a power management system, so that functions such as charging, discharging, and power management can be managed through the power management system.
  • the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.

Abstract

一种验证图片发送方法、合成方法及装置、存储介质和终端,所述验证图片发送方法包括:接收终端的验证请求(S10);根据所述验证请求生成一组随机数列(S20);将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数(S30);采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据(S40);向所述终端发送所述随机数列和若干个所述扩展子图片数据(S50)。该方法可将验证图片分隔为若干个向外扩展N个像素的扩展子图片,以使所述扩展子图片在终端还原拼接时抛弃边缘扩展的N个像素,只保留原来子图片的大小,从而避免终端通过压缩算法合成验证图片时的拼接失真问题,提高了验证图片的显示质量。

Description

验证图片发送方法、合成方法及装置、存储介质和终端
本申请要求于2019年01月28日提交中国专利局、申请号为201910078752.2、发明名称为“验证图片发送方法、合成方法及装置、存储介质和终端”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本申请涉及计算机技术领域,具体而言,本申请涉及一种验证图片发送方法、合成方法及装置、存储介质和终端。
背景技术
当用户进行登录操作或浏览部分网页时,为了避免机器操作占用服务器资源和发起恶意攻击,app或网页的客户端会要求用户进行行为验证,以确认当前操作的用户为非机器用户。图片验证是现有常用的验证方式,故加大机器对图片的辨识难度是确保防御安全的重要关卡,但现有的图片验证方式存在以下问题:
1、原始验证图片没有被打乱,机器可直接获取到原始图片;机器经过识别可读指令便可破解图片的验证数据。例如,通过爬虫技术,抓取到原始图片的路径,再通过破解可读指令,对原始图片进行二值化处理,便可得出原始图片中验证数据的坐标数据;再并进一步伪造验证数据,便可通过图片验证的关卡,发起恶意攻击。
2、原始验证图片被分割后,在客户端进行还原的密码固定,或生成密码的规律固定,甚至没有还原密码,从而导致图片数据容易泄露,引起泄露风险。当密码固定,或原始验证图片经过打乱但密码的规律不变时,部分不法用户通过一次破解即可一劳永逸地破解所有密码,破解成本低,难以起到有效的防范效果。
3、图片还原后,图像失真,用户体验不好。例如,还原后的图片中出现横竖线,或拼接处颜色失真,这些都是没有拼接好打散后的图片的图像效果。
发明内容
本申请针对现有方式的缺点,提出一种验证图片发送方法、合成方法及装置、存储介质和终端,用以解决现有技术中存在的图片验证安全的问题。
本申请提出的验证图片发送方法,包括:
接收终端的验证请求;
根据所述验证请求生成一组随机数列;
将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;
向所述终端发送所述随机数列和若干个所述扩展子图片数据,其中所述随机数列和若干个所述扩展子图片数据采用同一种方式进行发送,或者采用不同的方式发送;以供所述终端采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;并截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;将所述若干个子图片合成为验证图片。
优选地,所述向外扩展的N个像素为纯色像素。
本申请还提出一种验证图片合成方法,包括步骤:
接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:
将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;
截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;
将所述若干个子图片合成为验证图片。
本申请还提出一种验证图片发送装置,该装置包括:
验证请求接收模块,用于接收终端的验证请求;
随机数列生成模块,用于根据所述验证请求生成一组随机数列;
扩展子图片模块,用于将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
数据加密模块,用于采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;
数据发送模块,用于向所述终端发送所述随机数列和若干个所述扩展子图片数据,其中所述随机数列和若干个所述扩展子图片数据采用同一种方式进行发送,或者采用不同的方式发送;以供所述终端采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;并截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;将所述若干个子图片合成为验证图片。
本申请还提出一种验证图片合成装置,该装置包括:
验证数据接收模块,用于接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
数据解密模块,用于采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;
图片截取模块,用于截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;
图片合成模块,用于将所述若干个子图片合成为验证图片。
本申请还提出一种计算机可读存储介质,其上存储有计算机可读指令,其特征在于,该可读指令被处理器执行时实现前述任意一项所述的验证图片发送方法;或,
该可读指令被处理器执行时实现前述任意一项所述的验证图片合成方法。
本申请还提出一种计算机设备,其特征在于,所述计算机设备包括:
一个或多个处理器;
存储装置,用于存储一个或多个可读指令,
当所述一个或多个可读指令被所述一个或多个处理器执行,使得所述一个或多个处理器实现前述任意一项所述的验证图片发送方法;或,
当所述一个或多个可读指令被所述一个或多个处理器执行,使得所述一个或多个处理器实现前述任意一项所述的验证图片合成方法。
本申请具有以下有益效果:
1、本申请的验证图片发送方法可将验证图片分隔为若干个向外扩展N个像素的扩展子图片,以使所述扩展子图片在终端还原拼接时抛弃边缘扩展的N个像素,只保留原来子图片的大小,从而避免终端通过压缩算法合成验证图片时的拼接失真问题,提高了验证图片的显示质量。
2、本申请的验证图片合成方法可在接收到随机数列和若干个扩展子图片数据后,解密每个所述扩展子图片数据,得到对应的若干个扩展子图片,再截去每个所述扩展子图片边缘的N个像素,以得到原始的子图片,从而拼接出拼接处无失真的验证图片,提高了验证图片的显示质量。
本申请附加的方面和优点将在下面的描述中部分给出,这些将从下面的描述中变得明显,或通过本申请的实践了解到。
附图说明
本申请上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本申请验证图片发送方法一个实施例的流程示意图;
图2为本申请验证图片合成方法一个实施例的流程示意图;
图3为本申请验证图片发送装置一个实施例的模块示意图;
图4为本申请验证图片合成装置一个实施例的模块示意图;
图5为本申请计算机设备实施例的结构示意图。
具体实施方式
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本申请,而不能解释为对本申请的限制。
本技术领域技术人员可以理解,除非特意声明,这里使用的单数形式“一”、“一个”、“所述”和“该”也可包括复数形式,这里使用的“第一”、“第二”仅用于区别同一技术特征,并不对该技术特征的顺序和数量等加以限定。应该进一步理解的是,本申请的说明书中使用的措辞“包括”是指存在所述特征、整数、步骤、操作、元件和/或组件,但是并不排除存在或添加一个或多个其他特征、整数、步骤、操作、元件、组件和/或它们的组。
本技术领域技术人员可以理解,除非另外定义,这里使用的所有术语(包括技术术语和科学术语),具有与本申请所属领域中的普通技术人员的一般理解相同的意义。还应该理解的是,诸如通用字典中定义的那些术语,应该被理解为具有与现有技术的上下文中的意义一致的意义,并且除非像这里一样被特定定义,否则不会用理想化或过于正式的含义来解释。
本技术领域技术人员可以理解,这里所使用的“终端”、“终端设备”既包括无线信号接收器的设备,其仅具备无发射能力的无线信号接收器的设备,又包括接收和发射硬件的设备,其具有能够在双向通信链路上,执行双向通信的接收和发射硬件的设备。这种设备可以包括:蜂窝或其他通信设备,其具有单线路显示器或多线路显示器或没有多线路显示器的蜂窝或其他通信设备;PCS(Personal Communications Service,个人通信系统),其可以组合语音、数据处理、传真和/或数据通信能力;PDA(Personal Digital Assistant,个人数字助理),其可以包括射频接收器、寻呼机、互联网/内联网访问、网络浏览器、记事本、日历和/或GPS(Global Positioning System,全球定位系统)接收器;常规膝上型和/或掌上型计算机或其他设备,其具有和/或包括射频接收器的常规膝上型和/或掌上型计算机或其他设备。这里所使用的“终端”、“终端设备”可以是便携式、可运输、安装在交通工具(航空、海运和/或陆地)中的,或者适合于和/或配置为在本地运行,和/或以分布形式,运行在地球和/或空间的任何其他位置运行。这里所使用的“终端”、“终端设备”还可以是通信终端、上网终端、音乐/视频播放终端,例如可以是PDA、MID(Mobile Internet Device,移动互联网设备)和/或具有音乐/视频播放功能的移动电话,也可以是智能电视、机顶盒等设备。
本申请提出一种验证图片发送方法,用于提高验证图片的安全性,如图1所示的实施例,包括如下步骤:
步骤S10:接收终端的验证请求;步骤S20:根据所述验证请求生成一组随机数列;步骤S30:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;步骤S40:采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;步骤S50:向所述终端发送所述随机数列和若干个所述扩展子图片数据。其中,每个步骤具体如下:
步骤S10:接收终端的验证请求。
当用户在终端进行联网操作时,例如:登录应用可读指令、输入应用可读指令指令、执行特殊权限等操作时,会向对应的服务器发送操作指令请求。但,在部分场景下,也存在利用机器用户向服务发送操作指令的情况;例如,通过机器用户发送登录请求,在短时间内按照一定的数学规律不断重试密码,以登录手机号码作为用户名的账户,达到暴力破解账户的目的。这种发送登录请求的机器用户将占用大量服务器资源,造成服务器响应缓慢,甚至无法响应用户正常的请求指令等诸多问题。故,在部分情况下,当用户发送操作指令请求时,可同时触发发送验证请求的指令,以使服务器获取到终端有针对性的回复,从而鉴别出终端的用户是真的实用户或是机器用户。故,本申请所述的验证请求可在用户执行不同操作请求时触发,例如,当用户发起找回密码操作时,所述验证请求可与找回密码的请求一起发送至服务器,以通过验证请求使服务器确认当前发送找回密码的请求是否为非机器用户。
所述终端可以为移动终端,亦可为台式电脑等设备。所述验证请求对应的验证方式可由服务器确定,亦可包括于验证请求中,即:服务器可根据验证请求确定验证方式,故终端发出的验证请求中可直接包括验证方式。所述验证方式包括静态图片辨识验证、滑动图块拼接验证等多种验证方式。
步骤S20:根据所述验证请求生成一组随机数列。
所述随机数列为对验证图片进行加密的数列。若验证图片没有被加密,机器用户可直接获取到原始的验证图片,通过机器识别可读指令便可破解图片的验证数据。例如:通过爬虫技术抓取到验证图片的路径,再通过破解可读指令,对验证图片进行二值化处理,便可得出验证图片中验证数据的坐标数据;再进一步伪造验证数据,便可通过图片验证的验证,发起恶意攻击。又或例如:被分割后的验证图片在客户端进行还原的密码固定,或生成还原密码的规律固定,甚至没有还原密码,从而导致验证图片数据容易泄露。当还原密码固定,或验证图片经过打乱但还原密码的规律不变时,部分不法用户通过一次验证图片的破解即可一劳永逸地破解所有验证图片的还原密码,破解成本低,难以起到有效的防范效果。本实施例中的随机数列可通过随机算法算出,或将所述验证请求对应的数据进行预设随机处理得到。例如,通过对称算法或非对称算法生成一对密钥,将其中的一个密钥作为所述随机数列,以用于加密验证图片,另一个密钥用于解密加密后的验证图片。由于用于加密的随机数列不是固定的,使得终端的还原密码也随之变化,从而大大提高了验证图片在终端的安全性。
对于同一个终端不同的验证请求,可采用不同的随机算法生成随机数列。例如,当终端发送登录请求时,由于登录请求一般伴随着密码验证,故所述验证请求可对应于较为简单的验证图片,例如静态数字或汉字的识别等;当终端操作较为频繁时,例如,短时间内多次发出下载数据的请求,则在发送下载数据请求时发送的验证请求可对应于较为复杂的验证图片,例如多个近似物品的识别等。
在本申请的一些实施例中,当用户的操作环境较为安全时,服务器可采用较为简单的加密方式对验证图片进行加密,以简化服务器端的加密过程和终端的解密过程,提高验证效率。在另一些实施例中,当用户的操作环境较为复杂或存在一定的数据泄露风险时,服务器可采用较为复杂的加密方式对验证图片进行加密,以提高验证图片的安全级别,防止机器用户通过机器识别的方式获得验证图片信息。故,在本申请的一个实施例中,所述接收终端的验证请求,具体可包括:
步骤S11:接收终端的验证请求和终端的环境参数数据;
所述根据所述验证请求生成一组随机数列,具体包括:
步骤S21:根据所述环境参数数据和所述验证请求生成一组随机数列。
所述环境参数数据可在一定程度上反应出终端的操作环境安全性。例如,当终端为最新正版操作系统且装有杀毒软件时,可将用户的操作环境视为安全级别较高的环境;当终端为较为落后的操作系统且安装有数据监控软件时,可将用户的操作环境视为安全级别较低的环境。所述环境参数数据的获取可通过终端应用可读指令进行获取,或通过发送验证请求的可读指令中的插件获取。本实施例可根据用户的环境参数数据和验证请求生成一组随机数列,以调整验证图片的加密方式,通过提高验证图片的加密级别达到防止机器用户获取到验证图片信息的目的,或通过降低验证图片的加密级别以简化终端的解密过程的目的,既达到了提高验证图片信息安全性的目的,也达到了优化了用户体验的目的。
步骤S30:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数。
终端对验证图片的压缩还原一般为非保真压缩,故当验证图片被分隔打乱后再合成一张完整的验证图片时,验证图片为压缩的非保真图片格式;如果合成图片的两张子图片相邻区域的像素颜色差异明显,图片压缩算法将使两钟相邻像素的颜色趋于接近。但对于验证图片来说,分割的子图片拼接时,相邻的两个子图片的拼接处肯定具有颜色差异,从而导致验证图片拼接处的图片边缘因压缩而失真。本步骤将原本分隔的子图片向外扩展N个像素,得到对应的扩展子图片,当多个扩展子图片还原拼接时,再抛弃边缘扩展的N个像素,只截取原来子图片的大小进行拼接,从而保证了被压缩的是边缘扩展的N个像素,而这N个像素在拼接过程正好被抛弃,所以本步骤通过向外扩展N个像素,保证了拼接后的验证图片不失真的问题。
为了使拼接过程中的拼接渲染区域与需要剔除的边缘区域的区别更明显,在本申请的一个实施例中,所述向外扩展的N个像素为纯色边界,以兼顾终端的显示效果和终端的显示性能。例如,当本申请通过canvas技术渲染验证图片时,通过所述纯色边界,即可智能划分需要渲染的区域,又可方便区分出需要剔除的每个子图片的边缘区域,从而使得还原后的验证图片的显示效果更加清楚真实。
在本申请的一些实施例中,当用户的操作环境较为安全时,可向终端发送较为简单的验证图片,以简化用户的验证操作,提高验证效率,提升用户体验。在另一些实施例中,当用户的操作环境较为复杂或存在一定的数据泄露风险时,可向终端发送较为复杂的验证图片,以提高机器用户的验证级别。
步骤S40:采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据。
得到若干个扩展子图片之后,再采用所述随机数列对每个所述扩展子图片加密,以得到加密后的若干个扩展子图片数据。若验证图片的数据在传输过程中泄露至第三方,由于第三方无法获知解密的方式或解密规则,则无法获得正确的验证图片信息,从而确保了验证图片在传输过程中的安全。由于所述随机数列在每次加密过程中为变化的数列,故终端每次解密的数据亦同步发生变化,从而也保证了对应的终端在解密过程中的安全性,不会发生机器用户通过一次破解即可破解所有验证图片的还原密码的问题。所述加密方式可采用现有的AES256、SM2、SM3等高强度加密算法,所述加密算法均为现有技术,在此不再赘述。
步骤S50:向所述终端发送所述随机数列和若干个所述扩展子图片数据。
加密后的所述扩展子图片数据将发送至对应的终端,以使终端获得需要的验证图片;同时,所述随机数列亦将发送至该终端,以使该终端利用该随机数列对加密后的所述扩展子图片数据进行解密。所述随机数列和若干个所述扩展子图片数据可采用同一种方式进行发送,亦可采用不同的方式发送。例如,所述随机数列可在一个线程中发送,所述扩展子图片数据在另一个线程中发送;或在同一个线程中先发送所述随机数列,再逐一发送每个所述扩展子图片数据,以使终端可通过所述随机数列逐一解密收到的每个所述扩展子图片数据。
本申请可将验证图片分隔为若干个向外扩展N个像素的扩展子图片,以使所述扩展子图片在终端还原拼接时抛弃边缘扩展的N个像素,只保留原来子图片的大小,从而避免终端通过压缩算法合成验证图片时的拼接失真问题,提高了验证图片的显示质量。
如图2所示,本申请还提出一种验证图片合成方法,该方法包括如下步骤:
步骤S60:接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;步骤S70:采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片;步骤S80:截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;步骤S90:将所述若干个子图片合成为验证图片。
当终端接收到服务器发送的随机数列和若干个扩展子图片数据后,可直接采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片。由于每个扩展子图片的边缘具有扩展的N个像素,故本合成方法需先截去每个所述扩展子图片边缘的N个像素,以得到原始的若干个子图片,再将原始的子图片合成为验证图片,从而得到在拼接边界无失真的验证图片。本实施例所述的合成方法与前述验证图片的发送方法结合使用,可在终端与服务器之间形成可显示高质量验证图片的验证图片交互系统。
在终端合成验证图片时,可采用现有的jpg压缩图片格式;即:所述将所述若干个子图片合成为验证图片,具体包括:
采用国际数字图像压缩标准的压缩算法形成国际数字图像压缩标准的静态图片。
现有的jpg也称为JPEG(全称为Joint Photographic Experts Group)。JPEG是由国际标准组织和国际电话电报咨询委员会为静态图像所建立的第一个国际数字图像压缩标准是常见的一种图像格式。本实施例采用通用的jpg格式作为验证图片的显示方式,使得本申请可应用于几乎所有现有的具有显示功能的终端,提高了本申请的适用范围。在jpg图像的合成过程中,如果两个待合成的图片相邻像素的颜色差异明显,jpg压缩算法将会使两个相邻像素的颜色趋于接近,但在本申请中,拼接的子图片正好是已经截去扩展像素的,故本实施例在提高终端的适用范围时,不会导致验证图片的失真。
当然,在本申请中也可以采用其它图片压缩算法合成验证图片,例如,PNG图像压缩算法、GIF图像压缩算法等,在此不再赘述。
在进一步地的合成方法的实施例中,所述将所述若干个子图片合成为验证图片之后,还可包括:
若所述验证图片的接缝处有纯色像素,剔除所述纯色像素。
所述验证图片的接缝即相邻的子图片拼接时的边缘位置。当所述若干个子图片合成为验证图片的过程中,或合成为验证图片之后,可通过渲染的方式处理所述验证图片,以使验证图片的显示更为清晰,或通过增加背景色等方式提高验证图片的识别难度,增加验证的安全性。当所述接缝处仍保留有扩展的纯色像素时,可能是扩展的像素数量与截去的像素数量不匹配,从而导致验证图片的拼接出现误差。本实施例可通过后续的渲染过程或图片压缩处理剔除所述纯色像素,从而进一步提高拼接质量。
结合前述的验证图片发送方法和验证图片合成方法,本申请还提出一种验证图片交互系统,所述系统包括步骤:
步骤S12:服务器接收终端的验证请求;步骤S20:根据所述验证请求生成一组随机数列;步骤S30:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
步骤S40:采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;步骤S50:向所述终端发送所述随机数列和若干个所述扩展子图片数据;步骤S61:终端接收所述服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;步骤S70:采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片;步骤S80:截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;步骤S90:将所述若干个子图片合成为验证图片。
本实施例的验证图片交互系统的验证图片还原密码不固定,加大了验证图片的破解难度;而且,通过扩展子图片的像素,可保证扩展子图片在拼接时的拼接处不会失真,提升了雁阵图片的展示效果和保真度,保证良好的用户体验。
根据本申请所述的验证图片发送方法,本申请还提出一种验证图片发送装置,如图3所示,该装置包括:
验证请求接收模块10,用于接收终端的验证请求;随机数列生成模块20,用于根据所述验证请求生成一组随机数列;扩展子图片模块30,用于将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;数据加密模块40,用于采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;数据发送模块50,用于向所述终端发送所述随机数列和若干个所述扩展子图片数据。
根据本申请所述的验证图片合成方法,本申请还提出一种验证图片合成装置,如图4所示,该装置包括:
验证数据接收模块60,用于接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;数据解密模块70,用于采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片;图片截取模块80,用于截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;图片合成模块90,用于将所述若干个子图片合成为验证图片。
本申请实施例还提供一种计算机可读存储介质,其上存储有计算机可读指令,该可读指令被处理器执行时实现前述任意一项所述的验证图片发送方法;或,该可读指令被处理器执行时实现前述任意一项所述的验证图片合成方法。
其中,所述存储介质包括但不限于任何类型的盘(包括软盘、硬盘、光盘、CD-ROM、和磁光盘)、ROM(Read-Only Memory,只读存储器)、RAM(Random AcceSS Memory,随即存储器)、EPROM(EraSable Programmable Read-Only Memory,可擦写可编程只读存储器)、EEPROM(Electrically EraSable Programmable Read-Only Memory,电可擦可编程只读存储器)、闪存、磁性卡片或光线卡片。也就是,存储介质包括由设备(例如,计算机)以能够读的形式存储或传输信息的任何介质。可以是只读存储器,磁盘或光盘等。
本申请实施例还提供一种计算机设备,所述计算机设备包括:
一个或多个处理器;存储装置,用于存储一个或多个可读指令,当所述一个或多个可读指令被所述一个或多个处理器执行,使得所述一个或多个处理器实现前述任意一项所述的验证图片发送方法;或,当所述一个或多个可读指令被所述一个或多个处理器执行,使得所述一个或多个处理器实现前述任意一项所述的验证图片合成方法。
如图5所示,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑、服务器等任意终端设备,以终端为手机为例:
图5示出的是与本申请实施例中作为终端的计算机设备相关的手机的部分结构的框图。参考图5,手机包括:射频(Radio Frequency,RF)电路1510、存储器1520、输入单元1530、显示单元1540、传感器1550、音频电路1560、无线保真(wireless fidelity,Wi-Fi)模块1570、处理器1580、以及电源1590等部件。本领域技术人员可以理解,图5中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图5对手机的各个构成部件进行具体的介绍:
RF电路1510可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1580处理;另外,将设计上行的数据发送给基站。通常,RF电路1510包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1510还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统 (Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access, WCDMA)、长期演进 (Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器1520可用于存储软件可读指令以及模块,处理器1580通过运行存储在存储器1520的软件可读指令以及模块,从而执行手机的各种功能应用以及数据处理。存储器1520可主要包括存储可读指令区和存储数据区,其中,存储可读指令区可存储操作系统、至少一个功能所需的应用可读指令(比如社交应用等)等;存储数据区可存储根据手机的使用所创建的数据(比如验证图片解密数据等)等。此外,存储器1520可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1530可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1530可包括触控面板1531以及其他输入设备1532。触控面板1531,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1531上或在触控面板1531附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1531可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1580,并能接收处理器1580发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1531。除了触控面板1531,输入单元1530还可以包括其他输入设备1532。具体地,其他输入设备1532可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元1540可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1540可包括显示面板1541,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode, OLED)等形式来配置显示面板1541。进一步的,触控面板1531可覆盖显示面板1541,当触控面板1531检测到在其上或附近的触摸操作后,传送给处理器1580以确定触摸事件的类型,随后处理器1580根据触摸事件的类型在显示面板1541上提供相应的视觉输出。虽然在图5中,触控面板1531与显示面板1541是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1531与显示面板1541集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器1550,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1541的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1541和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等; 至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路1560、扬声器1561,传声器1562可提供用户与手机之间的音频接口。音频电路1560可将接收到的音频数据转换后的电信号,传输到扬声器1561,由扬声器1561转换为声纹信号输出;另一方面,传声器1562将收集的声纹信号转换为电信号,由音频电路1560接收后转换为音频数据,再将音频数据输出处理器1580处理后,经RF电路1510以发送给比如另一手机,或者将音频数据输出至存储器1520以便进一步处理。
Wi-Fi属于短距离无线传输技术,手机通过Wi-Fi模块1570可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图5示出了Wi-Fi模块1570,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器1580是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1520内的软件可读指令和/或模块,以及调用存储在存储器1520内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1580可包括一个或多个处理单元;优选的,处理器1580可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用可读指令等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1580中。
手机还包括给各个部件供电的电源1590(比如电池),优选的,电源可以通过电源管理系统与处理器1580逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
应该理解的是,在本申请各实施例中的各功能单元可集成在一个处理模块中,也可以各个单元单独物理存在,也可以两个或两个以上单元集成于一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
以上所述仅是本申请的部分实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。

Claims (20)

  1. 一种验证图片发送方法,其特征在于,包括步骤:
    接收终端的验证请求;
    根据所述验证请求生成一组随机数列;
    将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;
    向所述终端发送所述随机数列和若干个所述扩展子图片数据,其中所述随机数列和若干个所述扩展子图片数据采用同一种方式进行发送,或者采用不同的方式发送;以供所述终端采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;并截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;将所述若干个子图片合成为验证图片。
  2. 根据权利要求1所述的方法,其特征在于,所述向外扩展的N个像素为纯色像素。
  3. 根据权利要求1所述的方法,其特征在于,所述接收终端的验证请求,包括:
    接收终端的验证请求和终端的环境参数数据;
    所述根据所述验证请求生成一组随机数列,具体包括:
    根据所述环境参数数据和所述验证请求生成一组随机数列。
  4. 一种验证图片合成方法,其特征在于,包括步骤:
    接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:
    将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;
    截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;
    将所述若干个子图片合成为验证图片。
  5. 根据权利要求4所述的方法,其特征在于,所述将所述若干个子图片合成为验证图片,具体包括:
    采用国际数字图像压缩标准的压缩算法形成国际数字图像压缩标准的静态图片。
  6. 根据权利要求5所述的方法,其特征在于,所述将所述若干个子图片合成为验证图片之后,还包括:
    若所述验证图片的接缝处有纯色像素,剔除所述纯色像素。
  7. 一种验证图片发送装置,其特征在于,包括:
    验证请求接收模块,用于接收终端的验证请求;
    随机数列生成模块,用于根据所述验证请求生成一组随机数列;
    扩展子图片模块,用于将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    数据加密模块,用于采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;
    数据发送模块,用于向所述终端发送所述随机数列和若干个所述扩展子图片数据,其中所述随机数列和若干个所述扩展子图片数据采用同一种方式进行发送,或者采用不同的方式发送;以供所述终端采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;并截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;将所述若干个子图片合成为验证图片。
  8. 一种验证图片合成装置,其特征在于,包括:
    验证数据接收模块,用于接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    数据解密模块,用于采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;
    图片截取模块,用于截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;
    图片合成模块,用于将所述若干个子图片合成为验证图片。
  9. 一种计算机可读存储介质,其上存储有计算机可读指令,其特征在于,该可读指令被处理器执行时实现以下步骤:
    接收终端的验证请求;
    根据所述验证请求生成一组随机数列;
    将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;
    向所述终端发送所述随机数列和若干个所述扩展子图片数据,其中所述随机数列和若干个所述扩展子图片数据采用同一种方式进行发送,或者采用不同的方式发送;以供所述终端采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;并截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;将所述若干个子图片合成为验证图片。
  10. 根据权利要求9所述的计算机可读存储介质,其特征在于,所述向外扩展的N个像素为纯色像素。
  11. 根据权利要求9所述的计算机可读存储介质,其特征在于,所述接收终端的验证请求,包括:
    接收终端的验证请求和终端的环境参数数据;
    所述根据所述验证请求生成一组随机数列,具体包括:
    根据所述环境参数数据和所述验证请求生成一组随机数列。
  12. 根据权利要求9所述的计算机可读存储介质,其特征在于,该可读指令被处理器执行时实现以下步骤:
    接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:
    将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;
    截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;
    将所述若干个子图片合成为验证图片。
  13. 根据权利要求12所述的计算机可读存储介质,其特征在于,所述将所述若干个子图片合成为验证图片,具体包括:
    采用国际数字图像压缩标准的压缩算法形成国际数字图像压缩标准的静态图片。
  14. 根据权利要求13所述的计算机可读存储介质,其特征在于,所述将所述若干个子图片合成为验证图片之后,还包括:
    若所述验证图片的接缝处有纯色像素,剔除所述纯色像素。
  15. 一种计算机设备,其特征在于,所述计算机设备包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个可读指令,
    当所述一个或多个可读指令被所述一个或多个处理器执行,使得所述一个或多个处理器实现以下步骤:
    接收终端的验证请求;
    根据所述验证请求生成一组随机数列;
    将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    采用所述随机数列对每个所述扩展子图片加密,得到若干个扩展子图片数据;
    向所述终端发送所述随机数列和若干个所述扩展子图片数据,其中所述随机数列和若干个所述扩展子图片数据采用同一种方式进行发送,或者采用不同的方式发送;以供所述终端采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;并截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;将所述若干个子图片合成为验证图片。
  16. 根据权利要求15所述的计算机设备,其特征在于,所述向外扩展的N个像素为纯色像素。
  17. 根据权利要求15所述的计算机设备,其特征在于,所述接收终端的验证请求,包括:
    接收终端的验证请求和终端的环境参数数据;
    所述根据所述验证请求生成一组随机数列,具体包括:
    根据所述环境参数数据和所述验证请求生成一组随机数列。
  18. 根据权利要求15所述的计算机设备,其特征在于,当所述一个或多个可读指令被所述一个或多个处理器执行,使得所述一个或多个处理器实现以下步骤:
    接收服务器发送的随机数列和若干个扩展子图片数据,所述随机数列为服务器根据验证请求生成,所述扩展子图片数据为服务器通过以下方法得到:
    将验证图片分割为若干个子图片,将每个所述子图片向外扩展N个像素,得到若干个扩展子图片,其中N为正整数;
    采用所述随机数列解密每个所述扩展子图片数据,得到若干个扩展子图片,或通过预设的映射或计算方法得到解密数列,解密每个所述扩展子图片数据,以得到对应的若干个扩展子图片;
    截去每个所述扩展子图片边缘的N个像素,得到若干个子图片,其中N为正整数;
    将所述若干个子图片合成为验证图片。
  19. 根据权利要求18所述的计算机设备,其特征在于,所述将所述若干个子图片合成为验证图片,具体包括:
    采用国际数字图像压缩标准的压缩算法形成国际数字图像压缩标准的静态图片。
  20. 根据权利要求19所述的计算机设备,其特征在于,所述将所述若干个子图片合成为验证图片之后,还包括:
    若所述验证图片的接缝处有纯色像素,剔除所述纯色像素。
PCT/CN2019/118391 2019-01-28 2019-11-14 验证图片发送方法、合成方法及装置、存储介质和终端 WO2020155772A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910078752.2 2019-01-28
CN201910078752.2A CN109886010B (zh) 2019-01-28 2019-01-28 验证图片发送方法、合成方法及装置、存储介质和终端

Publications (1)

Publication Number Publication Date
WO2020155772A1 true WO2020155772A1 (zh) 2020-08-06

Family

ID=66927002

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/118391 WO2020155772A1 (zh) 2019-01-28 2019-11-14 验证图片发送方法、合成方法及装置、存储介质和终端

Country Status (2)

Country Link
CN (1) CN109886010B (zh)
WO (1) WO2020155772A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109886010B (zh) * 2019-01-28 2023-10-17 平安科技(深圳)有限公司 验证图片发送方法、合成方法及装置、存储介质和终端
CN110572369A (zh) * 2019-08-14 2019-12-13 平安科技(深圳)有限公司 图片验证方法、装置、计算机设备及存储介质
CN111027371A (zh) * 2019-10-16 2020-04-17 平安科技(深圳)有限公司 一种智能验车的方法及系统、计算机设备与存储介质
CN111859354B (zh) * 2020-07-21 2023-09-01 百度在线网络技术(北京)有限公司 图片验证方法、装置、电子设备、存储介质和程序产品
CN112702165B (zh) * 2021-03-23 2021-06-25 北京惠风智慧科技有限公司 一种图像加密方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013102017A1 (en) * 2011-12-28 2013-07-04 Arbitron, Inc. Media exposure data collection and security
CN104200150A (zh) * 2014-09-01 2014-12-10 湖北盛天网络技术股份有限公司 验证码处理方法和装置
CN104852889A (zh) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 图片验证码生成方法和系统、验证方法和客户端及服务器
CN108846274A (zh) * 2018-04-09 2018-11-20 腾讯科技(深圳)有限公司 一种安全验证方法、装置及终端
CN109886010A (zh) * 2019-01-28 2019-06-14 平安科技(深圳)有限公司 验证图片发送方法、合成方法及装置、存储介质和终端

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1306824C (zh) * 2004-07-29 2007-03-21 联合信源数字音视频技术(北京)有限公司 图像边界像素扩展系统及其实现方法
CN105447404B (zh) * 2015-11-06 2018-12-14 湖北工业大学 一种云存储中图像隐私保护的方法及系统
CN107958449A (zh) * 2017-12-13 2018-04-24 北京奇虎科技有限公司 一种图像合成方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013102017A1 (en) * 2011-12-28 2013-07-04 Arbitron, Inc. Media exposure data collection and security
CN104852889A (zh) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 图片验证码生成方法和系统、验证方法和客户端及服务器
CN104200150A (zh) * 2014-09-01 2014-12-10 湖北盛天网络技术股份有限公司 验证码处理方法和装置
CN108846274A (zh) * 2018-04-09 2018-11-20 腾讯科技(深圳)有限公司 一种安全验证方法、装置及终端
CN109886010A (zh) * 2019-01-28 2019-06-14 平安科技(深圳)有限公司 验证图片发送方法、合成方法及装置、存储介质和终端

Also Published As

Publication number Publication date
CN109886010B (zh) 2023-10-17
CN109886010A (zh) 2019-06-14

Similar Documents

Publication Publication Date Title
WO2020155772A1 (zh) 验证图片发送方法、合成方法及装置、存储介质和终端
WO2018157858A1 (zh) 信息存储方法、装置及计算机可读存储介质
CN109033801B (zh) 应用程序验证用户身份的方法、移动终端以及存储介质
WO2019184705A1 (zh) 数据保护方法和装置、终端、计算机可读存储介质
WO2018090823A1 (zh) 一种系统分区关键数据的保护方法及系统、终端
WO2018076879A1 (zh) 数据备份方法、装置、存储介质及终端
WO2014073847A1 (en) User terminal, external apparatus, data transceiving system, and data transceiving method
WO2017067271A1 (zh) 一种指纹识别方法、指纹识别装置和移动终端
WO2017071330A1 (zh) 数据的加密和解密方法及加密和解密装置
WO2017122980A1 (en) Electronic device and method for authenticating identification information thereof
WO2018035930A1 (zh) 一种系统解锁方法和设备
CN108810019B (zh) 拒绝服务攻击防御方法、装置、设备和存储介质
WO2017071324A1 (zh) 传输文件的加密和解密方法及加密和解密装置
WO2014035171A1 (ko) 전자장치에서 영상통화중 파일 전송 방법 및 장치
WO2015199505A1 (en) Apparatus and method for preventing malfunction in an electronic device
WO2020020029A1 (zh) 密钥更新方法、终端及网络侧设备
WO2012053875A2 (ko) 지문 정보를 통한 데이터 송신 수신 장치 및 시스템
WO2018053904A1 (zh) 一种信息处理方法及终端
WO2021027134A1 (zh) 数据存储方法、装置、设备和计算机存储介质
WO2023151256A1 (zh) 弱口令爆破攻击的防护方法、装置、介质、电子设备
WO2021068895A1 (zh) 截屏方法及其终端设备
WO2018145597A1 (zh) 基于移动终端的屏幕补光拍照方法及系统、移动终端
CN107302526B (zh) 系统接口调用方法、设备和计算机可读存储介质
WO2017016272A1 (zh) 一种虚拟资源数据的处理方法、装置及系统
CN106303085B (zh) 移动终端以及保密通话的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19913531

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19913531

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/01/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19913531

Country of ref document: EP

Kind code of ref document: A1