WO2021238753A1 - 验证方法、装置和电子设备 - Google Patents

验证方法、装置和电子设备 Download PDF

Info

Publication number
WO2021238753A1
WO2021238753A1 PCT/CN2021/094774 CN2021094774W WO2021238753A1 WO 2021238753 A1 WO2021238753 A1 WO 2021238753A1 CN 2021094774 W CN2021094774 W CN 2021094774W WO 2021238753 A1 WO2021238753 A1 WO 2021238753A1
Authority
WO
WIPO (PCT)
Prior art keywords
target image
image
transparency
verification
target
Prior art date
Application number
PCT/CN2021/094774
Other languages
English (en)
French (fr)
Inventor
吴源燚
张佳龙
黄鹤清
谢文奇
陈洪飞
赵晨晓
石崇文
杜培东
王欣宇
宋晔
段文斌
Original Assignee
北京字节跳动网络技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京字节跳动网络技术有限公司 filed Critical 北京字节跳动网络技术有限公司
Publication of WO2021238753A1 publication Critical patent/WO2021238753A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Definitions

  • the present disclosure relates to the field of Internet technology, and in particular to a verification method, device and electronic equipment.
  • CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA
  • verification code test is a public fully automatic program that distinguishes whether a user is a computer or a human. Setting a verification code can effectively prevent malicious registration, brute force cracking, or batch posting of the program.
  • verification code technology With the continuous development of verification code technology, various forms of verification codes have emerged, such as digital verification codes, image verification codes, and slider verification codes. However, people with ulterior motives will still use various methods to try to crack the verification code, for example, using the machine running the cracking program to pretend to be a human being.
  • the embodiments of the present disclosure provide a verification method, device, and electronic equipment.
  • embodiments of the present disclosure provide a verification method, the method includes: displaying a target image and a target control; according to an operation on the target control, rotating the target image and changing the target image transparency of the target image ; Based on the operation, it is determined whether the verification is passed.
  • an embodiment of the present disclosure provides a verification device, including: a display unit for displaying a target image and a target control; a rotation unit for rotating the target image and changing the target image according to an operation on the target control The target image transparency of the target image; a verification unit, configured to determine whether the verification is passed or not based on the operation.
  • an embodiment of the present disclosure provides an electronic device, including: one or more processors; a storage device, configured to store one or more programs, when the one or more programs are used by the one or more Executed by two processors, so that the one or more processors implement the verification method as described in the first aspect.
  • embodiments of the present disclosure provide a computer-readable medium on which a computer program is stored, and when the program is executed by a processor, the steps of the verification method as described in the first aspect are implemented.
  • the verification method, device and electronic equipment provided by the embodiments of the present disclosure can display the target image and display the target control; then, the target image is rotated according to the user's operation on the target control, and the target image transparency of the target image is changed, and based on the user
  • a new verification method can be provided.
  • the change of the transparency of the target image compared with not changing the transparency of the target image, increases the operational difficulty for the human user, thereby providing more operation details for verification and improving the accuracy of verification.
  • Fig. 1 is a flowchart of an embodiment of a verification method according to the present disclosure
  • FIGS. 2A, 2B, and 2C are diagrams of exemplary application scenarios of the verification method according to the present disclosure
  • Figure 3 is a brief explanatory diagram of an exemplary cracking method
  • Fig. 4 is a schematic structural diagram of an embodiment of a verification device according to the present disclosure.
  • FIG. 5 is an exemplary system architecture in which the verification method of an embodiment of the present disclosure can be applied
  • Fig. 6 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
  • FIG. 1 shows the flow of an embodiment of the verification method according to the present disclosure.
  • the verification method includes the following steps:
  • Step 101 Display the target image and the target control.
  • the execution subject of the verification method (for example, the terminal device) can display the target image and the target control.
  • the above-mentioned target image can be obtained in various ways, which is not limited here.
  • the foregoing target image may be sent from the server to the terminal.
  • the server obtains the target image can be set according to the actual application scenario, which is not limited here.
  • the server can rotate the material image and use the rotated material image as the target image, or adjust the rotated material image to obtain the target image.
  • the foregoing target image may be generated by the terminal itself, that is, the server sends a material image to the terminal, and then the terminal rotates the material image, and adjusts the rotated material image to obtain the target image.
  • the target control is used to rotate the target image and change the transparency of the target image.
  • the above-mentioned target control may be operated and moved by a human user, or may be moved by a machine user.
  • the display form of the above-mentioned target control can be various, which is not limited here.
  • the above-mentioned target control may be in the shape of a circle, a bar, or the like.
  • the operation form of the above-mentioned target control can be various, which is not limited here.
  • the aforementioned target control may include a slide rail and a slider, and the slider can be dragged. As the drag progresses, the target image is continuously rotated, and the transparency of the mask is continuously changed.
  • the device may need to be verified to obtain the corresponding permissions.
  • verification can also be referred to as authentication.
  • the device needs to be verified before logging in to the website, before performing a payment operation, etc.; specifically, the device can send various requests (such as a login request or a payment request) to the server. If the request triggers the verification mechanism, the server can send a request to the server.
  • the above device returns a verification code.
  • the interface that prompts the device to display the verification code can be called the verification interface.
  • the verification code may be of various types, such as letter verification code, digital verification code, slider verification code, and so on.
  • the device that sends the various requests to trigger the verification mechanism may be a terminal used by a real human user, or an electronic device (such as a terminal or a server) on which an automatic operation program designed by a cracker runs.
  • the automatic operation program When the automatic operation program is running, it can automatically identify the verification code and perform operations, and provide answers to the execution subject, in an attempt to convince the server that verifies the device that the device that sends various requests is being verified by a human user.
  • the operator may be a human user or a machine user; among them, the machine user can execute a cracking program (or an automatic operation program) to simulate the operation of a human user.
  • Step 102 Rotate the target image and change the target image transparency of the target image according to the operation on the target control.
  • the above-mentioned execution subject may rotate the target image and change the target image transparency of the target image according to the operation on the target control.
  • the specific process of rotating the target image according to the operation of the target control and the specific process of changing the mask transparency according to the operation of the target control can be set according to the actual application scenario.
  • the above operation is a drag operation.
  • the rotation speed of the rotating target image may be uniform or non-uniform.
  • the above operation is a drag operation.
  • the change speed of the transparency of the target image may be uniform or non-uniform.
  • the foregoing method may further include: displaying operation prompt information.
  • the above-mentioned operation prompt information is used to indicate at least one of the following to operate the target control: operation mode and operation target.
  • the operation mode can be "drag the slider".
  • the operation target may be "rotate the image to the positive position".
  • Step 103 Based on the operation, it is determined whether the verification is passed.
  • the above-mentioned execution subject may determine whether the verification is passed or not based on the operation on the target control.
  • the verification based on the operation may be based on various matters related to the operation, such as the parameters related to the operation.
  • the above-mentioned operation-related parameters may be predefined according to actual application scenarios, and are not limited here.
  • a prompt message indicating that the verification is passed can be displayed; if the verification fails, a prompt message indicating that the verification is not passed can be displayed.
  • verification based on operations can be performed by the terminal, by the server, or jointly by the terminal and the server.
  • step 103 performed by the client may include: sending parameters related to the operation to the server, the server may return a verification result to the terminal, and the terminal may determine whether the verification is passed or not based on the received verification result.
  • the terminal can combine the verification results of the two parameters to determine whether the verification is passed.
  • FIG. 2A, FIG. 2B, and FIG. 2C show an exemplary scenario of this embodiment.
  • a target image 201 and a target control 202 are shown.
  • the target control 202 may include a sliding rail 2021 and a slider 2022.
  • the image 201 can be rotated in a rectangular area on the interface, and visually, it can be a rotation of a building image in a circular area.
  • the density of the shadow image is used to characterize the transparency of the target image; the higher the density of the shadow image, the greater the transparency of the target image (that is, the more opaque visually).
  • the shadow image has the highest density, that is, the most opaque.
  • the slider 2022 is in the middle position, and the density of the shadow images in the target image is reduced compared to FIG. 2A, that is, the transparency of the target image is reduced. That is, the target image in FIG. 2B becomes transparent with respect to the target image in FIG. 2A.
  • the moving distance of the slider 2022 is greater, and the shadow image disappears, which means that the transparency of the target image is further reduced to that of the target image relative to FIG. 2B.
  • the verification method provided in this embodiment can display the target image and display the target control; then, the target image is rotated according to the user's operation on the target control, and the target image transparency of the target image is changed, and is based on the user's Operation to verify whether the user is a human user, that is, to determine whether the verification is passed.
  • a new verification method can be provided.
  • the change of the transparency of the target image compared with not changing the transparency of the target image, increases the operational difficulty for the human user, thereby providing more operation details for verification and improving the accuracy of verification.
  • the target image includes a graphic image and a mask of the graphic image
  • changing the target image transparency of the target image is achieved by at least one of the following: changing the mask transparency of the mask, changing the graphic image of the graphic image transparency.
  • the transparency of the target image can be used to characterize the degree of transparency of the graphic image and the mask superimposed together.
  • the setting of the mask can make it more convenient to change the transparency of the target image.
  • the graphic image and the above-mentioned mask may be obtained from the server together, or the graphic image may be obtained from the server and the mask is generated locally on the terminal.
  • graphic images and masks can be understood as images located on two layers.
  • the layer where the mask is located is above the layer where the graphic image is located.
  • the mask is equivalent to a layer of glass sheet covering the graphic image.
  • This glass sheet can be transparent, translucent or completely opaque.
  • the foregoing graphic image may be sent from the server to the terminal.
  • How the server obtains the graphic image can be set according to the actual application scenario, which is not limited here.
  • the server can rotate the material image and adjust the rotated material image to obtain a graphic image.
  • the foregoing graphic image may be generated by the terminal itself, that is, the server sends a material image to the terminal, and then the terminal rotates the material image, and adjusts the rotated material image to obtain the graphic image.
  • the mask of the above-mentioned graphic image may be a mask set on top of the graphic image. Since the graphic image in the graphic image is displayed together with the mask, the display effect of the graphic image can be a superimposed effect of the graphic image and the mask.
  • the above-mentioned masks can be various, which is not limited here.
  • the above-mentioned mask may be a line drawing, and the line drawing may include a pattern in the form of a line; in the line drawing, the pattern is displayed at the position of the line, and the pattern is not displayed at the position of the non-line.
  • the above-mentioned mask may be a blank image, the blank image may not include a pattern, and the blank image does not display the pattern as a whole, but the transparency of the blank image may vary.
  • the transparency of the mask can be used to characterize the degree of transparency of the mask.
  • the transparency of the mask can be characterized by the value of the transparency channel (also called Alpha Channel) of the mask; in other words, adjusting the transparency of the mask can be achieved by adjusting the value of the alpha channel of the mask image.
  • a picture that uses 16-bit storage may have 5 bits for red, 5 bits for green, 5 bits for blue, and 1 bit for alpha; when 1 bit is alpha, the image is completely transparent or completely opaque.
  • each 8 bits represents red, green, blue and transparency channels; in this case, the transparency channel can represent 256 levels of transparency.
  • the server can preset a material image library.
  • the server can rotate the material image in the material image library to obtain the original image and the target rotation angle, and the target rotation angle can indicate the rotation angle of the material image to the original image.
  • the server may perform various degrees of rotation for each material image in the material image library in advance to obtain multiple pairs of original images and target rotation angles.
  • the server triggers the verification mechanism and needs to return a verification code to the device, it can randomly obtain the original image and the target rotation angle.
  • the server can preset a material image library.
  • the server triggers the verification mechanism and needs to return the verification code to the device, it randomly obtains the material image from the material image library, performs random rotation, and then obtains the original image and the target rotation angle.
  • the material image generally has a forward image feature that can only be recognized by a human user, where the forward image feature can be used by the human user to determine whether the image is in a positive state.
  • the head of the animal In the animal image, the head of the animal is upright, has long legs and a neck, and the animal is in a standing state; you can also select a still life image.
  • the still life in the still life image can be common in life.
  • the scene for example, contains an obvious sense of gravity (such as a building), and the background ground is level.
  • the rotation of the above-mentioned material image is generally performed with the center of the image as the center of rotation.
  • the images are all rectangular (for example, rectangular or square).
  • the original image obtained by rotating the material image is also rectangular.
  • the size of the material image and the original image are the same (that is, the pixels in the length direction are the same, and the pixels in the width direction are the same)
  • the original image obtained by rotating the material image loses some pixels relative to the material image.
  • the original image can be adjusted in a non-rotated manner to obtain the target image.
  • the target image may have a certain tilt relative to the material image, and the tilt angle is the same as the original image.
  • the original image rotates at a different angle relative to the material image, which means that the lost pixels are different. Therefore, the original images obtained by rotating the material image at different angles have different main colors, and the channel values of each pixel in the blank part (including The color channel value and the transparent channel value) are both 0.
  • the same material image is rotated at different angles to obtain the pictures, which have different hash values. If only the cropped circles are retained in the rectangular image, the pixels of all circles can be rotated one-to-one in any case, so only the main tone of the cropped circular rectangular image is the same; but when the rotation angles are different , Because the position of the pixel value in the square image is different, the hash value of the rectangular image that only retains the circle is different.
  • the display area of the original image can be selected, and the shape of the display area can be various.
  • it may be a circle, a triangle, a rectangle, etc. It can be understood that the circle in FIG. 2 is only for illustration, and does not constitute a limitation on the shape of the display area.
  • the cracking methods may include a preparation phase and an application phase. Please refer to Figure 3, which shows a schematic diagram of the cracking method.
  • Preparation stage Download the verification code through various methods, the goal is to exhaust the material image library; then, through similar algorithms, filter the existing images, that is, the images with the same content but different rotation angles, and only keep one; and then, Label each image, such as material A, material B, and material C; then, rotate each image once every preset angle interval (for example, 3 degrees).
  • material B in FIG. 3 three original images obtained by rotating material B are shown, namely, the A rotation angle, the B rotation angle, and the C rotation angle.
  • the cracker also needs to find the corresponding relationship between the operation degree and the rotation angle, for example, the relationship between the sliding distance of the target control and the rotation angle.
  • Application stage Download the original image as the image to be recognized; use various methods to determine the image label of the image to be recognized, such as material B; then, use the hash value comparison to determine which data is under material B, for example, it is determined that it is B rotation angle; then, the angle difference between the B rotation angle and the data marked with the forward image (for example, 30 degrees) can be determined; then, the operation degree corresponding to the above-mentioned angle difference can be determined, for example, the operation degree can be rotation 30 degrees needs to control the sliding distance value of the target control; finally, the machine user controls the target control according to the above-mentioned degree of operation, and rotates the verification code by the above-mentioned angle difference to complete the cracking task.
  • the image label needs to be located first, then the data image under the image label is located, and the degree of operation must be determined.
  • the two steps of determining the image label of the image to be recognized and determining which piece of data under the image label are combined can be implemented.
  • the crackers rely on the first point, the second point and the third point.
  • the first point is that the material image library can be exhausted, and the material image can be matched and positioned horizontally, that is, the image of which content can be accurately identified.
  • the second point is that for images of the same content, the rotation angle can be located by matching the hash value or the main color; the basis for positioning the rotation angle by matching the hash value or the main color can be as follows: Take material B as an example. First, material B The hash value of each rotation angle is different, or the main color is different; secondly, for material B, the hash value of a single angle (such as the rotation angle of A) is stable, or the main color is stable.
  • the third point is to find the correspondence between the degree of operation and the angle difference (that is, the target rotation angle).
  • the hash value is stable.
  • the target image of the material B obtained by the terminal at a single angle (for example, the rotation angle of A) has the same hash value calculated multiple times; it is understandable that if the hash value calculated each time is not the same , There is no matching basis.
  • the main color is the same.
  • the rotation angle of the target image is negatively related to the transparency of the target image.
  • the continuous process of operation can be defined according to different types of operations.
  • a drag operation after the drag is started to before the drag is released, it can be used as the operation continuation process.
  • a continuous click operation if the click stops for a preset interval and there is no next click, the click will be regarded as the last click, and the process from the start of the click to before the last click can be regarded as the operation continuation process.
  • the rotation angle of the target image may be negatively related to the transparency of the target image.
  • the above-mentioned target image transparency may decrease. The smaller the transparency of the target image, the more transparent the target image.
  • the transparency of the target image is negatively related to the rotation angle of the target image, which can make the image content of the target image gradually clear during the rotation of the target image, thereby reducing interference to the target image and improving the efficiency of the user to obtain image information.
  • the target image will get closer and closer to the positive state. The closer the human user is to success (that is, the higher the definition of the target image is).
  • the target image is used as a reference. At this time, the human user’s attention is usually focused on the target image, which reduces the interference to the target image, which can reduce the difficulty of operation for the human user.
  • the transparency of the target image is less than the preset transparency threshold
  • the aforementioned preset transparency threshold may indicate that the user can clearly see the target image transparency of the target image. It should be noted that the above-mentioned "being able to see clearly” is a value judgment and can be judged by ordinary people.
  • first angle threshold and the above-mentioned second angle threshold are equivalent to defining an angle range.
  • the rotation angle of the target image is within this angle range, the transparency of the target image is smaller, which can make the target image clearer. , which can reduce the difficulty of operation for human users.
  • the above-mentioned target control may be marked with the word "start”.
  • the execution subject can rotate the target image according to a preset rotation mode, and change the transparency of the target image according to a preset transparency change mode.
  • the words marked on the target control are changed to the words marked "Stop” to prompt the user to click the target control marked with the words "Stop” to stop the target image Spin.
  • the aforementioned preset rotation mode may include uniform rotation and/or non-uniform rotation.
  • the above step 102 may include: determining the degree of operation according to the operation on the target control; determining the rotation angle of the target image according to the degree of operation, and determining the transparency of the target image.
  • the degree of operation can be used to characterize the progress of the user's operation of the target control.
  • the degree of operation can be represented by the distance between the initial slider position and the current slider position.
  • the operability can be determined by the number of clicks. Then, the rotation angle can be determined based on the number of clicks. As an example, for the first 5 clicks, the angle increment for each click is 0.5 degrees; starting from the 6th click, the angle increment for each click is 0.2 degrees.
  • the first corresponding relationship between the degree of operation and the angle of rotation may be preset.
  • the first correspondence relationship may be represented by a correspondence relationship table, or may be expressed by a functional relationship.
  • the second correspondence between the degree of operation and the transparency of the target image may be preset.
  • the second correspondence may be represented by a correspondence table, or may be represented by a functional relationship.
  • the execution subject may determine the rotation angle of the target image according to the degree of operation and the preset first correspondence, and then rotate the target image to the determined rotation angle.
  • the above-mentioned execution subject may determine the transparency of the target image according to the degree of operation and the second preset corresponding relationship, and then adjust the transparency of the target image to the determined target image transparency.
  • the linear relationship may include: the change speed of the operation degree, which is consistent with the change speed of the transparency of the target image.
  • the non-linear relationship between the transparency and the degree of operation of the target image can provide more verification basis, thereby increasing the difficulty of cracking.
  • the human user may be more cautious when operating, and the operation speed may be reduced. Using this as a verification basis can increase the difficulty of cracking.
  • the above-mentioned target control may include a sliding rail and a slider
  • the above-mentioned slider can move on the above-mentioned sliding rail in response to the above-mentioned operation
  • the above-mentioned degree of operation may be the distance between the current position and the initial position of the above-mentioned slider, That is, the moving distance of the slider on the slide rail.
  • the parameters related to the operation may include the relevant parameters at the time when the operation is stopped, and may also include the relevant parameters during the continuation of the operation.
  • the foregoing step 103 may include: determining whether the verification is passed according to at least one of the following but not limited to: relevant parameters at the time when the operation stops, and relevant parameters during the continuation of the operation. In other words, it can be determined whether the verification is passed or not based on the above-mentioned operation stop time and/or related parameters during the operation continuation process.
  • the parameter during the operation duration includes an operation position corresponding to the operation time; and at least one of the following according to the operation: related parameters at the time when the operation stops, and related parameters during the operation duration , Determining whether the verification is passed includes: determining whether the verification is passed according to the relevant parameters of the operation when the target image is at a preset target image transparency.
  • the specific value of the transparency of the preset target image can be set according to the actual application scenario, which is not limited here.
  • the preset target image transparency may be near the location where the transparency of the target image changes suddenly, and a human user may perform repeated operations on the control (for example, drag to the right and then to the left). These operation details can be used to verify whether it is a human user, thereby increasing the difficulty of cracking.
  • the step 103 may include: determining whether the verification is passed according to the relevant parameters at the time when the operation of the operation stops.
  • the determination of the time when the operation stops can be determined according to the type of operation.
  • the time when the operation stops may be the time when the drag is released.
  • the relevant parameters at the time when the operation stops may include the rotation angle. It can be determined whether the verification is passed by determining whether the difference between the rotation angle and the target rotation angle is less than a preset error.
  • the continuous process of operation can be defined according to different types of operations.
  • the click stops for a preset interval without the next click, the click is regarded as the last click, and the process from the start of the click to the last click can be regarded as the operation continuation process.
  • the relevant parameters during the operation duration may include an operation track, such as a drag track.
  • the above-mentioned operation-related parameter values may be generated by a human user operation, or may be generated by an automatic operation program controlling the above-mentioned target control.
  • the parameters related to the operation can provide a lot of details. For example, for the drag track of the above-mentioned target control, multiple details can be integrated to determine whether the device for sending operation information is operated by a human user.
  • the parameters in the operation duration include operation position data corresponding to the operation time; and the determination of whether the verification is passed according to the relevant parameters in the operation duration of the operation includes: according to the and operation The operation position data corresponding to the time determines whether the verification is passed.
  • the operating speed can be determined based on the operating position data corresponding to the operating time, and based on the operating trajectory and operating speed; it can be determined whether there is a human user operating based on the operating trajectory and operating speed.
  • the present disclosure provides an embodiment of a verification device.
  • the device embodiment corresponds to the method embodiment shown in FIG. 1, and the device can be specifically applied Used in various electronic devices.
  • the verification device of this embodiment includes: a display unit 401, a rotation unit 402, and a verification unit 403; wherein, the display unit is used to display the target image and the target control; The operation of the control is to rotate the target image and change the transparency of the target image of the target image; the verification unit is configured to determine whether the verification is passed or not based on the operation.
  • the target image includes a graphic image and a mask of the graphic image
  • changing the image transparency of the target image is achieved by at least one of the following: changing the mask transparency of the mask, changing the graphic image transparency of the graphic image .
  • the rotation angle of the target image is negatively related to the transparency of the target image.
  • the transparency of the target image is less than the preset transparency threshold
  • the rotating the target image and changing the transparency of the target image according to the operation on the target control includes: determining the degree of operation according to the operation on the target control; and according to the operation degree , Determine the rotation angle of the target image, and determine the transparency of the target image.
  • the target control includes a slide rail and a slider, the slider moves on the slide rail in response to the operation, and the degree of operation is the movement of the slider on the slide rail distance.
  • the determining whether the verification is passed based on the parameters related to the operation includes: determining according to at least one of the following: the relevant parameters at the time when the operation stops, and the relevant parameters in the continuation process of the operation. The verification is passed.
  • the parameter during the operation duration includes an operation position corresponding to the operation time; and at least one of the following according to the operation: related parameters at the time when the operation stops, and related parameters during the operation duration , Determining whether the verification is passed includes: determining whether the verification is passed according to the relevant parameters of the operation when the target image is at a preset target image transparency.
  • FIG. 5 shows an exemplary system architecture in which the verification method of an embodiment of the present disclosure can be applied.
  • the system architecture may include terminal devices 501, 502, and 503, a network 504, and a server 505.
  • the network 504 is used to provide a medium for communication links between the terminal devices 501, 502, 503 and the server 505.
  • the network 504 may include various connection types, such as wired, wireless communication links, or fiber optic cables, and so on.
  • the terminal devices 501, 502, and 503 can interact with the server 505 via the network 504 to receive or send messages and so on.
  • Various client applications may be installed on the terminal devices 501, 502, and 503, such as web browser applications, search applications, and news applications.
  • the client applications in the terminal devices 501, 502, and 503 can receive instructions from the user, and perform corresponding functions according to the instructions of the user, for example, add corresponding information to the information according to the instructions of the user.
  • the terminal devices 501, 502, and 503 may be hardware or software.
  • the terminal devices 501, 502, and 503 can be various electronic devices that have a display screen and support web browsing, including but not limited to smart phones, tablet computers, e-book readers, and MP3 players (Moving Picture Experts Group). Audio Layer III, Motion Picture Experts compress standard audio layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, Motion Picture Experts compress standard audio layer 4) Players, laptop portable computers and desktop computers, etc.
  • the terminal devices 501, 502, and 503 are software, they can be installed in the electronic devices listed above. It can be implemented as multiple software or software modules (for example, software or software modules used to provide distributed services), or as a single software or software module. There is no specific limitation here.
  • the server 505 may be a server that provides various services, for example, receiving information acquisition requests sent by the terminal devices 501, 502, and 503, and acquiring display information corresponding to the information acquisition request in various ways according to the information acquisition request. And the relevant data of the display information is sent to the terminal devices 501, 502, 503.
  • the verification method provided in the embodiments of the present disclosure can be executed by a terminal device, and accordingly, the verification device can be set in the terminal devices 501, 502, and 503.
  • the verification method provided by the embodiment of the present disclosure may also be executed by the server 505, and accordingly, the verification device may be set in the server 505.
  • terminal devices, networks, and servers in FIG. 5 are merely illustrative. It can have any number of terminal devices, networks, and servers according to implementation needs.
  • FIG. 6 shows a schematic structural diagram of an electronic device (for example, the terminal device or the server in FIG. 5) suitable for implementing the embodiments of the present disclosure.
  • the terminal devices in the embodiments of the present disclosure may include, but are not limited to, mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablets), PMPs (portable multimedia players), vehicle-mounted terminals (e.g. Mobile terminals such as car navigation terminals) and fixed terminals such as digital TVs, desktop computers, etc.
  • the electronic device shown in FIG. 6 is only an example, and should not bring any limitation to the function and scope of use of the embodiments of the present disclosure.
  • the electronic device may include a processing device (such as a central processing unit, a graphics processor, etc.) 601, which can be loaded into a random access memory according to a program stored in a read-only memory (ROM) 602 or from a storage device 608 (RAM) Programs in 603 execute various appropriate actions and processes. In the RAM 603, various programs and data required for the operation of the electronic device 600 are also stored.
  • the processing device 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604.
  • An input/output (I/O) interface 605 is also connected to the bus 604.
  • the following devices can be connected to the I/O interface 605: including input devices 606 such as touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; including, for example, liquid crystal display (LCD), speakers, vibration An output device 607 such as a device; a storage device 608 such as a magnetic tape, a hard disk, etc.; and a communication device 609.
  • the communication device 609 may allow the electronic device to perform wireless or wired communication with other devices to exchange data.
  • FIG. 6 shows an electronic device having various devices, it should be understood that it is not required to implement or have all of the illustrated devices. It may be implemented alternatively or provided with more or fewer devices.
  • an embodiment of the present disclosure includes a computer program product, which includes a computer program carried on a non-transitory computer readable medium, and the computer program contains program code for executing the method shown in the flowchart.
  • the computer program may be downloaded and installed from the network through the communication device 609, or installed from the storage device 608, or installed from the ROM 602.
  • the processing device 601 the above-mentioned functions defined in the method of the embodiment of the present disclosure are executed.
  • the above-mentioned computer-readable medium in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the two.
  • the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in a baseband or as a part of a carrier wave, and a computer-readable program code is carried therein. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium.
  • the computer-readable signal medium may send, propagate or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
  • the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to: wire, optical cable, RF (Radio Frequency), etc., or any suitable combination of the above.
  • the client and server can communicate with any currently known or future developed network protocol such as HTTP (HyperText Transfer Protocol), and can communicate with digital data in any form or medium.
  • Communication e.g., communication network
  • Examples of communication networks include local area networks (“LAN”), wide area networks (“WAN”), the Internet (for example, the Internet), and end-to-end networks (for example, ad hoc end-to-end networks), as well as any currently known or future research and development network of.
  • the above-mentioned computer-readable medium may be included in the above-mentioned electronic device; or it may exist alone without being assembled into the electronic device.
  • the above-mentioned computer-readable medium carries one or more programs.
  • the electronic device displays the target image and the target control; The target image and the target image transparency of the target image are changed; based on the operation, it is determined whether the verification is passed.
  • the computer program code used to perform the operations of the present disclosure can be written in one or more programming languages or a combination thereof.
  • the above-mentioned programming languages include, but are not limited to, object-oriented programming languages—such as Java, Smalltalk, C++, and Including conventional procedural programming languages-such as "C" language or similar programming languages.
  • the program code can be executed entirely on the user's computer, partly on the user's computer, executed as an independent software package, partly on the user's computer and partly executed on a remote computer, or entirely executed on the remote computer or server.
  • the remote computer can be connected to the user’s computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (for example, using an Internet service provider to pass Internet connection).
  • LAN local area network
  • WAN wide area network
  • each block in the flowchart or block diagram can represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more for realizing the specified logic function.
  • Executable instructions can also occur in a different order from the order marked in the drawings. For example, two blocks shown one after the other can actually be executed substantially in parallel, or they can sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations Or it can be realized by a combination of dedicated hardware and computer instructions.
  • the units involved in the embodiments described in the present disclosure can be implemented in software or hardware. Among them, the name of the unit does not constitute a limitation on the unit itself under certain circumstances.
  • the display unit can also be described as "a unit that displays the target image and the target control.”
  • exemplary types of hardware logic components include: Field Programmable Gate Array (FPGA), Application Specific Integrated Circuit (ASIC), Application Specific Standard Product (ASSP), System on Chip (SOC), Complex Programmable Logical device (CPLD) and so on.
  • FPGA Field Programmable Gate Array
  • ASIC Application Specific Integrated Circuit
  • ASSP Application Specific Standard Product
  • SOC System on Chip
  • CPLD Complex Programmable Logical device
  • a machine-readable medium may be a tangible medium, which may contain or store a program for use by the instruction execution system, apparatus, or device or in combination with the instruction execution system, apparatus, or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • the machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any suitable combination of the foregoing.
  • machine-readable storage media would include electrical connections based on one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
  • RAM random access memory
  • ROM read-only memory
  • EPROM or flash memory erasable programmable read-only memory
  • CD-ROM compact disk read only memory
  • magnetic storage device or any suitable combination of the foregoing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种验证方法、装置和电子设备。该方法包括:展示目标图像和目标控件(101);根据针对该目标控件的操作,转动该目标图像以及改变该目标图像的目标图像透明度(102);基于该操作,确定验证是否通过(103)。由此,可以提供一种新的验证方式。

Description

验证方法、装置和电子设备
相关申请的交叉引用
本申请要求于2020年05月29日提交的,申请号为202010481879.1、发明名称为“验证方法、装置和电子设备”的中国专利申请的优先权,该申请的全文通过引用结合在本申请中。
技术领域
本公开涉及互联网技术领域,尤其涉及一种验证方法、装置和电子设备。
背景技术
全自动区分计算机和人类的图灵测试(Completely Automated Public Turing test to tell Computers and Humans Apart,CAPTCHA),也称验证码测试,是一种区分用户是计算机还是人的公共全自动程序。设置验证码,可以有效防止使用程序恶意注册、暴力破解或者批量发帖等。
随着验证码技术的不断发展,出现了各种形式的验证码,例如,数字验证码、图片验证码、滑块验证码等。但是别有用心者,依然会使用各种方法,试图破解验证码,例如,利用运行破解程序的机器操作而伪装是人类在操作。
发明内容
提供该公开内容部分以便以简要的形式介绍构思,这些构思 将在后面的具体实施方式部分被详细描述。该公开内容部分并不旨在标识要求保护的技术方案的关键特征或必要特征,也不旨在用于限制所要求的保护的技术方案的范围。
本公开实施例提供了一种验证方法、装置和电子设备。
第一方面,本公开实施例提供了一种验证方法,该方法包括:展示目标图像和目标控件;根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度;基于所述操作,确定验证是否通过。
第二方面,本公开实施例提供了一种验证装置,包括:展示单元,用于展示目标图像和目标控件;转动单元,用于根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度;验证单元,用于基于所述操作,确定验证是否通过。
第三方面,本公开实施例提供了一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如第一方面所述的验证方法。
第四方面,本公开实施例提供了一种计算机可读介质,其上存储有计算机程序,该程序被处理器执行时实现如第一方面所述的验证方法的步骤。
本公开实施例提供的验证方法、装置和电子设备,可以展示目标图像,以及展示目标控件;然后,根据用户对目标控件的操作转动目标图像,以及改变目标图像的目标图像透明度,并且,基于用户的操作,验证用户是否是人类用户,即确定验证是否通过。由此,可以提供一种新的验证方式。并且,目标图像透明度的改变,相对于不改变目标图像透明度,对于人类用户来说增加了操作难度,由此可以提供更多的操作细节以供验证,提高验证的准确性。
附图说明
结合附图并参考以下具体实施方式,本公开各实施例的上述和其他特征、优点及方面将变得更加明显。贯穿附图中,相同或相似的附图标记表示相同或相似的元素。应当理解附图是示意性的,原件和元素不一定按照比例绘制。
图1是根据本公开的验证方法的一个实施例的流程图;
图2A、图2B和图2C是根据本公开的验证方法的示例性应用场景图;
图3是示例性破解方式的简要说明图;
图4是根据本公开的验证装置的一个实施例的结构示意图;
图5是本公开的一个实施例的验证方法可以应用于其中的示例性系统架构;
图6是根据本公开实施例提供的电子设备的基本结构的示意图。
具体实施方式
下面将参照附图更详细地描述本公开的实施例。虽然附图中显示了本公开的某些实施例,然而应当理解的是,本公开可以通过各种形式来实现,而且不应该被解释为限于这里阐述的实施例,相反提供这些实施例是为了更加透彻和完整地理解本公开。应当理解的是,本公开的附图及实施例仅用于示例性作用,并非用于限制本公开的保护范围。
应当理解,本公开的方法实施方式中记载的各个步骤可以按照不同的顺序执行,和/或并行执行。此外,方法实施方式可以包括附加的步骤和/或省略执行示出的步骤。本公开的范围在此方面不受限制。
本文使用的术语“包括”及其变形是开放性包括,即“包括但不限于”。术语“基于”是“至少部分地基于”。术语“一个实施例”表示“至少一个实施例”;术语“另一实施例”表示“至少一个另外的实施例”;术语“一些实施例”表示“至少一些实施例”。其他术语的相关定义将在下文描述中给出。
需要注意,本公开中提及的“第一”、“第二”等概念仅用于对不同的装置、模块或单元进行区分,并非用于限定这些装置、模块或单元所执行的功能的顺序或者相互依存关系。
需要注意,本公开中提及的“一个”、“多个”的修饰是示意性而非限制性的,本领域技术人员应当理解,除非在上下文另有明确指出,否则应该理解为“一个或多个”。
本公开实施方式中的多个装置之间所交互的消息或者信息的名称仅用于说明性的目的,而并不是用于对这些消息或信息的范围进行限制。
请参考图1,其示出了根据本公开的验证方法的一个实施例的流程。如图1所示该验证方法,包括以下步骤:
步骤101,展示目标图像和目标控件。
在本实施例中,验证方法的执行主体(例如终端设备)可以展示目标图像和目标控件。
在这里,上述目标图像可以通过各种方式得到,在此不做限定。
作为示例,上述目标图像可以是服务端发送给终端的。服务端如何得到的目标图像,可以根据实际应用场景设置,在此不做限定。例如,服务端可以对素材图像进行旋转,以及将旋转后的素材图像作为目标图像,或者将旋转后的素材图像进行调整得到目标图像。
作为示例,上述目标图像可以是终端自己生成的,即服务端发送给终端一个素材图像,然后终端旋转素材图像,以及对旋转后的素材图像进行调整得到目标图像。
在本实施例中,所述目标控件用于旋转所述目标图像以及改变所述目标图像透明度。
在本实施例中,上述目标控件可能由人类用户操作移动,也可能由机器用户操作移动。
在本实施例中,上述目标控件的显示形式可以是各种各样的,在此不做限定。作为示例,上述目标控件可以是圆环状、条状等。
在本实施例中,上述目标控件的操作形式可以是各种各样的,在此不做限定。
作为示例,可以对目标控件的预设区域不断点击,随着点击的进行,目标图像不断旋转,并且蒙版的透明度不断改变。
作为示例,上述目标控件可以包括滑轨和滑块,可以对滑块进行拖动,随着拖动的进行,目标图像不断旋转,并且蒙版的透明度不断改变。
可以理解,设备在一些情况下,可能需要被验证,才能获取相应权限。一些情况下,验证也可以被称为鉴权。例如,设备在登录网站之前、进行支付操作之前等,需要被验证;具体的,设备可以向服务器发送各种请求(例如登录请求或者支付请求),如果该请求触发了验证机制,则服务器可以向上述设备返回验证码。提示设备展示验证码的界面,可以称为验证界面。作为示例,验证码可以是各种各样的,例如,字母验证码、数字验证码、滑块验证码等。
需要说明的是,发送上述各种请求而触发验证机制的设备,可能是真实人类用户使用的终端,也可能是破解者设计的自动操作程序所运行于的电子设备(例如终端或者服务器)。自动操作程序运行时可以自动识别验证码以及进行操作,并且向执行主体提供答案,试图使对设备进行验证的服务器相信,发送各种请求的设备正在由人类用户操作进行验证。
换句话说,操作者可能是人类用户,也可能机器用户;其中,机器用户可以执行破解程序(或者说自动操作程序)以模拟人类用户的操作。
步骤102,根据针对目标控件的操作,转动目标图像以及改变目标图像的目标图像透明度。
在本实施例中,上述执行主体可以根据针对目标控件的操作,转动目标图像以及改变所述目标图像的目标图像透明度。
在本实施例中,可以根据实际应用场景,设置根据针对目标控件的操作转动目标图像的具体过程,以及设置根据针对目标控 件的操作改变蒙版透明度的具体过程。
作为示例,上述操作为拖动操作,随着拖动操作的匀速进行,转动目标图像的旋转速度可以是匀速的,也可以是非匀速的。
作为示例,上述操作为拖动操作,随着拖动操作的匀速进行,目标图像透明度的改变速度,可以是匀速的,也可以是非匀速的。
在一些实施例中,上述方法还可以包括:展示操作提示信息。在这里,上述操作提示信息用于指示对目标控件进行操作的以下至少一项:操作方式和操作目标。
作为示例,操作方式可以为“拖动滑块”。
作为示例,操作目标可以为“将图像旋转到正向位置”。
步骤103,基于操作,确定验证是否通过。
在本实施例中,上述执行主体可以基于针对目标控件的操作,确定验证是否通过。
在这里,基于操作进行验证,可以是基于与操作相关的各种事项进行验证,例如与操作相关的参数。
在一些实施例中,上述与操作相关的参数,可以是根据实际应用场景预先定义的,在此不做限定。
在一些应用场景中,如果验证通过,则可以展示指示验证通过的提示信息;如果验证没有通过,则可以展示指示验证未通过的指示信息。
在一些应用场景中,基于操作进行验证,可以是终端执行的,也可以是服务端执行的,还可以是终端和服务端联合完成的。如果是服务端执行的,客户端执行的步骤103可以包括:将与操作相关的参数发送至服务端,服务端可以向终端返回验证结果,终端可以根据接收到的验证结果,确定验证是否通过。作为示例,在与操作相关的参数有两种的情况下,可以在终端验证一种,在服务端验证另一种;终端可以结合两种参数的验证结果,确定验证是否通过。
请参考图2A、图2B和图2C,图2A、图2B和图2C示出了本实施例的一个示例性场景。图2A、图2B和图2C中,示出了目 标图像201和目标控件202。其中,目标控件202可以包括滑轨2021和滑块2022。用户操作滑块2022在滑轨2021上滑动的时候,图像201可以在界面上的矩形区域内转动,视觉上看的话,可以是圆形区域中的楼体图像转动。
需要说明的是,目标图像透明度变化的真实效果,由于说明书附图的格式限制难以示出。在这里,图2A、图2B和图2C中,利用阴影图像的密集程度,表征目标图像透明度;阴影图像的密集程度越高,表示目标图像透明度越大(即视觉上越不透明)。
在图2A中,滑块2022在初始位置,阴影图像的密集程度最高,即最不透明。在图2B中,随着操作的进行,滑块2022在中间位置,目标图像中阴影图像的密集程度相对于图2A降低,即目标图像透明度减小。即图2B中的目标图像相对于图2A中的目标图像变得透明。再随着操作的进行,滑块2022的移动距离更大,阴影图像消失,表示相对于图2B目标图像透明度进一步减小至目标图像透明。
需要说明的是,本实施例提供的验证方式,可以展示目标图像,以及展示目标控件;然后,根据用户对目标控件的操作转动目标图像,以及改变目标图像的目标图像透明度,并且,基于用户的操作,验证用户是否是人类用户,即确定验证是否通过。由此,可以提供一种新的验证方式。并且,目标图像透明度的改变,相对于不改变目标图像透明度,对于人类用户来说增加了操作难度,由此可以提供更多的操作细节以供验证,提高验证的准确性。
在一些实施例中,所述目标图像包括图形图像和图形图像的蒙版,改变所述目标图像的目标图像透明度通过以下至少一项实现:改变蒙版的蒙版透明度、改变图形图像的图形图像透明度。
在这里,目标图像透明度,可以用于表征图形图像和蒙版叠加在一起的透明程度。
需要说明的是,蒙版的设置,可以使得改变目标图像透明度更为便捷。
在本实施例中,图形图像和上述蒙版,可以是一同从服务器 获取的,也可以是图形图像从服务端获取而蒙版在终端本地生成。
在这里,图形图像和蒙版,可以理解为位于两个图层的图像。蒙版的所在的图层,在图形图像所在的图层之上。
视觉上看,蒙版相当于覆盖在图形图像上的一层玻璃片,这种玻璃片可是透明的、半透明的或者完全不透明的。
在这里,上述图形图像可以通过各种方式得到,在此不做限定。
作为示例,上述图形图像可以是服务端发送给终端的。服务端如何得到的图形图像,可以根据实际应用场景设置,在此不做限定。例如,服务端可以对素材图像进行旋转,以及将旋转后的素材图像进行调整得到图形图像。
作为示例,上述图形图像可以是终端自己生成的,即服务端发送给终端一个素材图像,然后终端旋转素材图像,以及对旋转后的素材图像进行调整得到图形图像。
在这里,上述图形图像的蒙版,可以是设置蒙在图形图像上方的蒙层。由于图形图像中的图形图像与蒙版一同展示,图形图像的展示效果可以是图形图像和蒙版的叠加效果。
在一些应用场景中,上述蒙版可以是各种各样的,在此不做限定。
作为示例,上述蒙版可以是线条图,线条图可以包括线条形式的图案;线条图中,线条位置显示图案,非线条位置不显示图案。
作为示例,上述蒙版可以是空白图,空白图可以不包括图案,空白图整个不显示图案,但是空白图的透明度可能变化。
在这里,蒙版透明度,可以用于表征蒙版的透明程度。一般情况下,蒙版的透明度可以通过蒙版的透明通道(也称阿尔法通道,Alpha Channel)的数值表征;换句话说,调节蒙版透明度,可以通过调节蒙版图像的阿尔法通道的数值实现。例如,一个使用16位存储的图片,可能5位表示红色,5位表示绿色,5位表示蓝色,1位是阿尔法;在1位是阿尔法的情况下,图像为完全透明或 者完全不透明。再例如,一个使用32位存储的图片,每8位表示红绿蓝和透明通道;在这种情况下,透明通道可以表示256级的透明度。
在一些应用场景中,服务器可以预先设置素材图像库。服务器可以对素材图像库中的素材图像进行旋转,得到原始图像和目标旋转角度,目标旋转角度可以指示素材图像到原始图像的旋转角度。
可选的,服务器可以预先针对素材图像库中的各个素材图像,进行多种程度的旋转得到多对原始图像和目标旋转角度。服务器触发验证机制需要向设备返回验证码的时候,可以随机获取原始图像和目标旋转角度。
可选的,服务器可以预先设置素材图像库。服务器触发验证机制需要向设备返回验证码的时候,随机从素材图像库中获取素材图像,进行随机旋转,然后得到的原始图像和目标旋转角度。
在这里,素材图像一般具有人类用户才能够识别的正向图像特征,其中,正向图像特征可以供人类用户判断图像是否处于正向状态。例如,可以选取动物图像作为素材图像,动物图像中动物的脑袋竖直向上不歪,有长腿长脖子,动物为站立状态;还可以选取静物图像,静物图像中的静物可以是生活中常见的景物,例如包含明显的重力感(例如楼体),背景地面水平。
在这里,对上述素材图像进行旋转,一般是以图像中心为旋转中心进行的。可以理解,图像均是矩形(例如长方形或者正方形)的。对素材图像旋转得到的原始图像,也是矩形的。在素材图像与原始图像的大小一致(即长度方向像素相同,宽度方向像素也相同)的情况下,转动素材图像得到的原始图像,相对于素材图像损失了一些像素。
在一些应用场景中,可以对原始图像进行非旋转形式的调整,得到目标图像。可以理解,目标图像相对于素材图像,可以具有一定的倾斜,并且倾斜角度与原始图像相同。
可以理解,原始图像相对于素材图像旋转的角度不同,意味 着损失的像素点不同,由此,素材图像旋转不同的角度得到的各个原始图像,主色调不同,空白部分各个像素的通道值(包括颜色通道值和透明通道值)均为0。并且,同一素材图像,旋转不同角度后得到得图片,具有不同的哈希值。如果矩形图像中只保留裁剪出的圆形,无论如何旋转所有圆的像素点都是能一一对应的,因此只保留裁剪出的圆形的矩形图像的主色调相同;但是不同旋转角度的时候,由于像素值在图像方阵中的位置不一样,只保留圆形的矩形图像哈希值是不同的。
在一些应用场景中,可以对原始图像的显示区域进行选择,显示区域的形状可以是各种各样的。例如可以是圆形、三角形、矩形等,可以理解,图2中的圆形只是示意,不构成对显示区域形状的限定。
为了说明本公开中实施例的技术效果,在此简述破解者可能采用的破解方式,破解方式可以包括准备阶段和应用阶段。请参考图3,图3示出了破解方式的示意图。
准备阶段:通过各种方式下载验证码,目标是通过列举穷尽素材图像库;然后,通过相似算法,过滤已经存在的图像,即同一内容而不同旋转角度的图像,只保留一张;再后,对各个图像标号,例如素材甲、素材乙和素材丙;再后,将各个图像每隔预设角度间隔(例如3度)旋转一次,可选的,可以利用哈希算法得到旋转后的图像标识,还可以对于每一次旋转后的图像,获取前预设数目个(例如5个)RGB值;这样,针对每个旋转后图像,得到一条数据记录该图像,例如,素材乙、图片哈希码、主色调RGB值(5个),是否是正向图像,作为示例,每三度旋转一次的话,针对图像标号为素材乙的图像,可以得到120条数据。为了便于示出,图3中的关于素材乙,示出了三个将素材乙进行旋转得到的原始图像,分别为A旋转角度、B旋转角度和C旋转角度。
需要说明的是,是否是正向图像需要人工设置。另外,破解者还需要找到操作度与旋转角度之间的对应关系,例如,目标控件滑动的距离与旋转角度之间的关系。
应用阶段:下载原始图像作为待识别图像;利用各种方式,确定待识别图像的图像标号,例如素材乙;然后,利用哈希值对比,确定是素材乙下的哪条数据,例如确定了是B旋转角度;再后,可以确定B旋转角度和标注了正向图像的数据之间的角度差(例如30度);再后,可以确定上述角度差对应的操作度,例如操作度可以是旋转30度需要控制目标控件滑动的距离值;最后,机器用户按照上述操作度,控制目标控件,将验证码旋转上述角度差,即可以完成破解任务。
可以看出,破解方式的应用阶段,需要先定位图像标号,再定位图像标号下是哪条数据图像,还要确定操作度。可选的,可以通过哈希值匹配,将确定待识别图像的图像标号和确定是该图像标号下的哪条数据这两个步骤,合并实现。
请参考图3,破解者所依赖的,有第一点、第二点和第三点。第一点,可以穷举素材图像库,横向匹配定位素材图像,即准确识别是哪个内容的图像。第二点,同一内容的图像,可以通过匹配哈希值或者主色调,定位旋转角度;通过匹配哈希值或者主色调定位旋转角度的基础,可以如下:以素材乙为例,首先,素材乙各个旋转角度的哈希值不同,或者主色调不同;其次,素材乙,单一角度(例如A旋转角度)的哈希值稳定,或者主色调稳定。第三点,还需要找到操作度与角度差(即目标旋转角度)之间的对应关系。
可以理解,哈希值稳定的意思,终端获得的素材乙的单一角度(例如A旋转角度)的目标图像,多次计算的哈希值相同;可以理解,如果各次计算的哈希值不相同,则没有匹配基础。主色调同理。
在一些实施例中,上述在所述操作的操作持续过程中,上述目标图像的旋转角度与上述目标图像透明度负相关。
在这里,操作的持续过程,可以根据操作类型的不同定义。作为示例,对于拖动操作来说,开始拖动之后到释放拖动之前,可以作为操作持续过程。作为示例,对于连续点击操作来说,点 击停止预设间隔时长而没有下一次点击,则将该点击作为最后一次点击,开始点击以后到最后一次点击之前的过程,可以作为操作持续过程。
在这里,上述目标图像的旋转角度,可以与上述目标图像透明度负相关。换句话说,随着目标图像的旋转角度增大,上述目标图像透明度可以减小。目标图像透明度越小,则表明目标图像越透明。
需要说明的是,目标图像透明度与目标图像的旋转角度负相关,可以使得在目标图像的旋转过程中,目标图像的图像内容逐渐清晰,从而减少对目标图像的干扰,提高用户获取图像信息的效率,使得人类用户的操作难度降低。换句话说,随着旋转角度的增大,目标图像将会越来越接近正向状态,人类用户在越接近成功(即把目标图像旋转至正向状态)的时候,越需要清晰度越高的目标图像作为参考,这个时候,人类用户的注意力通常集中于目标图像,减少对目标图像的干扰,可以降低人类用户的操作难度。
在一些实施例中,上述目标图像的旋转角度大于预设第一角度阈值并且小于预设第二角度阈值时,所述目标图像透明度小于预设透明度阈值。
在这里,上述预设透明度阈值可以指示用户能够看清目标图像的目标图像透明度。需要说明的是,上述“能够看清”属于价值判断,可以采用一般人判断标准。
需要说明的是,上述第一角度阈值和上述第二角度阈值相当于定义了一个角度范围,当目标图像的旋转角度在这个角度范围的时候,目标图像透明度越小,从而可以使得目标图像较为清晰,由此可以减低人类用户的操作难度。
在一些应用场景中,上述目标控件可以标示“开始”字样。用户点击标示“开始”字样的目标控件之后,执行主体可以根据预设的转动方式,转动所述目标图像,以及根据预设的透明度改变方式,改变所述目标图像透明度。并且,用户点击标示“开始” 字样的目标控件之后,所述目标控件上标示的字样发生改变,改变为标示“停止”字样,以提示用户点击标示“停止”字样的目标控件可以使得目标图像停止旋转。
在这里,上述预设的转动方式,可以为包括匀速转动和/或非匀速转动。
在一些实施例中,上述步骤102可以包括:根据针对目标控件的操作,确定操作度;根据操作度,确定目标图像的旋转角度,以及确定目标图像透明度。
在这里,操作度可以用于表征用户对目标控件的操作进度。
在这里,如果操作度的具体参数,与目标控件的展示形式相关。
作为示例,对于包括滑轨和滑块的目标控件,操作度可以用初始滑块位置和当前滑块位置之间的距离表示。
作为示例,对于包括点击触发的目标控件来说,可操作度可以用点击次数来确定。然后,可以根据点击次数,确定旋转角度。作为示例,前5次点击,每次点击的角度增量为0.5度;从第6次点击开始,每次点击的角度增量为0.2度。
在这里,可以预先设置操作度与旋转角度之间的第一对应关系。作为示例,第一对应关系可以用对应关系表进行表,也可以用函数关系表示。
在这里,可以预先设置操作度与目标图像透明度之间的第二对应关系,作为示例,第二对应关系可以用对应关系表进行表示,也可以用函数关系表示。
在这里,上述执行主体可以根据操作度和预先设置的第一对应关系,确定目标图像的旋转角度,进而将目标图像旋转至所确定的旋转角度。
在这里,上述执行主体可以根据操作度与预先设置的第二对应关系,确定目标图像透明度,进而将目标图像透明度调整至所确定的目标图像透明度。
在一些实施例中,上述目标图像透明度与上述操作度之间, 为线性关系或者非线性关系。
在这里,线性关系可以包括:操作度的变化速度,与目标图像透明度的变化速度一致。
需要说明的是,上述目标图像透明度与操作度之间,可以是线性关系。线性关系的目标图像透明度和操作度,目标图像透明度的改变不会超出人类用户预期之外,降低人类用户的操作难度。
需要说明的是,上述目标图像透明度与操作度之间,可以是非线性关系。非线性关系的目标图像透明度和操作度,可以提供更多的验证依据,从而提高破解难度。
作为示例,如果目标图像透明度和操作度之间为非线性,人类用户操作的时候可能会比较小心翼翼,操作速度可能会降低,以此作为验证依据,可以提高破解难度。
在一些实施例中,上述旋转角度与上述操作度之间,为线性或者非线性关系。
需要说明的是,上述旋转角度与操作度之间,可以是线性关系。线性关系的旋转角度和操作度,目标图像透明度的改变不会超出人类用户预期之外,降低人类用户的操作难度。
需要说明的是,旋转角度与操作度之间为非线性关系,请参考上文中关于破解者所依赖的第三点,则破解者难以破解操作度与旋转角度之间的对应关系,即使破解得到待旋转图片的目标旋转角度,也不能确定如何模拟操作而达到目标旋转角度对应的操作度。由此,可以增加破解难度。
在一些应用场景中,上述目标控件可以包括滑轨和滑块,上述滑块可以响应上述操作在上述滑轨上移动,上述操作度可以为上述滑块的当前位置和初始位置之间的距离,即滑块在所述滑轨上的移动距离。
在一些应用场景中,旋转角度与操作度之间为非线性关系,破解者即使破解得到待旋转图片的目标旋转角度,也不能确定将滑轨上的哪个位置指示目标旋转角度,即不能确定将滑块滑动到滑轨上的哪个位置释放拖动操作。
在一些应用场景中,与操作相关的参数,可以包括操作停止时刻的相关参数,还可以包括操作持续过程中的相关参数。
在一些实施例中,上述步骤103可以包括:根据所述操作的以下至少一项但不限于:操作停止时刻的相关参数、操作持续过程中的相关参数,确定验证是否通过。换句话说,可以基于上述操作停止时刻和/或操作持续过程中的相关参数,确定验证是否通过。
在一些实施例中,所述操作持续过程中的参数包括与操作时间对应的操作位置;以及所述根据所述操作的以下至少一项:操作停止时刻的相关参数、操作持续过程中的相关参数,确定验证是否通过,包括:根据当目标图像处于预设目标图像透明度时所述操作的相关参数,确定验证是否通过。
在这里,预设目标图像透明度的具体数值,可以根据实际应用场景设置,在此不做限定。
作为示例,预设目标图像透明度可以是目标图像透明度突变的位置附近,人类用户可能会对控件进行反复操作(例如向右拖动之后又向左拖动)。这些操作细节可以用于验证是否是人类用户,从而提高破解难度。
在一些实施例中,所述步骤103,可以包括:根据所述操作的操作停止时刻的相关参数,确定验证是否通过。
在这里,操作停止时刻的确定,可以根据操作类型的不同,具体设置确定方式。
作为示例,如果是拖动操作,操作停止时刻可以是释放拖动的时刻。
作为示例,操作停止时刻的相关参数,可以包括旋转角度。可以通过确定旋转角度与目标旋转角度的差值是否小于预设误差,确定验证是否通过。
在这里,操作的持续过程,可以根据操作类型的不同定义。
作为示例,对于拖动操作来说,开始拖动之后到释放拖动之前,可以作为操作持续过程。
作为示例,对于连续点击操作来说,点击停止预设间隔时长而没有下一次点击,则将该点击作为最后一次点击,开始点击以后到最后一次点击之前的过程,可以作为操作持续过程。
作为示例,操作持续过程中的相关参数,可以包括操作轨迹,例如拖动轨迹。
在这里,上述操作相关的参数值,可能是人类用户操作产生的,也可能是自动操作程序控制上述目标控件产生的。与操作相关的参数,可以提供大量细节,例如对上述目标控件的拖动轨迹,可以综合多个细节,确定发送操作信息设备是否由人类用户操作。
在一些实施例中,所述操作持续过程中的参数包括与操作时间对应的操作位置数据;以及所述根据所述操作的操作持续过程中的相关参数,确定验证是否通过,包括:根据与操作时间对应的操作位置数据,确定验证是否通过。作为示例,可以根据与操作时间对应的操作位置数据,确定操作速度,根据操作轨迹和操作速度;可以根据操作轨迹和操作速度,确定是否有人类用户操作。
进一步参考图4,作为对上述各图所示方法的实现,本公开提供了一种验证装置的一个实施例,该装置实施例与图1所示的方法实施例相对应,该装置具体可以应用于各种电子设备中。
如图4所示,本实施例的验证装置包括:展示单元401、转动单元402和验证单元403;其中,展示单元,用于展示目标图像和目标控件;转动单元,用于根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度;验证单元,用于基于所述操作,确定验证是否通过。
在本实施例中,验证装置的展示单元401、转动单元402和验证单元403的具体处理及其所带来的技术效果可分别参考图1对应实施例中步骤101、步骤102和步骤103的相关说明,在此不再赘述。
在一些实施例中,所述目标图像包括图形图像和图形图像的 蒙版,改变所述目标图像的图像透明度通过以下至少一项实现:改变蒙版的蒙版透明度、改变图形图像的图形图像透明度。
在一些实施例中,所述目标图像的旋转角度与所述目标图像透明度负相关。
在一些实施例中,当所述目标图像的旋转角度大于预设第一角度阈值并且小于预设第二角度阈值时,所述目标图像透明度小于预设透明度阈值。
在一些实施例中,所述根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像透明度,包括:根据针对所述目标控件的操作,确定操作度;根据所述操作度,确定所述目标图像的旋转角度,以及确定所述目标图像透明度。
在一些实施例中,所述目标图像透明度与所述操作度之间为线性关系或者非线性关系。
在一些实施例中,所述旋转角度与所述操作度之间为线性关系或者非线性关系。
在一些实施例中,所述目标控件包括滑轨和滑块,所述滑块响应所述操作在所述滑轨上移动,所述操作度为所述滑块在所述滑轨上的移动距离。
在一些实施例中,所述基于与所述操作相关的参数,确定验证是否通过,包括:根据所述操作的以下至少一项:操作停止时刻的相关参数、操作持续过程中的相关参数,确定验证是否通过。
在一些实施例中,所述操作持续过程中的参数包括与操作时间对应的操作位置;以及所述根据所述操作的以下至少一项:操作停止时刻的相关参数、操作持续过程中的相关参数,确定验证是否通过,包括:根据当目标图像处于预设目标图像透明度时所述操作的相关参数,确定验证是否通过。
请参考图5,图5示出了本公开的一个实施例的验证方法可以应用于其中的示例性系统架构。
如图5所示,系统架构可以包括终端设备501、502、503,网 络504,服务器505。网络504用以在终端设备501、502、503和服务器505之间提供通信链路的介质。网络504可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
终端设备501、502、503可以通过网络504与服务器505交互,以接收或发送消息等。终端设备501、502、503上可以安装有各种客户端应用,例如网页浏览器应用、搜索类应用、新闻资讯类应用。终端设备501、502、503中的客户端应用可以接收用户的指令,并根据用户的指令完成相应的功能,例如根据用户的指令在信息中添加相应信息。
终端设备501、502、503可以是硬件,也可以是软件。当终端设备501、502、503为硬件时,可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、电子书阅读器、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。当终端设备501、502、503为软件时,可以安装在上述所列举的电子设备中。其可以实现成多个软件或软件模块(例如用来提供分布式服务的软件或软件模块),也可以实现成单个软件或软件模块。在此不做具体限定。
服务器505可以是提供各种服务的服务器,例如接收终端设备501、502、503发送的信息获取请求,根据信息获取请求通过各种方式获取信息获取请求对应的展示信息。并展示信息的相关数据发送给终端设备501、502、503。
需要说明的是,本公开实施例所提供的验证方法可以由终端设备执行,相应地,验证装置可以设置在终端设备501、502、503中。此外,本公开实施例所提供的验证方法还可以由服务器505执行,相应地,验证装置可以设置于服务器505中。
应该理解,图5中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络 和服务器。
下面参考图6,其示出了适于用来实现本公开实施例的电子设备(例如图5中的终端设备或服务器)的结构示意图。本公开实施例中的终端设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。图6示出的电子设备仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。
如图6所示,电子设备可以包括处理装置(例如中央处理器、图形处理器等)601,其可以根据存储在只读存储器(ROM)602中的程序或者从存储装置608加载到随机访问存储器(RAM)603中的程序而执行各种适当的动作和处理。在RAM 603中,还存储有电子设备600操作所需的各种程序和数据。处理装置601、ROM 602以及RAM 603通过总线604彼此相连。输入/输出(I/O)接口605也连接至总线604。
通常,以下装置可以连接至I/O接口605:包括例如触摸屏、触摸板、键盘、鼠标、摄像头、麦克风、加速度计、陀螺仪等的输入装置606;包括例如液晶显示器(LCD)、扬声器、振动器等的输出装置607;包括例如磁带、硬盘等的存储装置608;以及通信装置609。通信装置609可以允许电子设备与其他设备进行无线或有线通信以交换数据。虽然图6示出了具有各种装置的电子设备,但是应理解的是,并不要求实施或具备所有示出的装置。可以替代地实施或具备更多或更少的装置。
特别地,根据本公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在非暂态计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置609从 网络上被下载和安装,或者从存储装置608被安装,或者从ROM 602被安装。在该计算机程序被处理装置601执行时,执行本公开实施例的方法中限定的上述功能。
需要说明的是,本公开上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、RF(射频)等等,或者上述的任意合适的组合。
在一些实施方式中,客户端、服务器可以利用诸如HTTP(HyperText Transfer Protocol,超文本传输协议)之类的任何当前已知或未来研发的网络协议进行通信,并且可以与任意形式或介质的数字数据通信(例如,通信网络)互连。通信网络的示例包括局域网(“LAN”),广域网(“WAN”),网际网(例如,互联网)以及端对端网络(例如,ad hoc端对端网络),以及任何当前已知 或未来研发的网络。
上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。
上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:展示目标图像和目标控件;根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度;基于所述操作,确定验证是否通过。
可以以一种或多种程序设计语言或其组合来编写用于执行本公开的操作的计算机程序代码,上述程序设计语言包括但不限于面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件 与计算机指令的组合来实现。
描述于本公开实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,单元的名称在某种情况下并不构成对该单元本身的限定,例如,展示单元还可以被描述为“展示目标图像和目标控件的单元”。
本文中以上描述的功能可以至少部分地由一个或多个硬件逻辑部件来执行。例如,非限制性地,可以使用的示范类型的硬件逻辑部件包括:现场可编程门阵列(FPGA)、专用集成电路(ASIC)、专用标准产品(ASSP)、片上系统(SOC)、复杂可编程逻辑设备(CPLD)等等。
在本公开的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。
以上描述仅为本公开的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本公开中所涉及的公开范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述公开构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本公开中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。
此外,虽然采用特定次序描绘了各操作,但是这不应当理解 为要求这些操作以所示出的特定次序或以顺序次序执行来执行。在一定环境下,多任务和并行处理可能是有利的。同样地,虽然在上面论述中包含了若干具体实现细节,但是这些不应当被解释为对本公开的范围的限制。在单独的实施例的上下文中描述的某些特征还可以组合地实现在单个实施例中。相反地,在单个实施例的上下文中描述的各种特征也可以单独地或以任何合适的子组合的方式实现在多个实施例中。
尽管已经采用特定于结构特征和/或方法逻辑动作的语言描述了本主题,但是应当理解所附权利要求书中所限定的主题未必局限于上面描述的特定特征或动作。相反,上面所描述的特定特征和动作仅仅是实现权利要求书的示例形式。

Claims (13)

  1. 一种验证方法,其特征在于,包括:
    展示目标图像和目标控件;
    根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度;
    基于所述操作,确定验证是否通过。
  2. 根据权利要求1所述的方法,其特征在于,所述目标图像包括图形图像和图形图像的蒙版,改变所述目标图像的图像透明度通过以下至少一项实现:改变蒙版的蒙版透明度、改变图形图像的图形图像透明度。
  3. 根据权利要求1所述的方法,其特征在于,所述目标图像的旋转角度与所述目标图像透明度负相关。
  4. 根据权利要求1所述的方法,其特征在于,当所述目标图像的旋转角度大于预设第一角度阈值并且小于预设第二角度阈值时,所述目标图像透明度小于预设透明度阈值。
  5. 根据权利要求1所述的方法,其特征在于,所述根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度,包括:
    根据针对所述目标控件的操作,确定操作度,其中,所述操作度用于表征对所述目标控件的操作进度;
    根据所述操作度,确定所述目标图像的旋转角度,以及确定所述目标图像透明度。
  6. 根据权利要求5所述的方法,其特征在于,所述蒙版透明度与所述操作度之间为线性关系或者非线性关系。
  7. 根据权利要求5所述的方法,其特征在于,所述旋转角度与所述操作度之间为线性关系或者非线性关系。
  8. 根据权利要求1所述的方法,其特征在于,所述目标控件包括滑轨和滑块,所述滑块响应所述操作在所述滑轨上移动,操作度为所述滑块在所述滑轨上的移动距离。
  9. 根据权利要求1所述的方法,其特征在于,所述基于所述操作,确定验证是否通过,包括:
    根据所述操作的以下至少一项:操作停止时刻的相关参数、操作持续过程中的相关参数,确定验证是否通过。
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述操作的以下至少一项:操作停止时刻的相关参数、操作持续过程中的相关参数,确定验证是否通过,包括:
    根据当目标图像处于预设目标图像透明度时所述操作的相关参数,确定验证是否通过。
  11. 一种验证装置,其特征在于,包括:
    展示单元,用于展示目标图像和目标控件;
    转动单元,用于根据针对所述目标控件的操作,转动所述目标图像以及改变所述目标图像的目标图像透明度;
    验证单元,用于基于所述操作,确定验证是否通过。
  12. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-10中任一所述的方法。
  13. 一种计算机可读介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1-10中任一所述的方法。
PCT/CN2021/094774 2020-05-29 2021-05-20 验证方法、装置和电子设备 WO2021238753A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010481879.1 2020-05-29
CN202010481879.1A CN111695105B (zh) 2020-05-29 2020-05-29 验证方法、装置和电子设备

Publications (1)

Publication Number Publication Date
WO2021238753A1 true WO2021238753A1 (zh) 2021-12-02

Family

ID=72478741

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/094774 WO2021238753A1 (zh) 2020-05-29 2021-05-20 验证方法、装置和电子设备

Country Status (2)

Country Link
CN (1) CN111695105B (zh)
WO (1) WO2021238753A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695105B (zh) * 2020-05-29 2022-08-09 北京字节跳动网络技术有限公司 验证方法、装置和电子设备
CN114040129B (zh) * 2021-11-30 2023-12-05 北京字节跳动网络技术有限公司 视频生成方法、装置、设备及存储介质
CN115131471B (zh) * 2022-08-05 2024-08-02 北京字跳网络技术有限公司 基于图像的动画生成方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10164975B1 (en) * 2016-03-30 2018-12-25 Snap Inc. Authentication via camera
CN109271762A (zh) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 基于滑块验证码的用户认证方法及装置
CN110308847A (zh) * 2019-05-31 2019-10-08 北京百度网讯科技有限公司 图片验证方法、装置、电子设备及计算机可读存储介质
CN111079119A (zh) * 2019-12-04 2020-04-28 北京达佳互联信息技术有限公司 验证方法、装置、设备及存储介质
CN111695105A (zh) * 2020-05-29 2020-09-22 北京字节跳动网络技术有限公司 验证方法、装置和电子设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016092502A1 (en) * 2014-12-10 2016-06-16 Universita' Degli Studi Di Padova Method for recognizing if a user of an electronic terminal is a human or a robot
CN104732135B (zh) * 2015-02-17 2018-09-07 网易有道信息技术(北京)有限公司 一种滑动验证方法和装置
CN108121906A (zh) * 2016-11-28 2018-06-05 阿里巴巴集团控股有限公司 一种验证方法、装置以及计算设备
CN107577934A (zh) * 2017-10-15 2018-01-12 杨礼帆 一种实现人机验证的方法与装置
CN110246207A (zh) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 基于多图层的图形验证码生成方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10164975B1 (en) * 2016-03-30 2018-12-25 Snap Inc. Authentication via camera
CN109271762A (zh) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 基于滑块验证码的用户认证方法及装置
CN110308847A (zh) * 2019-05-31 2019-10-08 北京百度网讯科技有限公司 图片验证方法、装置、电子设备及计算机可读存储介质
CN111079119A (zh) * 2019-12-04 2020-04-28 北京达佳互联信息技术有限公司 验证方法、装置、设备及存储介质
CN111695105A (zh) * 2020-05-29 2020-09-22 北京字节跳动网络技术有限公司 验证方法、装置和电子设备

Also Published As

Publication number Publication date
CN111695105A (zh) 2020-09-22
CN111695105B (zh) 2022-08-09

Similar Documents

Publication Publication Date Title
WO2021238753A1 (zh) 验证方法、装置和电子设备
JP7508600B2 (ja) ライブブロードキャストインタラクション方法、装置、可読媒体及び電子デバイス
WO2021160143A1 (zh) 用于显示视频的方法、装置、电子设备和介质
US20160191627A1 (en) Method and apparatus for execution of applications in a cloud system
WO2021135626A1 (zh) 菜单项选择方法、装置、可读介质及电子设备
JP7480344B2 (ja) 情報表示方法、装置及び電子機器
GB2594214A (en) Image display method and apparatus
WO2022096017A1 (zh) 内容显示方法及装置
TW201832127A (zh) 驗證方法及裝置
CN111695107B (zh) 验证方法、装置和电子设备
CN105323218A (zh) 身份验证方法及装置
JP7553582B2 (ja) 画像特殊効果の処理方法及び装置
WO2021197161A1 (zh) 图标更新方法、装置和电子设备
CN115278275B (zh) 信息展示方法、装置、设备、存储介质和程序产品
WO2023169305A1 (zh) 特效视频生成方法、装置、电子设备及存储介质
WO2021088823A1 (zh) 用于交互控制的方法、装置、终端及存储介质
WO2023179362A1 (zh) 控件的显示方法、装置、电子设备、存储介质和程序产品
US20240163501A1 (en) Media data playing method and device, storage medium and electronic device
WO2020220777A1 (zh) 一种信息推送的方法、装置、设备和介质
WO2020220782A1 (zh) 信息分享方法、装置、设备和介质
US20240244015A1 (en) Method, apparatus and electronic device for information processing
US8934044B2 (en) Systems and methods for live view photo layer in digital imaging applications
WO2021185047A1 (zh) 贴纸处理方法及装置
US20150067825A1 (en) Visual authentication to a computing device
WO2020224302A1 (zh) 用户信息处理方法、装置、电子设备及计算机存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21813379

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23.03.2023)

122 Ep: pct application non-entry in european phase

Ref document number: 21813379

Country of ref document: EP

Kind code of ref document: A1