CN108989269B - Method, device and system for acquiring verification code - Google Patents
Method, device and system for acquiring verification code Download PDFInfo
- Publication number
- CN108989269B CN108989269B CN201710409488.7A CN201710409488A CN108989269B CN 108989269 B CN108989269 B CN 108989269B CN 201710409488 A CN201710409488 A CN 201710409488A CN 108989269 B CN108989269 B CN 108989269B
- Authority
- CN
- China
- Prior art keywords
- verification
- verification code
- data
- code
- types
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 837
- 238000000034 method Methods 0.000 title claims abstract description 110
- 230000002452 interceptive effect Effects 0.000 claims description 36
- 230000033001 locomotion Effects 0.000 claims description 24
- 230000015654 memory Effects 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 18
- 230000003139 buffering effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 25
- 238000007639 printing Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 16
- 230000000694 effects Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 13
- 238000010200 validation analysis Methods 0.000 description 9
- 238000005336 cracking Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 5
- 230000006872 improvement Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 4
- 230000002708 enhancing effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 241000282326 Felis catus Species 0.000 description 2
- 241000282412 Homo Species 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003909 pattern recognition Methods 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 241000283007 Cervus nippon Species 0.000 description 1
- 241000287828 Gallus gallus Species 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000003973 irrigation Methods 0.000 description 1
- 230000002262 irrigation Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Processing Or Creating Images (AREA)
Abstract
The application discloses a method, a device and a system for obtaining a verification code. Wherein, the method comprises the following steps: obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped. The method and the device solve the technical problem that the existing verification code system is easy to be identified by a machine or predict to cause low security of the verification code.
Description
Technical Field
The invention relates to the field of information security, in particular to a method, a device and a system for acquiring a verification code.
Background
With the rapid development of internet technology, information security issues are increasingly prominent, for example, phenomena of abusing natural human resources by robots, such as large-scale spam senders, forum watering machines, game cheaters, and the like. CAPTCHAs (CAPTCHA) is a program algorithm that distinguishes a user as a computer or a human. The verification code can prevent malicious password cracking, ticket swiping and forum water filling, and effectively organizes a hacker to make continuous login attempts on an account number of a specific registered user by using a brute force cracking mode of a specific program.
Currently, the types of verification codes commonly used in the prior art are mainly as follows: the first authentication mode, as shown in fig. 1(a), distinguishes between a person and a computer by recognizing character content in a picture, which is a traditional CAPCHA type, and similar to this scheme, recognizes chinese characters, adds interference information (including interference colors, random lines, font connection), and the like; a second way of verification, as shown in fig. 1(b), is to click a specific word or a specific pattern in a picture to realize verification; a third verification method, as shown in fig. 1(c), is to implement verification by matching pictures, and generally needs to find a picture that is the same as or similar to the first picture; a fourth way of verifying, as shown in fig. 1(d), by pulling the protruding squares to similarly shaped shaded areas; a fifth way of authentication, as shown in fig. 1(e), can be achieved by sliding the slider to the far right.
For the first verification mode and the second verification mode, with the improvement of computer image identification technology, verification codes are more and more easily identified by machines, for some verification codes with higher identification difficulty, the verification codes are sent to a code printing platform through screen capture, and the verification codes can also pass tests conveniently by utilizing manual code printing and machine simulation input; for the third verification mode, although the machine identification is difficult, the machine identification is easy to be identified by manual coding; for the fourth verification mode, namely the scheme of moving the specific position by clicking the slider, the sliding distance is a limited distance and is predictable, so that the area needing to slide is found through simple image processing, and the slider can be dragged through the process sequence or can pass the test; for the fifth verification mode, user behavior data and environment information are collected to distinguish a person from a computer, the probability that the verification code passes through machine simulation is very low, manual code printing is even impossible to operate, and the verification code printing method has a good prevention and control effect, but the verification code printing method has the condition that the verification code printing cannot be distinguished, and the problem of machine identification or manual code printing attack can occur due to the fact that secondary verification is required to be performed through the first three verification modes.
Aiming at the problem that the existing verification code system is easy to be identified or predicted by a machine to cause low security of the verification code, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the invention provides a method, a device and a system for acquiring a verification code, which are used for at least solving the technical problem that the existing verification code system is easy to identify or predict by a machine, so that the security of the verification code is not high.
According to an aspect of the embodiments of the present invention, there is provided a method for acquiring a verification code, including: obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped.
According to an aspect of an embodiment of the present invention, there is provided a system for acquiring a verification code, including: the front-end equipment is used for displaying at least one verification code; the verification code generator is used for acquiring a verification code obtained by combining at least two types of verification data and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of the different types of verification data are mutually overlapped, and the types of the verification data comprise at least one of the following types: text, pictures, animations and characters.
According to another aspect of the embodiments of the present invention, there is also provided an apparatus for acquiring a verification code, including: the device comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring at least two types of verification data, and the types of the verification data comprise at least one of the following types: text, pictures, animations, and characters; the second acquisition module is used for acquiring the verification code obtained by combining at least two types of verification data; and the display module is used for transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped.
According to another aspect of the embodiments of the present invention, there is also provided a method for acquiring a verification code, including: the front-end equipment receives a verification code request; the front-end equipment acquires at least one verification code according to the verification code request, wherein the verification code is obtained by combining at least two types of verification data, display areas of different types of verification data are mutually overlapped, and the type of the verification data comprises at least one of the following types: text, pictures, animations, and characters; the front-end equipment displays at least one verification code in a preset area.
According to another aspect of the embodiments of the present invention, there is also provided an apparatus for acquiring a verification code, including: a receiving unit, configured to receive a verification code request; the acquiring unit is used for acquiring at least one verification code according to the verification code request, wherein the verification code is obtained by combining at least two types of verification data, display areas of different types of verification data are mutually overlapped, and the type of the verification data comprises at least one of the following types: text, pictures, animations, and characters; and the display unit is used for displaying at least one verification code in a preset area.
According to another aspect of the embodiments of the present invention, there is also provided a front-end device, including: the display displays at least one verification code in a preset area, wherein the verification code is obtained by combining at least two types of verification data, the display areas of the different types of verification data are mutually overlapped, and the types of the verification data comprise at least one of the following types: text, pictures, animations, and characters; and the processor acquires at least one verification code from the server according to the received verification code request and transmits the at least one verification code to the display for displaying.
According to another aspect of the embodiments of the present invention, there is also provided a storage medium, wherein the storage medium includes a stored program, and when the program runs, the apparatus on which the storage medium is located is controlled to execute any one of the above methods for acquiring the verification code.
According to another aspect of the embodiments of the present invention, there is also provided a processor for executing a program, where the program executes any one of the above methods for acquiring a verification code.
According to another aspect of the embodiments of the present invention, there is also provided an information display method, including: obtaining at least two verification data, wherein the type of the verification data comprises at least one of the following: text, pictures, animations, and characters; and displaying the verification data on the interactive interface, wherein the display areas of different verification data at least partially overlap.
According to another aspect of the embodiments of the present invention, there is also provided an information display method, including: the verification code generator obtains at least two verification data, wherein the type of the verification data comprises at least one of the following: text, pictures, animations, and characters; the verification code generator sends at least two verification data to an interactive interface of the front-end equipment; and displaying the verification data on the interactive interface of the front-end equipment, wherein the display areas of different verification data are at least partially overlapped.
According to another aspect of the embodiments of the present invention, there is also provided an information display method, including: obtaining at least two verification data, wherein the type of the verification data comprises at least one of the following: text, pictures, animations, and characters; displaying the verification data on the interactive interface; the interrelationship of different verification data is preserved.
According to another aspect of the embodiments of the present invention, there is also provided an information display method, including: the verification code generator obtains at least two verification data, wherein the type of the verification data comprises at least one of the following: text, pictures, animations, and characters; displaying verification data on an interactive interface of the front-end equipment; the interrelationship of different verification data is preserved.
According to another aspect of the embodiments of the present invention, there is also provided a method of verifying data, including: receiving an authentication request; displaying at least two kinds of verification data on the interactive interface according to the verification request, wherein the display areas of different verification data are at least partially overlapped, and the type of the verification data comprises at least one of the following types: text, pictures, animations, and characters; receiving an input verification answer; checking whether the verification answer is correct or not; and in the case that the verification answer is correct, determining that the verification answer passes verification.
In the embodiment of the present invention, at least two types of verification data are obtained, where the types of the verification data include at least one of the following: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; the verification code is transmitted to the front-end equipment to be displayed, wherein display areas of different types of verification data are mutually overlapped, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, the technical effect of improving information safety is achieved, and the technical problem that the existing verification code system is not high in verification code safety due to the fact that the verification code system is easily identified or predicted by a machine is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1(a) is a schematic diagram of an alternative verification scheme according to the prior art;
FIG. 1(b) is a schematic diagram of an alternative verification scheme according to the prior art;
FIG. 1(c) is a schematic diagram of an alternative verification scheme according to the prior art;
FIG. 1(d) is a schematic diagram of an alternative verification scheme according to the prior art;
FIG. 1(e) is a schematic diagram of an alternative verification scheme according to the prior art;
FIG. 2 is a schematic diagram of an alternative system for obtaining a verification code according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a system for obtaining a validation code according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an alternative authentication code according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an alternative system for obtaining a validation code according to an embodiment of the present application;
FIG. 6 is a schematic diagram of an alternative system for obtaining a validation code according to an embodiment of the present application;
FIG. 7 is a flow chart of a method of obtaining a validation code according to an embodiment of the present application;
FIG. 8 is a flow chart of an alternative method of obtaining a validation code according to an embodiment of the present application;
FIG. 9 is a flowchart of an alternative method of obtaining a validation code according to an embodiment of the present application;
FIG. 10 is a schematic diagram of an apparatus for obtaining a validation code according to an embodiment of the present application;
FIG. 11 is a flow chart of a method of obtaining a validation code according to an embodiment of the present application;
FIG. 12 is a diagram illustrating an apparatus for obtaining a validation code according to an embodiment of the present application;
FIG. 13 is a schematic diagram of a head end apparatus according to an embodiment of the present application;
fig. 14 is a block diagram showing a hardware configuration of a computer terminal;
FIG. 15 is a block diagram illustrating an alternative system architecture for obtaining a verification code, according to an embodiment of the present disclosure;
FIG. 16 is a flow chart of an information display method according to an embodiment of the present application;
FIG. 17 is a flow chart of an information display method according to an embodiment of the present application;
FIG. 18 is a flow chart of an information display method according to an embodiment of the present application;
FIG. 19 is a flow chart of an information display method according to an embodiment of the present application; and
FIG. 20 is a flow chart of a method of validating data according to an embodiment of the application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, some terms or terms appearing in the description of the embodiments of the present application are applicable to the following explanations:
verification code (CAPTCHA), which is an abbreviation of a Turing test for fully automatically distinguishing Computers and Humans, is a computer program for distinguishing users from Humans, can prevent malicious password cracking, ticket swiping and forum water irrigation, and effectively organizes a hacker to make continuous login attempts on an account number of a certain specific registered user by using a specific program brute force cracking mode.
The code printing means that a large amount of verification codes are input by using artificial intelligence, the verification codes are obtained by mutual competition of a computer Turing test image encryption technology and a decoding technology, and a user who answers the questions can be regarded as a human because the computer cannot answer the problems of the verification codes. The automation software can simulate all network operations but cannot complete turing tests. At this time, the automatic simulation software transmits the verification code image (e.g., by screen capture) to the client and waits for the input of the code writer, who inputs the correct verification code by recognizing the verification code image, thereby helping the automatic software to complete the entire operation. Because the image generation technology of the verification code is far lower than the image decoding and identifying technology in cost and difficulty, in an actual scene, a person is hired to decode instead of developing a new decoding system, namely, the code printing mode is also called manual code printing.
The front-end device may be any terminal device capable of accessing the internet, including but not limited to a mobile phone, a tablet computer, a notebook computer, and a computer, and the user may access one or more application servers on the internet through a browser or a client program on the front-end device, including but not limited to various social application servers (e.g., QQ, WeChat, MSN, forum, post bar, etc.), mailbox servers (e.g., 163 mailbox, 126 mailbox, etc.), video servers (e.g., server providing video services such as Yokou, Aiqiyi, etc.), game servers (e.g., racing car, continuous watching, etc.), e-commerce website servers, various bank's online banking servers, and the like.
Example 1
According to the embodiment of the present application, an embodiment of a system for obtaining an authentication code is provided, which is to be noted that the embodiment may be applied to a process of verifying a secure login or an online request of each website (e.g., an internet forum, an e-mail website, an online banking website, and a 12306 website) to ensure stability of a website server system and security of user information, for example, in a process of logging in an online bank, a user name, a password, and an authentication code are generally required to be input to prevent a large-scale login attack; when the Baidu post bar is not logged in, the verification code is also input to post, so that large-scale anonymous replying is prevented.
With the development of internet technology, more and more traditional services can be transacted online, for example, electronic commerce, online ticket booking and the like appear, so that the account security of users is increasingly emphasized. In the aspects of user information protection and data security of websites, the security requirements of websites cannot be met only by using a user name and password verification technology, and with the rapid development of computer technology and the improvement of the running speed of computers, hackers can often use high-performance computers and specific programs to violently crack passwords of users in an exhaustive mode, so that the information and website data of the users are stolen, and hidden dangers are brought to network security, for example, a large amount of automatic registration, malicious comment reply, malicious advertisement release, malicious database access increase and the like are performed. In order to prevent an attacker from writing a malicious program, automatically registering a website, automatically and repeatedly logging in, violently cracking a password, and maliciously replying or issuing an advertisement, the verification code technology plays a good role in protecting the security of an account. By adopting the verification mode of the verification code, the verification provided by the website must be filled in under the condition that the user registers, logs in or replies in a non-login mode to the website, and corresponding operation can be carried out only after the verification of the website server is passed.
The existing verification code implementation process is as follows: the server randomly generates a verification code character string, stores the verification code character string in the memory, writes the verification code character string into the image, sends the verification code character string to the client for display, the client inputs characters on the verification code image and submits the characters to the server, the server judges whether the characters submitted by the client are consistent with the characters stored in the memory of the server, and if the characters submitted by the client are consistent with the characters stored in the memory of the server, the server continues to request; and if the characters submitted by the client are not consistent with the characters stored in the memory of the server, returning an error prompt.
From the five verification methods shown in fig. 1(a) to 1(e), it can be seen that, from the earliest random number verification code to the random number picture verification code, the code pattern of the verification code becomes more complicated to prevent the verification code from being cracked, for example, from the random number which appears at the beginning without any distortion, to the verification code with interference lines (or interference points), the verification code with characters rotated by a certain angle, the verification code with characters distorted, the verification code with font changed, the verification code with color changed, the verification code with texture added, and the like.
With the development of artificial intelligence and the improvement of pattern recognition technology, the resolution of machine recognition is higher and higher, and the recognition of the various deformed character verification codes is easy.
Under the service scenario, the applicant researches and adopts at least two types of verification data to combine to obtain the verification code, so that the difficulty of machine identification can be further increased, and the phenomenon of manual code printing can be prevented by adding a dynamic interference factor.
The generation process of the verification code data comprises the following steps: firstly, reading corresponding configuration information from a database by a verification code generator, and combining different types of materials (including but not limited to characters or pictures) according to the configuration information to generate an original verification code; then, the verification code generator randomly generates interference factors (including but not limited to dots) with different sizes and different quantities, randomly generates motion tracks of each dot, adds the motion tracks into the original verification code, combines the motion tracks into a final dynamic verification code, and stores the final dynamic verification code into a cache for real-time service; in addition, the verification code generator executes refreshing data at regular time, and single verification codes are prevented from being cracked and recycled.
After the verification code server generates verification data, real-time service can be provided for one or more clients, and the specific process is as follows: when a user logs in a Web server through a browser of a client or accesses an application server through a client application program, if security verification needs to be executed (namely, the user needs to input a verification code), the browser or the client application program requests the verification code from the server, the server randomly obtains a verification code from a cache and returns the verification code to the client, the user clicks a picture or selects an answer in an interface, a front-end page encrypts the selection of the user and the original picture information and then requests the server for verification, the server checks the user answer, and if the user operation is correct, the user operation is considered to be legal; otherwise, returning a prompt message of failure verification and entering the next service logic.
Compared with the traditional identifying code system, the scheme can obtain the following technical effects: the method of combining pictures and characters is adopted, for example, the pictures are hidden in the characters, so that the difficulty of machine identification is greatly increased; a dynamic interference factor is added into the generated verification code, and no matter how long the verification data is, part of information is shielded, so that the mode of manually printing the code by capturing the screen and then sending the screen to a printing platform is very difficult; the answer selected by the user and the original picture information are encrypted and then sent to the server for verification, so that the cracking threshold is improved, and an attacker can hardly reverse the answer directly through the information of the parameters and the values.
Under the above system architecture, as an alternative embodiment, fig. 3 shows a schematic diagram of an alternative system for acquiring a verification code according to an embodiment of the present application, and as shown in fig. 3, the system includes: a front-end device 301 and a verification code generator 303.
The front-end device 301 is configured to display at least one verification code;
the verification code generator 303 obtains a verification code obtained by combining at least two types of verification data, and transmits the verification code to the front-end device for display, where display areas of the different types of verification data overlap each other, and the types of the verification data include at least one of the following types: text, pictures, animations and characters.
Specifically, in the above embodiments, the front-end device 301 may be any terminal device capable of accessing the internet, including but not limited to a mobile phone, a tablet computer, a notebook computer, and a computer, and the user may access one or more application servers on the internet through a browser or a client program on the front-end device, including but not limited to various social application servers (e.g., QQ, WeChat, MSn, forum, post bar, etc.), mailbox servers (e.g., 163 mailbox, 126 mailbox, etc.), video servers (e.g., server providing video services such as Yokou, Aiqiyi, etc.), game servers (e.g., racing car, connecting watch, etc.), e-commerce website servers, various bank's online banking servers, etc.; the verification code generator 303 may be a single server or cloud platform dedicated to providing verification codes, or may be a module on the application server; if the platform is a single server or cloud platform, the platform can communicate with each application server to provide verification code service for each application server. Alternatively, the verification code generator 303 may be a module on the front-end device.
It should be noted here that the verification code generated by the verification code generator includes more than two types of verification data, including but not limited to a combination of text and picture, a combination of text and animation, a combination of text and character, a combination of picture and animation, a combination of picture and character, and a combination of animation and character; or the combination of any three of characters, pictures, animations and characters can be realized, and the verification codes of the characters, the pictures, the animations and the characters are included; obviously, the form of the verification data is not limited to the combination of the above-mentioned characters, pictures, animations and characters, but may also be any combination of other data types (e.g., lines, videos, etc.) and the aforementioned centralized verification data types.
Alternatively, the combination of different types of verification data in the verification code may be dynamically combined, that is, the combination pattern of different types of verification data is changed in real time or at regular time.
In an optional embodiment, fig. 4 is a schematic diagram of an optional verification code according to an embodiment of the present application, where after a user clicks a text "11" containing a "cat" avatar picture, the server returns an interface with successful verification; and after clicking other characters, returning verification failure prompt information.
As can be seen from the above, in the above embodiment of the present application, a verification code including a combination of at least two types of verification data is generated by the verification code generator 303, and the generated verification code is transmitted to the front-end device 301 for display, where display areas of different types of verification data in the verification code displayed on the front-end device are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 1, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
In an alternative embodiment, as shown in fig. 5, the system may further include: the server 305 is connected between the front-end device and the verification code generator, wherein an interaction process among the front-end device 301, the server 305 and the verification code generator 303 is as shown in fig. 5, the front-end device 301 sends a verification code request to the server 305, the server 305 receives the verification code request sent by the front-end device 301, requests the verification code server 303 to generate a verification code, reads at least one verification code from the verification code generator 303 based on the verification code request, and returns the verification code to the front-end device for display.
Based on the foregoing embodiment, in an alternative embodiment, as shown in fig. 6, the system further includes: and the buffer 307 is connected between the server and the verification code generator, and is used for buffering the verification code generated in a cycle in which any one verification code generator generates the verification code, and buffering the updated verification code in the next cycle.
In an alternative embodiment, the verification code generator 303 is further configured to obtain a verification code obtained by combining at least two types of verification data according to configuration information, where the configuration information is used to determine a combination mode for combining different types of verification data, and the combination mode at least includes: the type of the verification data to be combined, the attribute information, and the number and content of the verification factors included in each type of verification data are selected.
In an alternative embodiment, the verification code generator 303 is further configured to generate a predetermined number of verification codes according to the combination pattern in any cycle of generating the verification codes, and update the predetermined number of verification codes by refreshing the combination pattern in the next cycle.
After obtaining the verification code obtained by combining at least two types of verification data, in an alternative embodiment, the verification code generator 303 is further configured to embed at least one interference data into the verification code to generate a new verification code, where the display result of the interference data includes: and displaying the verification code in a display area according to a preset appointed position or moving and displaying the verification code according to a preset motion track.
In an optional embodiment, the front-end device 301 is further configured to, after receiving the request for the verification code, obtain at least one verification code according to the request for the verification code, display the obtained at least one verification code, and receive a verification answer input by the user; the server 305 is further configured to verify whether the verification answer input by the user is correct, and in case of correct verification, prompt the verification code to pass verification, and perform the next operation.
In an optional embodiment, the front-end device 301 is further configured to encrypt at least one verification code and the received verification answer; and sending the encryption result to the server for verification.
Example 2
According to the embodiment of the present application, an embodiment of a method for acquiring a verification code is provided, and the method for acquiring a verification code provided in this embodiment may be applied to a system for acquiring a verification code provided in embodiment 1 of the present application, including but not limited to the application scenario described in embodiment 1 of the present application. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
At present, in the existing verification code, a string of randomly generated numbers or symbols is used to generate a picture, some interference elements are added to the picture, the verification code information in the picture is recognized by the naked eyes of a user, and the recognized verification code is input into an input frame on a page and submitted to a server for verification. The most common authentication codes have the following forms: random numbers without any distortion, verification codes added to interference lines (or interference points), verification codes of characters rotated by a certain angle, verification codes of character distortion, verification codes of converted fonts, verification codes of color change, verification codes of added textures and the like.
As can be seen from the above, the existing verification code is a picture generated by performing various deformations on various characters or adding interference, and with the development of machine identification technology, the accuracy of identifying the characters or characters is higher and higher, and the attack of a malicious program on the verification code cannot be resisted only by color distinction; with the advent of various pattern recognition algorithms, vector analysis of characters or letters is performed, and characters or letters rotated by any angle or deformed in any form can be recognized.
In the foregoing application environment, the present application provides a method for obtaining a verification code shown in fig. 7, where at least two kinds of verification data are combined to obtain the verification code, so as to generate a complex verification code and improve difficulty of machine identification, and specifically, fig. 7 is a flowchart of a method for obtaining the verification code according to an embodiment of the present application, and as shown in fig. 7, the method includes the following steps:
step S702, acquiring at least two types of verification data, where the types of the verification data include at least one of the following: text, pictures, animations and characters.
Specifically, in the above steps, the verification data includes, but is not limited to, any one or more of the following forms: text, pictures (including photographs and various shapes of graphics), animations, and characters; in order to increase the difficulty of identifying the verification code, two or more types of verification data may be used to generate the verification code, and thus, before generating the verification code, two or more types of verification data are first called according to a preset rule or randomly.
As an optional implementation manner, each embodiment of the present application is described by taking an example of generating a verification code by combining text and pictures.
Step S704, a verification code obtained by combining at least two types of verification data is acquired.
Specifically, in the above step, the verification code may be a picture or an animation composed of at least two types of verification data; after two or more types of verification data for generating the verification code are called, the verification code is generated after any position, color or shape combination is carried out according to the types of verification data.
Step S706, the verification code is transmitted to the front-end device for displaying, wherein the display areas of the different types of verification data are overlapped with each other.
Specifically, in the above steps, after generating the verification code composed of at least two types of verification data, the verification code is transmitted to the terminal device initiating the verification code request, including but not limited to a mobile phone, a tablet computer, a notebook computer and a computer. In the displayed verification code, the display areas of different types of verification data are overlapped with each other, for example, in a form of superimposing graphics on characters as shown in fig. 4.
As can be seen from the above, in the above embodiments of the present application, a manner of generating the verification code by arbitrarily combining at least two types of verification data is adopted, after any two or more types of verification data are acquired, the acquired verification data are arbitrarily combined to generate the corresponding verification code, and the generated verification code is transmitted to the front-end device that initiates the verification code request to be displayed, where display areas of different types of verification data in the verification code displayed on the front-end device are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 2 of the application, the aim of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
In an alternative embodiment, the verification code obtained by combining at least two types of verification data may be obtained according to configuration information, where the configuration information is used to determine a combination mode for combining different types of verification data, and the combination mode at least includes: the type of the verification data to be combined, the attribute information, and the number and content of the verification factors included in each type of verification data are selected.
Specifically, in the above-described embodiment, the configuration information is used to configure the combination pattern of different types of verification data in the verification code, and before the verification data constituting the verification code is acquired, the configuration information is first acquired, the combination pattern of the different types of verification data is determined based on the configuration information, and the type of the verification data in the combination pattern, the attribute information (including but not limited to color, shape, position, size, and the like) of each type of verification data in the combination pattern, and the number and content of the verification factors included in each type of verification data are acquired.
Still taking the verification code shown in fig. 4 as an example, the combination mode of the verification code may be a form of text plus picture, where the attribute information of the text is: the character font is 40-size black-body character, the character color is black and white, and the character content is 'Tianmao shopping festival is double 11 crazy shopping', wherein the 'Tianmao shopping festival' is directly displayed, and the 'double 11 crazy shopping' is displayed in a clockwise 275-degree rotation direction; the attribute information of the picture is: the size and the shape of the picture (chicken, cat, sika deer and little person) and the color of the picture are black and white; the verification factor is 'the character storing the kitten (i.e. the kitten and the character are displayed in an overlapping way').
By the above-described embodiment, the verification code is generated according to the configuration information of the verification code, and the verification code can be generated quickly.
In an alternative embodiment, a predetermined number of authentication codes are generated from the combination pattern in any one cycle in which the authentication codes are generated, and the predetermined number of authentication codes are updated by refreshing the combination pattern in the next cycle.
Specifically, in the above embodiment, the combination pattern of the verification data constituting the verification code is refreshed before the verification code is generated each time, which can prevent the combination pattern of the verification code from being attacked, and further enhance the security of the verification code.
In an alternative embodiment, after obtaining the verification code obtained by combining at least two types of verification data, the method may further include the following steps:
step S705, embedding at least one interference data into the verification code, and generating a new verification code, where a display result of the interference data includes: and displaying the verification code in a display area according to a preset appointed position or moving and displaying the verification code according to a preset motion track.
Specifically, in the above steps, interference factors (e.g., dots) with different sizes and numbers are randomly generated, a motion trajectory of each dot is randomly drawn, the motion trajectory is added to the original verification code to combine into a final dynamic verification code, and the generator periodically executes refreshing data, so that a single verification code can be prevented from being cracked and recycled.
Alternatively, the shape of the dynamic interference factor may be, but not limited to, a dot, and may also be other shapes, such as a square.
Through the embodiment, the dynamic interference factor is added, and at any time, part of contents in the verification code are shielded, so that the difficulty of screen capture and manual code printing sent to the code printing platform is increased.
In an alternative embodiment, as shown in fig. 8, transmitting the verification code to the front-end device for display may include the following steps:
step S802, the front-end equipment receives a verification code request;
step S804, the front-end equipment acquires at least one verification code according to the verification code request;
step S806, the front-end equipment displays at least one verification code and receives a verification answer;
step S808, if the verification answer received by the front-end device is verified to be correct, the verification code passes.
Specifically, in the above step, the request for the verification code may include, but is not limited to, initiating a registration request, a login request, or an online request for issuing content or issuing a reply without login; the front-end equipment can be any one of terminal equipment such as a mobile phone, a tablet computer, a notebook computer and a computer; the method comprises the steps that after receiving a verification code request input by a user, front-end equipment obtains at least one verification code according to the verification code request, and after the user inputs a verification answer corresponding to the verification code, if a server verifies that the verification answer received by the front-end equipment is correct, the server prompts that verification is successful; and if the server verifies that the verification answer received by the front-end equipment is wrong, prompting that the verification fails.
Based on the foregoing embodiment, in an optional implementation manner, as shown in fig. 9, after the front-end device displays at least one verification code and receives a verification answer, the method may further include the following steps:
step S902, the front-end equipment encrypts at least one verification code and the received verification answer;
step S904, the encryption result is sent to the server for verification.
Specifically, in the above steps, after receiving an authentication answer input by a user, the front-end device encrypts the authentication answer and an authentication code, and sends the encrypted authentication answer and the authentication code to the server for verification, wherein the encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm, and may be specifically determined according to actual services.
By the embodiment, the cracking threshold is improved, and an attacker is difficult to directly reverse the answer through the information of the parameters and the values.
According to the embodiment of the application, the verification code is generated by adopting more than two types of verification data, and the verification of the verification code is carried out through click operation, so that the machine identification difficulty is improved, and the user operation experience is enhanced; furthermore, the difficulty of manual code printing of the screenshot can be increased by adding the dynamic interference factor; and finally, encrypting the result selected by the user and the original image information and sending the result and the original image information to a server for verification, so as to prevent an attacker from speculating the answer of the verification code through requesting parameters and values.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method for acquiring the verification code according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation manner in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
Example 3
According to an embodiment of the present application, there is further provided an embodiment of an apparatus for implementing the method for acquiring an authentication code in embodiment 2, where fig. 10 is a schematic diagram of an apparatus for acquiring an authentication code according to an embodiment of the present application, and as shown in fig. 10, the apparatus includes: a first acquisition module 101, a second acquisition module 103 and a display module 105.
The first obtaining module 101 is configured to obtain at least two types of verification data, where the types of the verification data include at least one of the following: text, pictures, animations, and characters;
a second obtaining module 103, configured to obtain a verification code obtained by combining at least two types of verification data;
and the display module 105 is configured to transmit the verification code to the front-end device for display, where display areas of different types of verification data overlap with each other.
It should be noted here that the first acquiring module 101, the second acquiring module 103 and the display module 105 correspond to steps S702 to S706 in embodiment 2, and the modules are the same as the corresponding steps in the implementation example and application scenarios, but are not limited to the disclosure in embodiment 2. It should be noted that the modules described above as part of an apparatus may be implemented in a computer system such as a set of computer-executable instructions.
As can be seen from the above, in the above embodiments of the present application, a manner of generating a verification code by arbitrarily combining at least two types of verification data is adopted, any two or more types of verification data are acquired by the first acquisition module 101, the acquired verification data are arbitrarily combined by the second acquisition module 103 to obtain a corresponding verification code, and the generated verification code is transmitted to the front-end device initiating the verification code request by the display module 105 for display, where display areas of different types of verification data in the verification code displayed on the front-end device are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 3, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
In an optional embodiment, the first obtaining module is further configured to obtain, according to configuration information, a verification code obtained by combining at least two types of verification data, where the configuration information is used to determine a combination mode for combining different types of verification data, and the combination mode at least includes: the type of the verification data to be combined, the attribute information, and the number and content of the verification factors included in each type of verification data are selected.
In an optional embodiment, the second obtaining module is further configured to generate a predetermined number of verification codes according to the combination pattern in any cycle of generating the verification codes, and update the predetermined number of verification codes by refreshing the combination pattern in a next cycle.
In an optional embodiment, the apparatus further comprises:
the processing module is used for embedding at least one interference data into the verification code to generate a new verification code, wherein the display result of the interference data comprises: and displaying the verification code in a display area according to a preset appointed position or moving and displaying the verification code according to a preset motion track.
It should be noted here that the processing module corresponds to step S705 in embodiment 2, and the module is the same as the example and application scenario realized by the corresponding step, but is not limited to the disclosure of embodiment 2. It should be noted that the modules described above as part of an apparatus may be implemented in a computer system such as a set of computer-executable instructions.
In an alternative embodiment, the display module includes: the first receiving module is used for receiving a verification code request; the third acquisition module is used for acquiring at least one verification code according to the verification code request; the second receiving module is used for displaying at least one verification code and receiving a verification answer by the front-end equipment; and the execution module is used for verifying that the verification code passes if the received verification answer is verified to be correct.
It should be noted here that the first receiving module, the third acquiring module, the second receiving module and the executing module correspond to steps S802 to S808 in embodiment 2, and the modules are the same as the corresponding steps in implementation examples and application scenarios, but are not limited to the disclosure in embodiment 2. It should be noted that the modules described above as part of an apparatus may be implemented in a computer system such as a set of computer-executable instructions.
In an optional embodiment, after the front-end device displays at least one verification code and receives a verification answer, the apparatus further includes: the encryption module is used for encrypting the at least one verification code and the received verification answer by the front-end equipment; and the verification module is used for sending the encryption result to the server for verification.
It should be noted here that the above encryption module and the verification module correspond to steps S902 to S904 in embodiment 2, and the above modules are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure in embodiment 2. It should be noted that the modules described above as part of an apparatus may be implemented in a computer system such as a set of computer-executable instructions.
Example 4
According to the embodiment of the present application, an embodiment of a method for acquiring a verification code is provided, and is applied to a front-end device, and the method for acquiring a verification code provided in this embodiment may be applied to a system for acquiring a verification code provided in embodiment 1 of the present application, including but not limited to the application scenario described in embodiment 1 of the present application. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The present application provides a method for acquiring a verification code shown in fig. 11, which is applied to a front-end device, where fig. 11 is a flowchart of a method for acquiring a verification code according to an embodiment of the present application, and as shown in fig. 11, the method includes the following steps:
step S112, the front-end equipment receives the verification code request;
step S114, the front-end equipment acquires at least one verification code according to the verification code request, wherein the verification code is obtained by combining at least two types of verification data, display areas of the verification data of different types are mutually overlapped, and the type of the verification data comprises at least one of the following types: text, pictures, animations, and characters;
step S116, the front-end device displays at least one verification code in a predetermined area.
It should be noted here that, in the process of accessing the internet service by the user, in order to guarantee the information of the user and the data of the website, most of the website servers provide verification codes for verification, and when the user registers, logs in or replies to the website in a non-login manner (for example, replies to a hundredth bar without logging in), the verification provided by the website must be filled in, and only after the verification of the website server is passed, the corresponding operation can be performed.
Therefore, the front-end device may be a terminal device for a user to access the internet, including but not limited to a mobile phone, a tablet computer, a notebook computer and a computer; the verification code request includes but is not limited to any form of online request such as registration, login, content publishing, reply issuing and the like; when a user logs in a Web server (e.g., forum, baidu cafe, etc.) through a browser installed on the front-end device or accesses an application server through a client application (e.g., QQ, wechat, microblog, etc.) installed on the front-end device, if the front-end device receives a verification code request, a verification code obtained by combining at least two types of verification data can be obtained according to the verification code request, display areas of different types of verification data in the verification code are overlapped with each other, and a machine is difficult to identify, so that only a person can identify verification content in the verification code.
As can be seen from the above, in the above embodiments of the present application, a manner of generating the verification code by arbitrarily combining at least two types of verification data is adopted, after the front-end device receives the verification code request, the verification code obtained by arbitrarily combining any two or more types of verification data is obtained according to the verification code request, and is displayed in the predetermined area, where display areas of different types of verification data in the verification code displayed in the predetermined area are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 4, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
In an optional embodiment, at least one interference data is embedded in the predetermined area, wherein the interference data is displayed in the display area according to a predetermined designated position or moved according to a predetermined movement track.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method for acquiring the verification code according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation manner in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
Example 5
According to an embodiment of the present application, there is further provided an embodiment of an apparatus for implementing the method for acquiring an authentication code in embodiment 4, where fig. 12 is a schematic diagram of an apparatus for acquiring an authentication code according to an embodiment of the present application, and as shown in fig. 12, the apparatus includes: a receiving unit 121, an acquisition unit 123, and a display unit 125.
The receiving unit 121 is configured to receive a verification code request;
an obtaining unit 123, configured to obtain at least one verification code according to a verification code request, where the verification code is obtained by combining at least two types of verification data, display areas of different types of verification data are overlapped with each other, and the type of the verification data includes at least one of the following: text, pictures, animations, and characters;
and a display unit 125 for displaying at least one verification code in a predetermined area.
As can be seen from the above, in the above-described embodiment of the present application, the current request for the verification code is received by the receiving unit 121, the verification code obtained by arbitrarily combining any two or more verification data is acquired by the acquiring unit 123 according to the request for the verification code, and is displayed in the predetermined area by the display unit 125, wherein the display areas of the different types of verification data in the verification code displayed in the predetermined area are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 5, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
In an optional embodiment, the display unit is further configured to embed at least one interference data in the predetermined area, where the interference data is displayed in a predetermined designated position or moved according to a predetermined movement track in the display area.
Example 6
According to an embodiment of the present application, there is further provided an apparatus embodiment, and fig. 13 is a schematic diagram of a front-end apparatus according to the embodiment of the present application, and as shown in fig. 13, the front-end apparatus a includes: a display 131 and a processor 133.
The display 131 displays at least one verification code in a predetermined area, where the verification code is obtained by combining at least two types of verification data, display areas of different types of verification data are overlapped with each other, and the type of the verification data includes at least one of the following types: text, pictures, animations, and characters;
the processor 133 acquires the at least one verification code from the server according to the received verification code request, and transmits the at least one verification code to the display for displaying.
In particular, the display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the head-end device.
It should be noted here that, in some embodiments, the front-end device shown in fig. 13 may have a touch display (also referred to as a "touch screen" or a "touch display screen"). In some embodiments, the front-end device shown in fig. 13 has a Graphical User Interface (GUI) with which a user can interact with a human machine by finger contact and/or gestures on the surface of the touch screen, where the human machine interaction function optionally includes the following interactions: executable instructions for creating web pages, drawing, word processing, making electronic documents, games, video conferencing, instant messaging, emailing, call interfacing, playing digital video, playing digital music, and/or web browsing, etc., for performing the above-described human-computer interaction functions, are configured/stored in one or more processor-executable computer program products or readable storage media.
As can be seen from the above, in the above embodiment of the present application, the front-end device obtains at least one verification code from the server through the processor 133 according to the received verification code request, transmits the at least one verification code to the display 131, and displays the at least one verification code in the predetermined area on the display 131, where display areas of different types of verification data in the verification codes displayed in the predetermined area are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 6, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
Example 7
The embodiment of the application can provide a computer terminal, and the computer terminal can be any one computer terminal device in a computer terminal group. Optionally, in this embodiment, the computer terminal may also be replaced with a terminal device such as a mobile terminal.
Optionally, in this embodiment, the computer terminal may be located in at least one access device of a plurality of network devices of a computer network.
Fig. 14 shows a hardware configuration block diagram of a computer terminal. As shown in fig. 14, computer terminal 14 may include one or more (shown as 142a, 142b, … …, 142 n) processors 142 (processor 142 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory 144 for storing data, and a transmission device 146 for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 14 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 14 may also include more or fewer components than shown in FIG. 14, or have a different configuration than shown in FIG. 14.
It should be noted that the one or more processors 142 and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuit may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computer terminal 14. As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The processor 142 may invoke the information stored in the memory and the application program through the transmission device to perform the following steps: obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped.
The memory 144 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the method for acquiring the verification code in the embodiment of the present application, and the processor 142 executes various functional applications and data processing by running the software programs and modules stored in the memory 144, that is, implementing the method for acquiring the verification code of the application program. The memory 144 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 144 may further include memory located remotely from the processor 142, which may be connected to the computer terminal 14 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 146 is used for receiving or transmitting data via a network. Specific examples of such networks may include wireless networks provided by the communication provider of the computer terminal 14. In one example, the transmission device 146 includes a Network Interface Controller (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 146 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with the user interface of computer terminal 14.
It should be noted here that in some alternative embodiments, the computer terminal 14 shown in fig. 14 described above may include hardware elements (including circuitry), software elements (including computer code stored on a computer-readable medium), or a combination of both hardware and software elements. It should be noted that fig. 14 is only one example of a particular specific example and is intended to illustrate the types of components that may be present in the computer terminal 14 described above.
Fig. 14 shows a block diagram of a hardware structure, which may be taken as an exemplary block diagram of not only the front-end device but also the server, and in an alternative embodiment, fig. 15 shows an embodiment that uses the computer terminal shown in fig. 14 as a sending end in a block diagram. As shown in fig. 15, the head-end 151 may be connected via a data network connection or electronically to one or more servers 153. In an alternative embodiment, the computer terminal may be a computer. The data network connection may be a local area network connection, a wide area network connection, an internet connection, or other type of data network connection. The head-end may execute to connect to a network service executed by a server (e.g., a secure server) or a group of servers. A web server is a network-based user service such as social networking, cloud resources, email, online payment, or other online applications.
In this embodiment, the computer terminal 14 may execute the program code of the following steps in the method for acquiring the verification code of the application program: obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped.
The processor can call the information and application program stored in the memory through the transmission device to execute the following steps: obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped.
Optionally, the processor may further execute the program code of the following steps: acquiring a verification code obtained by combining at least two types of verification data according to configuration information, wherein the configuration information is used for determining a combination mode for combining different types of verification data, and the combination mode at least comprises the following steps: the type of the verification data to be combined, the attribute information, and the number and content of the verification factors included in each type of verification data are selected.
Optionally, the processor may further execute the program code of the following steps: in any cycle of generating the verification codes, a predetermined number of verification codes are generated according to the combination pattern, and in the next cycle, the predetermined number of verification codes are updated by refreshing the combination pattern.
Optionally, the processor may further execute the program code of the following steps: embedding at least one interference data into a verification code to generate a new verification code, wherein the display result of the interference data comprises: and displaying the verification code in a display area according to a preset appointed position or moving and displaying the verification code according to a preset motion track.
Optionally, the processor may further execute the program code of the following steps: the front-end equipment receives a verification code request; the front-end equipment acquires at least one verification code according to the verification code request; the front-end equipment displays at least one verification code and receives a verification answer; and if the verification answer received by the front-end equipment is verified to be correct, the verification code passes.
Optionally, the processor may further execute the program code of the following steps: the front-end equipment encrypts at least one verification code and the received verification answer; and sending the encryption result to the server for verification.
It can be understood by those skilled in the art that the structure shown in fig. 14 is only an illustration, and the computer terminal may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palmtop computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 14 is a diagram illustrating a structure of the electronic device. For example, the computer terminal 14 may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 14, or have a different configuration than shown in FIG. 14.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Example 8
According to the embodiment of the application, a storage medium is also provided. Optionally, in this embodiment, the storage medium may be configured to store the program code executed by the method for acquiring the verification code provided in embodiment 2.
Optionally, in this embodiment, the storage medium may be located in any one of computer terminals in a computer terminal group in a computer network, or in any one of mobile terminals in a mobile terminal group.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters; acquiring a verification code obtained by combining at least two types of verification data; and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: acquiring a verification code obtained by combining at least two types of verification data according to configuration information, wherein the configuration information is used for determining a combination mode for combining different types of verification data, and the combination mode at least comprises the following steps: the type of the verification data to be combined, the attribute information, and the number and content of the verification factors included in each type of verification data are selected.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: in any cycle of generating the verification codes, a predetermined number of verification codes are generated according to the combination pattern, and in the next cycle, the predetermined number of verification codes are updated by refreshing the combination pattern.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: embedding at least one interference data into a verification code to generate a new verification code, wherein the display result of the interference data comprises: and displaying the verification code in a display area according to a preset appointed position or moving and displaying the verification code according to a preset motion track.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: the front-end equipment receives a verification code request; the front-end equipment acquires at least one verification code according to the verification code request; the front-end equipment displays at least one verification code and receives a verification answer; and if the verification answer received by the front-end equipment is verified to be correct, the verification code passes.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: the front-end equipment encrypts at least one verification code and the received verification answer; and sending the encryption result to the server for verification.
Example 9
According to an embodiment of the present application, there is also provided a system, including: a processor; and a memory coupled to the processor for providing instructions to the processor for processing the following processing steps:
step S702, acquiring at least two types of verification data, where the types of the verification data include at least one of the following: text, pictures, animations, and characters;
step S704, obtaining a verification code obtained by combining at least two types of verification data;
step S706, the verification code is transmitted to the front-end device for displaying, wherein the display areas of the different types of verification data are overlapped with each other.
As can be seen from the above, in the above embodiments of the present application, a manner of generating the verification code by arbitrarily combining at least two types of verification data is adopted, after any two or more types of verification data are acquired, the acquired verification data are arbitrarily combined to generate the corresponding verification code, and the generated verification code is transmitted to the front-end device that initiates the verification code request to be displayed, where display areas of different types of verification data in the verification code displayed on the front-end device are displayed in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 9, the purpose of generating the verification code with higher complexity to prevent machine identification is achieved, and the technical effect of improving the information safety is achieved.
Example 10
According to the embodiment of the application, an embodiment of an information display method is further provided, and the information display method provided by the embodiment can be applied to various mobile phones, tablet computers, notebook computers, computers and other devices. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Fig. 16 is a flowchart of an information display method according to an embodiment of the present application, as shown in fig. 16, including the following steps:
step S162, acquiring at least two verification data, wherein the type of the verification data includes at least one of the following: text, pictures, animations, and characters;
step S164, displaying the verification data on the interactive interface, wherein the display areas of different verification data are at least partially overlapped.
Specifically, in the above step, the verification data may be any one or more of the following data added to the information content to be displayed: text, pictures (including photographs and various shapes of graphics), animations, and characters; in order to enhance the identification difficulty of the information to be displayed, at least two kinds of verification data can be added to the information to be displayed and are displayed on the interactive interface in an overlapping mode, and therefore machine identification is prevented.
As can be seen from the above, in the above embodiments of the present application, in the process of displaying the information to be displayed, at least two types of verification data are arbitrarily combined and displayed overlapping each other on the interactive interface. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 10, the aim of enhancing the difficulty of identifying the information content to be displayed so as to prevent machine identification is achieved, and therefore the technical effect of improving the information safety is achieved.
As an alternative, the verification data may be used for identity verification, or human-machine identification, or device authentication.
Specifically, in the above embodiments, the verification data may be applied to, but not limited to, identity verification, human-computer identification, or device authentication, according to different application scenarios. For example, when the information to be displayed is an account password of the user, at least two types of verification data are added to be displayed on the interactive interface of the displayed account password in an overlapping manner, so that the aim of malicious capture of the account password can be fulfilled.
Example 11
According to the embodiment of the present application, an embodiment of an information display method is further provided, and the information display method provided in this embodiment may be applied to a system including a server and a client, where the client includes but is not limited to a mobile phone, a tablet computer, a notebook computer, a computer, and other devices. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Fig. 17 is a flowchart of an information display method according to an embodiment of the present application, and as shown in fig. 17, the method includes the following steps:
step S172, the verification code generator obtains at least two kinds of verification data, wherein the type of the verification data includes at least one of the following: text, pictures, animations, and characters;
step S174, the verification code generator sends at least two verification data to an interactive interface of the front-end equipment;
step S176, displaying the verification data on the interactive interface of the front-end device, wherein the display areas of different verification data at least partially overlap.
Specifically, in the above step, the front-end device may be any terminal device capable of accessing the internet, including but not limited to a mobile phone, a tablet computer, a notebook computer, and a computer, the verification code generator may be a server for generating verification data in communication with the front-end device, and in the process of displaying information to be displayed (for example, important information such as a password) on the front-end device, the verification code generator may obtain any two or more verification data, send the verification data to the front-end device, and display the verification data on the front-end device in an overlapping manner, so as to increase the difficulty in identifying the information to be displayed.
As can be seen from the above, in the above embodiment of the present application, in the process of displaying the information to be displayed by the front-end device, at least two types of verification data are obtained by the verification code generator and sent to the front-end device, and the front-end device displays the received different types of verification data on the interactive interface in an overlapping manner. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 11, the aim of enhancing the difficulty of identifying the information content to be displayed so as to prevent machine identification is achieved, and therefore the technical effect of improving the information safety is achieved.
Example 12
According to the embodiment of the application, an embodiment of an information display method is further provided, and the information display method provided by the embodiment can be applied to various mobile phones, tablet computers, notebook computers, computers and other devices. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Fig. 18 is a flowchart of an information display method according to an embodiment of the present application, and as shown in fig. 18, the method includes the following steps:
step S182, at least two kinds of verification data are obtained, wherein the type of the verification data includes at least one of the following: text, pictures, animations, and characters;
step S184, displaying verification data on the interactive interface;
step S186, the correlation of different verification data is saved.
Specifically, in the above step, the verification data may be any one or more of the following data added to the information content to be displayed: text, pictures (including photographs and various shapes of graphics), animations, and characters; in order to enhance the identification difficulty of the information to be displayed, at least two kinds of verification data can be added to the information to be displayed and are displayed on the interactive interface in an overlapping mode, and therefore machine identification is prevented. It should be noted that, after at least two kinds of verification data are displayed on the interactive interface, the interrelation of the different kinds of verification data is stored, and the interrelation can be used to verify whether the verification answer is correct.
As can be seen from the above, in the above embodiments of the present application, in the process of displaying information to be displayed, at least two types of verification data are adopted to be arbitrarily combined and after the information is displayed on the interactive interface, the interrelation between the different types of verification data is stored. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 12, the aim of enhancing the difficulty of identifying the information content to be displayed so as to prevent machine identification is achieved, and therefore the technical effect of improving the information safety is achieved.
It should be noted here that the above-mentioned interrelationship of different verification data at least includes a positional relationship between different types of verification data displayed on the interactive interface.
Example 13
According to the embodiment of the present application, an embodiment of an information display method is further provided, and the information display method provided in this embodiment may be applied to a system including a server and a client, where the client includes but is not limited to a mobile phone, a tablet computer, a notebook computer, a computer, and other devices. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Fig. 19 is a flowchart of an information display method according to an embodiment of the present application, as shown in fig. 19, including the following steps:
in step S192, the verification code generator obtains at least two kinds of verification data, where the type of the verification data includes at least one of the following: text, pictures, animations, and characters;
step S194, displaying verification data on the interactive interface of the front-end device;
step S196 stores the correlation of different verification data.
Specifically, in the above steps, the front-end device may be any terminal device capable of accessing the internet, including but not limited to a mobile phone, a tablet computer, a notebook computer, and a computer, the verification code generator may be a server for generating verification data to be provided, the server being in communication with the front-end device, and in the process of displaying information to be displayed (for example, important information such as a password) on the front-end device, the verification code generator may obtain any two or more verification data to be transmitted to the front-end device: text, pictures (including photographs and various shapes of graphics), animations, and characters; the front-end equipment displays the received different types of verification data on the interactive interface, and stores the interrelation of the different types of verification data, and the interrelation can be used for verifying whether the verification answer is correct or not.
As can be seen from the above, in the above embodiment of the present application, in the process of displaying the information to be displayed by the front-end device, the verification code generator obtains at least two types of verification data, performs any combination on the verification data, and sends the verification data to the front-end device, and the front-end device displays the received verification data of different types on the interactive interface in an overlapping manner, and stores the mutual relationship between the verification data of different types. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations, and characters.
Through the scheme provided by the embodiment 13, the aim of enhancing the difficulty of identifying the information content to be displayed so as to prevent machine identification is achieved, and therefore the technical effect of improving the information safety is achieved.
It should be noted here that the above-mentioned interrelationship of different verification data at least includes a positional relationship between different types of verification data displayed on the interactive interface.
Example 14
According to the embodiment of the application, the embodiment of the method for verifying the data is further provided, and the method for verifying the data provided by the embodiment can be applied to various mobile phones, tablet computers, notebook computers, computers and other equipment; the method can also be applied to a system of a server and a client, wherein the client includes but is not limited to a mobile phone, a tablet computer, a notebook computer, a computer and the like. It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
Fig. 20 is a flowchart of a method for verifying data according to an embodiment of the present application, as shown in fig. 20, including the steps of:
step S202, receiving a verification request;
step S204, displaying at least two kinds of verification data on the interactive interface according to the verification request, wherein the display areas of different verification data are at least partially overlapped, and the type of the verification data comprises at least one of the following types: text, pictures, animations, and characters;
step S206, receiving an input verification answer;
step S208, checking whether the verification answer is correct;
and step S210, determining that the verification answer passes the verification under the condition that the verification answer is correct.
Specifically, in the above step, the request for the verification code may include, but is not limited to, initiating a registration request, a login request, or an online request for issuing content or issuing a reply without login; after receiving a verification code request input by a user, displaying at least two kinds of verification data overlapped with each other on an interactive interface according to the verification code request, and prompting that the verification is successful if the received verification answer is correct after the user inputs a verification answer corresponding to the verification code; if the received verification answer is wrong, the verification is prompted to fail.
As can be seen from the above, in the above embodiments of the present application, after receiving the verification request, the verification data of at least two types are obtained to be arbitrarily combined and displayed on the interactive interface, the verification answer input by the user is received, and whether the verification answer is correct or not is determined, and if the verification answer is correct, a successful verification is prompted. It is easy to note that the verification data types included in the verification code include, but are not limited to, any combination of two or more of characters, pictures, animations and characters; the verification answers may include, but are not limited to, interrelations (e.g., positional relationships, etc.) between different types of verification data.
Through the scheme provided by the embodiment 14, the purpose of providing verification complexity to prevent machine identification is achieved, and the technical effect of improving information safety is achieved.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.
Claims (22)
1. A system for obtaining a verification code, comprising:
the front-end equipment is used for displaying at least one verification code;
the verification code generator is used for acquiring a verification code obtained by combining at least two types of verification data and transmitting the verification code to the front-end equipment for displaying, wherein the display areas of the different types of verification data are mutually overlapped, and the types of the verification data comprise at least one of the following types: text, pictures, animations, and characters;
the verification code generator is further configured to embed at least one interference data into the verification code, and generate a new verification code, where the display result of the interference data includes: and performing moving display in a display area of the verification code according to a preset motion track.
2. The system of claim 1, further comprising:
and the server is connected between the front-end equipment and the verification code generator and used for receiving a verification code request sent by the front-end equipment and returning at least one verification code to the front-end equipment for displaying after reading at least one verification code from the verification code generator based on the verification code request.
3. The system of claim 2, further comprising:
and the buffer is connected between the server and the verification code generator and used for buffering the verification code generated in the period in which any one verification code generator generates the verification code and buffering the updated verification code in the next period.
4. A method of obtaining a verification code, comprising:
obtaining at least two types of verification data, wherein the types of verification data include at least one of: text, pictures, animations, and characters;
acquiring a verification code obtained by combining the at least two types of verification data;
transmitting the verification code to front-end equipment for displaying, wherein display areas of different types of verification data are mutually overlapped;
embedding at least one interference data into the verification code to generate a new verification code, wherein the display result of the interference data comprises: and performing moving display in a display area of the verification code according to a preset motion track.
5. The method according to claim 4, wherein the verification code obtained by combining the at least two types of verification data is obtained according to configuration information, wherein the configuration information is used for determining a combination mode for combining different types of verification data, and the combination mode at least comprises: the type of the verification data to be combined, the attribute information, and the number and content of the verification factors included in each type of verification data are selected.
6. The method according to claim 5, wherein a predetermined number of authentication codes are generated according to the combination pattern in any one cycle in which the authentication codes are generated, and the predetermined number of authentication codes are updated by refreshing the combination pattern in the next cycle.
7. The method of any one of claims 4 to 6, wherein transmitting the verification code to a front-end device for display comprises:
the front-end equipment receives a verification code request;
the front-end equipment acquires at least one verification code according to the verification code request;
the front-end equipment displays the at least one verification code and receives a verification answer;
and if the verification answer received by the front-end equipment is verified to be correct, verifying that the verification code passes.
8. The method of claim 7, wherein after the front-end device displays the at least one verification code and receives a verification answer, the method further comprises:
the front-end equipment encrypts the at least one verification code and the received verification answer;
and sending the encryption result to the server for verification.
9. An apparatus for obtaining a verification code, comprising:
the device comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring at least two types of verification data, and the types of the verification data comprise at least one of the following types: text, pictures, animations, and characters;
the second acquisition module is used for acquiring the verification code obtained by combining the at least two types of verification data;
the display module is used for transmitting the verification code to the front-end equipment for displaying, wherein the display areas of different types of verification data are mutually overlapped;
a processing module, configured to embed at least one interference data into the verification code to generate a new verification code, where a display result of the interference data includes: and performing moving display in a display area of the verification code according to a preset motion track.
10. A method of obtaining a verification code, comprising:
the front-end equipment receives a verification code request;
the front-end equipment acquires at least one verification code according to the verification code request, wherein the verification code is obtained by combining at least two types of verification data, display areas of different types of verification data are mutually overlapped, and the types of the verification data comprise at least one of the following types: text, pictures, animations, and characters;
the front-end equipment displays the at least one verification code in a preset area;
embedding at least one interference data in the preset area, wherein the interference data is displayed in the display area in a moving mode according to a preset motion track.
11. An apparatus for obtaining a verification code, comprising:
a receiving unit, configured to receive a verification code request;
an obtaining unit, configured to obtain at least one verification code according to the verification code request, where the verification code is obtained by combining at least two types of verification data, display areas of different types of verification data are overlapped with each other, and the type of the verification data includes at least one of the following types: text, pictures, animations, and characters;
the display unit is used for displaying the at least one verification code in a preset area;
the display unit is further used for embedding at least one interference data in the preset area, wherein the interference data is displayed in the display area in a moving mode according to a preset motion track.
12. A front-end device, comprising:
the display displays at least one verification code in a preset area, wherein the verification code is obtained by combining at least two types of verification data, the display areas of the different types of verification data are mutually overlapped, and the types of the verification data comprise at least one of the following types: text, pictures, animations, and characters;
the processor acquires the at least one verification code from the server according to the received verification code request and transmits the at least one verification code to the display for displaying;
the processor is further configured to embed at least one interference data into the verification code, and generate a new verification code, wherein the display result of the interference data includes: and performing moving display in a display area of the verification code according to a preset motion track.
13. A storage medium, characterized in that the storage medium comprises a stored program, wherein when the program runs, a device in which the storage medium is located is controlled to execute the method for acquiring the verification code according to any one of claims 4 to 8.
14. An authentication code generator, wherein the authentication code generator is configured to run a program, and wherein the program runs to perform the method of acquiring an authentication code according to any one of claims 4 to 8.
15. A system for obtaining a verification code, comprising:
a processor; and
a memory coupled to the processor for providing instructions to the processor for processing the following processing steps:
step S702, obtaining at least two types of verification data, where the types of the verification data include at least one of the following: text, pictures, animations, and characters;
step S704, obtaining a verification code obtained by combining the at least two types of verification data;
step S706, transmitting the verification code to a front-end device for displaying, wherein display areas of different types of verification data are mutually overlapped;
embedding at least one interference data into the verification code to generate a new verification code, wherein the display result of the interference data comprises: and performing moving display in a display area of the verification code according to a preset motion track.
16. An information display method, comprising:
obtaining at least two verification data and at least one interference data, wherein the type of the verification data comprises at least one of the following: text, pictures, animations, and characters;
displaying the verification data and the interference data on an interactive interface, wherein display areas of different verification data are at least partially overlapped;
and the interference data is displayed in the interactive interface in a moving mode according to a preset motion track.
17. The method of claim 16, wherein the verification data is used for identity verification, or human machine identification, or device authentication.
18. An information display method, comprising:
the verification code generator obtains at least two verification data and at least one interference data, wherein the type of the verification data comprises at least one of the following: text, pictures, animations, and characters;
the verification code generator sends the at least two verification data and the at least one interference data to an interactive interface of the front-end equipment;
and displaying the verification data and the interference data on the interactive interface of the front-end equipment, wherein display areas of different verification data are at least partially overlapped, and the interference data is displayed in the interactive interface in a moving mode according to a preset motion track.
19. An information display method, comprising:
acquiring at least two verification data and at least one interference data, wherein the display areas of different verification data at least partially overlap, and the type of the verification data comprises at least one of the following: text, pictures, animations, and characters;
displaying the verification data and at least one interference data on an interactive interface, wherein the interference data is movably displayed in the interactive interface according to a preset motion track;
the interrelationship of different verification data is preserved.
20. The method of claim 19, wherein the interrelationship of the different authentication data comprises a positional relationship.
21. An information display method, comprising:
the verification code generator obtains at least two kinds of verification data and at least one interference data, wherein display areas of different verification data at least partially overlap, and the type of the verification data comprises at least one of the following: text, pictures, animations, and characters;
displaying the verification data and at least one interference data on an interactive interface of front-end equipment, wherein the interference data is displayed in a moving mode in the interactive interface according to a preset motion track;
the interrelationship of different verification data is preserved.
22. A method of validating data, comprising:
receiving an authentication request;
displaying at least two kinds of verification data and at least one interference data on an interactive interface according to the verification request, wherein display areas of different verification data are at least partially overlapped, and the interference data is movably displayed in the interactive interface according to a preset motion track; wherein the type of the verification data comprises at least one of: text, pictures, animations, and characters;
receiving an input verification answer;
checking whether the verification answer is correct;
and determining that the verification answer passes the verification under the condition that the verification answer is verified to be correct.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710409488.7A CN108989269B (en) | 2017-06-02 | 2017-06-02 | Method, device and system for acquiring verification code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710409488.7A CN108989269B (en) | 2017-06-02 | 2017-06-02 | Method, device and system for acquiring verification code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108989269A CN108989269A (en) | 2018-12-11 |
CN108989269B true CN108989269B (en) | 2021-10-15 |
Family
ID=64501741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710409488.7A Active CN108989269B (en) | 2017-06-02 | 2017-06-02 | Method, device and system for acquiring verification code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989269B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902475B (en) * | 2019-03-13 | 2021-01-29 | 百度在线网络技术(北京)有限公司 | Verification code image generation method and device and electronic equipment |
CN110427745B (en) * | 2019-07-02 | 2022-03-08 | 五八有限公司 | Verification code obtaining method and device, electronic equipment and computer readable medium |
CN112751799B (en) * | 2019-10-29 | 2023-09-05 | 北京沃东天骏信息技术有限公司 | Verification method and device based on picture verification code |
CN111078437B (en) * | 2019-12-24 | 2023-07-14 | 五八有限公司 | Remote calling method and device for verification codes, electronic equipment and readable storage medium |
CN111783061B (en) * | 2020-05-28 | 2022-09-23 | 苏宁金融科技(南京)有限公司 | Data processing method, data processing device, computer equipment and storage medium |
CN111953647B (en) * | 2020-06-22 | 2022-09-27 | 北京百度网讯科技有限公司 | Security verification method and device, electronic equipment and storage medium |
CN112241522B (en) * | 2020-09-29 | 2024-02-09 | 全通金信控股(广东)有限公司 | Picture verification code generation method and verification system |
CN112685725B (en) * | 2020-12-30 | 2022-12-06 | 上海掌门科技有限公司 | A method and device for security verification |
CN113505360A (en) * | 2021-07-16 | 2021-10-15 | 湖南快乐阳光互动娱乐传媒有限公司 | Verification code request processing method and related equipment |
CN114281224A (en) * | 2021-12-15 | 2022-04-05 | 中国银联股份有限公司 | Calibration method and device based on sliding block |
CN114398614B (en) * | 2021-12-22 | 2025-09-16 | 中国电信股份有限公司 | Information verification method and device, electronic equipment and readable medium |
CN117058687B (en) * | 2023-07-21 | 2025-09-26 | 广州盈风网络科技有限公司 | A text classification verification method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660402A (en) * | 2013-11-19 | 2015-05-27 | 深圳市腾讯计算机系统有限公司 | Method, device and system for verifying terminal |
CN104852885A (en) * | 2014-02-14 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Method, device and system for verifying verification code |
CN106327547A (en) * | 2015-06-23 | 2017-01-11 | 阿里巴巴集团控股有限公司 | Verification code generation and verification method and device |
CN106341403A (en) * | 2016-08-30 | 2017-01-18 | 竞技世界(北京)网络技术有限公司 | Identifying code theft preventing method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9317674B2 (en) * | 2014-02-07 | 2016-04-19 | Bank Of America Corporation | User authentication based on fob/indicia scan |
CN104618350B (en) * | 2015-01-15 | 2018-03-16 | 湘潭大学 | A kind of generation method of picture validation code |
-
2017
- 2017-06-02 CN CN201710409488.7A patent/CN108989269B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660402A (en) * | 2013-11-19 | 2015-05-27 | 深圳市腾讯计算机系统有限公司 | Method, device and system for verifying terminal |
CN104852885A (en) * | 2014-02-14 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Method, device and system for verifying verification code |
CN106327547A (en) * | 2015-06-23 | 2017-01-11 | 阿里巴巴集团控股有限公司 | Verification code generation and verification method and device |
CN106341403A (en) * | 2016-08-30 | 2017-01-18 | 竞技世界(北京)网络技术有限公司 | Identifying code theft preventing method |
Also Published As
Publication number | Publication date |
---|---|
CN108989269A (en) | 2018-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108989269B (en) | Method, device and system for acquiring verification code | |
US10218506B1 (en) | Cross-device authentication | |
US10657243B2 (en) | Variation analysis-based public turing test to tell computers and humans apart | |
Zhu et al. | Captcha as graphical passwords—A new security primitive based on hard AI problems | |
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
CN104835046B (en) | A kind of data false distinguishing method for two-dimension code safe verification | |
US8745729B2 (en) | Preventing abuse of services through infrastructure incompatibility | |
CN107682368B (en) | Verification method, client, server and system based on interactive operation | |
US20130145441A1 (en) | Captcha authentication processes and systems using visual object identification | |
CN103763104B (en) | A kind of method and system of dynamic authentication | |
Conti et al. | CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery | |
CN105471808A (en) | Identifying code generating method, safety identification method, safety identification device and safety identification system | |
US20230344829A1 (en) | Multifactor authentication for information security within a metaverse | |
CN102801724A (en) | Identity authentication method combining graphic image with dynamic password | |
Almuairfi et al. | IPAS: Implicit password authentication system | |
CN106101463B (en) | Gesture-based verification method, mobile terminal and system in mobile application | |
CN104348617A (en) | Verification code processing method and device, and terminal and server | |
US12160514B2 (en) | Gesture-based authentication tokens for information security within a metaverse | |
CN105429928A (en) | Data communication method and system, and client and server | |
CN117313067A (en) | Verification code generation verification method and device, electronic equipment and storage medium | |
Dinh et al. | Human-artificial intelligence approaches for secure analysis in CAPTCHA codes | |
CN109413004B (en) | Verification method, device and equipment | |
Kolekar et al. | Click and session based—Captcha as graphical password authentication schemes for smart phone and web | |
JP7227444B2 (en) | Access authentication method using random dot pattern CAPTCHA | |
Mohamed et al. | On the security and usability of dynamic cognitive game CAPTCHAs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |