[go: up one dir, main page]

CN111079119A - Verification method, device, equipment and storage medium - Google Patents

Verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN111079119A
CN111079119A CN201911226689.9A CN201911226689A CN111079119A CN 111079119 A CN111079119 A CN 111079119A CN 201911226689 A CN201911226689 A CN 201911226689A CN 111079119 A CN111079119 A CN 111079119A
Authority
CN
China
Prior art keywords
verification code
image
graphic
verification
graphical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911226689.9A
Other languages
Chinese (zh)
Other versions
CN111079119B (en
Inventor
朱佳慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Reach Best Technology Co Ltd
Original Assignee
Reach Best Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reach Best Technology Co Ltd filed Critical Reach Best Technology Co Ltd
Priority to CN201911226689.9A priority Critical patent/CN111079119B/en
Publication of CN111079119A publication Critical patent/CN111079119A/en
Application granted granted Critical
Publication of CN111079119B publication Critical patent/CN111079119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/18Image warping, e.g. rearranging pixels individually

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure provides a verification method, an apparatus, a device, and a storage medium, which belong to the field of computer technologies, and the embodiment provides a method for performing verification by distorting an image, where a graphical verification code is distorted according to an image distortion operation, and whether the verification is passed is determined according to whether an angle of the graphical verification code obtained by the distortion processing is correct. Because the visual effect of the image is a high-level semantic meaning, for human beings, whether the image is distorted or normal is a characteristic which is easy to observe and understand, but for programs, whether the image is distorted or normal is a characteristic which is difficult to identify, whether the verification code triggering operation is a real person or a machine program can be effectively distinguished, the fact that the real person can pass the verification easily can be guaranteed, the program is difficult to break a correct graphic verification code to attack maliciously, and therefore the verification safety is improved. Compared with the answer verification mode, the answer verification method is convenient to operate, saves verification time and reduces learning cost.

Description

Verification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a verification method, an apparatus, a device, and a storage medium.
Background
The verification code is a technology for identifying whether a human user or a computer program is currently used for triggering an operation, and has a scientific name of a Completely automatic turing test (English: computer Automated publishing test to tell Computers and Humans, called CAPTCHA for short) for distinguishing Computers and Humans, and is commonly called the verification code. The form of the verification code can comprise various forms, such as a short message verification code, a question-answering verification code, a graphic verification code and the like. The graphic verification code is widely applied due to the advantages of easy identification and relatively high safety.
In the related art, a puzzle is usually used as a graphic verification code, and verification is performed according to whether the operation of the puzzle is correct. Specifically, the electronic device displays a background image of a missing tile and a randomly placed tile on the screen. The user needs to trigger the operation of the jigsaw puzzle to drive the jigsaw puzzle to move in the screen. When the jigsaw moves to the missing position in the background image, the operation is judged to be correct, and then the verification is passed. When the jigsaw puzzle moves to other positions of the background image, the operation is judged to be incorrect, and the verification is not passed.
When the method is used for verification, the correct position of the jigsaw puzzle is easy to be automatically calculated by a program by using an algorithm, so that the method is easy to crack, and the safety of the verification method is poor.
Disclosure of Invention
The present disclosure provides a verification method, apparatus, device and storage medium, to at least solve the technical problem of poor security caused by easy program cracking in the related art. The technical scheme of the disclosure is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a verification method, including:
displaying a first graphic verification code and first prompt information, wherein the first graphic verification code is a distorted image, and the first prompt information is used for prompting that image distortion operation is triggered on the first graphic verification code;
when an image distortion operation is detected, carrying out distortion processing on the first graphic verification code according to operation information of the image distortion operation to obtain a second graphic verification code;
and when the second graphic verification code is a normal image, the verification is passed.
Optionally, the image warping operation includes a sliding operation, and the warping processing is performed on the first graphical verification code according to the operation information of the image warping operation to obtain a second graphical verification code, including:
and according to the sliding distance of the sliding operation, carrying out distortion processing on the first graphic verification code to obtain a second graphic verification code, wherein the distortion degree of the second graphic verification code is related to the sliding distance.
Optionally, the sliding operation is an operation triggered on a slider on a guide rail, the guide rail is located in an area corresponding to the first graphic verification code, and the sliding distance is a distance that the slider slides from an end point of the guide rail; or,
the sliding operation is a sliding operation triggered on the first graphical verification code.
Optionally, the distorting the first graphical verification code according to the sliding distance of the sliding operation to obtain a second graphical verification code includes:
acquiring a target angle corresponding to the sliding distance according to the mapping relation between the sliding distance and the angle;
and twisting the first graphic verification code by the target angle to obtain a second graphic verification code.
Optionally, after the first graphical verification code is warped according to the operation information of the image warping operation to obtain a second graphical verification code, the method further includes:
and when the second graphic verification code is a normal image, displaying second prompt information, wherein the second prompt information is used for prompting that the second graphic verification code is a normal image.
Optionally, after the first graphical verification code is warped according to the operation information of the image warping operation to obtain a second graphical verification code, the method further includes:
and when the second graphic verification code is a distorted image, the verification fails, and third prompt information is displayed and used for prompting that the second graphic verification code is the distorted image.
Optionally, the method further comprises:
displaying a refresh control;
and when the operation triggered by the refreshing control is detected, refreshing the image content contained in the first graphic verification code.
According to a second aspect of embodiments of the present disclosure, there is provided an authentication apparatus including:
the display unit is configured to display a first graphic verification code and first prompt information, wherein the first graphic verification code is a distorted image, and the first prompt information is used for prompting that an image distortion operation is triggered on the first graphic verification code;
the distortion processing unit is configured to perform distortion processing on the first graphic verification code according to operation information of the image distortion operation when the image distortion operation is detected, so as to obtain a second graphic verification code;
and the verification unit is configured to execute that the verification is passed when the second graphic verification code is a normal image.
Optionally, the image warping operation includes a sliding operation, and the warping processing unit is configured to perform warping processing on the first graphical verification code according to a sliding distance of the sliding operation to obtain a second graphical verification code, where a degree of warping of the second graphical verification code is related to the sliding distance.
Optionally, the sliding operation is an operation triggered on a slider on a guide rail, the guide rail is located in an area corresponding to the first graphic verification code, and the sliding distance is a distance that the slider slides from an end point of the guide rail; or,
the sliding operation is a sliding operation triggered on the first graphical verification code.
Optionally, the warp processing unit includes:
the acquisition subunit is configured to execute acquiring a target angle corresponding to the sliding distance according to a mapping relation between the sliding distance and the angle;
and the distortion subunit is configured to perform distortion on the first graphical verification code by the target angle to obtain a second graphical verification code.
Optionally, the display unit is further configured to perform displaying second prompt information when the second graphic verification code is a normal image, where the second prompt information is used to prompt that the second graphic verification code is a normal image.
Optionally, the display unit is further configured to perform, when the second graphical verification code is a distorted image, that the verification fails, and display third prompt information, where the third prompt information is used to prompt that the second graphical verification code is a distorted image.
Optionally, the display unit is further configured to execute a display refresh control;
the detection unit is further configured to perform refreshing on the image content included in the first graphic verification code when the operation triggered by the refresh control is detected.
According to a third aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:
one or more processors;
one or more memories for storing the one or more processor-executable instructions;
wherein the one or more processors are configured to execute the instructions to implement the authentication method described above.
According to a fourth aspect of embodiments of the present disclosure, there is provided a storage medium, wherein instructions that, when executed by a processor of an electronic device, enable the electronic device to perform the above-mentioned authentication method.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product comprising one or more instructions that, when executed by a processor of an electronic device, enable the electronic device to perform the above-described authentication method.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
the embodiment provides a method for verifying by distorting an image, wherein a graphical verification code displayed on a foreground is distorted according to image distortion operation, and whether verification is passed is judged according to whether an angle of the graphical verification code obtained after the distortion processing is correct. Since the visual effect of the image is a high-level semantic meaning, for human beings, whether the image is distorted or normal is a feature which is easy to observe and understand, but for programs, whether the image is distorted or normal is a feature which is difficult to recognize, the verification method can effectively distinguish whether the operation triggered by the verification code is a real person or a machine program. By using the method, the real user can be ensured to pass the verification easily, and the program is ensured to be difficult to break the correct graphic verification code to attack maliciously, so the verification safety is greatly improved. In addition, the verification can be performed by triggering image distortion operation, and compared with a verification mode requiring a user to count or answer intelligent questions, the verification method has the advantages that the operation is very convenient, the time consumption of verification is saved, the verification efficiency is improved, and meanwhile, the learning cost of the user is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure and are not to be construed as limiting the disclosure.
FIG. 1 is an architecture diagram illustrating a verification system in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a verification method in accordance with an exemplary embodiment;
FIG. 3 is a flow diagram illustrating a verification method in accordance with an exemplary embodiment;
FIG. 4 is a diagram illustrating a graphical passcode-based verification in accordance with an exemplary embodiment;
FIG. 5 is a diagram illustrating a graphical passcode-based verification in accordance with an exemplary embodiment;
FIG. 6 is a diagram illustrating a graphical passcode-based verification in accordance with an exemplary embodiment;
FIG. 7 is a diagram illustrating a graphical passcode-based verification in accordance with an exemplary embodiment;
FIG. 8 is a diagram illustrating a graphical passcode-based verification in accordance with an exemplary embodiment;
FIG. 9 is a diagram illustrating a graphical passcode-based verification in accordance with an exemplary embodiment;
FIG. 10 is a block diagram illustrating an authentication device in accordance with an exemplary embodiment;
FIG. 11 is a block diagram illustrating a terminal in accordance with an exemplary embodiment;
FIG. 12 is a block diagram illustrating a server in accordance with an example embodiment.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The user information to which the present disclosure relates may be information authorized by the user or sufficiently authorized by each party.
Hereinafter, a hardware environment of the embodiments of the present disclosure is exemplified.
FIG. 1 is an architecture diagram illustrating a verification system in accordance with an exemplary embodiment. The authentication system includes: a terminal 101 and a verification platform 110. The terminal 101 is connected to the authentication platform 110 through a wireless network or a wired network.
The terminal 101 may be at least one of a smart phone, a game console, a desktop computer, a tablet computer, an e-book reader, an MP3(Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4) player, and a laptop computer. The terminal 101 is installed and operated with an application program supporting authentication. The application program may be a client application or a browser application. For example, the application may be a live application, a multimedia application, a short video application, a financial application, a shopping application, and the like. Illustratively, the terminal 101 is a terminal used by a user, and a user account is registered in an application running in the terminal 101.
The verification platform 110 may be at least one of a server, a plurality of servers, a cloud computing platform, and a virtualization center. The verification platform 110 is used to provide background services for applications that support verification functionality. Optionally, during the verification process, the verification platform 110 and the terminal 101 may work in cooperation. For example, the verification platform 110 is used to provide a graphical verification code, and the terminal 101 is used to display the graphical verification code and provide a user to trigger an image distortion operation on the graphical verification code.
Optionally, the verification platform 110 comprises: a server 1101 and a database 1102. The server 1101 is configured to provide background services related to authentication, for example, send a graphic verification code to the terminal 101, and receive a verification result returned by the terminal 101. The database 1102 may be used to store a large number of graphical authentication codes, etc., and the database 1102 may provide the stored graphical authentication codes to the server 1101 when needed.
Terminal 101 may generally refer to one of a plurality of terminals, or a set of a plurality of terminals; server 1101 may refer broadly to one of a plurality of servers, or a collection of servers; database 1102 may generally refer to one of a plurality of databases, or a collection of databases. It should be understood that if the terminal 101, server 1101, or database 1102 is a collection of multiple devices, although not shown in fig. 1, the authentication system described above may also include other terminals, other servers, or other databases. The present embodiment does not limit the number and types of each device in the verification system.
The hardware environment of the embodiment of the present disclosure is introduced above, and the method flow of the embodiment of the present disclosure is exemplarily described below.
Fig. 2 is a flow chart illustrating a verification method that may be employed in an electronic device, according to an example embodiment, including the following steps.
In step S21, a first graphic verification code and first prompt information are displayed, the first graphic verification code is a distorted image, and the first prompt information is used to prompt the first graphic verification code to trigger an image distortion operation.
In step S22, when the image warping operation is detected, the first graphic verification code is warped according to the operation information of the image warping operation, resulting in a second graphic verification code.
In step S23, when the second graphic verification code is a normal image, the verification passes.
The embodiment provides a method for verifying by distorting an image, wherein a graphical verification code displayed on a foreground is distorted according to image distortion operation, and whether verification is passed is judged according to whether an angle of the graphical verification code obtained after the distortion processing is correct. Since the visual effect of the image is a high-level semantic meaning, for human beings, whether the image is distorted or normal is a feature which is easy to observe and understand, but for programs, whether the image is distorted or normal is a feature which is difficult to recognize, the verification method can effectively distinguish whether the operation triggered by the verification code is a real person or a machine program. By using the method, the real user can be ensured to pass the verification easily, and the program is ensured to be difficult to break the correct graphic verification code to attack maliciously, so the verification safety is greatly improved. In addition, the verification can be performed by triggering image distortion operation, and compared with a verification mode requiring a user to count or answer intelligent questions, the verification method has the advantages that the operation is very convenient, the time consumption of verification is saved, the verification efficiency is improved, and meanwhile, the learning cost of the user is reduced.
Optionally, the image warping operation includes a sliding operation, and the warping processing is performed on the first graphical verification code according to the operation information of the image warping operation to obtain the second graphical verification code, including:
and according to the sliding distance of the sliding operation, performing distortion processing on the first graphic verification code to obtain a second graphic verification code, wherein the distortion degree of the second graphic verification code is related to the sliding distance.
Optionally, the sliding operation is an operation triggered by a slider on a guide rail, the guide rail is located in an area corresponding to the first graphic verification code, and the sliding distance is a distance that the slider slides from an end point of the guide rail; or,
the sliding operation is a sliding operation triggered on the first graphical verification code.
Optionally, according to the sliding distance of the sliding operation, performing distortion processing on the first graphical verification code to obtain a second graphical verification code:
acquiring a target angle corresponding to the sliding distance according to the mapping relation between the sliding distance and the angle;
and twisting the target angle of the first graphic verification code to obtain a second graphic verification code.
Optionally, after the first graphical verification code is distorted according to the operation information of the image distortion operation to obtain the second graphical verification code, the method further includes:
and when the second graphic verification code is a normal image, displaying second prompt information, wherein the second prompt information is used for prompting that the second graphic verification code is a normal image.
Optionally, after the first graphical verification code is distorted according to the operation information of the image distortion operation to obtain the second graphical verification code, the method further includes:
and when the second graphic verification code is the distorted image, the verification fails, and third prompt information is displayed and used for prompting that the second graphic verification code is the distorted image.
Optionally, the method further comprises:
displaying a refresh control;
and when the operation triggered by the refreshing control is detected, refreshing the image content contained in the first graphic verification code.
One method embodiment provided by the embodiment of the present disclosure is introduced above, and the embodiment of the present disclosure is exemplarily described below by another method embodiment.
FIG. 3 is a flow chart illustrating a method of authentication, according to an example embodiment, including the following steps.
In step S31, the electronic device acquires the first graphic verification code and the first prompt message.
The first graphic verification code may be a graphic verification code displayed before processing according to a user's operation. For example, the first graphical passcode may be the graphical passcode that was displayed upon initiation of the verification. As another example, the first graphical passcode may be a graphical passcode that is redisplayed after a failed retry. The form of the first graphic verification code may be an image, and the content of the image may be preset, for example, a building, a person, a cartoon, etc. The angle of the first graphic verification code may be a preset angle.
The first graphic verification code is a distorted image, and the first graphic verification code can be restored to a normal image through image distortion operation of a user subsequently. For example, referring to FIG. 4, the original graphical passcode may be a severely distorted image before the user has not begun dragging the slider.
The specific process of obtaining the first graphical verification code may include a variety of processes. For example, the electronic device may be a terminal, the terminal may send a verification code acquisition request to a server, the server reads the first graphical verification code from the database in response to the verification code acquisition request, and sends the first graphical verification code to the terminal, and the terminal may receive the first graphical verification code.
The scenario for acquiring the first graphical verification code may include a variety of scenarios. In an exemplary scenario, in the process of running a target application by an electronic device, when a service processing instruction is received, in order to identify whether a trigger instruction is a user or a script program, a first graphical verification code is obtained, a subsequent verification process based on the first graphical verification code is executed, when the verification passes, a corresponding service is executed in response to the service processing instruction, and when the verification passes, the execution of the service processing is rejected, so that the security is ensured, and an illegal person is prevented from maliciously instructing the electronic device to execute the service processing by using the script program.
The first prompt message is used for prompting that the image distortion operation is triggered on the first graphic verification code. The user can verify by looking at the first prompt and knowing that an image warping operation is to be performed. The first prompt message may be a text, a symbol, an image or a voice, but may also be in other data forms. The display position of the first prompt message may include various implementations. For example, the electronic device may display a first prompt in the remaining area of the track other than the slider, so that the user can see how the verification is passed by operating the slider by looking at the track. For example, referring to fig. 4, the electronic device may display "slide right drag resume warped image" in the guide rail.
In step S32, the electronic device displays the first graphical passcode and the first prompt.
Illustratively, referring to fig. 4, the electronic device may display a first graphical passcode and first prompt information as shown in fig. 4.
In some embodiments, the electronic device may further display the guide rail and the slider on the guide rail in an area corresponding to the first graphical verification code. The area corresponding to the first graphical verification code may be an area adjacent to the first graphical verification code in the interface. For example, the area corresponding to the first graphical verification code may be the area below the first graphical verification code. Illustratively, referring to FIG. 4, the rails and sliders may be displayed in an area below the first graphical passcode.
By displaying the guide rail and the slider, a user can change the position of the slider on the guide rail by dragging the slider, so that the slider slides on the guide rail, and the operation is configured as an image distortion operation, so that the first graphic verification code can be distorted. Therefore, the user can realize image verification by dragging the sliding block, the operation is very convenient, and the learning cost of the user is saved compared with the verification modes such as arithmetic, answering and the like.
Optionally, referring to fig. 4, the electronic device may also display a refresh control. The refresh control is configured to refresh the content of the image contained in the first graphical verification code. After the user triggers the refresh control to operate, the electronic device may reacquire the first graphical verification code and redisplay the first graphical verification code, where the redisplayed first graphical verification code is different from the previously displayed image content of the first graphical verification code. Therefore, if the operation difficulty of restoring the currently displayed first graphic verification code is high, the user can replace another first graphic verification code for verification by triggering the refreshing control to operate, and the operation success rate is improved.
In step S33, the electronic device detects an image warping operation.
The image warping operation refers to an operation for warping the first graphical verification code for user triggering. The degree of distortion of the first graphic verification code can be changed by the image distortion operation. Specific implementations of the image warping operation may include a variety. For example, the image warping operation may include a sliding operation. Hereinafter, an implementation of detecting a sliding operation for warping an image will be described by way of example in the first to second implementations.
In the first implementation mode, the image distortion operation is triggered by the slider.
Specifically, step S33 may include: the electronic device detects a slide operation triggered on the slider. For example, referring to fig. 4, 5, 6, 7, 8, or 9, if the user drags the slider to slide left and right on the rail, the electronic device may detect the image warping operation.
In the second implementation mode, the image distortion operation is triggered by sliding on the first graphic verification code.
Specifically, step S33 may include: the electronic device detects a sliding operation from a first position to a second position in the first graphical verification code. The first position may be any position on the first graphical verification code, and the second position may be any position on the first graphical verification code different from the first position. The first location and the second location may be on opposite sides of the first graphical verification code, respectively, e.g., the first location is to the left of the first graphical verification code and the second location is to the right of the first graphical verification code. For example, the user may slide from the left side to the right side of the first graphical passcode to trigger an image warping operation.
In step S34, the electronic device performs a warping process on the first graphical verification code according to the operation information of the image warping operation to obtain a second graphical verification code.
The second graphic verification code is an image obtained by distorting the first graphic verification code, and can be used for judging whether verification is passed or not. The second graphical verification code is distorted with respect to the first graphical verification code, i.e. the shape of the second graphical verification code is different from the shape of the first graphical verification code. For example, the twist angle of the second graphical verification code is different from the twist angle of the first graphical verification code. Referring to fig. 5, fig. 5 is a schematic diagram of the second graphical verification code, and it can be seen from a comparison between fig. 4 and fig. 5 that the first graphical verification code is distorted from the image shown in fig. 4 to the image shown in fig. 5. Fig. 5 is a schematic diagram of a second verification code that can trigger verification to pass, where the second verification code is a normal image and the image is displayed with a positive effect. Referring to fig. 6, 7, 8 or 9, fig. 6, 7, 8 or 9 is a schematic diagram of another second graphical verification code, and fig. 6, 7, 8 or 9 is a schematic diagram of a second graphical verification code that can trigger verification failure, where the second graphical verification code is a distorted image and the display effect of the image is distorted.
The operation information of the image warping operation may include one or more of an operation distance, an operation strength, and an operation number, and the operation information of the image warping operation may be determined, and the first graphic verification code may be warped according to the operation information. For example, if the image warping operation is a swipe operation, the operation information of the image warping operation may be a swipe distance, which may be mapped to an angle of the first graphical captcha that is warped, e.g., the greater the distance of the swipe, the greater the angle of the first graphical captcha that is warped. For example, referring to fig. 5, 6, 7, 8, or 9, the more to the right the slider is positioned on the rail, the greater the angle at which the first graphical authentication code is twisted.
Through step S34, the user can change the distortion degree of the first graphical verification code by performing an image distortion operation, and if the image distortion operation is correct, the distortion amount of the first graphical verification code can be correct, so that the first graphical verification code is corrected to a normal posture.
In some embodiments, if the image warping operation is a slide operation, the act of warping processing may be: and the electronic equipment twists the first graphic verification code according to the track of the sliding operation to obtain a second graphic verification code. The warping processing using the sliding trajectory may specifically include various implementations, and the following description is given by way of example in the first implementation to the second implementation.
In the first implementation mode, the electronic equipment twists the first graphic verification code according to the sliding distance of the sliding block on the guide rail to obtain a second graphic verification code.
The slider may start sliding from the end point of the guide rail, and the distance the slider slides may be the distance between the end point of the slide rail and the position where the slider is currently located on the slide rail. For example, if the slider is currently located at the left end point of the slide rail, the distance the slider slides may be 0. If the slider is currently located at the right end point of the slide rail, the distance the slider slides may be the length of the slide rail. Schematically, referring to fig. 4 and 5, a user can apply a correct twist amount by dragging the slider to a correct position, so as to gradually recover the first graphic verification code from a twisted form, and when the first graphic verification code slides to a certain extent, the form of the image recovers to a normal state, and at this time, the user releases the slider to stop dragging, so that the verification is passed. Therefore, the distorted graph is restored by dragging the slider, and the function of image verification can be realized, so that the convenience of operation is ensured.
In some embodiments, implementation one may include the following steps one through two.
Step one, the electronic equipment acquires a target angle corresponding to the sliding distance according to the mapping relation between the sliding distance and the angle.
The target angle refers to the angle of the distance map over which the slider is currently sliding. The target angle may be positively correlated with the distance. For example, the minimum value of the distance may be mapped to the minimum value of the target angle. For example, if the minimum value of the distance is 0 and the minimum value of the target angle is 0 degrees, the distance of 0 may be mapped to 0 degrees. The maximum value of the distance may be mapped to the maximum value of the target angle. For example, if the maximum value of the distance is the length of the guide rail and the maximum value of the target angle is 180 degrees, the distance may be mapped to 180 degrees when the distance is the length of the guide rail. Referring to fig. 4, when the slider is not slid, the slider is located at the left end of the slide rail, and the distance is 0, and the distance is mapped to 0 degrees, then a twist angle of 0 degrees is applied to the first graphic verification code in the following. When the slide block slides to the right end point of the slide rail, the distance is the length of the slide rail, the distance is mapped to 180 degrees, and then a 180-degree torsion angle is applied to the first graphic verification code in the following process.
Wherein, each position on the guide rail and the size of the angle to be distorted of the first graphic verification code can be in a linear mapping relationship. For example, referring to fig. 4, 5, 6, 7, 8, or 9, 0 to 180 degrees may be uniformly mapped on various positions on the guide rail. Of course, each position on the guide rail and the size of the angle to be distorted of the first graphic verification code may be in a non-linear mapping relationship, which is not limited in this embodiment.
In some embodiments, the electronic device may apply an amount of distortion to the image through a skew function. The skew function may be a function under transform in a Cascading Style Sheets (CSS). The skew function may include a variety, for example, the skew function may be a skew X (hierarchy) function; as another example, the skew function may be a skewY (hierarchy) function; as another example, the skew function may be skew (Xdegree, Ydegree). The specific skew functions are distinguished in that a skew (degree) function applies a skew angle in the X-axis direction, a skew (degree) function applies a skew angle in the Y-axis direction, and a skew (Ydegree ) function applies a skew angle in both the X-axis direction and the Y-axis direction. Wherein degree is an angle parameter representing an angle to be distorted toward the first graphic verification code. For example, skewX (30) indicates that a twist angle of 30 degrees is applied in the X-axis direction.
And secondly, the electronic equipment distorts the target angle of the first graphic verification code to obtain a second graphic verification code.
Illustratively, referring to fig. 4, before the slider is undrawn, the slider is located at the leftmost end, and the angle at which the first graphic verification code is distorted is 0 degrees. When the user drags the slider, the electronic device applies a certain amount of distortion to the image through the skewX () function. Wherein, the more to the right the slider position, the larger the applied twist angle.
In the second implementation manner, if the sliding operation is a sliding operation triggered on the first graphic verification code body, the electronic device performs distortion processing on the first graphic verification code according to the distance between the first position and the second position to obtain a second graphic verification code.
In step S35, when the second graphic verification code is a normal image, the electronic device verifies.
The electronic device may determine whether the angle of distortion of the second graphic verification code is a preset angle, and if the angle of distortion of the second graphic verification code is the preset angle, the electronic device may determine that the second graphic verification code is a normal image, and the verification is passed. For example, referring to FIG. 5, if the second graphical passcode is shown in FIG. 5, it may be determined that the second graphical passcode has been restored to a normal image, and the verification passes.
In some embodiments, when the second graphical verification code is a normal image, the electronic device may display a second prompt message for prompting that the second graphical verification code is a normal image. The second prompt message may be a text, a symbol, an image or a voice, but may also be in other data forms. The display position of the second prompt message may include various implementations. For example, the electronic device may display the second prompt message on a slider in the guide rail, so that the user can know whether the image distortion operation is correct or not by checking the slider, and whether the verification is currently passed or not. For example, referring to fig. 5, the electronic device may display a pair of hooks on the slider, where the pair of hooks is the second prompt message.
In step S36, when the second graphic verification code is a distorted image, the electronic device does not verify.
If the distorted angle of the second graphical verification code is not the preset angle, the electronic device can determine that the second graphical verification code is a distorted image, and the verification is not passed. In some embodiments, when the second graphical verification code is a distorted image, the electronic device may display a third prompt for prompting that the second graphical verification code is a distorted image. The third prompt message may be a text, a symbol, an image or a voice, but may also be in other data forms. The display position of the third prompt message may include various implementations. For example, the electronic device may display the third prompt message on the slider in the guide rail, so that the user can know whether the image distortion operation is correct or not by checking the slider, and whether the verification is successful or not currently. For example, referring to fig. 6, 7, 8, or 9, the electronic device may display a cross on the slider, where the cross is the third prompt message.
The embodiment provides a method for verifying by distorting an image, wherein a graphical verification code displayed on a foreground is distorted according to image distortion operation, and whether verification is passed is judged according to whether an angle of the graphical verification code obtained after the distortion processing is correct. Since the visual effect of the image is a high-level semantic meaning, for human beings, whether the image is distorted or normal is a feature which is easy to observe and understand, but for programs, whether the image is distorted or normal is a feature which is difficult to recognize, the verification method can effectively distinguish whether the operation triggered by the verification code is a real person or a machine program. By using the method, the real user can be ensured to pass the verification easily, and the program is ensured to be difficult to break the correct graphic verification code to attack maliciously, so the verification safety is greatly improved. In addition, the verification can be performed by triggering image distortion operation, and compared with a verification mode requiring a user to count or answer intelligent questions, the verification method has the advantages that the operation is very convenient, the time consumption of verification is saved, the verification efficiency is improved, and meanwhile, the learning cost of the user is reduced.
The technical principle of the method embodiment for improving safety is illustrated below.
Through research and analysis on the method for verifying the jigsaw puzzle, the scheme can be cracked by a computer program by using an algorithm. Specifically, an attacker can write a script program, simulate a human being by running the program script, continuously simulate sliding of the sliding block, continuously generate snapshots in real time during the sliding, analyze a large number of snapshots including various positions of the sliding block, judge whether a jigsaw in the snapshots is overlapped with a missing position in a background image by a graph processing algorithm, and determine whether the current position is the correct jigsaw position. Therefore, the cracking mode is easy to crack by a program by using a computer and an algorithm, and the safety is poor.
Whether the image is just stored in the image or not is a high-level semantic meaning. Whether the image is measured or not is very difficult to calculate through an algorithm, but is easy to perceive visually and intuitively. Therefore, compared with a jigsaw verification method which can judge whether the position is correct through a simple algorithm, the method for verifying the distorted image provided by the embodiment can greatly improve the cracking difficulty, so that the method is ensured to be difficult to be broken by a computer program, and the safety is improved.
The technical effects of the above method embodiments are illustrated below with reference to some application scenarios.
The verification method provided by the embodiment of the disclosure can be applied to various application scenarios, including but not limited to: logging in a website through a browser, logging in an application client, registering a user account, performing authentication when paying for consumption and the like. Of course, these several scenarios are merely examples. It should be understood that the scenario of instructing a computer to execute a specific service can implement the present solution to achieve the purpose of improving security.
In an exemplary application scenario, after the terminal starts the application client, if a login instruction is received, an account number input box, a password input box and a first graphical verification code may be displayed in a login interface. Acquiring a user account according to the input operation of the account input box; acquiring a password according to the input operation of the password input box; according to the operation information of the image distortion operation, performing distortion processing on the first graphic verification code to obtain a second graphic verification code; and when the second graphic verification code is a normal image and the user account number is matched with the password, the verification is passed, and the application client is allowed to log in based on the user account number. And when the second graphic verification code is a distorted image or the user account number is not matched with the password, the verification is not passed, and the login of the application client based on the user account number is refused.
When the method is applied to the scene, whether the real user or the malicious script program triggers the login instruction can be identified through the method provided by the embodiment, so that the login verification safety is improved, the malicious login condition of an illegal user is avoided, and the account protection function is realized for the application client.
In another exemplary application scenario, after the terminal starts the application client, if a service processing instruction is received, the method may be implemented, and the first graphical verification code is displayed in the service processing interface. According to the operation information of the image distortion operation, performing distortion processing on the first graphic verification code to obtain a second graphic verification code; and when the second graphic verification code is a normal image, the verification is passed, and the service corresponding to the service processing instruction is executed. And when the second graphic verification code is the distorted image, the verification fails, and the service corresponding to the service processing instruction is refused to be executed.
For example, if the application client is a train ticket booking client, if a ticket booking instruction is received, the method can be implemented, and an account number input box, a password input box and a first graphical verification code are displayed in a ticket booking interface. Acquiring a user account according to the input operation of the account input box; acquiring a password according to the input operation of the password input box; according to the operation information of the image distortion operation, performing distortion processing on the first graphic verification code to obtain a second graphic verification code; when the second graphic verification code is a normal image, the user account is a registered user account at the train ticket purchasing client side, and the password is matched with the user account, the verification is passed, and ticket booking is allowed. When the second graphical verification code is a distorted image, or the user account is not registered at the train ticket purchasing client, or the password is not matched with the user account, the verification fails, and ticket booking is refused.
In the above scenario, the method provided by the embodiment can effectively prevent a hacker from violently cracking the verification code by continuously trying with a computer program, and maliciously instructing the server to process the service. For example, the problem that illegal ticket robbing software imitates the ticket booking of a legal user so as to maliciously swipe the ticket and consume the ticket source can be prevented.
In still other exemplary application scenarios, in the service of the attention user, such as the service of the attention anchor and the service of the attention microblog user, the problem of machine brushing attention can be solved through the above method embodiments. In another exemplary application scenario, in a service for commenting on a resource, such as a service for commenting a short video, commenting a commodity, and commenting a microblog, the problem of machine review can be solved through the above method embodiment. In another exemplary application scenario, in a service of acquiring resources in a lottery manner, such as a service of forwarding a microblog lottery, a carousel game lottery, a collective lottery, and the like, the problem of malicious lottery may be solved through the above method embodiment. In another exemplary application scenario, in a financial transaction, such as a transaction of payment by verification code, transfer, cash withdrawal, etc., the problem of stealing assets of a user account by embezzling the verification code and causing financial risk can be solved by the above method embodiments. The technical principle of the specific method flows of these application scenarios is similar to that of the foregoing application scenarios, and the specific details thereof may be referred to the foregoing method embodiments, and for brevity of description, they are not enumerated here one by one.
The method embodiments provided by the embodiments of the present disclosure are introduced above, and the following is an exemplary description of the virtual device provided by the embodiments of the present disclosure.
FIG. 10 is a block diagram illustrating an authentication device according to an example embodiment. Referring to fig. 10, the apparatus includes a display unit 1001, a distortion processing unit 1002, and an authentication unit 1003.
A display unit 1001 configured to perform displaying a first graphic verification code and first prompt information, the first graphic verification code being a distorted image, the first prompt information being used to prompt that an image distortion operation is triggered for the first graphic verification code;
a warping processing unit 1002 configured to perform, when an image warping operation is detected, warping processing on the first graphic verification code according to operation information of the image warping operation to obtain a second graphic verification code;
an authentication unit 1003 configured to perform authentication pass when the second graphic authentication code is a normal image.
The embodiment provides a device for verifying by distorting an image, which is used for distorting a graphic verification code displayed on a foreground according to image distortion operation and judging whether the verification is passed according to whether the angle of the graphic verification code obtained after the distortion processing is correct. Since the visual effect of the image is a high-level semantic meaning, for human beings, whether the image is distorted or normal is a feature which is easy to observe and understand, but for programs, whether the image is distorted or normal is a feature which is difficult to recognize, the verification method can effectively distinguish whether the operation triggered by the verification code is a real person or a machine program. By using the method, the real user can be ensured to pass the verification easily, and the program is ensured to be difficult to break the correct graphic verification code to attack maliciously, so the verification safety is greatly improved. In addition, the verification can be performed by triggering image distortion operation, and compared with a verification mode requiring a user to count or answer intelligent questions, the verification method has the advantages that the operation is very convenient, the time consumption of verification is saved, the verification efficiency is improved, and meanwhile, the learning cost of the user is reduced.
Optionally, the image warping operation includes a sliding operation, and the warping processing unit 1002 is configured to perform warping processing on the first graphical verification code according to a sliding distance of the sliding operation to obtain a second graphical verification code, where a degree of warping of the second graphical verification code is related to the sliding distance.
Optionally, the sliding operation is an operation triggered by a slider on a guide rail, the guide rail is located in an area corresponding to the first graphic verification code, and the sliding distance is a distance that the slider slides from an end point of the guide rail; or,
the sliding operation is a sliding operation triggered on the first graphical verification code.
Optionally, the warping processing unit 1002 includes:
the obtaining subunit is configured to perform obtaining of a target angle corresponding to the sliding distance according to a mapping relationship between the sliding distance and the angle;
and the distortion subunit is configured to perform distortion of the first graphical verification code by the target angle to obtain a second graphical verification code.
Optionally, the display unit 1001 is further configured to perform displaying a second prompt message for prompting that the second graphic verification code is a normal image when the second graphic verification code is a normal image.
Optionally, the display unit 1001 is further configured to perform, when the second graphic verification code is a distorted image, that the verification fails, and display third prompt information for prompting that the second graphic verification code is the distorted image.
Optionally, the display unit 1001 is further configured to execute a display refresh control;
the detection unit is further configured to refresh the image content contained in the first graphic verification code when the operation triggered by the refresh control is detected.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The virtual device provided by the embodiment of the present disclosure is introduced above, and the hardware device provided by the embodiment of the present disclosure is exemplarily described below.
The electronic device in the above method embodiment may be implemented as a terminal, for example, fig. 11 shows a block diagram of a terminal 1100 provided in an exemplary embodiment of the present disclosure. The terminal 1100 may be: a smart phone, a tablet computer, an MP3(Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4) player, a notebook computer or a desktop computer. Terminal 1100 may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, and so forth.
In general, terminal 1100 includes: one or more processors 1101 and one or more memories 1102.
Processor 1101 may include one or more processing cores, such as a 4-core processor, an 8-core processor, or the like. The processor 1101 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1101 may also include a main processor and a coprocessor, the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1101 may be integrated with a GPU (Graphics Processing Unit) that is responsible for rendering and drawing the content that the display screen needs to display. In some embodiments, the processor 1101 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 1102 may include one or more computer-readable storage media, which may be non-transitory. Memory 1102 can also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1102 is used to store at least one instruction for execution by processor 1101 to implement the authentication method provided by method embodiments in the present disclosure.
In some embodiments, the terminal 1100 may further include: a peripheral interface 1103 and at least one peripheral. The processor 1101, memory 1102 and peripheral interface 1103 may be connected by a bus or signal lines. Various peripheral devices may be connected to the peripheral interface 1103 by buses, signal lines, or circuit boards. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1104, touch screen display 1105, camera assembly 1106, audio circuitry 1107, positioning assembly 1108, and power supply 1109.
The peripheral interface 1103 may be used to connect at least one peripheral associated with I/O (Input/Output) to the processor 1101 and the memory 1102. In some embodiments, the processor 1101, memory 1102, and peripheral interface 1103 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1101, the memory 1102 and the peripheral device interface 1103 may be implemented on separate chips or circuit boards, which is not limited by this embodiment.
The Radio Frequency circuit 1104 is used to receive and transmit RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuit 1104 communicates with communication networks and other communication devices via electromagnetic signals. The radio frequency circuit 1104 converts an electric signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electric signal. Optionally, the radio frequency circuit 1104 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 1104 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1104 may also include NFC (Near Field Communication) related circuits, which are not limited by this disclosure.
The display screen 1105 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 1105 is a touch display screen, the display screen 1105 also has the ability to capture touch signals on or over the surface of the display screen 1105. The touch signal may be input to the processor 1101 as a control signal for processing. At this point, the display screen 1105 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, display 1105 may be one, providing the front panel of terminal 1100; in other embodiments, the display screens 1105 can be at least two, respectively disposed on different surfaces of the terminal 1100 or in a folded design; in still other embodiments, display 1105 can be a flexible display disposed on a curved surface or on a folded surface of terminal 1100. Even further, the display screen 1105 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The Display screen 1105 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), and the like.
Camera assembly 1106 is used to capture images or video. Optionally, camera assembly 1106 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 1106 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuitry 1107 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1101 for processing or inputting the electric signals to the radio frequency circuit 1104 to achieve voice communication. For stereo capture or noise reduction purposes, multiple microphones may be provided, each at a different location of terminal 1100. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 1101 or the radio frequency circuit 1104 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, the audio circuitry 1107 may also include a headphone jack.
Positioning component 1108 is used to locate the current geographic position of terminal 1100 for purposes of navigation or LBS (location based Service). The positioning component 1108 may be a positioning component based on the GPS (global positioning System) in the united states, the beidou System in china, or the galileo System in russia.
Power supply 1109 is configured to provide power to various components within terminal 1100. The power supply 1109 may be alternating current, direct current, disposable or rechargeable. When the power supply 1109 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 1100 can also include one or more sensors 1110. The one or more sensors 1110 include, but are not limited to: acceleration sensor 1111, gyro sensor 1112, pressure sensor 1113, fingerprint sensor 1114, optical sensor 1115, and proximity sensor 1116.
Acceleration sensor 1111 may detect acceleration levels in three coordinate axes of a coordinate system established with terminal 1100. For example, the acceleration sensor 1111 may be configured to detect components of the gravitational acceleration in three coordinate axes. The processor 1101 may control the touch display screen 1105 to display a user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1111. The acceleration sensor 1111 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 1112 may detect a body direction and a rotation angle of the terminal 1100, and the gyro sensor 1112 may cooperate with the acceleration sensor 1111 to acquire a 3D motion of the user with respect to the terminal 1100. From the data collected by gyroscope sensor 1112, processor 1101 may implement the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensor 1113 may be disposed on a side bezel of terminal 1100 and/or on an underlying layer of touch display screen 1105. When the pressure sensor 1113 is disposed on the side frame of the terminal 1100, the holding signal of the terminal 1100 from the user can be detected, and the processor 1101 performs left-right hand recognition or shortcut operation according to the holding signal collected by the pressure sensor 1113. When the pressure sensor 1113 is disposed at the lower layer of the touch display screen 1105, the processor 1101 controls the operability control on the UI interface according to the pressure operation of the user on the touch display screen 1105. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1114 is configured to collect a fingerprint of the user, and the processor 1101 identifies the user according to the fingerprint collected by the fingerprint sensor 1114, or the fingerprint sensor 1114 identifies the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, the user is authorized by the processor 1101 to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for and changing settings, etc. Fingerprint sensor 1114 may be disposed on the front, back, or side of terminal 1100. When a physical button or vendor Logo is provided on the terminal 1100, the fingerprint sensor 1114 may be integrated with the physical button or vendor Logo.
Optical sensor 1115 is used to collect ambient light intensity. In one embodiment, the processor 1101 may control the display brightness of the touch display screen 1105 based on the ambient light intensity collected by the optical sensor 1115. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 1105 is increased; when the ambient light intensity is low, the display brightness of the touch display screen 1105 is turned down. In another embodiment, processor 1101 may also dynamically adjust the shooting parameters of camera assembly 1106 based on the ambient light intensity collected by optical sensor 1115.
Proximity sensor 1116, also referred to as a distance sensor, is typically disposed on a front panel of terminal 1100. Proximity sensor 1116 is used to capture the distance between the user and the front face of terminal 1100. In one embodiment, the touch display screen 1105 is controlled by the processor 1101 to switch from a bright screen state to a dark screen state when the proximity sensor 1116 detects that the distance between the user and the front face of the terminal 1100 is gradually decreasing; when the proximity sensor 1116 detects that the distance between the user and the front face of the terminal 1100 becomes gradually larger, the touch display screen 1105 is controlled by the processor 1101 to switch from a breath-screen state to a bright-screen state.
Those skilled in the art will appreciate that the configuration shown in fig. 11 does not constitute a limitation of terminal 1100, and may include more or fewer components than those shown, or may combine certain components, or may employ a different arrangement of components.
The electronic device in the foregoing method embodiment may be implemented as a server, for example, fig. 12 is a schematic structural diagram of a server provided in the present disclosure, where the server 1200 may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 1201 and one or more memories 1202, where the memory 1202 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 1201 to implement the verification method provided in each of the foregoing method embodiments. Of course, the server may also have a wired or wireless network interface, an input/output interface, and other components to facilitate input and output, and the server may also include other components for implementing the functions of the device, which are not described herein again.
In an exemplary embodiment, there is also provided a storage medium comprising instructions, such as a memory comprising instructions, executable by a processor of an electronic device to perform the above-described authentication method. Alternatively, the storage medium may be a non-transitory computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact Disc Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
Embodiments of the present disclosure also provide a computer program product including one or more instructions that, when executed by a processor of an electronic device, enable the electronic device to perform the above-described authentication method.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method of authentication, comprising:
displaying a first graphic verification code and first prompt information, wherein the first graphic verification code is a distorted image, and the first prompt information is used for prompting that image distortion operation is triggered on the first graphic verification code;
when an image distortion operation is detected, carrying out distortion processing on the first graphic verification code according to operation information of the image distortion operation to obtain a second graphic verification code;
and when the second graphic verification code is a normal image, the verification is passed.
2. The verification method according to claim 1, wherein the image warping operation includes a sliding operation, and the warping the first graphical verification code according to the operation information of the image warping operation to obtain a second graphical verification code includes:
and according to the sliding distance of the sliding operation, carrying out distortion processing on the first graphic verification code to obtain a second graphic verification code, wherein the distortion degree of the second graphic verification code is related to the sliding distance.
3. The authentication method according to claim 2,
the sliding operation is an operation triggered by a sliding block on a guide rail, the guide rail is located in an area corresponding to the first graphic verification code, and the sliding distance is a distance that the sliding block slides from an end point of the guide rail; or,
the sliding operation is a sliding operation triggered on the first graphical verification code.
4. The verification method according to claim 3, wherein the warping the first graphical verification code according to the sliding distance of the sliding operation to obtain a second graphical verification code comprises:
acquiring a target angle corresponding to the sliding distance according to the mapping relation between the sliding distance and the angle;
and twisting the first graphic verification code by the target angle to obtain a second graphic verification code.
5. The verification method according to claim 1, wherein after the first graphical verification code is warped according to the operation information of the image warping operation to obtain a second graphical verification code, the method further comprises:
and when the second graphic verification code is a normal image, displaying second prompt information, wherein the second prompt information is used for prompting that the second graphic verification code is a normal image.
6. The verification method according to claim 1, wherein after the first graphical verification code is warped according to the operation information of the image warping operation to obtain a second graphical verification code, the method further comprises:
and when the second graphic verification code is a distorted image, the verification fails, and third prompt information is displayed and used for prompting that the second graphic verification code is the distorted image.
7. The authentication method of claim 1, further comprising:
displaying a refresh control;
and when the operation triggered by the refreshing control is detected, refreshing the image content contained in the first graphic verification code.
8. An authentication apparatus, comprising:
the display unit is configured to display a first graphic verification code and first prompt information, wherein the first graphic verification code is a distorted image, and the first prompt information is used for prompting that an image distortion operation is triggered on the first graphic verification code;
the distortion processing unit is configured to perform distortion processing on the first graphic verification code according to operation information of the image distortion operation when the image distortion operation is detected, so as to obtain a second graphic verification code;
and the verification unit is configured to execute that the verification is passed when the second graphic verification code is a normal image.
9. An electronic device, comprising:
one or more processors;
one or more memories for storing the one or more processor-executable instructions;
wherein the one or more processors are configured to execute the instructions to implement the authentication method of any one of claims 1 to 7.
10. A storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the authentication method of any one of claims 1 to 7.
CN201911226689.9A 2019-12-04 2019-12-04 Verification method, device, equipment and storage medium Active CN111079119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911226689.9A CN111079119B (en) 2019-12-04 2019-12-04 Verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911226689.9A CN111079119B (en) 2019-12-04 2019-12-04 Verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111079119A true CN111079119A (en) 2020-04-28
CN111079119B CN111079119B (en) 2022-04-22

Family

ID=70312801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911226689.9A Active CN111079119B (en) 2019-12-04 2019-12-04 Verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111079119B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695105A (en) * 2020-05-29 2020-09-22 北京字节跳动网络技术有限公司 Authentication method, apparatus and electronic equipment
CN113836513A (en) * 2021-08-20 2021-12-24 广州酷狗计算机科技有限公司 Man-machine verification method and device, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120167204A1 (en) * 2010-12-22 2012-06-28 Yahoo! Inc Isolation tool for user assistance in solving a captcha test
CN104065666A (en) * 2014-07-03 2014-09-24 北京齐尔布莱特科技有限公司 Method and device for generating picture identification code
CN104700441A (en) * 2015-02-05 2015-06-10 北京京东尚科信息技术有限公司 Image verification code generating method and image verification code generating system
CN109063453A (en) * 2018-06-25 2018-12-21 广州爱九游信息技术有限公司 Identifying code implementation method, system, calculates equipment and storage medium at device
CN109782989A (en) * 2017-11-14 2019-05-21 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN110298164A (en) * 2019-07-03 2019-10-01 中国工商银行股份有限公司 Identifying code processing method and processing device
CN110308847A (en) * 2019-05-31 2019-10-08 北京百度网讯科技有限公司 Image verification method, device, electronic device, and computer-readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120167204A1 (en) * 2010-12-22 2012-06-28 Yahoo! Inc Isolation tool for user assistance in solving a captcha test
CN104065666A (en) * 2014-07-03 2014-09-24 北京齐尔布莱特科技有限公司 Method and device for generating picture identification code
CN104700441A (en) * 2015-02-05 2015-06-10 北京京东尚科信息技术有限公司 Image verification code generating method and image verification code generating system
CN109782989A (en) * 2017-11-14 2019-05-21 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN109063453A (en) * 2018-06-25 2018-12-21 广州爱九游信息技术有限公司 Identifying code implementation method, system, calculates equipment and storage medium at device
CN110308847A (en) * 2019-05-31 2019-10-08 北京百度网讯科技有限公司 Image verification method, device, electronic device, and computer-readable storage medium
CN110298164A (en) * 2019-07-03 2019-10-01 中国工商银行股份有限公司 Identifying code processing method and processing device

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A. A. CHANDAVALE等: "《Algorithm for Secured Online Authentication Using CAPTCHA》", 《2010 3RD INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY》 *
BADLYFORPAPERS: "《【CSS3】变形--扭曲 skew()》", 《HTTPS://BLOG.CSDN.NET/HAPPYHAOJIE/ARTICLE/DETAILS/50731282》 *
CHI-WING FU等: "《The Rhombic Dodecahedron Map: An Efficient Scheme for Encoding Panoramic Video》", 《IEEE TRANSACTIONS ON MULTIMEDIA》 *
我到底还要多久: "《图形验证码》", 《HTTPS://BLOG.CSDN.NET/O841122137/ARTICLE/DETAILS/52125661》 *
赵梓杰: "《针对移动终端涉及的基于滑动响应方式的验证码研究》", 《电子制作》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695105A (en) * 2020-05-29 2020-09-22 北京字节跳动网络技术有限公司 Authentication method, apparatus and electronic equipment
WO2021238753A1 (en) * 2020-05-29 2021-12-02 北京字节跳动网络技术有限公司 Verification method and apparatus, and electronic device
CN111695105B (en) * 2020-05-29 2022-08-09 北京字节跳动网络技术有限公司 Verification method and device and electronic equipment
CN113836513A (en) * 2021-08-20 2021-12-24 广州酷狗计算机科技有限公司 Man-machine verification method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN111079119B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
US12189748B2 (en) Implementation of biometric authentication
KR102158211B1 (en) The mobile terminal and the control method thereof
WO2021120793A1 (en) Face image transmission method and apparatus, numerical value transfer method and apparatus, and electronic device
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
KR20150080736A (en) Method for executing a function and Electronic device using the same
CN109688147A (en) Using login method, device, terminal, server, system and storage medium
JP7660635B2 (en) Biometric authentication
CN115329309A (en) Verification method, verification device, electronic equipment and storage medium
CN112231666A (en) Illegal account processing method, device, terminal, server and storage medium
CN110417710B (en) Attack data capturing method and device and storage medium
CN106991311A (en) A kind of information processing method and mobile terminal
CN112989299A (en) Interactive identity recognition method, system, device and medium
CN108804180A (en) Display method, device, terminal and storage medium of user interface
CN111079119B (en) Verification method, device, equipment and storage medium
CN110909264A (en) Information processing method, device, equipment and storage medium
CN108229171A (en) Driver processing method, device and storage medium
CN110213205B (en) Verification method, device and equipment
CN109995804B (en) Target resource information display method, information providing method and device
CN113377647A (en) Page processing method, device, server, terminal and readable storage medium
CN114724312B (en) Cabinet opening method, device and equipment of storage cabinet and computer readable storage medium
CN112764824B (en) Method, device, equipment and storage medium for triggering identity verification in application program
CN112308104A (en) Abnormity identification method and device and computer storage medium
CN111131619B (en) Account switching processing method, device and system
CN109446773A (en) A kind of verification mode reminding method and terminal device
CN111949341A (en) Method, device and equipment for displaying information and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant