Verification method and device

A verification method and a technology of a verification device, which are applied in the field of communication, can solve problems such as the inability to effectively prevent machine programs from recognizing verification codes, and achieve the effect of increasing difficulty and reducing the pass rate

Inactive Publication Date: 2017-12-15
CHINA MOBILE COMM LTD RES INST +1
3 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] In view of the above technical problems, embodiments of the present invention provide a verification method and dev...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0070] The difficulty of machine program identification can be effectively improved by using the verification task and the verification picture as the verification code problem....
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The embodiment of the invention provides a verification method and device. The verification method comprises the steps of receiving a verification request, wherein the verification request carries content input by a user on a verification picture and a position of the content on the verification picture; and if the content input by the user is the same to appointed content and the position of the content is in an appointed area on the verification picture, indicating that a verification result of the verification request is successful. The problem that in the prior art, a machine program cannot be effectively prevented from identifying the verification code is solved.

Application Domain

Technology Topic

Computer securityValidation methods +1

Image

  • Verification method and device
  • Verification method and device
  • Verification method and device

Examples

  • Experimental program(5)

Example

[0061] First embodiment
[0062] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference figure 2 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.
[0063] figure 2 The flow of an example of the verification method in the implementation of the present invention is schematically shown.
[0064] Such as figure 2 As shown, the verification method of this embodiment may specifically include, for example:
[0065] Step 201: Receive a verification request. The verification request carries the content entered by the user on the verification picture and the position of the content on the verification picture, and then step 202 is entered.
[0066] It should be noted that the above verification picture may be divided into a plurality of regions in advance, and the shape of the region may be a regular shape, such as a rectangle, of course, the shape of the region may also be an irregular shape.
[0067] The foregoing content may be the content input by the user when completing the verification task in the designated area in the verification picture.
[0068] Optionally, before step 201, a request to apply for a verification code question is received; then a verification task and a verification picture are randomly selected in the verification code database. The verification picture includes multiple areas. The verification task means that the user is required to be in the place. The task completed in the designated area in the verification picture; the verification task and the verification picture are sent as the verification code question to the requesting party applying for the verification code question.
[0069] The above verification task can be: please paint the area No. 1 in the verification picture with the specified color (for example, the specified color is blue), or please enter the specified letter in the area No. 1 in the verification picture (for example, the specified The letter is a) etc. Of course, it is understandable that the verification task is not limited to this.
[0070] The above-mentioned use of verification tasks and verification pictures as verification code problems can effectively improve the difficulty of machine program identification.
[0071] Step 202: If the content input by the user is the same as the specified content, and the location of the content is within the specified area on the verification image, the verification result of the verification request is that the verification passed.
[0072] Option 1: The content entered by the user is the color value of the color entered by the user, and the position of the content on the verification image is the coordinate of the coloring track on the verification image. In step 204, if the color value of the color entered by the user is equal to The color values ​​of the designated colors are the same, and the coordinates of the coloring locus of the color input by the user are within the designated area on the verification picture, and the verification result of the verification request is that the verification is passed.
[0073] Compared with the prior art, it is determined whether the verification code is correct by verifying whether the coordinates formed by the coloring track are in the designated area and whether the color value of the designated area after coloring is the same as the color value of the designated color. It is easy to read the title from the verification task and identify the designated area in the verification image. When submitting the verification code subsequently, you only need to select the designated color brush and paint the designated area with the designated color to complete the verification code input. However, it is difficult for the machine program to automatically recognize the verification code problem in this embodiment, because the machine needs to identify the verification task and verify the content of the picture first, and then perform semantic analysis to determine the designated area and the designated color. If the designated area has an irregular shape, The machine program also needs to analyze the irregular edges of the designated area and forge the coloring track. This embodiment solves the problem in the prior art that it is impossible to accurately determine whether the verification code is entered manually or by other terminals, effectively increasing the difficulty of the program automatically identifying the verification code, and reducing the pass rate of malicious access.
[0074] Option 2: The content input by the user is the character or character string input by the user, and the position of the content is the coordinate of the input character or character string track. In step 204, if the character or character string input by the user is the same as the designated character or character string, and the coordinates of the input character or character string track are within the designated area on the verification picture, the verification result of the verification request is that the verification passed.
[0075] Compared with the prior art, the verification code is correct by verifying whether the coordinates of the input character or character string track is in the designated area and whether the character or character string input by the user is the same as the designated character or character string. It is easy to read the title from the verification task and identify the designated area in the verification picture. When submitting the verification code subsequently, you only need to enter the designated character or string in the designated area to complete the verification code input. It is difficult for the machine program to automatically recognize the verification code problem in this embodiment, because the machine needs to first identify the verification task and verify the content of the picture, and then perform semantic analysis to determine the designated area and the designated character or string. If the designated area is irregular The machine program also needs to analyze the irregular edges of the designated area and forge the input character or string trajectory. This embodiment solves the problem in the prior art that it is impossible to accurately determine whether the verification code is entered manually or by other terminals, effectively increasing the difficulty of the program automatically identifying the verification code, and reducing the pass rate of malicious access.
[0076] It should be noted that the above two optional methods are only exemplary descriptions, and the specific form of content and the specific form of coordinates are not limited in this embodiment.

Example

[0077] Second embodiment
[0078] Combine below figure 1 Application scenarios, the following combination figure 1 Application scenarios, reference image 3 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.
[0079] image 3 The flow of an example of the verification method in the implementation of the present invention is schematically shown.
[0080] Such as image 3 As shown, the verification method of this embodiment may specifically include, for example:
[0081] Step 301: Obtain the content input by the user on the verification picture and the position of the content on the verification picture, and then proceed to step 302.
[0082] The foregoing content may be the content input by the user when completing the verification task in the designated area in the verification picture.
[0083] Optionally, before the receiving the verification request, the verification method further includes: sending a request to apply for a verification code question; receiving a verification code question, the verification code question including a verification task and a verification picture, the verification picture including multiple The verification task refers to a task that needs to be completed by the user in a designated area in the verification picture. The above verification task can be: please paint the area No. 1 in the verification picture with the specified color (for example, the specified color is blue), or please enter the specified letter in the area No. 1 in the verification picture (for example, the specified The letter is a) etc. Of course, it is understandable that the verification task is not limited to this.
[0084] The above-mentioned use of verification tasks and verification pictures as verification code problems can effectively improve the difficulty of machine program identification.
[0085] Step 302: Send a verification request, where the verification request carries the content input by the user and the position of the content on the verification picture.
[0086] Option 1: The content input by the user is the color value of the color input by the user, and the position of the content on the verification image is the coordinate of the coloring track on the verification image.
[0087] Compared with the prior art, it is determined whether the verification code is correct by verifying whether the coordinates formed by the coloring track are in the designated area and whether the color value of the designated area after coloring is the same as the color value of the designated color. It is easy to read the title from the verification task and identify the designated area in the verification image. When submitting the verification code later, you only need to select the designated color brush and paint the designated area with the designated color to complete the verification code input. However, it is difficult for the machine program to automatically recognize the verification code problem in this embodiment, because the machine needs to first identify the verification task and verify the content of the picture, and determine the designated area and the designated color through semantic analysis. If the designated area is an irregular shape, The machine program also needs to analyze the irregular edges of the designated area and forge the coloring track. This embodiment solves the problem in the prior art that it is impossible to accurately determine whether the verification code is entered manually or by other terminals, effectively increasing the difficulty of the program automatically identifying the verification code, and reducing the pass rate of malicious access.
[0088] Option 2: The content input by the user is the character or character string input by the user, and the position of the content is the coordinate of the input character or character string track.
[0089] Compared with the prior art, the verification code is correct by verifying whether the coordinates of the input character or character string track is in the designated area and whether the character or character string input by the user is the same as the designated character or character string. It is easy to read the title from the verification task and identify the designated area in the verification picture. When submitting the verification code subsequently, you only need to enter the specified character or string in the designated area to complete the verification code input. It is difficult for the machine program to automatically recognize the verification code problem in this embodiment, because the machine needs to first identify the verification task and verify the content of the picture, and then perform semantic analysis to determine the designated area and the designated character or string. If the designated area is irregular The machine program also needs to analyze the irregular edges of the designated area and forge the input character or string trajectory. This embodiment solves the problem in the prior art that it is impossible to accurately determine whether the verification code is entered manually or by other terminals, effectively increasing the difficulty of the program automatically identifying the verification code, and reducing the pass rate of malicious access.
[0090] It should be noted that the above two optional methods are only exemplary descriptions, and the specific form of content and the specific form of coordinates are not limited in this embodiment.

Example

[0091] The third embodiment
[0092] See Figure 4 , The figure shows the flow of the verification method. The scenario of the verification method can be the verification scenario of mobile payment, the verification scenario of logging in to the chat client, the verification scenario of retrieving the password or changing the password. It should be noted that, The verification scenario is not specifically limited in this embodiment, and the specific steps are as follows:
[0093] Step 401: The verification code plug-in of the business client applies to the verification code platform for verification code questions.
[0094] The foregoing business client may be an existing application client, such as a payment client, a chat client, etc., of course, it is not limited to this.
[0095] It should be noted that the verification code problem in this embodiment includes the coloring task picture and the coloring card picture. The coloring card picture is the interface for the user to color, and the coloring card picture may include multiple areas that need to be painted. , The coloring task image is used to specify the area and color that the user needs to color. See Figure 5 , The coloring task picture 51 describes: Title: Please paint area 1 blue. The coloring card picture 52 is divided into a plurality of irregular shapes.
[0096] Step 402: The verification code platform randomly selects the coloring task picture and the coloring card picture as the verification code problem in the verification code database.
[0097] Step 403: The verification code platform sends the verification code question to the verification code plug-in of the business client.
[0098] Step 404: The verification code plug-in of the business client displays the received coloring task pictures and coloring card pictures.
[0099] See Figure 5 , The figure shows the effect of the verification code problem displayed on the business client.
[0100] Step 405: The user reads the coloring task in the coloring task picture, selects the brush of the specified color through brain thinking, and paints in the specified area.
[0101] See Image 6 , The picture shows the effect of the user painting area 1 blue.
[0102] Step 406: The verification code plug-in of the business client records the coordinates on the coloring trajectory, and saves the user's coloring card picture after coloring. The recorded coordinates are calculated to form a sequence string, and the sequence string is encrypted.
[0103] Continue to see Image 6 , Periodically record the coordinates on the painting track: (0,1)(0,1)(0,2)(0,2)(1,2)(0,2)(1,2)(0, 2)(0,3)(1,3)(0,3)(1,3), for example, the sequence string formed by a simple splicing operation is 010102021202120203130313.
[0104] Step 407: The verification code plug-in of the business client uploads the encrypted sequence string and the coloring card picture painted by the user together with the business request from the business client to the business server.
[0105] Step 408: The service server forwards the encrypted sequence string together with the painted coloring card picture to the verification code platform for verification.
[0106] Step 409: The verification code platform verifies the correctness of the verification code. If the following conditions are also met, the verification code is entered correctly:
[0107] Condition 1: The verification code platform decrypts the coordinate sequence string, restores each coordinate on the coloring track, and judges whether the coordinates are in the designated area.
[0108] Condition 2: Obtain the color value of the designated area in the painted coloring card picture, and judge whether it is the same as the color value of the designated color.
[0109] Step 410: The verification code platform returns the verification result of the verification code to the service server for subsequent processing.
[0110] Compared with the prior art, it is determined whether the verification code is correct by verifying whether the coordinates formed by the coloring track are in the designated area and whether the color value of the designated area after coloring is the same as the color value of the designated color. It is easy to read the title from the verification task and identify the designated area in the verification image. When submitting the verification code later, you only need to select the designated color brush and paint the designated area with the designated color to complete the verification code input. However, it is difficult for the machine program to automatically recognize the verification code problem in this embodiment, because the machine needs to first identify the verification task and verify the content of the picture, and determine the designated area and the designated color through semantic analysis. If the designated area is an irregular shape, The machine program also needs to analyze the irregular edges of the designated area and forge the coloring track. This embodiment solves the problem in the prior art that it is impossible to accurately determine whether the verification code is entered manually or by other terminals, effectively increasing the difficulty of the program automatically identifying the verification code, and reducing the pass rate of malicious access.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Method for detecting spatial point target space-base on basis of track cataloguing model

InactiveCN102116876AExpand your searchIncrease the difficultyOptical detectionComputer visionMotion Mode
Owner:SHANGHAI INST OF TECHNICAL PHYSICS - CHINESE ACAD OF SCI

Classification and recommendation of technical efficacy words

  • Increase the difficulty
  • Lower pass rate

Method for generating picture verification codes and system thereof

InactiveCN101976430AReduce the chance of identical captchasIncrease the difficulty2D-image generationImage data processing detailsMachine identificationTheoretical computer science
Owner:SHENZHEN YUCHU NETWORK TECH CO LTD

Credible safety computer

InactiveCN101324912ASolve the problem of real-time encrypted storageIncrease the difficultyDigital data authenticationSecurity enhancementCard reader
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Mining dustproof water curtain

InactiveCN107559040AEasy to coverLower pass rateDust removalFire preventionEngineeringUnderground tunnel
Owner:济宁鑫铄矿山设备有限公司

Image acquisition device and image acquisition method

ActiveCN112135012ALower pass rateSolve the problem of color cast overexposureTelevision system detailsColor signal processing circuitsWave bandExposure
Owner:HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products