Unlock instant, AI-driven research and patent intelligence for your innovation.

Interactive verification method and device based on verification code, medium and computing equipment

A technology of interactive verification and verification code, which is applied in digital data authentication, instruments, electronic digital data processing, etc., to achieve the effect of improving security

Active Publication Date: 2019-11-01
杭州网易智企科技有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although security protection strategies are deployed in Internet services open to the outside world in most industries, however, with the rapid development of business and products, especially the rapid increase of personal online business, the information security protection of various industries is also facing more and more severe challenges. challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interactive verification method and device based on verification code, medium and computing equipment
  • Interactive verification method and device based on verification code, medium and computing equipment
  • Interactive verification method and device based on verification code, medium and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] In order to improve the resolution of the human face image output by the human face image generation model as much as possible, the training process of the above human face image generation model can be carried out in a step-by-step manner. Exemplarily, the above-mentioned process of optimizing the first generator and the first discriminator based on the discrimination result output by the first discriminator may include: performing multiple rounds of optimization on the first generator and the first discriminator, and the first generator and the number of layers of the first discriminator increases as the number of optimization rounds increases. Among them, when performing the Mth (M is a positive integer) round of optimization, the number of layers of the first generator and the first discriminator corresponding to the Mth round of optimization is determined, and then based on the discrimination result of the first discriminator, the first generated The weights of the...

Embodiment 2

[0082] In order to avoid the first generator to only learn part of the region, resulting in small differences between the generated images. A constant feature map can be added to the above-mentioned first generation confrontational network, so that all regions in the sample image can be considered during the model learning process. Exemplarily, the above-mentioned inputting the sample face verification code parameters into the first generator may include: inputting a plurality of predetermined batches of sample face verification code parameters into the first generator, and the sample face verification code parameters are combined with multiple corresponds to a spatial location. Further, according to the verification code-based interactive verification method according to the embodiment of the present disclosure, when each predetermined batch of sample face verification code parameters is input to the first generator, based on the predetermined batch of sample face verificatio...

Embodiment 3

[0085] Due to the gradient competition between the first generator and the first discriminator, the generative adversarial network is prone to the expansion of the gradient magnitude, resulting in problems such as easy divergence, difficulty in convergence, and instability. To this end, the first generator and the second generator can be normalized. Exemplarily, the captcha-based interactive verification method according to an embodiment of the present disclosure can scale the weight of each layer for each layer in the first generator and the first discriminator, and output The features of the feature map are normalized.

[0086] For example, in the training process of the face image generation model, on the one hand, for the weight w of the i-th layer network i Carry out scaling as in formula (1):

[0087]

[0088] where c i is the normalized parameter corresponding to the i-th layer network, and the calculation method can be shown in formula (2), for example:

[0089]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an interactive verification method based on a verification code, which is applied to a server. The interactive verification method comprises the following steps: in response to a received verification request, obtaining a human face verification code parameter; processing the face verification code parameter by using a face image generation model to generate a face image; processing the face image by using a style migration model to generate a stylized face image; sending the stylized face image to a client for display; acquiring position information ofinteractive operation for the stylized face image; and determining whether the interactive operation passes verification based on the position information of the interactive operation. The embodimentof the invention further provides an interactive verification device based on a verification code, a medium and computing equipment.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technology, and more specifically, embodiments of the present invention relate to a verification code-based interactive verification method, device, medium, and computing device. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] With the continuous development of Internet technology, the Internet has brought great convenience to various industries and users. Various industries provide services to users through the Internet, and users interact with various industries through the Internet. Although security protection strategies are deployed for Internet services open to the outside world in most industries, however, with the rapid development of business and products, especially the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
CPCG06F21/36G06F2221/2133
Inventor 董彬徐国智李雨珂杨卫强朱浩齐
Owner 杭州网易智企科技有限公司