Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification code-based interactive verification method, device, medium and computing device

A technology of interactive verification and verification code, which is applied in digital data authentication, instruments, electronic digital data processing, etc., to achieve the effect of improving security

Active Publication Date: 2022-03-22
杭州网易智企科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although security protection strategies are deployed in Internet services open to the outside world in most industries, however, with the rapid development of business and products, especially the rapid increase of personal online business, the information security protection of various industries is also facing more and more severe challenges. challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code-based interactive verification method, device, medium and computing device
  • Verification code-based interactive verification method, device, medium and computing device
  • Verification code-based interactive verification method, device, medium and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] In order to improve the resolution of the human face image output by the human face image generation model as much as possible, the training process of the above human face image generation model can be carried out in a step-by-step manner. Exemplarily, the above-mentioned process of optimizing the first generator and the first discriminator based on the discrimination result output by the first discriminator may include: performing multiple rounds of optimization on the first generator and the first discriminator, and the first generator and the number of layers of the first discriminator increases as the number of optimization rounds increases. Among them, when performing the Mth (M is a positive integer) round of optimization, the number of layers of the first generator and the first discriminator corresponding to the Mth round of optimization is determined, and then based on the discrimination result of the first discriminator, the first generated The weights of the...

Embodiment 2

[0082] In order to avoid the first generator to only learn part of the region, resulting in small differences between the generated images. A constant feature map can be added to the above-mentioned first generation confrontational network, so that all regions in the sample image can be considered during the model learning process. Exemplarily, the above-mentioned inputting the sample face verification code parameters into the first generator may include: inputting a plurality of predetermined batches of sample face verification code parameters into the first generator, and the sample face verification code parameters are combined with multiple corresponds to a spatial location. Further, according to the verification code-based interactive verification method according to the embodiment of the present disclosure, when each predetermined batch of sample face verification code parameters is input to the first generator, based on the predetermined batch of sample face verificatio...

Embodiment 3

[0085] Due to the gradient competition between the first generator and the first discriminator, the generative adversarial network is prone to the expansion of the gradient amplitude, causing problems such as easy divergence, difficulty in convergence, and instability. To this end, the first generator and the second generator can be normalized. Exemplarily, the captcha-based interactive verification method according to an embodiment of the present disclosure can scale the weight of each layer for each layer in the first generator and the first discriminator, and output The features of the feature map are normalized.

[0086] For example, in the training process of the face image generation model, on the one hand, for the weight w of the i-th layer network i Carry out scaling as in formula (1):

[0087]

[0088] where c i is the normalized parameter corresponding to the i-th layer network, and the calculation method can be shown in formula (2), for example:

[0089]

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides an interactive verification method based on a verification code, which is applied to a server. The method includes: obtaining the face verification code parameters in response to receiving a verification request; using a face image generation model to process the human face Face verification code parameters to generate a face image; use the style transfer model to process the face image to generate a stylized face image; send the stylized face image to the client for display; The location information of the interactive operation on the face image; and, based on the location information of the interactive operation, determine whether the interactive operation passes the verification. Embodiments of the present invention also provide a verification code-based interactive verification device, medium and computing equipment.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technology, and more specifically, embodiments of the present invention relate to a verification code-based interactive verification method, device, medium, and computing device. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] With the continuous development of Internet technology, the Internet has brought great convenience to various industries and users. Various industries provide services to users through the Internet, and users interact with various industries through the Internet. Although security protection strategies are deployed for Internet services open to the outside world in most industries, however, with the rapid development of business and products, especially the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36
CPCG06F21/36G06F2221/2133
Inventor 董彬徐国智李雨珂杨卫强朱浩齐
Owner 杭州网易智企科技有限公司