CN103853968A - Method and device for generating verification code picture and verification method and device thereof - Google Patents
Method and device for generating verification code picture and verification method and device thereof Download PDFInfo
- Publication number
- CN103853968A CN103853968A CN201410073873.5A CN201410073873A CN103853968A CN 103853968 A CN103853968 A CN 103853968A CN 201410073873 A CN201410073873 A CN 201410073873A CN 103853968 A CN103853968 A CN 103853968A
- Authority
- CN
- China
- Prior art keywords
- pictures
- sub
- picture
- identifying code
- positional information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Image Processing (AREA)
Abstract
The invention provides a method and a device for generating a verification code picture and a verification method and device thereof. The method for generating the verification code picture comprises the following steps: acquiring first sub-pictures and second sub-pictures; splicing the first sub-pictures into a background image of the verification code picture; acquiring the position information of the second sub-pictures on the background image, and setting the second sub-pictures according to the position information to differ the visual cheat effects of the second sub-pictures from the visual cheat effect of the background image. According to the method for generating the verification code picture in the embodiment of the invention, the visual cheat effects of the second sub-pictures, namely, effect dot sub-pictures, differ from the visual cheat effect of the background image, so that the verification code picture which can be identified by human eyes but cannot be identified by a machine is generated, the identification rate of the machine is lowered, unreasonable operation of certain malware pretending users can be avoided, and the network security is improved.
Description
Technical field
The present invention relates to Computer Applied Technology field, particularly a kind of generation method and apparatus of identifying code picture and verification method and device.
Background technology
Identifying code is that a kind of user of differentiation is computing machine and people's public full-automatic program.Identifying code uses some lines and some irregular character compositions conventionally, and Main Function is in order to prevent that hacker from cracking user cipher, steals subscriber information message etc.At present, the identifying code of most of websites is mainly chosen input frame by click, automatic spring identifying code picture, and then user inputs according to the verification code information ejecting.After being proved to be successful, could login and enter user account, carry out other operations etc.
But realizing in process of the present invention, inventor finds that in prior art, at least there are the following problems: current identifying code picture is static images, is easy to be identified by program by computing machine, and machine recognition rate is high, and internet security is low.
Summary of the invention
The present invention is intended to solve at least to a certain extent one of technical matters in correlation technique.
For this reason, first object of the present invention is to propose a kind of generation method of identifying code picture, the method is that the vision deception effect of effect idea picture is different with the vision deception effect of Background by the second sub-pictures, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
For reaching above-mentioned purpose, a kind of generation method that has proposed identifying code picture according to first aspect present invention embodiment, comprising: obtain the first sub-pictures and the second sub-pictures; The first sub-pictures is spliced into the Background of identifying code picture; And obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, make the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
According to the generation method of the identifying code picture of the embodiment of the present invention, by obtaining the first sub-pictures and the second sub-pictures, the first sub-pictures is spliced into the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Second aspect present invention embodiment has proposed a kind of generating apparatus of identifying code picture, comprising: obtain module, for obtaining the first sub-pictures and the second sub-pictures; Concatenation module, for being spliced into the first sub-pictures that obtains module acquisition the Background of identifying code picture; And processing module, for obtaining the positional information on the Background that the second sub-pictures is spliced in concatenation module, according to positional information, the second sub-pictures is set, make the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
According to the generating apparatus of the identifying code picture of the embodiment of the present invention, by obtaining the first sub-pictures and the second sub-pictures, the first sub-pictures is spliced into the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Third aspect present invention embodiment has proposed a kind of verification method of identifying code picture, comprising: show identifying code picture, the vision deception effect of the second sub-pictures of identifying code picture is different with the vision deception effect of the Background of identifying code picture; Receive user according to the information of identifying code picture input; And according to the verification code information corresponding with identifying code picture prestoring, information is verified.
According to the verification method of the identifying code picture of the embodiment of the present invention, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Fourth aspect present invention embodiment has proposed a kind of demo plant of identifying code picture, comprise: display module, be used for showing identifying code picture, the vision deception effect of the second sub-pictures of identifying code picture is different with the vision deception effect of the Background of identifying code picture; Receiver module, for receiving user according to the information of the identifying code picture input of display module demonstration; And authentication module, verify for information receiver module being received according to the verification code information corresponding with identifying code picture prestoring.
According to the demo plant of the identifying code picture of the embodiment of the present invention, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Brief description of the drawings
Fig. 1 a is the process flow diagram of the generation method of identifying code picture according to an embodiment of the invention;
Fig. 1 b is the process flow diagram of the generation method of identifying code picture in accordance with another embodiment of the present invention;
Fig. 2 is the matrix schematic diagram one that identifying code picture is corresponding according to an embodiment of the invention;
Fig. 3 is the schematic diagram one of identifying code picture according to an embodiment of the invention;
Fig. 4 is the matrix schematic diagram two that identifying code picture is corresponding according to an embodiment of the invention;
Fig. 5 is the matrix schematic diagram three that identifying code picture is corresponding according to an embodiment of the invention;
Fig. 6 is the process flow diagram of the generation method of the identifying code picture of another embodiment according to the present invention;
Fig. 7 is the schematic diagram two of identifying code picture according to an embodiment of the invention;
Fig. 8 is the structural representation of the generating apparatus of identifying code picture according to an embodiment of the invention;
Fig. 9 is the process flow diagram of the verification method of identifying code picture according to an embodiment of the invention;
Figure 10 is the structural representation of the demo plant of identifying code picture according to an embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Be exemplary below by the embodiment being described with reference to the drawings, be intended to for explaining the present invention, and can not be interpreted as limitation of the present invention.
Describe according to the generation method and apparatus of the identifying code picture of the embodiment of the present invention and verification method and device below with reference to accompanying drawing.
In order to reduce the discrimination of machine, improve the security of network, embodiments of the invention propose a kind of generation method of identifying code picture.
Fig. 1 a is the process flow diagram of the generation method of identifying code picture according to an embodiment of the invention.As shown in Figure 1a, the generation method of this identifying code picture comprises:
S101, obtains the first sub-pictures and the second sub-pictures.
In this embodiment, can from local picture library, read the first sub-pictures, can generate the first sub-pictures according to pixel strategy; Wherein, the first sub-pictures can have identical pattern, also can have different patterns.Namely background sub-pictures of this first sub-pictures.
Similarly, also can from local picture library, read the second sub-pictures, can generate the second sub-pictures according to pixel strategy; Wherein, the second sub-pictures can have identical pattern, also can have different patterns; Can be of similar shape, also can there is different shapes.
S102, is spliced into the first sub-pictures the Background of identifying code picture.
In this embodiment, multiple the first sub-pictures can be spliced into a large figure, as the Background of identifying code picture.
S103, obtains the positional information of the second sub-pictures on Background, according to positional information, the second sub-pictures is set, and makes the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
Wherein, the second sub-pictures can be called effect idea picture.
Particularly, can obtain the second sub-pictures according to default verification code information is the positional information of effect idea picture on Background, for example coordinate information.Suppose, default verification code information is 8, and the Background in this embodiment is a matrix that 5 row 4 are listed as, and as shown in Figure 2, can, with the region division effect idea picture of round dot mark in Fig. 2, can obtain the positional information in the region of Fig. 2 round dot mark.
It should be noted that, this Fig. 2 is only for schematically illustrating a kind of mode that obtains effect idea picture positional information.
In this embodiment, can effect idea picture be set according to positional information and preset rules, wherein, preset rules can be preset direction, as shown in Figure 3, the direction difference of the effect idea picture in Fig. 3 in two circles, certainly, because the vision deception effect of effect idea picture in Fig. 3 is different with the vision deception effect of Background, the identifying code picture shown in Fig. 3 that old friend arrives is soon for dynamic.Certainly, can change pattern, the type etc. of the effect idea picture shown in Fig. 3.
In addition, also the processing of can first location information floating, then according to the positional information after treatment of floating, the second sub-pictures being set is effect idea picture, for example, to 5 row 5 column matrix shown in Fig. 4, can move one of them second sub-pictures is effect idea picture, matrix after movement as shown in Figure 5, from Fig. 5, still can find out that verification code information is 8, and matrix is larger, the floating space of verification code information is larger.
In the present embodiment, in order further to reduce the discrimination of machine to identifying code picture, can in identifying code picture, increase interfere information, but this interfere information can not affect the identification of human eye to identifying code.Therefore, the method embodiment can also comprise S104, as shown in Figure 1 b:
S104, obtains the 3rd sub-pictures and the positional information of the 3rd sub-pictures on Background, according to the positional information of the 3rd sub-pictures on Background, the 3rd sub-pictures is set, and makes the vision deception effect of the 3rd sub-pictures identical with the vision deception effect of the second sub-pictures.
Wherein, the 3rd sub-pictures can be called noise spot sub-pictures.
In this embodiment, can read from this locality one or more the 3rd sub-pictures; Also can generate one or more the 3rd sub-pictures according to pixel strategy.
Particularly, can obtain the 3rd sub-pictures according to default interfere information is the positional information of noise spot sub-pictures on Background.In order to make the vision deception effect of the 3rd sub-pictures identical with the vision deception effect of the second sub-pictures, can adopt the preset rules identical with the second sub-pictures that the 3rd sub-pictures is set, do not repeat herein.Certainly, the 3rd sub-pictures also can be identical picture, can be also different pictures.
The generation embodiment of the method for above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, is spliced into the first sub-pictures the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Fig. 6 is the process flow diagram of the generation method of the identifying code picture of another embodiment according to the present invention.
As shown in Figure 6, the generation method of this identifying code picture comprises:
S601, obtains background sub-pictures and effect idea picture from local picture library.
Wherein, background sub-pictures can have identical pattern, also can have different patterns.Similarly effect idea picture can have identical pattern, also can have different patterns; Can be of similar shape, also can there is different shapes.
S602, is spliced into background sub-pictures the Background of identifying code picture.
In this embodiment, multiple background sub-pictures can be spliced into a large figure, as the Background of identifying code picture.
S603, obtains the positional information of effect idea picture on Background according to default verification code information, according to positional information, effect idea picture is set, and makes the vision deception effect of effect idea picture different with the vision deception effect of Background.
In this embodiment, default verification code information is 8, after acquisition positional information, effect idea picture is set, make the vision deception effect of effect idea picture different with the vision deception effect of Background, as shown in Figure 7, and the direction difference of effect idea picture, it should be noted that, this Fig. 7 only cheats the schematic diagram of effect for vision.
The generation embodiment of the method for above-mentioned identifying code picture, by obtaining background sub-pictures and effect idea picture, is spliced into background sub-pictures the Background of identifying code picture; Then obtain the positional information of effect idea picture on Background, and according to positional information, effect idea picture is set, so that the vision deception effect of the vision of effect idea picture deception effect and Background is different, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Fig. 8 is the structural representation of the generating apparatus of identifying code picture according to an embodiment of the invention.
As shown in Figure 8, the generating apparatus of identifying code picture comprises: obtain module 110, concatenation module 120 and processing module 130.
Particularly, obtain module 110 for obtaining the first sub-pictures and the second sub-pictures.
In this embodiment, obtain module 110 and can from local picture library, read the first sub-pictures, can generate the first sub-pictures according to pixel strategy; Wherein, the first sub-pictures can have identical pattern, also can have different patterns.Wherein, the first sub-pictures can be called background sub-pictures, and the second sub-pictures can be called effect idea picture.
Similarly, obtain module 110 and also can from local picture library, read the second sub-pictures, can generate the second sub-pictures according to pixel strategy; Wherein, the second sub-pictures can have identical pattern, also can have different patterns; Can be of similar shape, also can there is different shapes.
Concatenation module 120 is spliced into the Background of identifying code picture for the first sub-pictures that acquisition module 110 is obtained.
In this embodiment, concatenation module 120 can be spliced into multiple the first sub-pictures a large figure, as the Background of identifying code picture.
Processing module 130, for the positional information on the Background that obtains the second sub-pictures and be spliced in concatenation module, arranges the second sub-pictures according to positional information, makes the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
Particularly, processing module 130 can obtain the positional information of the second sub-pictures on Background, for example coordinate information according to default verification code information.Suppose, default verification code information is 8, and the Background in this embodiment is a matrix that 5 row 4 are listed as, and as shown in Figure 2, can, with region division second sub-pictures of round dot mark in Fig. 2, can obtain the positional information in the region of Fig. 2 round dot mark.
It should be noted that, this Fig. 2 is only for schematically illustrating a kind of mode that obtains the second sub-pictures positional information.
In this embodiment, processing module 130 can arrange the second sub-pictures according to positional information and preset rules, wherein, preset rules can be preset direction, as shown in Figure 3, the direction difference of the second sub-pictures in Fig. 3 in two circles, certainly, because the vision deception effect of the second sub-pictures in Fig. 3 is different with the vision deception effect of Background, the identifying code picture shown in Fig. 3 that old friend arrives is soon for dynamic.Certainly, can change pattern, the type etc. of the second sub-pictures shown in Fig. 3.
In addition, processing module 130 processing of also can first location information floating, then according to the positional information after treatment of floating, the second sub-pictures is set, for example, to 5 row 5 column matrix shown in Fig. 4, can move one of them second sub-pictures, matrix after movement as shown in Figure 5, from Fig. 5, still can find out that verification code information is 8, and matrix is larger, the floating space of verification code information is larger.
In the present embodiment, in order further to reduce the discrimination of machine to identifying code picture, can in identifying code picture, increase interfere information, but this interfere information can not affect the identification of human eye to identifying code.Therefore, described acquisition module 110 is also for obtaining the 3rd sub-pictures; Described processing module 130 is also for obtaining the positional information of described the 3rd sub-pictures on described Background, according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set, makes the vision deception effect of described the 3rd sub-pictures identical with the vision deception effect of described the second sub-pictures.
Wherein, the 3rd sub-pictures can be called noise spot sub-pictures.
In this embodiment, obtain module 110 and can read from this locality one or more the 3rd sub-pictures; Also can generate one or more the 3rd sub-pictures according to pixel strategy.
Particularly, processing module 130 can be the positional information of noise spot sub-pictures on Background according to default interfere information acquisition the 3rd sub-pictures.In order to make the vision deception effect of the 3rd sub-pictures identical with the vision deception effect of the second sub-pictures, can adopt the preset rules identical with the second sub-pictures that the 3rd sub-pictures is set, do not repeat herein.Certainly, the 3rd sub-pictures also can be identical picture, can be also different pictures.
The generating apparatus embodiment of above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, is spliced into the first sub-pictures the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Fig. 9 is the process flow diagram of the verification method of identifying code picture according to an embodiment of the invention.
As shown in Figure 9, the verification method of this identifying code picture comprises:
S901, shows identifying code picture, and the second sub-pictures of identifying code picture is that the vision deception effect of effect idea picture is different with the vision deception effect of the Background of identifying code picture.
Suppose, client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture is that the vision deception effect of effect idea picture is different with the vision deception effect of the Background of identifying code picture, so human eye can be seen the dynamic verification code in the identifying code picture shown in Fig. 7.
In addition, on identifying code picture, also may there is interfere information, and because the vision deception effect of the vision of the 3rd sub-pictures on identifying code picture deception effect and described the second sub-pictures is identical, so human eye can identify verification code information and interfere information, but interfere information can not identified identifying code to user and impact, but can greatly reduce the discrimination of machine.
S902, receives user according to the information of identifying code picture input.
User is identifying after dynamic verification code, the verification code information that input identifies.
S903, verifies information according to the verification code information corresponding with identifying code picture prestoring.
In this embodiment, the verification code information of the verification code information prestoring and user's input can be compared, if the two is consistent, by checking, if the two is inconsistent, authentication failed.
The verification method of above-mentioned identifying code picture, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Figure 10 is the structural representation of the demo plant of identifying code picture according to an embodiment of the invention.
As shown in figure 10, the demo plant of identifying code picture comprises: display module 210, receiver module 220 and authentication module 230.
Particularly, display module 210 is for showing identifying code picture.
Suppose, client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture is that the vision deception effect of effect idea picture is different with the vision deception effect of the Background of identifying code picture, so human eye can be seen the dynamic verification code in the identifying code picture shown in Fig. 7.
In addition, on the identifying code picture that display module 210 shows, also may there is interfere information, and because the vision deception effect of the vision of the 3rd sub-pictures on identifying code picture deception effect and described the second sub-pictures is identical, so human eye can identify verification code information and interfere information, but interfere information can not identified identifying code to user and impact, but can greatly reduce the discrimination of machine.
Receiver module 220 is for the information of the identifying code picture input that receives user and show according to display module 210.
User is identifying after dynamic verification code, and receiver module 220 receives user and inputs the verification code information identifying.
Authentication module 230 is verified for information receiver module 220 being received according to the verification code information corresponding with identifying code picture prestoring.
In this embodiment, authentication module 230 can compare the verification code information of the verification code information prestoring and user's input, if the two is consistent, and by checking, if the two is inconsistent, authentication failed.
The demo plant of above-mentioned identifying code picture, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Any process of otherwise describing in process flow diagram or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
The logic and/or the step that in process flow diagram, represent or otherwise describe at this, for example, can be considered to the sequencing list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (as computer based system, comprise that the system of processor or other can and carry out the system of instruction from instruction execution system, device or equipment instruction fetch), or use in conjunction with these instruction execution systems, device or equipment.With regard to this instructions, " computer-readable medium " can be anyly can comprise, device that storage, communication, propagation or transmission procedure use for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wirings, portable computer diskette box (magnetic device), random-access memory (ram), ROM (read-only memory) (ROM), the erasable ROM (read-only memory) (EPROM or flash memory) of editing, fiber device, and portable optic disk ROM (read-only memory) (CDROM).In addition, computer-readable medium can be even paper or other the suitable medium that can print described program thereon, because can be for example by paper or other media be carried out to optical scanning, then edit, decipher or process in electronics mode and obtain described program with other suitable methods if desired, be then stored in computer memory.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with being stored in software or the firmware carried out in storer and by suitable instruction execution system.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic for data-signal being realized to the logic gates of logic function, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.
The above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
In the description of this instructions, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And specific features, structure, material or the feature of description can be with suitable mode combination in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, those having ordinary skill in the art will appreciate that: in the situation that not departing from principle of the present invention and aim, can carry out multiple variation, amendment, replacement and modification to these embodiment, scope of the present invention is by claim and be equal to and limit.
Claims (24)
1. a generation method for identifying code picture, is characterized in that, comprising:
Obtain the first sub-pictures and the second sub-pictures;
Described the first sub-pictures is spliced into the Background of identifying code picture; And
Obtain the positional information of described the second sub-pictures on described Background, according to described positional information, described the second sub-pictures is set, make the vision deception effect of described the second sub-pictures different with the vision deception effect of described Background.
2. method according to claim 1, is characterized in that, described acquisition the first sub-pictures comprises: read one or more the first sub-pictures from this locality; Or, generate one or more the first sub-pictures according to pixel strategy; And/or
Described acquisition the second sub-pictures comprises: read one or more the second sub-pictures from this locality; Or, generate one or more the second sub-pictures according to pixel strategy.
3. method according to claim 1, is characterized in that, the positional information of described the second sub-pictures of described acquisition on described Background comprises:
Obtain the positional information of described the second sub-pictures on described Background according to default verification code information.
4. method according to claim 1, is characterized in that, describedly according to described positional information, described the second sub-pictures is set and comprises:
According to described positional information and preset rules, described the second sub-pictures is set; Or
To the processing of floating of described positional information, according to unsteady positional information after treatment, described the second sub-pictures is set.
5. method according to claim 4, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns.
6. according to the method described in the arbitrary claim of claim 1-5, it is characterized in that, also comprise:
Obtain the 3rd sub-pictures and the positional information of described the 3rd sub-pictures on described Background, according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set, makes the vision deception effect of described the 3rd sub-pictures identical with the vision deception effect of described the second sub-pictures.
7. method according to claim 6, is characterized in that, described acquisition the 3rd sub-pictures comprises:
Read one or more the 3rd sub-pictures from this locality; Or, generate one or more the 3rd sub-pictures according to pixel strategy.
8. method according to claim 6, is characterized in that, the positional information of described the 3rd sub-pictures of described acquisition on described Background comprises:
Obtain the positional information of described the 3rd sub-pictures on described Background according to default interfere information.
9. method according to claim 6, is characterized in that, describedly according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set and comprises:
Positional information according to described the 3rd sub-pictures on described Background and preset rules arrange described the 3rd sub-pictures.
10. a generating apparatus for identifying code picture, is characterized in that, comprising:
Obtain module, for obtaining the first sub-pictures and the second sub-pictures;
Concatenation module, for being spliced into described first sub-pictures of described acquisition module acquisition the Background of identifying code picture; And
Processing module, for obtaining the positional information on the described Background that described the second sub-pictures is spliced in described concatenation module, according to described positional information, described the second sub-pictures is set, makes the vision deception effect of described the second sub-pictures different with the vision deception effect of described Background.
11. devices according to claim 10, is characterized in that, described acquisition module, specifically for:
Read one or more the first sub-pictures from this locality; Or, generate one or more the first sub-pictures according to pixel strategy; And/or
Read one or more the second sub-pictures from this locality; Or, generate one or more the second sub-pictures according to pixel strategy.
12. devices according to claim 10, is characterized in that, described processing module, specifically for:
Obtain the positional information of described the second sub-pictures on described Background according to default verification code information.
13. devices according to claim 10, is characterized in that, described processing module, specifically for:
According to described positional information and preset rules, described the second sub-pictures is set; Or
To the processing of floating of described positional information, according to unsteady positional information after treatment, described the second sub-pictures is set.
14. devices according to claim 10, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns.
15. according to the device described in the arbitrary claim of claim 10-14, it is characterized in that, described acquisition module, also for obtaining the 3rd sub-pictures;
Described processing module, also for obtaining the positional information of described the 3rd sub-pictures on described Background, according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set, makes the vision deception effect of described the 3rd sub-pictures identical with the vision deception effect of described the second sub-pictures.
16. devices according to claim 15, is characterized in that, described acquisition module, specifically for:
Read one or more the 3rd sub-pictures from this locality; Or, generate one or more the 3rd sub-pictures according to pixel strategy.
17. devices according to claim 15, is characterized in that, described processing module, specifically for:
Obtain the positional information of described the 3rd sub-pictures on described Background according to default interfere information.
18. devices according to claim 15, is characterized in that, described processing module, specifically for:
Positional information according to described the 3rd sub-pictures on described Background and preset rules arrange described the 3rd sub-pictures.
The verification method of 19. 1 kinds of identifying code pictures, is characterized in that, comprising:
Show identifying code picture, the vision deception effect of the second sub-pictures of described identifying code picture is different with the vision deception effect of the Background of described identifying code picture;
Receive user according to the information of described identifying code picture input; And
According to the verification code information corresponding with described identifying code picture prestoring, described information is verified.
20. methods according to claim 19, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns; Or
Described Background is spliced by multiple the first sub-pictures, and described multiple the first sub-pictures are identical or different.
21. methods according to claim 19, is characterized in that, the vision deception effect of the 3rd sub-pictures of described identifying code picture is identical with the vision deception effect of described the second sub-pictures.
The demo plant of 22. 1 kinds of identifying code pictures, is characterized in that, comprising:
Display module, for showing identifying code picture, the vision deception effect of the second sub-pictures of described identifying code picture is different with the vision deception effect of the Background of described identifying code picture;
Receiver module, for receiving user according to the information of the identifying code picture input of described display module demonstration; And
Authentication module, verifies for the described information described receiver module being received according to the verification code information corresponding with described identifying code picture prestoring.
23. devices according to claim 22, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns; Or
Described Background is spliced by multiple the first sub-pictures, and described multiple the first sub-pictures are identical or different.
24. devices according to claim 22, is characterized in that, the vision deception effect of the 3rd sub-pictures of described identifying code picture is identical with the vision deception effect of described the second sub-pictures.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410073873.5A CN103853968B (en) | 2014-02-28 | 2014-02-28 | Method and device for generating verification code picture and verification method and device thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410073873.5A CN103853968B (en) | 2014-02-28 | 2014-02-28 | Method and device for generating verification code picture and verification method and device thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103853968A true CN103853968A (en) | 2014-06-11 |
CN103853968B CN103853968B (en) | 2017-05-10 |
Family
ID=50861614
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410073873.5A Active CN103853968B (en) | 2014-02-28 | 2014-02-28 | Method and device for generating verification code picture and verification method and device thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103853968B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354480A (en) * | 2014-08-20 | 2016-02-24 | 阿里巴巴集团控股有限公司 | Verification code picture generation method and apparatus |
CN106295264A (en) * | 2015-05-21 | 2017-01-04 | 阿里巴巴集团控股有限公司 | The recognition methods of a kind of operation and system |
CN107154924A (en) * | 2016-03-04 | 2017-09-12 | 阿里巴巴集团控股有限公司 | Authentication processing method and device based on identifying code |
CN105354480B (en) * | 2014-08-20 | 2018-06-01 | 阿里巴巴集团控股有限公司 | Identifying code Picture Generation Method and device |
CN109388933A (en) * | 2018-09-06 | 2019-02-26 | 中南民族大学 | Verification method, device, user equipment and storage medium based on dynamic subgraph |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070201745A1 (en) * | 2006-01-31 | 2007-08-30 | The Penn State Research Foundation | Image-based captcha generation system |
CN101923701A (en) * | 2010-07-19 | 2010-12-22 | 西安建筑科技大学 | Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology |
EP2330529A2 (en) * | 2009-08-19 | 2011-06-08 | Deutsche Telekom AG | CAPTCHAs based on visual illusions |
CN103400107A (en) * | 2013-07-05 | 2013-11-20 | 百度在线网络技术(北京)有限公司 | Method and device for generating dynamic verification code picture, and verification method and device |
-
2014
- 2014-02-28 CN CN201410073873.5A patent/CN103853968B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070201745A1 (en) * | 2006-01-31 | 2007-08-30 | The Penn State Research Foundation | Image-based captcha generation system |
EP2330529A2 (en) * | 2009-08-19 | 2011-06-08 | Deutsche Telekom AG | CAPTCHAs based on visual illusions |
CN101923701A (en) * | 2010-07-19 | 2010-12-22 | 西安建筑科技大学 | Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology |
CN103400107A (en) * | 2013-07-05 | 2013-11-20 | 百度在线网络技术(北京)有限公司 | Method and device for generating dynamic verification code picture, and verification method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354480A (en) * | 2014-08-20 | 2016-02-24 | 阿里巴巴集团控股有限公司 | Verification code picture generation method and apparatus |
CN105354480B (en) * | 2014-08-20 | 2018-06-01 | 阿里巴巴集团控股有限公司 | Identifying code Picture Generation Method and device |
CN106295264A (en) * | 2015-05-21 | 2017-01-04 | 阿里巴巴集团控股有限公司 | The recognition methods of a kind of operation and system |
CN107154924A (en) * | 2016-03-04 | 2017-09-12 | 阿里巴巴集团控股有限公司 | Authentication processing method and device based on identifying code |
CN107154924B (en) * | 2016-03-04 | 2021-01-05 | 阿里巴巴集团控股有限公司 | Verification processing method and device based on verification code |
US11288354B2 (en) | 2016-03-04 | 2022-03-29 | Alibaba Group Holding Limited | Verification code-based verification processing |
CN109388933A (en) * | 2018-09-06 | 2019-02-26 | 中南民族大学 | Verification method, device, user equipment and storage medium based on dynamic subgraph |
Also Published As
Publication number | Publication date |
---|---|
CN103853968B (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11250229B2 (en) | Displaying and recognizing two-dimensional code | |
KR101773885B1 (en) | A method and server for providing augmented reality objects using image authentication | |
US9690923B2 (en) | Method, apparatus and system for verifying terminal | |
CN104200150B (en) | Method and device for processing verification codes | |
US10395022B2 (en) | Access control for a resource | |
US11288354B2 (en) | Verification code-based verification processing | |
CN104796428A (en) | Dynamic verification method, client side, server and system | |
CN101178813A (en) | Method and apparatus for generating photograph identifying code | |
CN106157344A (en) | The generation method and device of checking picture | |
CN106101463B (en) | Gesture-based verification method in mobile application, mobile terminal and system | |
CN104462930A (en) | Verification code generating method and device | |
KR20190086781A (en) | Methods, systems, and media for detecting stereoscopic video by generating fingerprints for multiple portions of a video frame | |
CN107888553B (en) | Verification method, server and system | |
CN106131092A (en) | A kind of method and device of telnet server | |
CN103853968A (en) | Method and device for generating verification code picture and verification method and device thereof | |
CN109726543A (en) | A kind of login method of application program, device, terminal device and storage medium | |
WO2015184944A1 (en) | Biometric authentication, and near-eye wearable device | |
EP3528151A1 (en) | Method and apparatus for user authentication | |
CN105187429A (en) | ASCII-based character two-dimensional code terminal logging-in method, apparatus, and system | |
CN105631446B (en) | A kind of determination method and device interacting footmark prompt | |
CN108200043B (en) | Picture verification code verification method and picture verification code verification device | |
CN107920044A (en) | A kind of safe verification method and device | |
CN113422687B (en) | Verification method, verification server and verification system | |
CN116601661A (en) | Generating an evaluation mask for multi-factor authentication | |
CN110569627B (en) | Image processing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |