CN103853968A - Method and device for generating verification code picture and verification method and device thereof - Google Patents

Method and device for generating verification code picture and verification method and device thereof Download PDF

Info

Publication number
CN103853968A
CN103853968A CN201410073873.5A CN201410073873A CN103853968A CN 103853968 A CN103853968 A CN 103853968A CN 201410073873 A CN201410073873 A CN 201410073873A CN 103853968 A CN103853968 A CN 103853968A
Authority
CN
China
Prior art keywords
pictures
sub
picture
identifying code
positional information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410073873.5A
Other languages
Chinese (zh)
Other versions
CN103853968B (en
Inventor
王云吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410073873.5A priority Critical patent/CN103853968B/en
Publication of CN103853968A publication Critical patent/CN103853968A/en
Application granted granted Critical
Publication of CN103853968B publication Critical patent/CN103853968B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a method and a device for generating a verification code picture and a verification method and device thereof. The method for generating the verification code picture comprises the following steps: acquiring first sub-pictures and second sub-pictures; splicing the first sub-pictures into a background image of the verification code picture; acquiring the position information of the second sub-pictures on the background image, and setting the second sub-pictures according to the position information to differ the visual cheat effects of the second sub-pictures from the visual cheat effect of the background image. According to the method for generating the verification code picture in the embodiment of the invention, the visual cheat effects of the second sub-pictures, namely, effect dot sub-pictures, differ from the visual cheat effect of the background image, so that the verification code picture which can be identified by human eyes but cannot be identified by a machine is generated, the identification rate of the machine is lowered, unreasonable operation of certain malware pretending users can be avoided, and the network security is improved.

Description

The generation method and apparatus of identifying code picture and verification method and device
Technical field
The present invention relates to Computer Applied Technology field, particularly a kind of generation method and apparatus of identifying code picture and verification method and device.
Background technology
Identifying code is that a kind of user of differentiation is computing machine and people's public full-automatic program.Identifying code uses some lines and some irregular character compositions conventionally, and Main Function is in order to prevent that hacker from cracking user cipher, steals subscriber information message etc.At present, the identifying code of most of websites is mainly chosen input frame by click, automatic spring identifying code picture, and then user inputs according to the verification code information ejecting.After being proved to be successful, could login and enter user account, carry out other operations etc.
But realizing in process of the present invention, inventor finds that in prior art, at least there are the following problems: current identifying code picture is static images, is easy to be identified by program by computing machine, and machine recognition rate is high, and internet security is low.
Summary of the invention
The present invention is intended to solve at least to a certain extent one of technical matters in correlation technique.
For this reason, first object of the present invention is to propose a kind of generation method of identifying code picture, the method is that the vision deception effect of effect idea picture is different with the vision deception effect of Background by the second sub-pictures, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
For reaching above-mentioned purpose, a kind of generation method that has proposed identifying code picture according to first aspect present invention embodiment, comprising: obtain the first sub-pictures and the second sub-pictures; The first sub-pictures is spliced into the Background of identifying code picture; And obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, make the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
According to the generation method of the identifying code picture of the embodiment of the present invention, by obtaining the first sub-pictures and the second sub-pictures, the first sub-pictures is spliced into the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Second aspect present invention embodiment has proposed a kind of generating apparatus of identifying code picture, comprising: obtain module, for obtaining the first sub-pictures and the second sub-pictures; Concatenation module, for being spliced into the first sub-pictures that obtains module acquisition the Background of identifying code picture; And processing module, for obtaining the positional information on the Background that the second sub-pictures is spliced in concatenation module, according to positional information, the second sub-pictures is set, make the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
According to the generating apparatus of the identifying code picture of the embodiment of the present invention, by obtaining the first sub-pictures and the second sub-pictures, the first sub-pictures is spliced into the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Third aspect present invention embodiment has proposed a kind of verification method of identifying code picture, comprising: show identifying code picture, the vision deception effect of the second sub-pictures of identifying code picture is different with the vision deception effect of the Background of identifying code picture; Receive user according to the information of identifying code picture input; And according to the verification code information corresponding with identifying code picture prestoring, information is verified.
According to the verification method of the identifying code picture of the embodiment of the present invention, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Fourth aspect present invention embodiment has proposed a kind of demo plant of identifying code picture, comprise: display module, be used for showing identifying code picture, the vision deception effect of the second sub-pictures of identifying code picture is different with the vision deception effect of the Background of identifying code picture; Receiver module, for receiving user according to the information of the identifying code picture input of display module demonstration; And authentication module, verify for information receiver module being received according to the verification code information corresponding with identifying code picture prestoring.
According to the demo plant of the identifying code picture of the embodiment of the present invention, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Brief description of the drawings
Fig. 1 a is the process flow diagram of the generation method of identifying code picture according to an embodiment of the invention;
Fig. 1 b is the process flow diagram of the generation method of identifying code picture in accordance with another embodiment of the present invention;
Fig. 2 is the matrix schematic diagram one that identifying code picture is corresponding according to an embodiment of the invention;
Fig. 3 is the schematic diagram one of identifying code picture according to an embodiment of the invention;
Fig. 4 is the matrix schematic diagram two that identifying code picture is corresponding according to an embodiment of the invention;
Fig. 5 is the matrix schematic diagram three that identifying code picture is corresponding according to an embodiment of the invention;
Fig. 6 is the process flow diagram of the generation method of the identifying code picture of another embodiment according to the present invention;
Fig. 7 is the schematic diagram two of identifying code picture according to an embodiment of the invention;
Fig. 8 is the structural representation of the generating apparatus of identifying code picture according to an embodiment of the invention;
Fig. 9 is the process flow diagram of the verification method of identifying code picture according to an embodiment of the invention;
Figure 10 is the structural representation of the demo plant of identifying code picture according to an embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Be exemplary below by the embodiment being described with reference to the drawings, be intended to for explaining the present invention, and can not be interpreted as limitation of the present invention.
Describe according to the generation method and apparatus of the identifying code picture of the embodiment of the present invention and verification method and device below with reference to accompanying drawing.
In order to reduce the discrimination of machine, improve the security of network, embodiments of the invention propose a kind of generation method of identifying code picture.
Fig. 1 a is the process flow diagram of the generation method of identifying code picture according to an embodiment of the invention.As shown in Figure 1a, the generation method of this identifying code picture comprises:
S101, obtains the first sub-pictures and the second sub-pictures.
In this embodiment, can from local picture library, read the first sub-pictures, can generate the first sub-pictures according to pixel strategy; Wherein, the first sub-pictures can have identical pattern, also can have different patterns.Namely background sub-pictures of this first sub-pictures.
Similarly, also can from local picture library, read the second sub-pictures, can generate the second sub-pictures according to pixel strategy; Wherein, the second sub-pictures can have identical pattern, also can have different patterns; Can be of similar shape, also can there is different shapes.
S102, is spliced into the first sub-pictures the Background of identifying code picture.
In this embodiment, multiple the first sub-pictures can be spliced into a large figure, as the Background of identifying code picture.
S103, obtains the positional information of the second sub-pictures on Background, according to positional information, the second sub-pictures is set, and makes the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
Wherein, the second sub-pictures can be called effect idea picture.
Particularly, can obtain the second sub-pictures according to default verification code information is the positional information of effect idea picture on Background, for example coordinate information.Suppose, default verification code information is 8, and the Background in this embodiment is a matrix that 5 row 4 are listed as, and as shown in Figure 2, can, with the region division effect idea picture of round dot mark in Fig. 2, can obtain the positional information in the region of Fig. 2 round dot mark.
It should be noted that, this Fig. 2 is only for schematically illustrating a kind of mode that obtains effect idea picture positional information.
In this embodiment, can effect idea picture be set according to positional information and preset rules, wherein, preset rules can be preset direction, as shown in Figure 3, the direction difference of the effect idea picture in Fig. 3 in two circles, certainly, because the vision deception effect of effect idea picture in Fig. 3 is different with the vision deception effect of Background, the identifying code picture shown in Fig. 3 that old friend arrives is soon for dynamic.Certainly, can change pattern, the type etc. of the effect idea picture shown in Fig. 3.
In addition, also the processing of can first location information floating, then according to the positional information after treatment of floating, the second sub-pictures being set is effect idea picture, for example, to 5 row 5 column matrix shown in Fig. 4, can move one of them second sub-pictures is effect idea picture, matrix after movement as shown in Figure 5, from Fig. 5, still can find out that verification code information is 8, and matrix is larger, the floating space of verification code information is larger.
In the present embodiment, in order further to reduce the discrimination of machine to identifying code picture, can in identifying code picture, increase interfere information, but this interfere information can not affect the identification of human eye to identifying code.Therefore, the method embodiment can also comprise S104, as shown in Figure 1 b:
S104, obtains the 3rd sub-pictures and the positional information of the 3rd sub-pictures on Background, according to the positional information of the 3rd sub-pictures on Background, the 3rd sub-pictures is set, and makes the vision deception effect of the 3rd sub-pictures identical with the vision deception effect of the second sub-pictures.
Wherein, the 3rd sub-pictures can be called noise spot sub-pictures.
In this embodiment, can read from this locality one or more the 3rd sub-pictures; Also can generate one or more the 3rd sub-pictures according to pixel strategy.
Particularly, can obtain the 3rd sub-pictures according to default interfere information is the positional information of noise spot sub-pictures on Background.In order to make the vision deception effect of the 3rd sub-pictures identical with the vision deception effect of the second sub-pictures, can adopt the preset rules identical with the second sub-pictures that the 3rd sub-pictures is set, do not repeat herein.Certainly, the 3rd sub-pictures also can be identical picture, can be also different pictures.
The generation embodiment of the method for above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, is spliced into the first sub-pictures the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Fig. 6 is the process flow diagram of the generation method of the identifying code picture of another embodiment according to the present invention.
As shown in Figure 6, the generation method of this identifying code picture comprises:
S601, obtains background sub-pictures and effect idea picture from local picture library.
Wherein, background sub-pictures can have identical pattern, also can have different patterns.Similarly effect idea picture can have identical pattern, also can have different patterns; Can be of similar shape, also can there is different shapes.
S602, is spliced into background sub-pictures the Background of identifying code picture.
In this embodiment, multiple background sub-pictures can be spliced into a large figure, as the Background of identifying code picture.
S603, obtains the positional information of effect idea picture on Background according to default verification code information, according to positional information, effect idea picture is set, and makes the vision deception effect of effect idea picture different with the vision deception effect of Background.
In this embodiment, default verification code information is 8, after acquisition positional information, effect idea picture is set, make the vision deception effect of effect idea picture different with the vision deception effect of Background, as shown in Figure 7, and the direction difference of effect idea picture, it should be noted that, this Fig. 7 only cheats the schematic diagram of effect for vision.
The generation embodiment of the method for above-mentioned identifying code picture, by obtaining background sub-pictures and effect idea picture, is spliced into background sub-pictures the Background of identifying code picture; Then obtain the positional information of effect idea picture on Background, and according to positional information, effect idea picture is set, so that the vision deception effect of the vision of effect idea picture deception effect and Background is different, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Fig. 8 is the structural representation of the generating apparatus of identifying code picture according to an embodiment of the invention.
As shown in Figure 8, the generating apparatus of identifying code picture comprises: obtain module 110, concatenation module 120 and processing module 130.
Particularly, obtain module 110 for obtaining the first sub-pictures and the second sub-pictures.
In this embodiment, obtain module 110 and can from local picture library, read the first sub-pictures, can generate the first sub-pictures according to pixel strategy; Wherein, the first sub-pictures can have identical pattern, also can have different patterns.Wherein, the first sub-pictures can be called background sub-pictures, and the second sub-pictures can be called effect idea picture.
Similarly, obtain module 110 and also can from local picture library, read the second sub-pictures, can generate the second sub-pictures according to pixel strategy; Wherein, the second sub-pictures can have identical pattern, also can have different patterns; Can be of similar shape, also can there is different shapes.
Concatenation module 120 is spliced into the Background of identifying code picture for the first sub-pictures that acquisition module 110 is obtained.
In this embodiment, concatenation module 120 can be spliced into multiple the first sub-pictures a large figure, as the Background of identifying code picture.
Processing module 130, for the positional information on the Background that obtains the second sub-pictures and be spliced in concatenation module, arranges the second sub-pictures according to positional information, makes the vision deception effect of the second sub-pictures different with the vision deception effect of Background.
Particularly, processing module 130 can obtain the positional information of the second sub-pictures on Background, for example coordinate information according to default verification code information.Suppose, default verification code information is 8, and the Background in this embodiment is a matrix that 5 row 4 are listed as, and as shown in Figure 2, can, with region division second sub-pictures of round dot mark in Fig. 2, can obtain the positional information in the region of Fig. 2 round dot mark.
It should be noted that, this Fig. 2 is only for schematically illustrating a kind of mode that obtains the second sub-pictures positional information.
In this embodiment, processing module 130 can arrange the second sub-pictures according to positional information and preset rules, wherein, preset rules can be preset direction, as shown in Figure 3, the direction difference of the second sub-pictures in Fig. 3 in two circles, certainly, because the vision deception effect of the second sub-pictures in Fig. 3 is different with the vision deception effect of Background, the identifying code picture shown in Fig. 3 that old friend arrives is soon for dynamic.Certainly, can change pattern, the type etc. of the second sub-pictures shown in Fig. 3.
In addition, processing module 130 processing of also can first location information floating, then according to the positional information after treatment of floating, the second sub-pictures is set, for example, to 5 row 5 column matrix shown in Fig. 4, can move one of them second sub-pictures, matrix after movement as shown in Figure 5, from Fig. 5, still can find out that verification code information is 8, and matrix is larger, the floating space of verification code information is larger.
In the present embodiment, in order further to reduce the discrimination of machine to identifying code picture, can in identifying code picture, increase interfere information, but this interfere information can not affect the identification of human eye to identifying code.Therefore, described acquisition module 110 is also for obtaining the 3rd sub-pictures; Described processing module 130 is also for obtaining the positional information of described the 3rd sub-pictures on described Background, according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set, makes the vision deception effect of described the 3rd sub-pictures identical with the vision deception effect of described the second sub-pictures.
Wherein, the 3rd sub-pictures can be called noise spot sub-pictures.
In this embodiment, obtain module 110 and can read from this locality one or more the 3rd sub-pictures; Also can generate one or more the 3rd sub-pictures according to pixel strategy.
Particularly, processing module 130 can be the positional information of noise spot sub-pictures on Background according to default interfere information acquisition the 3rd sub-pictures.In order to make the vision deception effect of the 3rd sub-pictures identical with the vision deception effect of the second sub-pictures, can adopt the preset rules identical with the second sub-pictures that the 3rd sub-pictures is set, do not repeat herein.Certainly, the 3rd sub-pictures also can be identical picture, can be also different pictures.
The generating apparatus embodiment of above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, is spliced into the first sub-pictures the Background of identifying code picture; Then obtain the positional information of the second sub-pictures on Background, and according to positional information, the second sub-pictures is set, so that the second sub-pictures is the vision deception effect of effect idea picture is different with the vision deception effect of Background, thereby generating human eye can identify and the identifying code picture of machine None-identified, reduce the discrimination of machine, and then can evade some rogue programs user that disguises oneself as and carry out irrational operation, improve the security of network.
Fig. 9 is the process flow diagram of the verification method of identifying code picture according to an embodiment of the invention.
As shown in Figure 9, the verification method of this identifying code picture comprises:
S901, shows identifying code picture, and the second sub-pictures of identifying code picture is that the vision deception effect of effect idea picture is different with the vision deception effect of the Background of identifying code picture.
Suppose, client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture is that the vision deception effect of effect idea picture is different with the vision deception effect of the Background of identifying code picture, so human eye can be seen the dynamic verification code in the identifying code picture shown in Fig. 7.
In addition, on identifying code picture, also may there is interfere information, and because the vision deception effect of the vision of the 3rd sub-pictures on identifying code picture deception effect and described the second sub-pictures is identical, so human eye can identify verification code information and interfere information, but interfere information can not identified identifying code to user and impact, but can greatly reduce the discrimination of machine.
S902, receives user according to the information of identifying code picture input.
User is identifying after dynamic verification code, the verification code information that input identifies.
S903, verifies information according to the verification code information corresponding with identifying code picture prestoring.
In this embodiment, the verification code information of the verification code information prestoring and user's input can be compared, if the two is consistent, by checking, if the two is inconsistent, authentication failed.
The verification method of above-mentioned identifying code picture, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Figure 10 is the structural representation of the demo plant of identifying code picture according to an embodiment of the invention.
As shown in figure 10, the demo plant of identifying code picture comprises: display module 210, receiver module 220 and authentication module 230.
Particularly, display module 210 is for showing identifying code picture.
Suppose, client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture is that the vision deception effect of effect idea picture is different with the vision deception effect of the Background of identifying code picture, so human eye can be seen the dynamic verification code in the identifying code picture shown in Fig. 7.
In addition, on the identifying code picture that display module 210 shows, also may there is interfere information, and because the vision deception effect of the vision of the 3rd sub-pictures on identifying code picture deception effect and described the second sub-pictures is identical, so human eye can identify verification code information and interfere information, but interfere information can not identified identifying code to user and impact, but can greatly reduce the discrimination of machine.
Receiver module 220 is for the information of the identifying code picture input that receives user and show according to display module 210.
User is identifying after dynamic verification code, and receiver module 220 receives user and inputs the verification code information identifying.
Authentication module 230 is verified for information receiver module 220 being received according to the verification code information corresponding with identifying code picture prestoring.
In this embodiment, authentication module 230 can compare the verification code information of the verification code information prestoring and user's input, if the two is consistent, and by checking, if the two is inconsistent, authentication failed.
The demo plant of above-mentioned identifying code picture, by showing that identifying code picture makes user can identify verification code information and machine None-identified, then the verification code information of user's input is verified, reduce the discrimination of machine, carry out irrational operation thereby can evade some rogue programs user that disguises oneself as, improve the security of network and user's satisfaction.
Any process of otherwise describing in process flow diagram or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
The logic and/or the step that in process flow diagram, represent or otherwise describe at this, for example, can be considered to the sequencing list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (as computer based system, comprise that the system of processor or other can and carry out the system of instruction from instruction execution system, device or equipment instruction fetch), or use in conjunction with these instruction execution systems, device or equipment.With regard to this instructions, " computer-readable medium " can be anyly can comprise, device that storage, communication, propagation or transmission procedure use for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wirings, portable computer diskette box (magnetic device), random-access memory (ram), ROM (read-only memory) (ROM), the erasable ROM (read-only memory) (EPROM or flash memory) of editing, fiber device, and portable optic disk ROM (read-only memory) (CDROM).In addition, computer-readable medium can be even paper or other the suitable medium that can print described program thereon, because can be for example by paper or other media be carried out to optical scanning, then edit, decipher or process in electronics mode and obtain described program with other suitable methods if desired, be then stored in computer memory.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with being stored in software or the firmware carried out in storer and by suitable instruction execution system.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic for data-signal being realized to the logic gates of logic function, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.
The above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
In the description of this instructions, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And specific features, structure, material or the feature of description can be with suitable mode combination in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, those having ordinary skill in the art will appreciate that: in the situation that not departing from principle of the present invention and aim, can carry out multiple variation, amendment, replacement and modification to these embodiment, scope of the present invention is by claim and be equal to and limit.

Claims (24)

1. a generation method for identifying code picture, is characterized in that, comprising:
Obtain the first sub-pictures and the second sub-pictures;
Described the first sub-pictures is spliced into the Background of identifying code picture; And
Obtain the positional information of described the second sub-pictures on described Background, according to described positional information, described the second sub-pictures is set, make the vision deception effect of described the second sub-pictures different with the vision deception effect of described Background.
2. method according to claim 1, is characterized in that, described acquisition the first sub-pictures comprises: read one or more the first sub-pictures from this locality; Or, generate one or more the first sub-pictures according to pixel strategy; And/or
Described acquisition the second sub-pictures comprises: read one or more the second sub-pictures from this locality; Or, generate one or more the second sub-pictures according to pixel strategy.
3. method according to claim 1, is characterized in that, the positional information of described the second sub-pictures of described acquisition on described Background comprises:
Obtain the positional information of described the second sub-pictures on described Background according to default verification code information.
4. method according to claim 1, is characterized in that, describedly according to described positional information, described the second sub-pictures is set and comprises:
According to described positional information and preset rules, described the second sub-pictures is set; Or
To the processing of floating of described positional information, according to unsteady positional information after treatment, described the second sub-pictures is set.
5. method according to claim 4, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns.
6. according to the method described in the arbitrary claim of claim 1-5, it is characterized in that, also comprise:
Obtain the 3rd sub-pictures and the positional information of described the 3rd sub-pictures on described Background, according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set, makes the vision deception effect of described the 3rd sub-pictures identical with the vision deception effect of described the second sub-pictures.
7. method according to claim 6, is characterized in that, described acquisition the 3rd sub-pictures comprises:
Read one or more the 3rd sub-pictures from this locality; Or, generate one or more the 3rd sub-pictures according to pixel strategy.
8. method according to claim 6, is characterized in that, the positional information of described the 3rd sub-pictures of described acquisition on described Background comprises:
Obtain the positional information of described the 3rd sub-pictures on described Background according to default interfere information.
9. method according to claim 6, is characterized in that, describedly according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set and comprises:
Positional information according to described the 3rd sub-pictures on described Background and preset rules arrange described the 3rd sub-pictures.
10. a generating apparatus for identifying code picture, is characterized in that, comprising:
Obtain module, for obtaining the first sub-pictures and the second sub-pictures;
Concatenation module, for being spliced into described first sub-pictures of described acquisition module acquisition the Background of identifying code picture; And
Processing module, for obtaining the positional information on the described Background that described the second sub-pictures is spliced in described concatenation module, according to described positional information, described the second sub-pictures is set, makes the vision deception effect of described the second sub-pictures different with the vision deception effect of described Background.
11. devices according to claim 10, is characterized in that, described acquisition module, specifically for:
Read one or more the first sub-pictures from this locality; Or, generate one or more the first sub-pictures according to pixel strategy; And/or
Read one or more the second sub-pictures from this locality; Or, generate one or more the second sub-pictures according to pixel strategy.
12. devices according to claim 10, is characterized in that, described processing module, specifically for:
Obtain the positional information of described the second sub-pictures on described Background according to default verification code information.
13. devices according to claim 10, is characterized in that, described processing module, specifically for:
According to described positional information and preset rules, described the second sub-pictures is set; Or
To the processing of floating of described positional information, according to unsteady positional information after treatment, described the second sub-pictures is set.
14. devices according to claim 10, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns.
15. according to the device described in the arbitrary claim of claim 10-14, it is characterized in that, described acquisition module, also for obtaining the 3rd sub-pictures;
Described processing module, also for obtaining the positional information of described the 3rd sub-pictures on described Background, according to the positional information of described the 3rd sub-pictures on described Background, described the 3rd sub-pictures is set, makes the vision deception effect of described the 3rd sub-pictures identical with the vision deception effect of described the second sub-pictures.
16. devices according to claim 15, is characterized in that, described acquisition module, specifically for:
Read one or more the 3rd sub-pictures from this locality; Or, generate one or more the 3rd sub-pictures according to pixel strategy.
17. devices according to claim 15, is characterized in that, described processing module, specifically for:
Obtain the positional information of described the 3rd sub-pictures on described Background according to default interfere information.
18. devices according to claim 15, is characterized in that, described processing module, specifically for:
Positional information according to described the 3rd sub-pictures on described Background and preset rules arrange described the 3rd sub-pictures.
The verification method of 19. 1 kinds of identifying code pictures, is characterized in that, comprising:
Show identifying code picture, the vision deception effect of the second sub-pictures of described identifying code picture is different with the vision deception effect of the Background of described identifying code picture;
Receive user according to the information of described identifying code picture input; And
According to the verification code information corresponding with described identifying code picture prestoring, described information is verified.
20. methods according to claim 19, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns; Or
Described Background is spliced by multiple the first sub-pictures, and described multiple the first sub-pictures are identical or different.
21. methods according to claim 19, is characterized in that, the vision deception effect of the 3rd sub-pictures of described identifying code picture is identical with the vision deception effect of described the second sub-pictures.
The demo plant of 22. 1 kinds of identifying code pictures, is characterized in that, comprising:
Display module, for showing identifying code picture, the vision deception effect of the second sub-pictures of described identifying code picture is different with the vision deception effect of the Background of described identifying code picture;
Receiver module, for receiving user according to the information of the identifying code picture input of described display module demonstration; And
Authentication module, verifies for the described information described receiver module being received according to the verification code information corresponding with described identifying code picture prestoring.
23. devices according to claim 22, is characterized in that, described the second sub-pictures is identical picture, the picture of different sizes or the picture of different patterns; Or
Described Background is spliced by multiple the first sub-pictures, and described multiple the first sub-pictures are identical or different.
24. devices according to claim 22, is characterized in that, the vision deception effect of the 3rd sub-pictures of described identifying code picture is identical with the vision deception effect of described the second sub-pictures.
CN201410073873.5A 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof Active CN103853968B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410073873.5A CN103853968B (en) 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410073873.5A CN103853968B (en) 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof

Publications (2)

Publication Number Publication Date
CN103853968A true CN103853968A (en) 2014-06-11
CN103853968B CN103853968B (en) 2017-05-10

Family

ID=50861614

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410073873.5A Active CN103853968B (en) 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof

Country Status (1)

Country Link
CN (1) CN103853968B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354480A (en) * 2014-08-20 2016-02-24 阿里巴巴集团控股有限公司 Verification code picture generation method and apparatus
CN106295264A (en) * 2015-05-21 2017-01-04 阿里巴巴集团控股有限公司 The recognition methods of a kind of operation and system
CN107154924A (en) * 2016-03-04 2017-09-12 阿里巴巴集团控股有限公司 Authentication processing method and device based on identifying code
CN105354480B (en) * 2014-08-20 2018-06-01 阿里巴巴集团控股有限公司 Identifying code Picture Generation Method and device
CN109388933A (en) * 2018-09-06 2019-02-26 中南民族大学 Verification method, device, user equipment and storage medium based on dynamic subgraph

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070201745A1 (en) * 2006-01-31 2007-08-30 The Penn State Research Foundation Image-based captcha generation system
CN101923701A (en) * 2010-07-19 2010-12-22 西安建筑科技大学 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
EP2330529A2 (en) * 2009-08-19 2011-06-08 Deutsche Telekom AG CAPTCHAs based on visual illusions
CN103400107A (en) * 2013-07-05 2013-11-20 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070201745A1 (en) * 2006-01-31 2007-08-30 The Penn State Research Foundation Image-based captcha generation system
EP2330529A2 (en) * 2009-08-19 2011-06-08 Deutsche Telekom AG CAPTCHAs based on visual illusions
CN101923701A (en) * 2010-07-19 2010-12-22 西安建筑科技大学 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
CN103400107A (en) * 2013-07-05 2013-11-20 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354480A (en) * 2014-08-20 2016-02-24 阿里巴巴集团控股有限公司 Verification code picture generation method and apparatus
CN105354480B (en) * 2014-08-20 2018-06-01 阿里巴巴集团控股有限公司 Identifying code Picture Generation Method and device
CN106295264A (en) * 2015-05-21 2017-01-04 阿里巴巴集团控股有限公司 The recognition methods of a kind of operation and system
CN107154924A (en) * 2016-03-04 2017-09-12 阿里巴巴集团控股有限公司 Authentication processing method and device based on identifying code
CN107154924B (en) * 2016-03-04 2021-01-05 阿里巴巴集团控股有限公司 Verification processing method and device based on verification code
US11288354B2 (en) 2016-03-04 2022-03-29 Alibaba Group Holding Limited Verification code-based verification processing
CN109388933A (en) * 2018-09-06 2019-02-26 中南民族大学 Verification method, device, user equipment and storage medium based on dynamic subgraph

Also Published As

Publication number Publication date
CN103853968B (en) 2017-05-10

Similar Documents

Publication Publication Date Title
US11250229B2 (en) Displaying and recognizing two-dimensional code
KR101773885B1 (en) A method and server for providing augmented reality objects using image authentication
US9690923B2 (en) Method, apparatus and system for verifying terminal
CN104200150B (en) Method and device for processing verification codes
US10395022B2 (en) Access control for a resource
US11288354B2 (en) Verification code-based verification processing
CN104796428A (en) Dynamic verification method, client side, server and system
CN101178813A (en) Method and apparatus for generating photograph identifying code
CN106157344A (en) The generation method and device of checking picture
CN106101463B (en) Gesture-based verification method in mobile application, mobile terminal and system
CN104462930A (en) Verification code generating method and device
KR20190086781A (en) Methods, systems, and media for detecting stereoscopic video by generating fingerprints for multiple portions of a video frame
CN107888553B (en) Verification method, server and system
CN106131092A (en) A kind of method and device of telnet server
CN103853968A (en) Method and device for generating verification code picture and verification method and device thereof
CN109726543A (en) A kind of login method of application program, device, terminal device and storage medium
WO2015184944A1 (en) Biometric authentication, and near-eye wearable device
EP3528151A1 (en) Method and apparatus for user authentication
CN105187429A (en) ASCII-based character two-dimensional code terminal logging-in method, apparatus, and system
CN105631446B (en) A kind of determination method and device interacting footmark prompt
CN108200043B (en) Picture verification code verification method and picture verification code verification device
CN107920044A (en) A kind of safe verification method and device
CN113422687B (en) Verification method, verification server and verification system
CN116601661A (en) Generating an evaluation mask for multi-factor authentication
CN110569627B (en) Image processing method and device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant