CN103853968B - Method and device for generating verification code picture and verification method and device thereof - Google Patents
Method and device for generating verification code picture and verification method and device thereof Download PDFInfo
- Publication number
- CN103853968B CN103853968B CN201410073873.5A CN201410073873A CN103853968B CN 103853968 B CN103853968 B CN 103853968B CN 201410073873 A CN201410073873 A CN 201410073873A CN 103853968 B CN103853968 B CN 103853968B
- Authority
- CN
- China
- Prior art keywords
- pictures
- sub
- picture
- effect
- identifying code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Image Processing (AREA)
Abstract
The invention provides a method and a device for generating a verification code picture and a verification method and device thereof. The method for generating the verification code picture comprises the following steps: acquiring first sub-pictures and second sub-pictures; splicing the first sub-pictures into a background image of the verification code picture; acquiring the position information of the second sub-pictures on the background image, and setting the second sub-pictures according to the position information to differ the visual cheat effects of the second sub-pictures from the visual cheat effect of the background image. According to the method for generating the verification code picture in the embodiment of the invention, the visual cheat effects of the second sub-pictures, namely, effect dot sub-pictures, differ from the visual cheat effect of the background image, so that the verification code picture which can be identified by human eyes but cannot be identified by a machine is generated, the identification rate of the machine is lowered, unreasonable operation of certain malware pretending users can be avoided, and the network security is improved.
Description
Technical field
The present invention relates to Computer Applied Technology field, the generation method and device of more particularly to a kind of identifying code picture and
Its verification method and device.
Background technology
Identifying code be it is a kind of differentiation user be computer and people public full auto-programs.Identifying code is usually used some lines
Bar and some irregular character compositions, Main Function is to prevent hack user cipher, stealing subscriber information message
Deng.At present, the identifying code of most of websites mainly chooses input frame by click, automatic spring identifying code picture, then user
Verification code information according to ejecting is input into.After being proved to be successful, user account can be just logged into, carry out other operations
Deng.
But, in process of the present invention is realized, inventor has found that at least there are the following problems in prior art:Current tests
Card code picture is static images, it is easy to be identified by program by computer, and machine recognition rate is high, and internet security is low.
The content of the invention
It is contemplated that at least solving one of technical problem in correlation technique to a certain extent.
For this purpose, first purpose of the present invention is to propose a kind of generation method of identifying code picture, the method is by the
Two sub-pictures are that the vision deception effect of effect idea picture is different with the vision of Background deception effect, can so as to generate human eye
The identifying code picture of machine None- identified with identification, reduces the discrimination of machine, and then can evade some rogue programs
The user that disguises oneself as carries out irrational operation, improves the safety of network.
It is that up to above-mentioned purpose, according to a first aspect of the present invention embodiment proposes a kind of generation method of identifying code picture,
Including:Obtain the first sub-pictures and the second sub-pictures;First sub-pictures are spliced into into the Background of identifying code picture;And obtain
Positional information of second sub-pictures on Background, according to positional information the second sub-pictures are arranged, and make the vision of the second sub-pictures
Deception effect is different with the vision of Background deception effect.
The generation method of identifying code picture according to embodiments of the present invention, by obtaining the first sub-pictures and the second subgraph
First sub-pictures are spliced into the Background of identifying code picture by piece;Then position letter of second sub-pictures on Background is obtained
Breath, and according to positional information arrange the second sub-pictures so that the second sub-pictures be effect idea picture vision deception effect and
The vision deception effect of Background is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduces
The discrimination of machine, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve network
Safety.
Second aspect present invention embodiment proposes a kind of generating means of identifying code picture, including:Module is obtained, is used for
Obtain the first sub-pictures and the second sub-pictures;Concatenation module, for the first sub-pictures for obtaining module acquisition to be spliced into into checking
The Background of code picture;And processing module, for obtaining position of second sub-pictures on the Background that concatenation module is spliced into
Confidence ceases, and according to positional information the second sub-pictures are arranged, and takes advantage of the vision deception effect of the second sub-pictures and the vision of Background
Deceive effect different.
The generating means of identifying code picture according to embodiments of the present invention, by obtaining the first sub-pictures and the second subgraph
First sub-pictures are spliced into the Background of identifying code picture by piece;Then position letter of second sub-pictures on Background is obtained
Breath, and according to positional information arrange the second sub-pictures so that the second sub-pictures be effect idea picture vision deception effect and
The vision deception effect of Background is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduces
The discrimination of machine, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve network
Safety.
Third aspect present invention embodiment proposes a kind of verification method of identifying code picture, including:Show identifying code figure
Piece, the vision deception effect of the Background of the vision deception effect and identifying code picture of the second sub-pictures of identifying code picture is not
Together;The information that receive user is input into according to identifying code picture;And according to the identifying code letter corresponding with identifying code picture that prestores
Breath is verified to information.
The verification method of identifying code picture according to embodiments of the present invention, by showing that identifying code picture knows user
Do not go out verification code information and machine None- identified, then the verification code information of user input is verified, reduce machine
Discrimination, such that it is able to evade some rogue programs user that disguises oneself as irrational operation is carried out, improve network safety and
The satisfaction of user.
Fourth aspect present invention embodiment proposes a kind of checking device of identifying code picture, including:Display module, is used for
Show identifying code picture, the vision of the Background of the vision deception effect and identifying code picture of the second sub-pictures of identifying code picture
Deception effect is different;Receiver module, the information of the identifying code picture input shown according to display module for receive user;And
Authentication module, for being tested the information that receiver module is received according to the verification code information corresponding with identifying code picture for prestoring
Card.
The checking device of identifying code picture according to embodiments of the present invention, by showing that identifying code picture knows user
Do not go out verification code information and machine None- identified, then the verification code information of user input is verified, reduce machine
Discrimination, such that it is able to evade some rogue programs user that disguises oneself as irrational operation is carried out, improve network safety and
The satisfaction of user.
Description of the drawings
Fig. 1 a are the flow charts of the generation method of identifying code picture according to an embodiment of the invention;
Fig. 1 b are the flow charts of the generation method of identifying code picture in accordance with another embodiment of the present invention;
Fig. 2 is the corresponding matrix schematic diagram one of identifying code picture according to an embodiment of the invention;
Fig. 3 is the schematic diagram one of identifying code picture according to an embodiment of the invention;
Fig. 4 is the corresponding matrix schematic diagram two of identifying code picture according to an embodiment of the invention;
Fig. 5 is the corresponding matrix schematic diagram three of identifying code picture according to an embodiment of the invention;
Fig. 6 is the flow chart of the generation method of the identifying code picture according to another embodiment of the invention;
Fig. 7 is the schematic diagram two of identifying code picture according to an embodiment of the invention;
Fig. 8 is the structural representation of the generating means of identifying code picture according to an embodiment of the invention;
Fig. 9 is the flow chart of the verification method of identifying code picture according to an embodiment of the invention;
Figure 10 is the structural representation of the checking device of identifying code picture according to an embodiment of the invention.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and be not considered as limiting the invention.
Below with reference to the accompanying drawings generation method and device and its checking of identifying code picture according to embodiments of the present invention are described
Method and apparatus.
In order to reduce the discrimination of machine, the safety of network is improved, embodiments of the invention propose a kind of identifying code figure
The generation method of piece.
Fig. 1 a are the flow charts of the generation method of identifying code picture according to an embodiment of the invention.As shown in Figure 1a,
The generation method of the identifying code picture includes:
S101, obtains the first sub-pictures and the second sub-pictures.
In this embodiment it is possible to the first sub-pictures are read from local picture library, can be according to pixel strategy generating
First sub-pictures;Wherein, the first sub-pictures can have identical pattern, it is possible to have different patterns.First subgraph
Piece i.e. background sub-pictures.
It is equally possible that the second sub-pictures are read from local picture library, can be according to pixel strategy generating second
Sub-pictures;Wherein, the second sub-pictures can have identical pattern, it is possible to have different patterns;There can be identical
Shape, it is possible to have different shapes.
First sub-pictures are spliced into the Background of identifying code picture by S102.
In this embodiment it is possible to multiple first sub-pictures are spliced into into a big figure, as the background of identifying code picture
Figure.
S103, obtains positional information of second sub-pictures on Background, and according to positional information the second sub-pictures are arranged, and makes
The vision deception effect of the second sub-pictures is different with the vision of Background deception effect.
Wherein, the second sub-pictures are properly termed as effect idea picture.
Specifically, it is effect idea picture on Background that can obtain the second sub-pictures according to default verification code information
Positional information, such as coordinate information.It is assumed that default verification code information is 8, the Background in the embodiment is 5 rows 4
The matrix of row, as shown in Fig. 2 the region that then can be marked with round dot in fig. 2 arranges effect idea picture, you can to obtain figure
The positional information in 2 regions marked with round dot.
It should be noted that the Fig. 2 is only to schematically illustrate a kind of mode for obtaining effect idea picture positional information.
In this embodiment it is possible to effect idea picture is arranged according to positional information and preset rules, wherein, preset rules
Can be preset direction, as shown in figure 3, the direction of the effect idea picture in Fig. 3 in two circles is different, certainly, due to Fig. 3
The vision deception effect of middle effect idea picture is different with the vision of Background deception effect, therefore shown in Fig. 3 seen by person
Identifying code picture is dynamic.Of course, it is possible to change pattern, type of effect idea picture shown in Fig. 3 etc..
Alternatively, it is also possible to first to positional information carry out floating process, then arranged according to the positional information after floating process
Second sub-pictures are effect idea picture, for example, to the column matrix of 5 row 5 shown in Fig. 4, can move one of them second subgraph
Piece is effect idea picture, it is mobile after matrix as shown in figure 5, still it can be seen that verification code information is 8 from Fig. 5, and
Matrix is bigger, and the floating space of verification code information is bigger.
In the present embodiment, in order to further reduce discrimination of the machine to identifying code picture, can be in identifying code picture
Middle increase interference information, but the interference information does not interfere with identification of the human eye to identifying code.Therefore, the method embodiment can be with
Including S104, as shown in Figure 1 b:
S104, obtains the positional information of the 3rd sub-pictures and the 3rd sub-pictures on Background, is existed according to the 3rd sub-pictures
Positional information on Background arranges the 3rd sub-pictures, makes the vision deception effect of the 3rd sub-pictures and the vision of the second sub-pictures
Deception effect is identical.
Wherein, the 3rd sub-pictures are properly termed as noise spot sub-pictures.
In this embodiment it is possible to from locally one or more the 3rd sub-pictures of reading;Can also be according to pixel strategy
Generate one or more the 3rd sub-pictures.
Specifically, it is noise spot sub-pictures on Background that can obtain the 3rd sub-pictures according to default interference information
Positional information.In order that the vision deception effect of the 3rd sub-pictures is identical with the vision of the second sub-pictures deception effect, can adopt
The 3rd sub-pictures are set with the second sub-pictures identical preset rules, are not repeated herein.Certainly, the 3rd sub-pictures are alternatively phase
Same picture, or different pictures.
The generation method embodiment of above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, by first
Sub-pictures are spliced into the Background of identifying code picture;Then positional information of second sub-pictures on Background is obtained, and according to
Positional information arranges the second sub-pictures, so that the second sub-pictures are the vision deception effect of effect idea picture and regarding for Background
Feel that deception effect is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduce the knowledge of machine
Not other rate, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve the safety of network.
Fig. 6 is the flow chart of the generation method of the identifying code picture according to another embodiment of the invention.
As shown in fig. 6, the generation method of the identifying code picture includes:
S601, from local picture library background sub-pictures and effect idea picture are obtained.
Wherein, background sub-pictures can have identical pattern, it is possible to have different patterns.Similarly effect idea
Picture can have identical pattern, it is possible to have different patterns;Can be of similar shape, it is possible to have different
Shape.
Background sub-pictures are spliced into the Background of identifying code picture by S602.
In this embodiment it is possible to multiple background sub-pictures are spliced into into a big figure, as the background of identifying code picture
Figure.
S603, obtains positional information of the effect idea picture on Background, according to position according to default verification code information
Confidence breath arranges effect idea picture, makes the vision deception effect of effect idea picture and the vision of Background cheat effect not
Together.
In this embodiment, default verification code information is 8, and effect idea picture is arranged after positional information is obtained, and is made
The vision deception effect of effect idea picture is different with the vision of Background deception effect, as shown in fig. 7, and effect dot map
The direction of piece is different, it should be noted that the Fig. 7 is only the schematic diagram that vision cheats effect.
The generation method embodiment of above-mentioned identifying code picture, by obtaining background sub-pictures and effect idea picture, will carry on the back
Scape sub-pictures are spliced into the Background of identifying code picture;Then positional information of the effect idea picture on Background is obtained, and
Effect idea picture is arranged according to positional information, so that the vision deception of the vision deception effect of effect idea picture and Background
Effect is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduces the discrimination of machine, enters
And can evade some rogue programs user that disguises oneself as carries out irrational operation, the safety of network is improved.
Fig. 8 is the structural representation of the generating means of identifying code picture according to an embodiment of the invention.
As shown in figure 8, the generating means of identifying code picture include:Obtain module 110, concatenation module 120 and processing module
130。
Specifically, obtaining module 110 is used to obtain the first sub-pictures and the second sub-pictures.
In this embodiment, obtaining module 110 can read the first sub-pictures from local picture library, can be according to pixel
The point sub-pictures of strategy generating first;Wherein, the first sub-pictures can have identical pattern, it is possible to have different patterns.
Wherein, the first sub-pictures are properly termed as background sub-pictures, and the second sub-pictures are properly termed as effect idea picture.
Similarly, obtaining module 110 can also read the second sub-pictures from local picture library, can be according to pixel plan
Slightly generate the second sub-pictures;Wherein, the second sub-pictures can have identical pattern, it is possible to have different patterns;Can be with
It is of similar shape, it is possible to have different shapes.
Concatenation module 120 is used to that the first sub-pictures that acquisition module 110 is obtained to be spliced into the Background of identifying code picture.
In this embodiment, multiple first sub-pictures can be spliced into a big figure by concatenation module 120, used as identifying code
The Background of picture.
Processing module 130 is used to obtain positional information of second sub-pictures on the Background that concatenation module is spliced into, root
The second sub-pictures are set according to positional information, make the vision deception effect of the second sub-pictures and the vision of Background cheat effect not
Together.
Specifically, processing module 130 can be according to default verification code information the second sub-pictures of acquisition on Background
Positional information, such as coordinate information.It is assumed that default verification code information is 8, the Background in the embodiment is arranged for 5 rows 4
Matrix, as shown in Fig. 2 then can in fig. 2 with round dot mark region arrange the second sub-pictures, you can with obtain Fig. 2 use
The positional information in the region of round dot mark.
It should be noted that the Fig. 2 is only to schematically illustrate a kind of mode for obtaining the second sub-pictures positional information.
In this embodiment, processing module 130 can arrange the second sub-pictures according to positional information and preset rules, its
In, preset rules can be preset direction, as shown in figure 3, the direction of the second sub-pictures in Fig. 3 in two circles is different, when
So, because the vision deception effect of the second sub-pictures in Fig. 3 is different with the vision of Background deception effect, therefore figure seen by person
Identifying code picture shown in 3 is dynamic.Of course, it is possible to change pattern, type of the second sub-pictures shown in Fig. 3 etc..
In addition, processing module 130 first can also carry out floating process to positional information, then according to the position after floating process
Confidence breath arranges the second sub-pictures, for example, to the column matrix of 5 row 5 shown in Fig. 4, can move one of them second sub-pictures, moves
Matrix after dynamic from Fig. 5 as shown in figure 5, still can be seen that verification code information is 8, and matrix is bigger, verification code information
Floating space it is bigger.
In the present embodiment, in order to further reduce discrimination of the machine to identifying code picture, can be in identifying code picture
Middle increase interference information, but the interference information does not interfere with identification of the human eye to identifying code.Therefore, the acquisition module 110 is gone back
For obtaining the 3rd sub-pictures;The processing module 130 is additionally operable to obtain position of the 3rd sub-pictures on the Background
Confidence ceases, and according to the 3rd sub-pictures, positional information on the Background arranges the 3rd sub-pictures, makes described the
The vision deception effect of three sub-pictures is identical with the vision of second sub-pictures deception effect.
Wherein, the 3rd sub-pictures are properly termed as noise spot sub-pictures.
In this embodiment, obtaining module 110 can be from locally one or more the 3rd sub-pictures of reading;Can also be according to
One or more the 3rd sub-pictures of pixel strategy generating.
Specifically, it is noise spot sub-pictures that processing module 130 can obtain the 3rd sub-pictures according to default interference information
Positional information on Background.In order that the vision deception effect of the vision deception effect of the 3rd sub-pictures and the second sub-pictures
It is identical, the 3rd sub-pictures can be set using with the second sub-pictures identical preset rules, do not repeat herein.Certainly, the 3rd is sub
Picture is alternatively identical picture, or different pictures.
The generating means embodiment of above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, by first
Sub-pictures are spliced into the Background of identifying code picture;Then positional information of second sub-pictures on Background is obtained, and according to
Positional information arranges the second sub-pictures, so that the second sub-pictures are the vision deception effect of effect idea picture and regarding for Background
Feel that deception effect is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduce the knowledge of machine
Not other rate, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve the safety of network.
Fig. 9 is the flow chart of the verification method of identifying code picture according to an embodiment of the invention.
As shown in figure 9, the verification method of the identifying code picture includes:
S901, shows identifying code picture, and the second sub-pictures of identifying code picture are the vision deception effect of effect idea picture
Fruit is different with the vision of the Background of identifying code picture deception effect.
It is assumed that client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture are effect
The vision deception effect of idea picture is different with the vision of the Background of identifying code picture deception effect, so human eye can be seen
The dynamic verification code in identifying code picture shown in Fig. 7.
In addition, interference information has been likely on identifying code picture, and because the 3rd sub-pictures on identifying code picture
It is identical that vision cheats effect and the vision of second sub-pictures deception effect, thus human eye can identify verification code information and
Interference information, but interference information will not impact to user's identification identifying code, but the discrimination of machine can be substantially reduced.
S902, the information that receive user is input into according to identifying code picture.
User is input into the verification code information for identifying after dynamic verification code is identified.
S903, according to prestoring, verification code information corresponding with identifying code picture is verified to information.
In this embodiment it is possible to the verification code information for prestoring is compared with the verification code information of user input, if
The two is consistent, then by checking, if the two is inconsistent, authentication failed.
The verification method of above-mentioned identifying code picture, by showing that identifying code picture allows user to identify verification code information
And machine None- identified, then the verification code information of user input is verified, the discrimination of machine is reduced, such that it is able to
Evading some rogue programs user that disguises oneself as carries out irrational operation, improves the safety of network and the satisfaction of user.
Figure 10 is the structural representation of the checking device of identifying code picture according to an embodiment of the invention.
As shown in Figure 10, the checking device of identifying code picture includes:Display module 210, receiver module 220 and authentication module
230。
Specifically, display module 210 is used to show identifying code picture.
It is assumed that client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture are effect
The vision deception effect of idea picture is different with the vision of the Background of identifying code picture deception effect, so human eye can be seen
The dynamic verification code in identifying code picture shown in Fig. 7.
In addition, interference information has been likely on the identifying code picture of the display of display module 210, and because identifying code picture
On the 3rd sub-pictures vision deception effect and the vision of second sub-pictures deception effect it is identical, so human eye can be known
Do not go out verification code information and interference information, but interference information will not be impacted to user's identification identifying code, but can substantially reduce
The discrimination of machine.
Receiver module 220 is used for the information of the identifying code picture input that receive user shows according to display module 210.
User after dynamic verification code is identified, the verification code information that the receiving user's input of receiver module 220 is identified.
Authentication module 230 is used to connect receiver module 220 according to the verification code information corresponding with identifying code picture for prestoring
The information of receipts is verified.
In this embodiment, authentication module 230 can be by the verification code information for prestoring and the verification code information of user input
It is compared, if the two is consistent, by checking, if the two is inconsistent, authentication failed.
The checking device of above-mentioned identifying code picture, by showing that identifying code picture allows user to identify verification code information
And machine None- identified, then the verification code information of user input is verified, the discrimination of machine is reduced, such that it is able to
Evading some rogue programs user that disguises oneself as carries out irrational operation, improves the safety of network and the satisfaction of user.
In flow chart or here any process described otherwise above or method description are construed as, expression includes
It is one or more for realizing specific logical function or process the step of the module of code of executable instruction, fragment or portion
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussion suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
In flow charts expression or here logic described otherwise above and/or step, for example, are considered use
In the order list of the executable instruction for realizing logic function, in may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment(As computer based system, the system including processor or other can hold from instruction
The system of row system, device or equipment instruction fetch and execute instruction)Use, or with reference to these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
The dress that defeated program is used for instruction execution system, device or equipment or with reference to these instruction execution systems, device or equipment
Put.The more specifically example of computer-readable medium(Non-exhaustive list)Including following:With the electricity that one or more are connected up
Connecting portion(Electronic installation), portable computer diskette box(Magnetic device), random access memory(RAM), read only memory
(ROM), erasable edit read-only storage(EPROM or flash memory), fiber device, and portable optic disk is read-only deposits
Reservoir(CDROM).In addition, computer-readable medium can even is that the paper that can thereon print described program or other are suitable
Medium, because for example by carrying out optical scanning to paper or other media edlin, interpretation can then be entered or if necessary with it
His suitable method is processed to electronically obtain described program, in being then stored in computer storage.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realizing.For example, if realized with hardware, and in another embodiment, can be with well known in the art
Any one of row technology or their combination are realizing:With for realizing the logic gates of logic function to data signal
Discrete logic, the special IC with suitable combinational logic gate circuit, programmable gate array(PGA), scene
Programmable gate array(FPGA)Deng.
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carried
Suddenly the hardware that can be by program to instruct correlation is completed, and described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the invention can be integrated in a processing module, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated mould
Block both can be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such as
Fruit is realized and as independent production marketing or when using using in the form of software function module, it is also possible to be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are described
Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any
One or more embodiments or example in combine in an appropriate manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that:Not
These embodiments can be carried out with various changes, modification, replacement and modification in the case of the principle and objective that depart from the present invention, this
The scope of invention is limited by claim and its equivalent.
Claims (20)
1. a kind of generation method of identifying code picture, it is characterised in that include:
Obtain the first sub-pictures and the second sub-pictures;
First sub-pictures are spliced into into the Background of identifying code picture;And
Positional information of second sub-pictures on the Background is obtained, described second is arranged according to the positional information
Picture, makes that the vision of second sub-pictures cheats effect and the vision of Background deception effect is different, wherein, described the
Two sub-pictures are effect idea picture, and the effect idea picture constitutes verification code information;
The positional information of the 3rd sub-pictures and the 3rd sub-pictures on the Background is obtained, according to the 3rd sub-pictures
Positional information on the Background arranges the 3rd sub-pictures, and the vision for making the 3rd sub-pictures cheats effect and institute
State the second sub-pictures vision deception effect it is identical, wherein, the 3rd sub-pictures be noise spot sub-pictures, the interference idea
Picture constitutes interference information.
2. method according to claim 1, it is characterised in that the sub-pictures of the acquisition first include:One is read from local
Plant or various first sub-pictures;Or, according to one or more first sub-pictures of pixel strategy generating;And/or
The second sub-pictures of the acquisition include:From locally one or more second sub-pictures of reading;Or, according to pixel strategy
Generate one or more second sub-pictures.
3. method according to claim 1, it is characterised in that the acquisition second sub-pictures are on the Background
Positional information include:
Positional information of second sub-pictures on the Background is obtained according to default verification code information.
4. method according to claim 1, it is characterised in that described that second subgraph is arranged according to the positional information
Piece includes:
Second sub-pictures are arranged according to the positional information and preset rules;Or
Floating process is carried out to the positional information, the positional information after processing according to floating arranges second sub-pictures.
5. method according to claim 4, it is characterised in that second sub-pictures are identical picture, different size
Picture or different pattern picture.
6. method according to claim 1, it is characterised in that the sub-pictures of the acquisition the 3rd include:
From locally one or more the 3rd sub-pictures of reading;Or, according to one or more the 3rd subgraphs of pixel strategy generating
Piece.
7. method according to claim 1, it is characterised in that the acquisition the 3rd sub-pictures are on the Background
Positional information include:
Positional information of 3rd sub-pictures on the Background is obtained according to default interference information.
8. method according to claim 1, it is characterised in that it is described according to the 3rd sub-pictures on the Background
Positional information the 3rd sub-pictures be set include:
Positional information and preset rules according to the 3rd sub-pictures on the Background arranges the 3rd sub-pictures.
9. a kind of generating means of identifying code picture, it is characterised in that include:
Module is obtained, for obtaining the first sub-pictures and the second sub-pictures;
Concatenation module, for first sub-pictures that the acquisition module is obtained to be spliced into the Background of identifying code picture;
And
Processing module, for obtaining position letter of second sub-pictures on the Background that the concatenation module is spliced into
Breath, according to the positional information second sub-pictures are arranged, and the vision for making second sub-pictures cheats effect and the back of the body
The vision deception effect of scape figure is different, wherein, second sub-pictures are effect idea picture, the effect idea picture composition
Verification code information;
The acquisition module, is additionally operable to obtain the 3rd sub-pictures;
The processing module, is additionally operable to obtain the positional information of the 3rd sub-pictures on the Background, according to described the
Positional information of three sub-pictures on the Background arranges the 3rd sub-pictures, and the vision for making the 3rd sub-pictures is cheated
Effect is identical with the vision of second sub-pictures deception effect, wherein, the 3rd sub-pictures are noise spot sub-pictures, described
Noise spot sub-pictures constitute interference information.
10. device according to claim 9, it is characterised in that the acquisition module, specifically for:
From locally one or more first sub-pictures of reading;Or, according to one or more first subgraphs of pixel strategy generating
Piece;And/or
From locally one or more second sub-pictures of reading;Or, according to one or more second subgraphs of pixel strategy generating
Piece.
11. devices according to claim 9, it is characterised in that the processing module, specifically for:
Positional information of second sub-pictures on the Background is obtained according to default verification code information.
12. devices according to claim 9, it is characterised in that the processing module, specifically for:
Second sub-pictures are arranged according to the positional information and preset rules;Or
Floating process is carried out to the positional information, the positional information after processing according to floating arranges second sub-pictures.
13. devices according to claim 9, it is characterised in that second sub-pictures are identical picture, different size
Picture or different pattern picture.
14. devices according to claim 9, it is characterised in that the acquisition module, specifically for:
From locally one or more the 3rd sub-pictures of reading;Or, according to one or more the 3rd subgraphs of pixel strategy generating
Piece.
15. devices according to claim 9, it is characterised in that the processing module, specifically for:
Positional information of 3rd sub-pictures on the Background is obtained according to default interference information.
16. devices according to claim 9, it is characterised in that the processing module, specifically for:
Positional information and preset rules according to the 3rd sub-pictures on the Background arranges the 3rd sub-pictures.
17. a kind of verification methods of identifying code picture, it is characterised in that include:
Show identifying code picture, the vision deception effect of the second sub-pictures of the identifying code picture and the identifying code picture
The vision deception effect of Background is different, wherein, second sub-pictures are effect idea picture, the effect idea picture group
Into verification code information, the vision deception effect of the 3rd sub-pictures of the identifying code picture and the vision of second sub-pictures are taken advantage of
Deceive effect identical, wherein, the 3rd sub-pictures are noise spot sub-pictures, and the noise spot sub-pictures constitute interference information;
The information that receive user is input into according to the identifying code picture;And
According to prestoring, verification code information corresponding with the identifying code picture is verified to described information.
18. methods according to claim 17, it is characterised in that second sub-pictures are identical picture, difference is big
The picture of little picture or different patterns;Or
The Background is spliced by multiple first sub-pictures, and the plurality of first sub-pictures are identical or different.
19. a kind of checking devices of identifying code picture, it is characterised in that include:
Display module, for showing identifying code picture, the vision deception effect of the second sub-pictures of the identifying code picture and institute
The vision deception effect for stating the Background of identifying code picture is different, wherein, second sub-pictures are effect idea picture, described
Effect idea picture constitutes verification code information, the vision deception effect and described second of the 3rd sub-pictures of the identifying code picture
Sub-pictures vision deception effect it is identical, wherein, the 3rd sub-pictures be noise spot sub-pictures, the noise spot sub-pictures group
Into interference information;
Receiver module, the information of the identifying code picture input shown according to the display module for receive user;And
Authentication module, for being received to the receiver module according to the verification code information corresponding with the identifying code picture for prestoring
Described information verified.
20. devices according to claim 19, it is characterised in that second sub-pictures are identical picture, difference is big
The picture of little picture or different patterns;Or
The Background is spliced by multiple first sub-pictures, and the plurality of first sub-pictures are identical or different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410073873.5A CN103853968B (en) | 2014-02-28 | 2014-02-28 | Method and device for generating verification code picture and verification method and device thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410073873.5A CN103853968B (en) | 2014-02-28 | 2014-02-28 | Method and device for generating verification code picture and verification method and device thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103853968A CN103853968A (en) | 2014-06-11 |
CN103853968B true CN103853968B (en) | 2017-05-10 |
Family
ID=50861614
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410073873.5A Active CN103853968B (en) | 2014-02-28 | 2014-02-28 | Method and device for generating verification code picture and verification method and device thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103853968B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106295264A (en) * | 2015-05-21 | 2017-01-04 | 阿里巴巴集团控股有限公司 | The recognition methods of a kind of operation and system |
CN107154924B (en) | 2016-03-04 | 2021-01-05 | 阿里巴巴集团控股有限公司 | Verification processing method and device based on verification code |
CN109388933A (en) * | 2018-09-06 | 2019-02-26 | 中南民族大学 | Verification method, device, user equipment and storage medium based on dynamic subgraph |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101923701A (en) * | 2010-07-19 | 2010-12-22 | 西安建筑科技大学 | Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology |
EP2330529A2 (en) * | 2009-08-19 | 2011-06-08 | Deutsche Telekom AG | CAPTCHAs based on visual illusions |
CN103400107A (en) * | 2013-07-05 | 2013-11-20 | 百度在线网络技术(北京)有限公司 | Method and device for generating dynamic verification code picture, and verification method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7929805B2 (en) * | 2006-01-31 | 2011-04-19 | The Penn State Research Foundation | Image-based CAPTCHA generation system |
-
2014
- 2014-02-28 CN CN201410073873.5A patent/CN103853968B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2330529A2 (en) * | 2009-08-19 | 2011-06-08 | Deutsche Telekom AG | CAPTCHAs based on visual illusions |
CN101923701A (en) * | 2010-07-19 | 2010-12-22 | 西安建筑科技大学 | Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology |
CN103400107A (en) * | 2013-07-05 | 2013-11-20 | 百度在线网络技术(北京)有限公司 | Method and device for generating dynamic verification code picture, and verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN103853968A (en) | 2014-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107154924B (en) | Verification processing method and device based on verification code | |
US20090232351A1 (en) | Authentication method, authentication device, and recording medium | |
US10037461B2 (en) | Biometric authentication, and near-eye wearable device | |
US10395022B2 (en) | Access control for a resource | |
CN107451643B (en) | Generation, recognition methods and the device of dynamic two-dimension code | |
CN104091140B (en) | A kind of information processing method and electronic equipment | |
CN106200960A (en) | The content display method of electronic interactive product and device | |
CN103761460A (en) | Method for authenticating users of display equipment | |
CN105354481B (en) | Network verification method and network authentication server | |
CN104298912A (en) | Methods and devices of implementing and generating crack-resistant identifying code | |
CN103853968B (en) | Method and device for generating verification code picture and verification method and device thereof | |
CN105701391B (en) | Dynamic verification code Picture Generation Method and device | |
AU2020267220A1 (en) | Methods and apparatuses for identity authentication | |
WO2015184944A1 (en) | Biometric authentication, and near-eye wearable device | |
CN107851141A (en) | For the method and system for the access for providing the user device | |
KR101234249B1 (en) | Method for operating database for CAPTCHA test on image basis, method, system for CAPTCHA using the same and program recording medium for the same | |
CN109388933A (en) | Verification method, device, user equipment and storage medium based on dynamic subgraph | |
CN107994994A (en) | Image authentication code verification method, system, server and terminal | |
CN108200043B (en) | Picture verification code verification method and picture verification code verification device | |
JP5784813B1 (en) | Bar code display device, operation method and program of bar code display device | |
CN109801076A (en) | Handwriting authentication method, equipment and storage medium based on self-aided terminal | |
CN105335773B (en) | QR code encoding methods and device | |
JP6493974B2 (en) | Bar code display device, bar code server device, bar code reading device, operation method thereof, and program | |
KR101261717B1 (en) | Face-picture based CAPTCHA method, device and recording medium for program | |
CN117392246A (en) | Picture verification code cracking prevention processing method, verification method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |