CN103853968B - Method and device for generating verification code picture and verification method and device thereof - Google Patents

Method and device for generating verification code picture and verification method and device thereof Download PDF

Info

Publication number
CN103853968B
CN103853968B CN201410073873.5A CN201410073873A CN103853968B CN 103853968 B CN103853968 B CN 103853968B CN 201410073873 A CN201410073873 A CN 201410073873A CN 103853968 B CN103853968 B CN 103853968B
Authority
CN
China
Prior art keywords
pictures
sub
picture
effect
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410073873.5A
Other languages
Chinese (zh)
Other versions
CN103853968A (en
Inventor
王云吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410073873.5A priority Critical patent/CN103853968B/en
Publication of CN103853968A publication Critical patent/CN103853968A/en
Application granted granted Critical
Publication of CN103853968B publication Critical patent/CN103853968B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a method and a device for generating a verification code picture and a verification method and device thereof. The method for generating the verification code picture comprises the following steps: acquiring first sub-pictures and second sub-pictures; splicing the first sub-pictures into a background image of the verification code picture; acquiring the position information of the second sub-pictures on the background image, and setting the second sub-pictures according to the position information to differ the visual cheat effects of the second sub-pictures from the visual cheat effect of the background image. According to the method for generating the verification code picture in the embodiment of the invention, the visual cheat effects of the second sub-pictures, namely, effect dot sub-pictures, differ from the visual cheat effect of the background image, so that the verification code picture which can be identified by human eyes but cannot be identified by a machine is generated, the identification rate of the machine is lowered, unreasonable operation of certain malware pretending users can be avoided, and the network security is improved.

Description

The generation method and device of identifying code picture and its verification method and device
Technical field
The present invention relates to Computer Applied Technology field, the generation method and device of more particularly to a kind of identifying code picture and Its verification method and device.
Background technology
Identifying code be it is a kind of differentiation user be computer and people public full auto-programs.Identifying code is usually used some lines Bar and some irregular character compositions, Main Function is to prevent hack user cipher, stealing subscriber information message Deng.At present, the identifying code of most of websites mainly chooses input frame by click, automatic spring identifying code picture, then user Verification code information according to ejecting is input into.After being proved to be successful, user account can be just logged into, carry out other operations Deng.
But, in process of the present invention is realized, inventor has found that at least there are the following problems in prior art:Current tests Card code picture is static images, it is easy to be identified by program by computer, and machine recognition rate is high, and internet security is low.
The content of the invention
It is contemplated that at least solving one of technical problem in correlation technique to a certain extent.
For this purpose, first purpose of the present invention is to propose a kind of generation method of identifying code picture, the method is by the Two sub-pictures are that the vision deception effect of effect idea picture is different with the vision of Background deception effect, can so as to generate human eye The identifying code picture of machine None- identified with identification, reduces the discrimination of machine, and then can evade some rogue programs The user that disguises oneself as carries out irrational operation, improves the safety of network.
It is that up to above-mentioned purpose, according to a first aspect of the present invention embodiment proposes a kind of generation method of identifying code picture, Including:Obtain the first sub-pictures and the second sub-pictures;First sub-pictures are spliced into into the Background of identifying code picture;And obtain Positional information of second sub-pictures on Background, according to positional information the second sub-pictures are arranged, and make the vision of the second sub-pictures Deception effect is different with the vision of Background deception effect.
The generation method of identifying code picture according to embodiments of the present invention, by obtaining the first sub-pictures and the second subgraph First sub-pictures are spliced into the Background of identifying code picture by piece;Then position letter of second sub-pictures on Background is obtained Breath, and according to positional information arrange the second sub-pictures so that the second sub-pictures be effect idea picture vision deception effect and The vision deception effect of Background is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduces The discrimination of machine, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve network Safety.
Second aspect present invention embodiment proposes a kind of generating means of identifying code picture, including:Module is obtained, is used for Obtain the first sub-pictures and the second sub-pictures;Concatenation module, for the first sub-pictures for obtaining module acquisition to be spliced into into checking The Background of code picture;And processing module, for obtaining position of second sub-pictures on the Background that concatenation module is spliced into Confidence ceases, and according to positional information the second sub-pictures are arranged, and takes advantage of the vision deception effect of the second sub-pictures and the vision of Background Deceive effect different.
The generating means of identifying code picture according to embodiments of the present invention, by obtaining the first sub-pictures and the second subgraph First sub-pictures are spliced into the Background of identifying code picture by piece;Then position letter of second sub-pictures on Background is obtained Breath, and according to positional information arrange the second sub-pictures so that the second sub-pictures be effect idea picture vision deception effect and The vision deception effect of Background is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduces The discrimination of machine, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve network Safety.
Third aspect present invention embodiment proposes a kind of verification method of identifying code picture, including:Show identifying code figure Piece, the vision deception effect of the Background of the vision deception effect and identifying code picture of the second sub-pictures of identifying code picture is not Together;The information that receive user is input into according to identifying code picture;And according to the identifying code letter corresponding with identifying code picture that prestores Breath is verified to information.
The verification method of identifying code picture according to embodiments of the present invention, by showing that identifying code picture knows user Do not go out verification code information and machine None- identified, then the verification code information of user input is verified, reduce machine Discrimination, such that it is able to evade some rogue programs user that disguises oneself as irrational operation is carried out, improve network safety and The satisfaction of user.
Fourth aspect present invention embodiment proposes a kind of checking device of identifying code picture, including:Display module, is used for Show identifying code picture, the vision of the Background of the vision deception effect and identifying code picture of the second sub-pictures of identifying code picture Deception effect is different;Receiver module, the information of the identifying code picture input shown according to display module for receive user;And Authentication module, for being tested the information that receiver module is received according to the verification code information corresponding with identifying code picture for prestoring Card.
The checking device of identifying code picture according to embodiments of the present invention, by showing that identifying code picture knows user Do not go out verification code information and machine None- identified, then the verification code information of user input is verified, reduce machine Discrimination, such that it is able to evade some rogue programs user that disguises oneself as irrational operation is carried out, improve network safety and The satisfaction of user.
Description of the drawings
Fig. 1 a are the flow charts of the generation method of identifying code picture according to an embodiment of the invention;
Fig. 1 b are the flow charts of the generation method of identifying code picture in accordance with another embodiment of the present invention;
Fig. 2 is the corresponding matrix schematic diagram one of identifying code picture according to an embodiment of the invention;
Fig. 3 is the schematic diagram one of identifying code picture according to an embodiment of the invention;
Fig. 4 is the corresponding matrix schematic diagram two of identifying code picture according to an embodiment of the invention;
Fig. 5 is the corresponding matrix schematic diagram three of identifying code picture according to an embodiment of the invention;
Fig. 6 is the flow chart of the generation method of the identifying code picture according to another embodiment of the invention;
Fig. 7 is the schematic diagram two of identifying code picture according to an embodiment of the invention;
Fig. 8 is the structural representation of the generating means of identifying code picture according to an embodiment of the invention;
Fig. 9 is the flow chart of the verification method of identifying code picture according to an embodiment of the invention;
Figure 10 is the structural representation of the checking device of identifying code picture according to an embodiment of the invention.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and be not considered as limiting the invention.
Below with reference to the accompanying drawings generation method and device and its checking of identifying code picture according to embodiments of the present invention are described Method and apparatus.
In order to reduce the discrimination of machine, the safety of network is improved, embodiments of the invention propose a kind of identifying code figure The generation method of piece.
Fig. 1 a are the flow charts of the generation method of identifying code picture according to an embodiment of the invention.As shown in Figure 1a, The generation method of the identifying code picture includes:
S101, obtains the first sub-pictures and the second sub-pictures.
In this embodiment it is possible to the first sub-pictures are read from local picture library, can be according to pixel strategy generating First sub-pictures;Wherein, the first sub-pictures can have identical pattern, it is possible to have different patterns.First subgraph Piece i.e. background sub-pictures.
It is equally possible that the second sub-pictures are read from local picture library, can be according to pixel strategy generating second Sub-pictures;Wherein, the second sub-pictures can have identical pattern, it is possible to have different patterns;There can be identical Shape, it is possible to have different shapes.
First sub-pictures are spliced into the Background of identifying code picture by S102.
In this embodiment it is possible to multiple first sub-pictures are spliced into into a big figure, as the background of identifying code picture Figure.
S103, obtains positional information of second sub-pictures on Background, and according to positional information the second sub-pictures are arranged, and makes The vision deception effect of the second sub-pictures is different with the vision of Background deception effect.
Wherein, the second sub-pictures are properly termed as effect idea picture.
Specifically, it is effect idea picture on Background that can obtain the second sub-pictures according to default verification code information Positional information, such as coordinate information.It is assumed that default verification code information is 8, the Background in the embodiment is 5 rows 4 The matrix of row, as shown in Fig. 2 the region that then can be marked with round dot in fig. 2 arranges effect idea picture, you can to obtain figure The positional information in 2 regions marked with round dot.
It should be noted that the Fig. 2 is only to schematically illustrate a kind of mode for obtaining effect idea picture positional information.
In this embodiment it is possible to effect idea picture is arranged according to positional information and preset rules, wherein, preset rules Can be preset direction, as shown in figure 3, the direction of the effect idea picture in Fig. 3 in two circles is different, certainly, due to Fig. 3 The vision deception effect of middle effect idea picture is different with the vision of Background deception effect, therefore shown in Fig. 3 seen by person Identifying code picture is dynamic.Of course, it is possible to change pattern, type of effect idea picture shown in Fig. 3 etc..
Alternatively, it is also possible to first to positional information carry out floating process, then arranged according to the positional information after floating process Second sub-pictures are effect idea picture, for example, to the column matrix of 5 row 5 shown in Fig. 4, can move one of them second subgraph Piece is effect idea picture, it is mobile after matrix as shown in figure 5, still it can be seen that verification code information is 8 from Fig. 5, and Matrix is bigger, and the floating space of verification code information is bigger.
In the present embodiment, in order to further reduce discrimination of the machine to identifying code picture, can be in identifying code picture Middle increase interference information, but the interference information does not interfere with identification of the human eye to identifying code.Therefore, the method embodiment can be with Including S104, as shown in Figure 1 b:
S104, obtains the positional information of the 3rd sub-pictures and the 3rd sub-pictures on Background, is existed according to the 3rd sub-pictures Positional information on Background arranges the 3rd sub-pictures, makes the vision deception effect of the 3rd sub-pictures and the vision of the second sub-pictures Deception effect is identical.
Wherein, the 3rd sub-pictures are properly termed as noise spot sub-pictures.
In this embodiment it is possible to from locally one or more the 3rd sub-pictures of reading;Can also be according to pixel strategy Generate one or more the 3rd sub-pictures.
Specifically, it is noise spot sub-pictures on Background that can obtain the 3rd sub-pictures according to default interference information Positional information.In order that the vision deception effect of the 3rd sub-pictures is identical with the vision of the second sub-pictures deception effect, can adopt The 3rd sub-pictures are set with the second sub-pictures identical preset rules, are not repeated herein.Certainly, the 3rd sub-pictures are alternatively phase Same picture, or different pictures.
The generation method embodiment of above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, by first Sub-pictures are spliced into the Background of identifying code picture;Then positional information of second sub-pictures on Background is obtained, and according to Positional information arranges the second sub-pictures, so that the second sub-pictures are the vision deception effect of effect idea picture and regarding for Background Feel that deception effect is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduce the knowledge of machine Not other rate, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve the safety of network.
Fig. 6 is the flow chart of the generation method of the identifying code picture according to another embodiment of the invention.
As shown in fig. 6, the generation method of the identifying code picture includes:
S601, from local picture library background sub-pictures and effect idea picture are obtained.
Wherein, background sub-pictures can have identical pattern, it is possible to have different patterns.Similarly effect idea Picture can have identical pattern, it is possible to have different patterns;Can be of similar shape, it is possible to have different Shape.
Background sub-pictures are spliced into the Background of identifying code picture by S602.
In this embodiment it is possible to multiple background sub-pictures are spliced into into a big figure, as the background of identifying code picture Figure.
S603, obtains positional information of the effect idea picture on Background, according to position according to default verification code information Confidence breath arranges effect idea picture, makes the vision deception effect of effect idea picture and the vision of Background cheat effect not Together.
In this embodiment, default verification code information is 8, and effect idea picture is arranged after positional information is obtained, and is made The vision deception effect of effect idea picture is different with the vision of Background deception effect, as shown in fig. 7, and effect dot map The direction of piece is different, it should be noted that the Fig. 7 is only the schematic diagram that vision cheats effect.
The generation method embodiment of above-mentioned identifying code picture, by obtaining background sub-pictures and effect idea picture, will carry on the back Scape sub-pictures are spliced into the Background of identifying code picture;Then positional information of the effect idea picture on Background is obtained, and Effect idea picture is arranged according to positional information, so that the vision deception of the vision deception effect of effect idea picture and Background Effect is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduces the discrimination of machine, enters And can evade some rogue programs user that disguises oneself as carries out irrational operation, the safety of network is improved.
Fig. 8 is the structural representation of the generating means of identifying code picture according to an embodiment of the invention.
As shown in figure 8, the generating means of identifying code picture include:Obtain module 110, concatenation module 120 and processing module 130。
Specifically, obtaining module 110 is used to obtain the first sub-pictures and the second sub-pictures.
In this embodiment, obtaining module 110 can read the first sub-pictures from local picture library, can be according to pixel The point sub-pictures of strategy generating first;Wherein, the first sub-pictures can have identical pattern, it is possible to have different patterns. Wherein, the first sub-pictures are properly termed as background sub-pictures, and the second sub-pictures are properly termed as effect idea picture.
Similarly, obtaining module 110 can also read the second sub-pictures from local picture library, can be according to pixel plan Slightly generate the second sub-pictures;Wherein, the second sub-pictures can have identical pattern, it is possible to have different patterns;Can be with It is of similar shape, it is possible to have different shapes.
Concatenation module 120 is used to that the first sub-pictures that acquisition module 110 is obtained to be spliced into the Background of identifying code picture.
In this embodiment, multiple first sub-pictures can be spliced into a big figure by concatenation module 120, used as identifying code The Background of picture.
Processing module 130 is used to obtain positional information of second sub-pictures on the Background that concatenation module is spliced into, root The second sub-pictures are set according to positional information, make the vision deception effect of the second sub-pictures and the vision of Background cheat effect not Together.
Specifically, processing module 130 can be according to default verification code information the second sub-pictures of acquisition on Background Positional information, such as coordinate information.It is assumed that default verification code information is 8, the Background in the embodiment is arranged for 5 rows 4 Matrix, as shown in Fig. 2 then can in fig. 2 with round dot mark region arrange the second sub-pictures, you can with obtain Fig. 2 use The positional information in the region of round dot mark.
It should be noted that the Fig. 2 is only to schematically illustrate a kind of mode for obtaining the second sub-pictures positional information.
In this embodiment, processing module 130 can arrange the second sub-pictures according to positional information and preset rules, its In, preset rules can be preset direction, as shown in figure 3, the direction of the second sub-pictures in Fig. 3 in two circles is different, when So, because the vision deception effect of the second sub-pictures in Fig. 3 is different with the vision of Background deception effect, therefore figure seen by person Identifying code picture shown in 3 is dynamic.Of course, it is possible to change pattern, type of the second sub-pictures shown in Fig. 3 etc..
In addition, processing module 130 first can also carry out floating process to positional information, then according to the position after floating process Confidence breath arranges the second sub-pictures, for example, to the column matrix of 5 row 5 shown in Fig. 4, can move one of them second sub-pictures, moves Matrix after dynamic from Fig. 5 as shown in figure 5, still can be seen that verification code information is 8, and matrix is bigger, verification code information Floating space it is bigger.
In the present embodiment, in order to further reduce discrimination of the machine to identifying code picture, can be in identifying code picture Middle increase interference information, but the interference information does not interfere with identification of the human eye to identifying code.Therefore, the acquisition module 110 is gone back For obtaining the 3rd sub-pictures;The processing module 130 is additionally operable to obtain position of the 3rd sub-pictures on the Background Confidence ceases, and according to the 3rd sub-pictures, positional information on the Background arranges the 3rd sub-pictures, makes described the The vision deception effect of three sub-pictures is identical with the vision of second sub-pictures deception effect.
Wherein, the 3rd sub-pictures are properly termed as noise spot sub-pictures.
In this embodiment, obtaining module 110 can be from locally one or more the 3rd sub-pictures of reading;Can also be according to One or more the 3rd sub-pictures of pixel strategy generating.
Specifically, it is noise spot sub-pictures that processing module 130 can obtain the 3rd sub-pictures according to default interference information Positional information on Background.In order that the vision deception effect of the vision deception effect of the 3rd sub-pictures and the second sub-pictures It is identical, the 3rd sub-pictures can be set using with the second sub-pictures identical preset rules, do not repeat herein.Certainly, the 3rd is sub Picture is alternatively identical picture, or different pictures.
The generating means embodiment of above-mentioned identifying code picture, by obtaining the first sub-pictures and the second sub-pictures, by first Sub-pictures are spliced into the Background of identifying code picture;Then positional information of second sub-pictures on Background is obtained, and according to Positional information arranges the second sub-pictures, so that the second sub-pictures are the vision deception effect of effect idea picture and regarding for Background Feel that deception effect is different, can recognize and the identifying code picture of machine None- identified so as to generate human eye, reduce the knowledge of machine Not other rate, and then some rogue programs user that disguises oneself as can be evaded carry out irrational operation, improve the safety of network.
Fig. 9 is the flow chart of the verification method of identifying code picture according to an embodiment of the invention.
As shown in figure 9, the verification method of the identifying code picture includes:
S901, shows identifying code picture, and the second sub-pictures of identifying code picture are the vision deception effect of effect idea picture Fruit is different with the vision of the Background of identifying code picture deception effect.
It is assumed that client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture are effect The vision deception effect of idea picture is different with the vision of the Background of identifying code picture deception effect, so human eye can be seen The dynamic verification code in identifying code picture shown in Fig. 7.
In addition, interference information has been likely on identifying code picture, and because the 3rd sub-pictures on identifying code picture It is identical that vision cheats effect and the vision of second sub-pictures deception effect, thus human eye can identify verification code information and Interference information, but interference information will not impact to user's identification identifying code, but the discrimination of machine can be substantially reduced.
S902, the information that receive user is input into according to identifying code picture.
User is input into the verification code information for identifying after dynamic verification code is identified.
S903, according to prestoring, verification code information corresponding with identifying code picture is verified to information.
In this embodiment it is possible to the verification code information for prestoring is compared with the verification code information of user input, if The two is consistent, then by checking, if the two is inconsistent, authentication failed.
The verification method of above-mentioned identifying code picture, by showing that identifying code picture allows user to identify verification code information And machine None- identified, then the verification code information of user input is verified, the discrimination of machine is reduced, such that it is able to Evading some rogue programs user that disguises oneself as carries out irrational operation, improves the safety of network and the satisfaction of user.
Figure 10 is the structural representation of the checking device of identifying code picture according to an embodiment of the invention.
As shown in Figure 10, the checking device of identifying code picture includes:Display module 210, receiver module 220 and authentication module 230。
Specifically, display module 210 is used to show identifying code picture.
It is assumed that client shows identifying code picture as shown in Figure 7, because the second sub-pictures of identifying code picture are effect The vision deception effect of idea picture is different with the vision of the Background of identifying code picture deception effect, so human eye can be seen The dynamic verification code in identifying code picture shown in Fig. 7.
In addition, interference information has been likely on the identifying code picture of the display of display module 210, and because identifying code picture On the 3rd sub-pictures vision deception effect and the vision of second sub-pictures deception effect it is identical, so human eye can be known Do not go out verification code information and interference information, but interference information will not be impacted to user's identification identifying code, but can substantially reduce The discrimination of machine.
Receiver module 220 is used for the information of the identifying code picture input that receive user shows according to display module 210.
User after dynamic verification code is identified, the verification code information that the receiving user's input of receiver module 220 is identified.
Authentication module 230 is used to connect receiver module 220 according to the verification code information corresponding with identifying code picture for prestoring The information of receipts is verified.
In this embodiment, authentication module 230 can be by the verification code information for prestoring and the verification code information of user input It is compared, if the two is consistent, by checking, if the two is inconsistent, authentication failed.
The checking device of above-mentioned identifying code picture, by showing that identifying code picture allows user to identify verification code information And machine None- identified, then the verification code information of user input is verified, the discrimination of machine is reduced, such that it is able to Evading some rogue programs user that disguises oneself as carries out irrational operation, improves the safety of network and the satisfaction of user.
In flow chart or here any process described otherwise above or method description are construed as, expression includes It is one or more for realizing specific logical function or process the step of the module of code of executable instruction, fragment or portion Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussion suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
In flow charts expression or here logic described otherwise above and/or step, for example, are considered use In the order list of the executable instruction for realizing logic function, in may be embodied in any computer-readable medium, for Instruction execution system, device or equipment(As computer based system, the system including processor or other can hold from instruction The system of row system, device or equipment instruction fetch and execute instruction)Use, or with reference to these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass The dress that defeated program is used for instruction execution system, device or equipment or with reference to these instruction execution systems, device or equipment Put.The more specifically example of computer-readable medium(Non-exhaustive list)Including following:With the electricity that one or more are connected up Connecting portion(Electronic installation), portable computer diskette box(Magnetic device), random access memory(RAM), read only memory (ROM), erasable edit read-only storage(EPROM or flash memory), fiber device, and portable optic disk is read-only deposits Reservoir(CDROM).In addition, computer-readable medium can even is that the paper that can thereon print described program or other are suitable Medium, because for example by carrying out optical scanning to paper or other media edlin, interpretation can then be entered or if necessary with it His suitable method is processed to electronically obtain described program, in being then stored in computer storage.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realizing.For example, if realized with hardware, and in another embodiment, can be with well known in the art Any one of row technology or their combination are realizing:With for realizing the logic gates of logic function to data signal Discrete logic, the special IC with suitable combinational logic gate circuit, programmable gate array(PGA), scene Programmable gate array(FPGA)Deng.
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carried Suddenly the hardware that can be by program to instruct correlation is completed, and described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the invention can be integrated in a processing module, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated mould Block both can be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such as Fruit is realized and as independent production marketing or when using using in the form of software function module, it is also possible to be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are described Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any One or more embodiments or example in combine in an appropriate manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that:Not These embodiments can be carried out with various changes, modification, replacement and modification in the case of the principle and objective that depart from the present invention, this The scope of invention is limited by claim and its equivalent.

Claims (20)

1. a kind of generation method of identifying code picture, it is characterised in that include:
Obtain the first sub-pictures and the second sub-pictures;
First sub-pictures are spliced into into the Background of identifying code picture;And
Positional information of second sub-pictures on the Background is obtained, described second is arranged according to the positional information Picture, makes that the vision of second sub-pictures cheats effect and the vision of Background deception effect is different, wherein, described the Two sub-pictures are effect idea picture, and the effect idea picture constitutes verification code information;
The positional information of the 3rd sub-pictures and the 3rd sub-pictures on the Background is obtained, according to the 3rd sub-pictures Positional information on the Background arranges the 3rd sub-pictures, and the vision for making the 3rd sub-pictures cheats effect and institute State the second sub-pictures vision deception effect it is identical, wherein, the 3rd sub-pictures be noise spot sub-pictures, the interference idea Picture constitutes interference information.
2. method according to claim 1, it is characterised in that the sub-pictures of the acquisition first include:One is read from local Plant or various first sub-pictures;Or, according to one or more first sub-pictures of pixel strategy generating;And/or
The second sub-pictures of the acquisition include:From locally one or more second sub-pictures of reading;Or, according to pixel strategy Generate one or more second sub-pictures.
3. method according to claim 1, it is characterised in that the acquisition second sub-pictures are on the Background Positional information include:
Positional information of second sub-pictures on the Background is obtained according to default verification code information.
4. method according to claim 1, it is characterised in that described that second subgraph is arranged according to the positional information Piece includes:
Second sub-pictures are arranged according to the positional information and preset rules;Or
Floating process is carried out to the positional information, the positional information after processing according to floating arranges second sub-pictures.
5. method according to claim 4, it is characterised in that second sub-pictures are identical picture, different size Picture or different pattern picture.
6. method according to claim 1, it is characterised in that the sub-pictures of the acquisition the 3rd include:
From locally one or more the 3rd sub-pictures of reading;Or, according to one or more the 3rd subgraphs of pixel strategy generating Piece.
7. method according to claim 1, it is characterised in that the acquisition the 3rd sub-pictures are on the Background Positional information include:
Positional information of 3rd sub-pictures on the Background is obtained according to default interference information.
8. method according to claim 1, it is characterised in that it is described according to the 3rd sub-pictures on the Background Positional information the 3rd sub-pictures be set include:
Positional information and preset rules according to the 3rd sub-pictures on the Background arranges the 3rd sub-pictures.
9. a kind of generating means of identifying code picture, it is characterised in that include:
Module is obtained, for obtaining the first sub-pictures and the second sub-pictures;
Concatenation module, for first sub-pictures that the acquisition module is obtained to be spliced into the Background of identifying code picture; And
Processing module, for obtaining position letter of second sub-pictures on the Background that the concatenation module is spliced into Breath, according to the positional information second sub-pictures are arranged, and the vision for making second sub-pictures cheats effect and the back of the body The vision deception effect of scape figure is different, wherein, second sub-pictures are effect idea picture, the effect idea picture composition Verification code information;
The acquisition module, is additionally operable to obtain the 3rd sub-pictures;
The processing module, is additionally operable to obtain the positional information of the 3rd sub-pictures on the Background, according to described the Positional information of three sub-pictures on the Background arranges the 3rd sub-pictures, and the vision for making the 3rd sub-pictures is cheated Effect is identical with the vision of second sub-pictures deception effect, wherein, the 3rd sub-pictures are noise spot sub-pictures, described Noise spot sub-pictures constitute interference information.
10. device according to claim 9, it is characterised in that the acquisition module, specifically for:
From locally one or more first sub-pictures of reading;Or, according to one or more first subgraphs of pixel strategy generating Piece;And/or
From locally one or more second sub-pictures of reading;Or, according to one or more second subgraphs of pixel strategy generating Piece.
11. devices according to claim 9, it is characterised in that the processing module, specifically for:
Positional information of second sub-pictures on the Background is obtained according to default verification code information.
12. devices according to claim 9, it is characterised in that the processing module, specifically for:
Second sub-pictures are arranged according to the positional information and preset rules;Or
Floating process is carried out to the positional information, the positional information after processing according to floating arranges second sub-pictures.
13. devices according to claim 9, it is characterised in that second sub-pictures are identical picture, different size Picture or different pattern picture.
14. devices according to claim 9, it is characterised in that the acquisition module, specifically for:
From locally one or more the 3rd sub-pictures of reading;Or, according to one or more the 3rd subgraphs of pixel strategy generating Piece.
15. devices according to claim 9, it is characterised in that the processing module, specifically for:
Positional information of 3rd sub-pictures on the Background is obtained according to default interference information.
16. devices according to claim 9, it is characterised in that the processing module, specifically for:
Positional information and preset rules according to the 3rd sub-pictures on the Background arranges the 3rd sub-pictures.
17. a kind of verification methods of identifying code picture, it is characterised in that include:
Show identifying code picture, the vision deception effect of the second sub-pictures of the identifying code picture and the identifying code picture The vision deception effect of Background is different, wherein, second sub-pictures are effect idea picture, the effect idea picture group Into verification code information, the vision deception effect of the 3rd sub-pictures of the identifying code picture and the vision of second sub-pictures are taken advantage of Deceive effect identical, wherein, the 3rd sub-pictures are noise spot sub-pictures, and the noise spot sub-pictures constitute interference information;
The information that receive user is input into according to the identifying code picture;And
According to prestoring, verification code information corresponding with the identifying code picture is verified to described information.
18. methods according to claim 17, it is characterised in that second sub-pictures are identical picture, difference is big The picture of little picture or different patterns;Or
The Background is spliced by multiple first sub-pictures, and the plurality of first sub-pictures are identical or different.
19. a kind of checking devices of identifying code picture, it is characterised in that include:
Display module, for showing identifying code picture, the vision deception effect of the second sub-pictures of the identifying code picture and institute The vision deception effect for stating the Background of identifying code picture is different, wherein, second sub-pictures are effect idea picture, described Effect idea picture constitutes verification code information, the vision deception effect and described second of the 3rd sub-pictures of the identifying code picture Sub-pictures vision deception effect it is identical, wherein, the 3rd sub-pictures be noise spot sub-pictures, the noise spot sub-pictures group Into interference information;
Receiver module, the information of the identifying code picture input shown according to the display module for receive user;And
Authentication module, for being received to the receiver module according to the verification code information corresponding with the identifying code picture for prestoring Described information verified.
20. devices according to claim 19, it is characterised in that second sub-pictures are identical picture, difference is big The picture of little picture or different patterns;Or
The Background is spliced by multiple first sub-pictures, and the plurality of first sub-pictures are identical or different.
CN201410073873.5A 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof Active CN103853968B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410073873.5A CN103853968B (en) 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410073873.5A CN103853968B (en) 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof

Publications (2)

Publication Number Publication Date
CN103853968A CN103853968A (en) 2014-06-11
CN103853968B true CN103853968B (en) 2017-05-10

Family

ID=50861614

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410073873.5A Active CN103853968B (en) 2014-02-28 2014-02-28 Method and device for generating verification code picture and verification method and device thereof

Country Status (1)

Country Link
CN (1) CN103853968B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295264A (en) * 2015-05-21 2017-01-04 阿里巴巴集团控股有限公司 The recognition methods of a kind of operation and system
CN107154924B (en) 2016-03-04 2021-01-05 阿里巴巴集团控股有限公司 Verification processing method and device based on verification code
CN109388933A (en) * 2018-09-06 2019-02-26 中南民族大学 Verification method, device, user equipment and storage medium based on dynamic subgraph

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923701A (en) * 2010-07-19 2010-12-22 西安建筑科技大学 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
EP2330529A2 (en) * 2009-08-19 2011-06-08 Deutsche Telekom AG CAPTCHAs based on visual illusions
CN103400107A (en) * 2013-07-05 2013-11-20 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7929805B2 (en) * 2006-01-31 2011-04-19 The Penn State Research Foundation Image-based CAPTCHA generation system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2330529A2 (en) * 2009-08-19 2011-06-08 Deutsche Telekom AG CAPTCHAs based on visual illusions
CN101923701A (en) * 2010-07-19 2010-12-22 西安建筑科技大学 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
CN103400107A (en) * 2013-07-05 2013-11-20 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device

Also Published As

Publication number Publication date
CN103853968A (en) 2014-06-11

Similar Documents

Publication Publication Date Title
CN107154924B (en) Verification processing method and device based on verification code
US20090232351A1 (en) Authentication method, authentication device, and recording medium
US10037461B2 (en) Biometric authentication, and near-eye wearable device
US10395022B2 (en) Access control for a resource
CN107451643B (en) Generation, recognition methods and the device of dynamic two-dimension code
CN104091140B (en) A kind of information processing method and electronic equipment
CN106200960A (en) The content display method of electronic interactive product and device
CN103761460A (en) Method for authenticating users of display equipment
CN105354481B (en) Network verification method and network authentication server
CN104298912A (en) Methods and devices of implementing and generating crack-resistant identifying code
CN103853968B (en) Method and device for generating verification code picture and verification method and device thereof
CN105701391B (en) Dynamic verification code Picture Generation Method and device
AU2020267220A1 (en) Methods and apparatuses for identity authentication
WO2015184944A1 (en) Biometric authentication, and near-eye wearable device
CN107851141A (en) For the method and system for the access for providing the user device
KR101234249B1 (en) Method for operating database for CAPTCHA test on image basis, method, system for CAPTCHA using the same and program recording medium for the same
CN109388933A (en) Verification method, device, user equipment and storage medium based on dynamic subgraph
CN107994994A (en) Image authentication code verification method, system, server and terminal
CN108200043B (en) Picture verification code verification method and picture verification code verification device
JP5784813B1 (en) Bar code display device, operation method and program of bar code display device
CN109801076A (en) Handwriting authentication method, equipment and storage medium based on self-aided terminal
CN105335773B (en) QR code encoding methods and device
JP6493974B2 (en) Bar code display device, bar code server device, bar code reading device, operation method thereof, and program
KR101261717B1 (en) Face-picture based CAPTCHA method, device and recording medium for program
CN117392246A (en) Picture verification code cracking prevention processing method, verification method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant