CN107994994A - Image authentication code verification method, system, server and terminal - Google Patents

Image authentication code verification method, system, server and terminal Download PDF

Info

Publication number
CN107994994A
CN107994994A CN201711187860.0A CN201711187860A CN107994994A CN 107994994 A CN107994994 A CN 107994994A CN 201711187860 A CN201711187860 A CN 201711187860A CN 107994994 A CN107994994 A CN 107994994A
Authority
CN
China
Prior art keywords
image
authentication code
code
identifying code
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711187860.0A
Other languages
Chinese (zh)
Inventor
陈友雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE ICT Technologies Co Ltd
Original Assignee
ZTE ICT Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE ICT Technologies Co Ltd filed Critical ZTE ICT Technologies Co Ltd
Priority to CN201711187860.0A priority Critical patent/CN107994994A/en
Publication of CN107994994A publication Critical patent/CN107994994A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention proposes a kind of image authentication code verification method, and image authentication code verification method includes:Receive the upload image sent by terminal;Handled using emulation technology uploading image, to generate image authentication code, image authentication storehouse is generated according to image authentication code;Receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code matches consistent with image authentication code, is verified, otherwise, authentication failed.By this programme, user can select uploading pictures to generate identifying code according to the wish of oneself, it is achieved thereby that the personalized customization of identifying code.On the premise of ensureing to verify safety, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.

Description

Image authentication code verification method, system, server and terminal
Technical field
The present invention relates to verification field, in particular to a kind of image authentication code verification method, device, a kind of service Device and a kind of terminal.
Background technology
The appearance of identifying code is to be used to prevent machine automatic identification, and violence uses a kind of technological means of system, to current Untill, the skill level of the identifying code full maturity for security standpoint, however as the raising of security, effective While preventing machine recognition, also become difficult as using identification of the user that identifying code is verified for identifying code, go out Now repeatedly attempt just be proved to be successful, largely have impact on the ease of use of user, the main original of the above situation occur Because be checking information that system provides not known to user, user cannot provide correct judgement for strange information.
Therefore, a kind of people-oriented, one kind safety for being formed from the wish of user, easy-to-use verification method are designed As urgent problem to be solved.
The content of the invention
It is contemplated that at least solve one of technical problem present in the prior art or correlation technique.
For this reason, first aspect present invention is, it is proposed that a kind of image authentication code verification method, for server.
The second aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, for server.
The third aspect of the present invention is, it is proposed that a kind of server.
The fourth aspect of the present invention is, it is proposed that a kind of image authentication code verification method, for terminal.
The fifth aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, for terminal.
The sixth aspect of the present invention is, it is proposed that a kind of terminal.
In view of this, first aspect present invention is, it is proposed that a kind of image authentication code verification method, for server, Described image verification code verification method includes:Receive the upload image sent by terminal;Using emulation technology to upload image into Row processing, to generate image authentication code, image authentication storehouse is generated according to image authentication code;Receive the login authentication sent by terminal Code is simultaneously matched with image authentication code, when login authentication code matches consistent with image authentication code, is verified, otherwise, is tested Card failure.
In the technical scheme, image is uploaded or local image is uploaded directly into server, server root by taking pictures According to the image received, by specifying emulation technology to be emulated, identifying code is acquired, when logging in, by the login of selection Identifying code is matched with the identifying code of the emulation generation in server, only in the case where matching unanimous circumstances, is proved to be successful simultaneously Log in, relative to technical solution at this stage, in the technical scheme, user can select uploading pictures according to the wish of oneself To generate identifying code, i.e., when making choice out logon authentication code to identifying code, correct identifying code is image known to user, And be then unfamiliar for other users, it is achieved thereby that the personalized customization of identifying code.Therefore, verification peace is being ensured On the premise of complete, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
In addition, above-mentioned image authentication code verification method also has following additional technical feature according to the present invention:
In the above-mentioned technical solutions, it is preferable that receive the upload image sent by terminal and specifically include:Receive encryption storage Upload image in terminal browser sessionStorage;Persistence is carried out to uploading image.
In the technical scheme, the upload image being stored encrypted in terminal browser sessionStorage is received, and Persistence is carried out to uploading image, so that the storage of the personal settings of user is carried out, when user logs in next time, service Device no longer needs to obtain the image that terminal uploads, and the image call that directly can be uploaded first time is simultaneously emulated, and is avoided Malice uploads image to update the image of generation identifying code in user setting, so as to cause user to lose.SessionStorage, That is session storage object, window data is preserved for browser temporarily.Server obtains the image of designated position, effectively avoids disliking Meaning application replaces the image so that more newly-generated identifying code by distorting information using other images.User is according to the selection of oneself Identifying code is configured, under the premise of verification safely is ensured, personalized customization checking information is realized, since checking information is complete Select to set by user oneself entirely, therefore also improve the accuracy rate of verification.
In the above-mentioned technical solutions, it is preferable that handled using emulation technology uploading image, to generate image authentication Code, generates image authentication storehouse according to image authentication code and specifically includes:Using BufferedImage emulation image technologies to upper blit As being emulated, image authentication code is generated, and image authentication storehouse is generated according to image authentication code;Send image authentication code and Identifying code is disturbed to terminal, so that terminal makes a choice and sends login authentication code.
In the technical scheme, emulated using BufferedImage emulation image technologies to uploading image, so that will Uploading pictures are handled, and obtain image authentication storehouse, and BufferedImage is the image buffer storage that picture is loaded into memory Area, modifies the image operation, such as using buffer area:Size conversion, picture are graying, set picture transparent or opaque Deng;For contrasting with the mode of existing identifying code generation, identifying code that existing scheme obtains is to be entirely by giving birth at random from the background Into, user is also to be unfamiliar with completely for identifying code, and generation identifying code has certain create-rule in existing scheme, The identifying code of generation can not be controlled by user, and situation cannot be identified by user easily occur, and in the present solution, user can root According to the original image of itself wish selection identifying code generation, also it is easy to be distinguished hence for the identifying code user of generation, In addition the image authentication storehouse generated by using BufferedImage emulation image technologies can effectively ensure that image authentication code not , so that on the basis of ensureing to verify safety, personalized customization checking information can be realized because being revealed there are create-rule, Since checking information selects setting by user oneself completely, the accuracy rate of verification is also improved.
In the above-mentioned technical solutions, it is preferable that before sending image authentication code and interference identifying code to terminal, also wrap Include:Image authentication code and interference identifying code are encrypted using RSA Algorithm.
In the technical scheme, due to easily occurring exchanging data appearance when carrying out information communication between terminal and server The situation of leakage, is encrypted exchange data using RSA Algorithm the safety that can effectively ensure that data, even if there is data quilt Malicious application is stolen, can not direct or encrypted content, so as to ensure that security of the identifying code in data transmission procedure, So as to support this verification method on security standpoint, it is achieved thereby that personalized customization checking information, RSA Algorithm, i.e. RSA Algorithm, is based on two prime numbers multiplications by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand and holds Easily calculate, but a kind of factorization algorithm that extremely difficult principle proposes is carried out for result of product;Since verification is believed Breath is selected to set by user oneself completely, therefore also improves the accuracy rate of verification.
In the above-mentioned technical solutions, it is preferable that upload image and include human face's information.
In the technical scheme, the original image that user is used using personal face-image as emulation, due to everyone Having differences property of facial characteristics, that is to say, that facial information is different, and facial characteristics has the characteristics of not reproducible, this Outside, oneself known appearance feature of user, the identifying code generated according to the image comprising oneself facial characteristics, user can easily into The correct selection of row, not only has the characteristics that highly safe, the characteristics of resolution is high is also equipped with, so as to evade identifying code selection mistake Situation.
The second aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, including:Receiving unit, is used for Receive the upload image sent by terminal;Processing unit, for being handled using emulation technology uploading image, to generate figure As identifying code, image authentication storehouse is generated according to image authentication code;Matching unit, for receiving the login authentication code sent by terminal And matched with image authentication code, when login authentication code matches consistent with image authentication code, it is verified, otherwise, verification Failure.
In the technical scheme, receiving unit uploads image or local image is uploaded directly into server by taking pictures, Server specifies emulation technology to be emulated, acquires identifying code, Yong Hu according to the image received by processing unit During login, matching unit is matched the login authentication code of selection with the identifying code that the emulation in server generates, and is only existed Match under unanimous circumstances, be proved to be successful and log in, relative to technical solution at this stage, in the technical scheme, Yong Huke To select uploading pictures to generate identifying code according to the wish of oneself, i.e., identifying code is being made choice so as to logon authentication code When, correct identifying code is image known to user, and is then unfamiliar for other users, it is achieved thereby that verification The personalized customization of code.Therefore, on the premise of ensureing to verify safety, improve user and select accuracy rate so that verification logs in More it is applicable in.
In the above-mentioned technical solutions, it is preferable that receiving unit specifically includes:Receiving subelement, for receiving encryption storage Upload image in terminal browser sessionStorage;Storage unit, for carrying out persistence to uploading image.
In the technical scheme, the upload image being stored encrypted in terminal browser sessionStorage is received, is deposited Storage unit carries out persistence to uploading image, so that the storage of the personal settings of user is carried out, when user logs in next time To wait, server no longer needs to obtain the image that terminal uploads, and the image call that directly can be uploaded first time is simultaneously emulated, The identifying code that malice uploads image update user setting is it also avoid at the same time, so as to cause the appearance of user's damaed cordition. SessionStorage, i.e. session storage object, window data is preserved for browser temporarily.Server obtains designated position Image, effectively avoids malicious application by distorting information using other images instead of so as to update identifying code, causing above-mentioned danger Situation.User is configured identifying code according to the selection of oneself, under the premise of verification safely is ensured, realizes personalized customization Checking information, since checking information selects setting by user oneself completely, also improves the accuracy rate of verification.
In the above-mentioned technical solutions, it is preferable that processing unit specifically includes:Simulation unit, for using BufferedImage emulation image technologies are emulated to uploading image, generate image authentication code;And according to image authentication code Generate image authentication storehouse;Transmitting element, for sending image authentication code and interference identifying code to terminal, so that terminal makes choosing Select and send login authentication code.
In the technical scheme, emulated using BufferedImage emulation image technologies to uploading image, so that will Uploading pictures are handled, and obtain image authentication storehouse, and BufferedImage is the image buffer storage that picture is loaded into memory Area, modifies the image operation, such as using buffer area:Size conversion, picture are graying, set picture transparent or opaque Deng;For contrasting with the mode of existing identifying code generation, identifying code that existing scheme obtains is to be entirely by giving birth at random from the background Into, user is also to be unfamiliar with completely for identifying code, and generation identifying code has certain create-rule in existing scheme, The identifying code of generation can not be controlled by user, and situation cannot be identified by user easily occur, and in the present solution, user can root According to the original image of itself wish selection identifying code generation, also it is easy to be distinguished hence for the identifying code user of generation, In addition the image authentication storehouse generated by using BufferedImage emulation image technologies can effectively ensure that image authentication code not , so that on the basis of ensureing to verify safety, personalized customization checking information can be realized because being revealed there are create-rule, Since checking information selects setting by user oneself completely, the accuracy rate of verification is also improved.
In the above-mentioned technical solutions, it is preferable that further include:Encryption unit, is tested for sending image authentication code and interference Before demonstrate,proving code to terminal, image authentication code and interference identifying code are encrypted using RSA Algorithm.
In the technical scheme, due to easily occurring exchanging data appearance when carrying out information communication between terminal and server The situation of leakage, is encrypted exchange data using RSA Algorithm the safety that can effectively ensure that data, even if there is data quilt Malicious application is stolen, can not direct or encrypted content, so as to ensure that security of the identifying code in data transmission procedure, So as to support this verification method on security standpoint, it is achieved thereby that personalized customization checking information, RSA Algorithm, i.e. RSA Algorithm, is based on two prime numbers multiplications by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand and holds Easily calculate, but a kind of factorization algorithm that extremely difficult principle proposes is carried out for result of product;Since verification is believed Breath is selected to set by user oneself completely, therefore also improves the accuracy rate of verification.
The third aspect of the present invention is, it is proposed that a kind of server, including any of the above-described described image identifying code are tested Card device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
The fourth aspect of the present invention is, it is proposed that a kind of image authentication code verification method, for terminal.
Described image verification code verification method specifically includes:Obtain and upload image;Using RSA cryptographic algorithms to uploading image It is encrypted, and encrypted upload image is stored to the sessionStorage of browser;Send and upload image, so that Server is matched to uploading image.
In the technical scheme, sessionStorage in browser, i.e. session storage object, are protected temporarily for browser Window data is deposited, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image, It can guarantee that being normally carried out for storage, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but factorization is carried out but extremely for result of product A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, will upload image It is stored in browser sessionStorage, when carrying out login authentication, uploads the image for being stored in sessionStorage, So that server to upload image match, when both match it is consistent when, the verification of next step could be carried out.Server obtains Designated position image is matched, and is verified whether end message is included in server database according to matching result, is worked as matching When consistent, server just can send checking information to terminal.With this, ensure the security of the transmission of Sign-On authentication information, avoid The appearance of checking information situation can all be sent when receiving any request by server occur, also, user can be by using The renewal and replacement of checking information are realized in image change in browser sessionStorage, so as to be carried out to identifying code a Propertyization is set.
In addition, above-mentioned image authentication code verification method also has following additional technical feature according to the present invention:
In the above-mentioned technical solutions, it is preferable that send after uploading image, further include:Receive the figure sent by server As identifying code and interference identifying code;Image authentication code and interference identifying code are made choice, obtain login authentication code;Use Login authentication code is encrypted in RSA Algorithm, and by encrypted login authentication code to server, so that server carries out Match somebody with somebody.
In the technical scheme, terminal is used multiple during login authentication code is sent to server using RSA Algorithm Login authentication code is encrypted in miscellaneous logical calculated so that and login authentication code is guaranteed safely in transmitting procedure, in addition, The correct decryption of login authentication code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating terminal and carries out identifying code Verification.
The fifth aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, for terminal, including:Obtain Unit, image is uploaded for obtaining;First storage unit, for being encrypted using RSA cryptographic algorithms to uploading image, and Encrypted upload image is stored to the sessionStorage of browser;First transmitting element, image is uploaded for sending, So that server is matched to uploading image.
In the technical scheme, sessionStorage in browser, i.e. session storage object, are protected temporarily for browser Window data is deposited, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image, It can guarantee that being normally carried out for storage, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but factorization is carried out but extremely for result of product A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, acquiring unit obtain Upload image is taken, the first storage unit is stored in image is uploaded in browser sessionStorage, and is carrying out login authentication When, the image for being stored in sessionStorage is uploaded, so that server is matched to uploading image, when both match unanimously When, the verification of next step could be carried out.Server obtains designated position image and is matched, and terminal letter is verified according to matching result Whether breath is included in server database, and when matching consistent, server just can send checking information to terminal.With this, protect The security of the transmission of Sign-On authentication information is demonstrate,proved, checking information can all be sent when receiving any request by avoiding the occurrence of server The appearance of situation, also, user can realize checking information by using the image change in browser sessionStorage Renewal and replacement so as to identifying code carry out personal settings.
In the above-mentioned technical solutions, it is preferable that further include:First receiving unit, for receiving the figure sent by server As identifying code and interference identifying code;Selecting unit, for being made choice to image authentication code and interference identifying code, is stepped on Record identifying code;Second transmitting element, is tested for login authentication code to be encrypted using RSA Algorithm, and by encrypted login Code is demonstrate,proved to server, so that server is matched.
In the technical scheme, terminal is used multiple during login authentication code is sent to server using RSA Algorithm Login authentication code is encrypted in miscellaneous logical calculated so that and login authentication code is guaranteed safely in transmitting procedure, in addition, The correct decryption of login authentication code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating terminal and carries out identifying code Verification.
The sixth aspect of the present invention is, it is proposed that a kind of terminal, including the verification of any of the above-described described image identifying code Device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
The additional aspect and advantage of the present invention will become obvious in following description section, or the practice by the present invention Recognize.
Brief description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become in the description from combination accompanying drawings below to embodiment Substantially and it is readily appreciated that, wherein:
Fig. 1 shows the flow diagram of the image authentication code verification method of one embodiment of the present of invention;
Fig. 2 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Fig. 3 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Fig. 4 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Fig. 5 shows the schematic block diagram of the image authentication code verification device 500 of an alternative embodiment of the invention;
Fig. 6 shows the schematic block diagram of the image authentication code verification device 600 of an alternative embodiment of the invention;
Fig. 7 shows the schematic block diagram of the image authentication code verification device 700 of an alternative embodiment of the invention;
Fig. 8 shows the schematic block diagram of the image authentication code verification device 800 of an alternative embodiment of the invention;
Fig. 9 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Figure 10 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Figure 11 shows the schematic block diagram of the image authentication code verification device 1100 of an alternative embodiment of the invention;
Figure 12 shows the schematic block diagram of the image authentication code verification device 1200 of an alternative embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that aforementioned aspect of the present invention, feature and advantage Mode is applied the present invention is further described in detail.It should be noted that in the case where there is no conflict, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented using other different from other modes described here, therefore, protection scope of the present invention is not limited to following public affairs The limitation for the specific embodiment opened.
The embodiment of first aspect present invention, it is proposed that a kind of image authentication code verification method, Fig. 1 show the present invention's The flow diagram of the image authentication code verification method of one embodiment, including:
Step 102, the upload image sent by terminal is received;
Step 104, handled using emulation technology uploading image, to generate image authentication code, according to image authentication Code generation image authentication storehouse;
Step 106, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, upload image or local image is uploaded directly into server by taking pictures, server according to The image received, by specifying emulation technology to be emulated, acquires identifying code, and when logging in, the login of selection is tested Card code is matched with the identifying code of the emulation generation in server, only in the case where matching unanimous circumstances, is proved to be successful and is stepped on Record, relative to technical solution at this stage, in the technical scheme, user can be selected according to the wish of oneself uploading pictures come Generate identifying code, i.e., when making choice out logon authentication code to identifying code, correct identifying code is image known to user, and It is then unfamiliar for other users, it is achieved thereby that the personalized customization of identifying code.Such as:User selects one certainly Image known to oneself, and in this, as the image of image simulation, the image that the image by emulating generation is selected with user has Certain similitude, it can very easily be distinguished by user from other identifying codes, so as to fulfill the correct of identifying code Matching.Also, on the premise of ensureing to verify safety, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
Fig. 2 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Wherein, should Image authentication code verification method includes:
Step 202, the upload image being stored encrypted in terminal browser sessionStorage is received;
Step 204, persistence is carried out to uploading image;
Step 206, handled using emulation technology uploading image, to generate image authentication code, according to image authentication Code generation image authentication storehouse;
Step 208, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, the upload image being stored encrypted in terminal browser sessionStorage is received, and it is right Upload image and carry out persistence, so that the storage of the personal settings of user is carried out, when user logs in next time, server No longer need to obtain the image that terminal uploads, the image call that directly can be uploaded first time is simultaneously emulated, while is also kept away The identifying code that malice uploads image update user setting is exempted from, so as to cause the appearance of user's damaed cordition. SessionStorage, i.e. session storage object, window data is preserved for browser temporarily.Such as:Uploaded for the first time in user After image, server can store the image, and when user carries out register, server will not be again to terminal request figure As being emulated and being generated identifying code, figure that only user's request is modified Shi Caihui and is uploaded to user for uploading image As making requests on, in this process, non-essential request between server and terminal is reduced, improves the speed of service.In addition, Server obtains the image of designated position, effectively avoids malicious application from being replaced by distorting information using other images so as to update Identifying code.User is configured identifying code according to the selection of oneself, and under the premise of verification safely is ensured, it is personalized fixed to realize Checking information processed, since checking information selects setting by user oneself completely, also improves the accuracy rate of verification.
Fig. 3 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Wherein, should Image authentication code verification method includes:
Step 302, the upload image being stored encrypted in terminal browser sessionStorage is received;
Step 304, persistence is carried out to uploading image;
Step 306, emulated using BufferedImage emulation image technologies to uploading image, generate image authentication Code, and image authentication storehouse is generated according to image authentication code;
Step 308, image authentication code and interference identifying code are sent to terminal, so that terminal makes a choice and sends login Identifying code;
Step 310, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, emulated using BufferedImage emulation image technologies to uploading image, so that will be upper Blit piece is handled, and obtains image authentication storehouse, and BufferedImage is the image buffer storage area that picture is loaded into memory, Modified using buffer area to the image operation, such as:Size conversion, picture are graying, set picture transparent or opaque etc.;With For the mode of existing identifying code generation contrasts, identifying code that existing scheme obtains be entirely by generating at random from the background, User is also to be unfamiliar with completely for identifying code, and generation identifying code has certain create-rule in existing scheme, generates Identifying code can not be controlled by user, situation cannot be identified by user easily occur, and in the present solution, user can according to from The uploading pictures of body wish selection identifying code generation, are also easy to be distinguished hence for the identifying code user of generation, such as: User takes pictures to decorating and being laid out in the family of oneself, and using this photo as image is uploaded, according to testing for emulation generation Code is demonstrate,proved to be familiar with decoration and layout in own home with the feature in user family, user, easily can test it from interference Chosen in card code, so as to complete correctly to verify.In addition by using the generation of BufferedImage emulation image technologies Image authentication storehouse can effectively ensure that image authentication code will not be revealed because of there are create-rule, so as to ensure verification safety On the basis of, personalized customization checking information is realized, since checking information selects setting by user oneself completely, is also carried The high accuracy rate of verification.
Fig. 4 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Wherein, should Image authentication code verification method includes:
Step 402, the upload image being stored encrypted in terminal browser sessionStorage is received;
Step 404, persistence is carried out to uploading image;
Step 406, emulated using BufferedImage emulation image technologies to uploading image, generate image authentication Code, and image authentication storehouse is generated according to image authentication code;
Step 408, image authentication code and interference identifying code are encrypted using RSA Algorithm;
Step 410, image authentication code and interference identifying code are sent to terminal, so that terminal makes a choice and sends login Identifying code;
Step 412, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, let out due to easily occurring exchanging data when carrying out information communication between terminal and server The situation of leakage, is encrypted exchange data using RSA Algorithm the safety that can effectively ensure that data, is disliked even if there are data Meaning application is stolen, can not direct or encrypted content, so as to ensure that security of the identifying code in data transmission procedure, from And this verification method is supported on security standpoint, it is achieved thereby that personalized customization checking information, RSA Algorithm, i.e. RSA Algorithm, is based on two prime numbers multiplications by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand and holds Easily calculate, but a kind of factorization algorithm that extremely difficult principle proposes is carried out for result of product;Since verification is believed Breath is selected to set by user oneself completely, therefore also improves the accuracy rate of verification.
In the image authentication code verification method of an alternative embodiment of the invention, upload image and include human face's information.
In this embodiment, the original image that user is used using personal face-image as emulation, due to everyone face Having differences property of portion's feature, that is to say, that facial information is different, and facial characteristics has the characteristics of not reproducible, in addition, Oneself known appearance feature of user, the identifying code generated according to the image comprising oneself facial characteristics, user can carry out easily Correct selection, not only has the characteristics that highly safe, the characteristics of resolution is high is also equipped with, so as to evade identifying code selection mistake Situation.
The second aspect of the present invention is, it is proposed that a kind of image authentication code verifies device 500, as shown in figure 5, including: Receiving unit 502, for receiving the upload image sent by terminal;Processing unit 504, for using emulation technology to upper blit As being handled, to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit 506, for receiving By terminal send login authentication code and matched with image authentication code, when login authentication code matches unanimously with image authentication code When, it is verified, otherwise, authentication failed.
In this embodiment, receiving unit 502 uploads image or local image is uploaded directly into server by taking pictures, Server specifies emulation technology to be emulated, acquires identifying code, use according to the image received by processing unit 504 When logging in, matching unit 506 is matched the login authentication code of selection with the identifying code that the emulation in server generates at family, Only in the case where matching unanimous circumstances, it is proved to be successful and logs in, relative to technical solution at this stage, in the technical scheme, For the upload image of generated code to be specified according to the selection of user oneself, that is to say, that made choice to identifying code During so as to logon authentication code, correct identifying code is image known to user, and for other users be then it is unfamiliar, It is achieved thereby that the personalized customization of identifying code.Such as:User selects oneself known image, and is imitated in this, as image Genuine image, the image that the image by emulating generation is selected with user have certain similitude, and user can be very easily It is distinguished from other identifying codes, so as to fulfill the correct matching of identifying code.Also, in the premise for ensureing verification safety Under, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
Fig. 6 shows the schematic block diagram of the image authentication code verification device 600 of an alternative embodiment of the invention.Such as Fig. 6 Shown, image authentication code verification device 600 includes:Receiving unit 602, processing unit 604, matching unit 606.Receiving unit 602 specifically include:Receiving subelement 608 and storage unit 610.
Wherein receiving unit 602 is used to receive the upload image sent by terminal;Processing unit 604, for using emulation Technology is handled uploading image, and to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit 606, for receiving the login authentication code sent by terminal and being matched with image authentication code, when login authentication code is tested with image When card code matching is consistent, it is verified, otherwise, authentication failed;Receiving subelement 608, end is stored encrypted in specifically for receiving Hold the upload image in browser sessionStorage;Storage unit 610, for carrying out persistence to uploading image.
In this embodiment, receiving subelement 608 is received and is stored encrypted in terminal browser sessionStorage Upload image, storage unit 610 carries out persistence to uploading image, so as to carry out the storage of the personal settings of user, with When login next time of family, server no longer needs to obtain the image that terminal uploads, the image that directly can be uploaded first time Call and emulated, while it also avoid the identifying code that malice uploads image update user setting, so as to cause user to lose The appearance of situation.SessionStorage, i.e. session storage object, window data is preserved for browser temporarily.Such as:In user For the first time upload image after, server can store the image, user carry out register when, server will not again to Terminal request image is emulated and is generated identifying code, only user request for upload image be modified Shi Caihui to The image that family uploads makes requests on, and in this process, reduces non-essential request between server and terminal, improves operation Speed.In addition, server obtains the image of designated position, malicious application is effectively avoided to use other image generations by distorting information For so as to update identifying code.User is configured identifying code according to the selection of oneself, under the premise of verification safely is ensured, realizes Personalized customization checking information, since checking information completely is selected to set by user oneself, also improves the standard of verification True rate.
Fig. 7 shows the schematic block diagram of the image authentication code verification device 700 of an alternative embodiment of the invention.Such as Fig. 7 Shown, image authentication code verification device 700 includes:Receiving unit 702, processing unit 704, matching unit 706, receiving subelement 708th, storage unit 710, processing unit 704 specifically include:Simulation unit 712 and transmitting element 714.
Wherein receiving unit 702 is used to receive the upload image sent by terminal;Processing unit 704, for using emulation Technology is handled uploading image, and to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit 706, for receiving the login authentication code sent by terminal and being matched with image authentication code, when login authentication code is tested with image When card code matching is consistent, it is verified, otherwise, authentication failed;Receiving subelement 708, it is clear to be stored encrypted in terminal for reception The upload image look in device sessionStorage;Storage unit 710, for carrying out persistence to uploading image;Simulation unit 712, specifically for being emulated using BufferedImage emulation image technologies to uploading image, image authentication code is generated, with And image authentication storehouse is generated according to image authentication code;Transmitting element 714, for sending image authentication code and interference identifying code extremely Terminal, so that terminal makes a choice and sends login authentication code.
In this embodiment, simulation unit 712 is imitated uploading image using BufferedImage emulation image technologies Very, so that uploading pictures be handled, and image authentication storehouse is obtained, BufferedImage is that picture is loaded into memory Image buffer storage area, modifies the image operation, such as using buffer area:Size conversion, picture be graying, set picture transparent or It is opaque etc.;For contrasting with the mode of existing identifying code generation, identifying code that existing scheme obtains is to be entirely by backstage Generate at random, user is also to be unfamiliar with completely for identifying code, and it is to have certain generation that identifying code is generated in existing scheme Rule, the identifying code of generation can not be controlled by user, and situation cannot be identified by user easily occur, and in the present solution, with Family can according to itself wish select identifying code generate uploading pictures, hence for generation identifying code user be also easy into Row discrimination, such as:User in the family of oneself decorate and be laid out take pictures, and using this photo as upload image, according to The identifying code of emulation generation has the feature in user family, and user is familiar with decoration and layout in own home, can be easily It is chosen from interference identifying code, so as to complete correctly to verify.In addition by using BufferedImage analogous diagrams As technology generate image authentication storehouse can effectively ensure that image authentication code will not be revealed because of create-rule, so as to ensure On the basis of verifying safety, personalized customization checking information is realized, since checking information selects setting by user oneself completely, Therefore the accuracy rate of verification is also improved.
Fig. 8 shows the schematic block diagram of the image authentication code verification device 800 of an alternative embodiment of the invention.Such as Fig. 8 Shown, image authentication code verification device 800 includes:Receiving unit 802, processing unit 804, matching unit 806, receiving subelement 808th, storage unit 810, simulation unit 812, transmitting element 814 and encryption unit 816.
Wherein receiving unit 802 is used to receive the upload image sent by terminal;Processing unit 804, for using emulation Technology is handled uploading image, and to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit 806, for receiving the login authentication code sent by terminal and being matched with image authentication code, when login authentication code is tested with image When card code matching is consistent, it is verified, otherwise, authentication failed;Receiving subelement 808, it is clear to be stored encrypted in terminal for reception The upload image look in device sessionStorage;Storage unit 810, for carrying out persistence to uploading image;Simulation unit 812, for being emulated using BufferedImage emulation image technologies to uploading image, generate image authentication code, Yi Jigen According to image authentication code generation image authentication storehouse;Transmitting element 814, for sending image authentication code and interference identifying code to end End, so that terminal makes a choice and sends login authentication code;Encryption unit 816, is tested for sending image authentication code and interference Before demonstrate,proving code to terminal, image authentication code and interference identifying code are encrypted using RSA Algorithm.
In this embodiment, let out due to easily occurring exchanging data when carrying out information communication between terminal and server Exchange data are encrypted using RSA Algorithm the safety that can effectively ensure that data in the situation of leakage, encryption unit 816, even if There are data to be stolen by malicious application, can not direct or encrypted content, so as to ensure that identifying code in data transfer mistake The security of journey, so as to support this verification method on security standpoint, it is achieved thereby that personalized customization checking information, RSA is calculated Method, i.e. RSA algorithm, two are based on by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand Prime number, which is multiplied, easily to be calculated, but carries out a kind of factorization algorithm that extremely difficult principle proposes for result of product; Since checking information selects setting by user oneself completely, the accuracy rate of verification is also improved.
The embodiment of third aspect present invention, it is proposed that a kind of server 900, including any of the above-described image authentication code are tested Card device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
The embodiment of fourth aspect present invention, proposes a kind of image authentication code verification method, for terminal.As shown in figure 9, Including:
Step 902, obtain and upload image;
Step 904, it is encrypted using RSA cryptographic algorithms to uploading image, and encrypted upload image is stored To the sessionStorage of browser;
Step 906, send and upload image, so that server is matched to uploading image.
In this embodiment, sessionStorage in browser, i.e. session storage object, preserve temporarily for browser Window data, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image, ability Ensure storage be normally carried out, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs with And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but it is but extremely tired to carry out factorization for result of product A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, will upload image and deposits Storage is in browser sessionStorage, when carrying out login authentication, uploads the image for being stored in sessionStorage, with Make server to upload image match, when both match it is consistent when, the verification of next step could be carried out.Server, which obtains, to be referred to Determine location drawing picture to be matched, verify whether end message is included in server database according to matching result, when matching one During cause, server just can send checking information to terminal.With this, ensure the security of the transmission of Sign-On authentication information, avoid out Existing server can all send the appearance of checking information situation when receiving any request, also, user can be by using clear The renewal and replacement of checking information are realized in the image change look in device sessionStorage, so as to carry out individual character to identifying code Change and set.
In addition, above-mentioned image authentication code verification method also has following additional technical feature according to the present invention:
Figure 10 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Such as Figure 10 Shown, which includes:
Step 1002, obtain and upload image;
Step 1004, it is encrypted using RSA cryptographic algorithms to uploading image, and encrypted upload image is stored To the sessionStorage of browser;
Step 1006, send and upload image, so that server is matched to uploading image;
Step 1008, the image authentication code sent by server and interference identifying code are received;
Step 1010, image authentication code and interference identifying code are made choice, obtains login authentication code;
Step 1012, login authentication code is encrypted using RSA Algorithm, and encrypted login authentication code is extremely serviced Device, so that server is matched.
In this embodiment, terminal is used complicated during login authentication code is sent to server using RSA Algorithm Logical calculated login authentication code is encrypted so that login authentication code is guaranteed safely in transmitting procedure, in addition, stepping on The correct decryption of record identifying code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating terminal and carries out identifying code Verification.
The embodiment of fifth aspect present invention, proposes a kind of image authentication code verification device, for terminal.
As shown in figure 11, image authentication code verification device 1100 includes:Acquiring unit 1102, image is uploaded for obtaining; First storage unit 1104, for being encrypted using RSA cryptographic algorithms to uploading image, and by encrypted upload image Store to the sessionStorage of browser;First transmitting element 1106, for sending the upload image, so that server Matched to uploading image.
In this embodiment, sessionStorage in browser, i.e. session storage object, preserve temporarily for browser Window data, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image, ability Ensure storage be normally carried out, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs with And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but it is but extremely tired to carry out factorization for result of product A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, acquiring unit 1102 Obtain and upload image, the first storage unit 1104 is stored in image is uploaded in browser sessionStorage, and is being stepped on During record verification, upload and be stored in the image of sessionStorage so that server is matched to uploading image, when both With it is consistent when, the verification of next step could be carried out.Server obtains designated position image and is matched, and is verified according to matching result Whether end message is included in server database, and when matching consistent, server just can send checking information to terminal.With This, ensures the security of the transmission of Sign-On authentication information, avoids the occurrence of server and can all be sent when receiving any request and is tested The appearance of information state is demonstrate,proved, also, user can be tested by using the image change realization in browser sessionStorage The renewal and replacement of information are demonstrate,proved, so as to carry out personal settings to identifying code.
Figure 12 shows the schematic block diagram of the image authentication code verification device of an alternative embodiment of the invention.Such as Figure 12 institutes Show, image authentication code verification device 1200 includes:Acquiring unit 1202, the first storage unit 1204, the first transmitting element 1206, First receiving unit 1208, selecting unit 1210, the second transmitting element 1212.
Wherein the first receiving unit 1208, for receiving the image authentication code sent by server and interference identifying code; Selecting unit 1210, for being made choice to image authentication code and interference identifying code, obtains login authentication code;Second sends list Member 1212, for login authentication code to be encrypted using RSA Algorithm, and by encrypted login authentication code to server, with Matched server.
In this embodiment, terminal second transmitting element 1212 during login authentication code is sent to server uses RSA Algorithm is encrypted login authentication code using complicated logical calculated so that login authentication code safety in transmitting procedure It is guaranteed, in addition, the correct decryption of login authentication code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating Terminal carries out the verification of identifying code.
The embodiment of sixth aspect present invention, it is proposed that a kind of terminal 1300, including any of the above-described image authentication code are tested Card device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
In the description of this specification, the description of term " one embodiment ", " some embodiments ", " specific embodiment " etc. Mean to combine at least one reality that the particular features, structures, materials, or characteristics that the embodiment or example describe are contained in the present invention Apply in example or example.In the present specification, schematic expression of the above terms is not necessarily referring to identical embodiment or reality Example.Moreover, description particular features, structures, materials, or characteristics can in any one or more embodiments or example with Suitable mode combines.
It these are only the preferred embodiment of the present invention, be not intended to limit the invention, for those skilled in the art For member, the invention may be variously modified and varied.Any modification within the spirit and principles of the invention, being made, Equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (15)

  1. A kind of 1. image authentication code verification method, for server, it is characterised in that:
    Receive the upload image sent by terminal;
    The upload image is handled using emulation technology, to generate image authentication code, is given birth to according to described image identifying code Into image authentication storehouse;
    Receive the login authentication code sent by the terminal and matched with described image identifying code, when the login authentication code When matching consistent with described image identifying code, it is verified, otherwise, authentication failed.
  2. 2. image authentication code verification method according to claim 1, for server, it is characterised in that the reception is by end The upload image that end is sent specifically includes:
    Receive the upload image being stored encrypted in terminal browser sessionStorage;
    Persistence is carried out to the upload image.
  3. 3. image authentication code verification method according to claim 1 or claim 2, it is characterised in that
    It is described that the upload image is handled using emulation technology, to generate image authentication code, verified according to described image Code generation image authentication storehouse specifically includes:
    The upload image is emulated using BufferedImage emulation image technologies, generates described image identifying code, with And
    Image authentication storehouse is generated according to described image identifying code;
    Described image identifying code and interference identifying code are sent to the terminal, so that the terminal makes a choice and sends described Login authentication code.
  4. 4. image authentication code verification method according to claim 3, it is characterised in that
    Before sending described image identifying code and interference identifying code to the terminal, further include:Using RSA Algorithm to the figure As identifying code and the interference identifying code are encrypted.
  5. 5. code verification method is verified according to any one of claims 1 to 4 described image, it is characterised in that
    The upload image includes human face's information.
  6. 6. a kind of image authentication code verifies device, it is characterised in that
    Receiving unit, for receiving the upload image sent by terminal;
    Processing unit, for being handled using emulation technology the upload image, to generate image authentication code, according to described Image authentication code generation image authentication storehouse;
    Matching unit, for receiving the login authentication code sent by the terminal and being matched with described image identifying code, when When the login authentication code matches consistent with described image identifying code, it is verified, otherwise, authentication failed.
  7. 7. image authentication code verification device according to claim 6, it is characterised in that the receiving unit specifically includes:
    Receiving subelement, for receiving the upload image being stored encrypted in terminal browser sessionStorage;
    Storage unit, for carrying out persistence to the upload image.
  8. 8. device is verified according to 6 or 7 described image identifying code of claim, it is characterised in that the processing unit specifically includes:
    Simulation unit, for being emulated using BufferedImage emulation image technologies to the upload image, described in generation Image authentication code, and
    Image authentication storehouse is generated according to described image identifying code;
    Transmitting element, for sending described image identifying code and interference identifying code to the terminal, so that the terminal is made Select and send the login authentication code.
  9. 9. image authentication code verification device according to claim 8, it is characterised in that further include:
    Encryption unit, for before described image identifying code and interference identifying code to the terminal is sent, using RSA Algorithm Described image identifying code and the interference identifying code are encrypted.
  10. A kind of 10. server, it is characterised in that including:The image authentication code verification dress as any one of claim 6 to 9 Put.
  11. A kind of 11. image authentication code verification method, for terminal, it is characterised in that
    Obtain and upload image;
    The upload image is encrypted using RSA cryptographic algorithms, and
    The encrypted upload image is stored to the sessionStorage of browser;
    The upload image is sent, so that server matches the upload image.
  12. 12. code verification method is verified according to claim 11 described image, it is characterised in that
    After sending the upload image, further include:
    Receive the image authentication code sent by the server and interference identifying code;
    Described image identifying code and interference identifying code are made choice, obtain login authentication code;
    The login authentication code is encrypted using RSA Algorithm, and by the encrypted login authentication code to the service Device, so that the server is matched.
  13. 13. a kind of image authentication code verifies device, for terminal, it is characterised in that including:
    Acquiring unit, image is uploaded for obtaining;
    First storage unit, for the upload image to be encrypted using RSA cryptographic algorithms, and
    The encrypted upload image is stored to the sessionStorage of browser;
    First transmitting element, for sending the upload image, so that server matches the upload image.
  14. 14. device is verified according to claim 13 described image identifying code, it is characterised in that
    Further include:
    First receiving unit, for receiving the image authentication code sent by the server and interference identifying code;
    Selecting unit, for being made choice to described image identifying code and interference identifying code, obtains login authentication code;
    Second transmitting element, for the login authentication code to be encrypted using RSA Algorithm, and by the encrypted login Identifying code is to the server, so that the server is matched.
  15. A kind of 15. terminal, it is characterised in that including:As 13 or 14 described image identifying code of claim verifies device.
CN201711187860.0A 2017-11-24 2017-11-24 Image authentication code verification method, system, server and terminal Pending CN107994994A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711187860.0A CN107994994A (en) 2017-11-24 2017-11-24 Image authentication code verification method, system, server and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711187860.0A CN107994994A (en) 2017-11-24 2017-11-24 Image authentication code verification method, system, server and terminal

Publications (1)

Publication Number Publication Date
CN107994994A true CN107994994A (en) 2018-05-04

Family

ID=62031855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711187860.0A Pending CN107994994A (en) 2017-11-24 2017-11-24 Image authentication code verification method, system, server and terminal

Country Status (1)

Country Link
CN (1) CN107994994A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110798435A (en) * 2018-08-03 2020-02-14 广州小鹏汽车科技有限公司 Verification code verification method and device
CN112311806A (en) * 2020-11-08 2021-02-02 杭州有数金融信息服务有限公司 Method for generating geographic information authentication verification code
CN112671738A (en) * 2020-12-16 2021-04-16 平安普惠企业管理有限公司 Login method, device, terminal and storage medium of enterprise internal system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970307A (en) * 2012-12-21 2013-03-13 网秦无限(北京)科技有限公司 Password safety system and password safety method
CN103595744A (en) * 2012-08-16 2014-02-19 腾讯科技(深圳)有限公司 Information management method and client
CN105141430A (en) * 2015-09-22 2015-12-09 中国科学院信息工程研究所 Identity authentication system based on portrait and intelligent server and authentication method
CN106453209A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verifying method and apparatus
CN106909684A (en) * 2017-03-06 2017-06-30 青岛鹏海软件有限公司 Panoramic picture is retrieved and methods of exhibiting
CN107220000A (en) * 2017-04-19 2017-09-29 深圳中兴网信科技有限公司 Picture compression method and picture compression device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595744A (en) * 2012-08-16 2014-02-19 腾讯科技(深圳)有限公司 Information management method and client
CN102970307A (en) * 2012-12-21 2013-03-13 网秦无限(北京)科技有限公司 Password safety system and password safety method
CN106453209A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verifying method and apparatus
CN105141430A (en) * 2015-09-22 2015-12-09 中国科学院信息工程研究所 Identity authentication system based on portrait and intelligent server and authentication method
CN106909684A (en) * 2017-03-06 2017-06-30 青岛鹏海软件有限公司 Panoramic picture is retrieved and methods of exhibiting
CN107220000A (en) * 2017-04-19 2017-09-29 深圳中兴网信科技有限公司 Picture compression method and picture compression device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110798435A (en) * 2018-08-03 2020-02-14 广州小鹏汽车科技有限公司 Verification code verification method and device
CN110798435B (en) * 2018-08-03 2021-12-07 广州小鹏汽车科技有限公司 Verification code verification method and device
CN112311806A (en) * 2020-11-08 2021-02-02 杭州有数金融信息服务有限公司 Method for generating geographic information authentication verification code
CN112311806B (en) * 2020-11-08 2022-09-20 浙江有数数智科技有限公司 Method for generating geographic information authentication verification code
CN112671738A (en) * 2020-12-16 2021-04-16 平安普惠企业管理有限公司 Login method, device, terminal and storage medium of enterprise internal system

Similar Documents

Publication Publication Date Title
CN105516104B (en) A kind of auth method and system of the dynamic password based on TEE
US20190260748A1 (en) Securing a transaction performed from a non-secure terminal
US20160034682A1 (en) Visual image authentication
CN106612180A (en) Method and device for realizing session identifier synchronization
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
CN107294721A (en) The method and apparatus of identity registration, certification based on biological characteristic
SG189122A1 (en) System, method and program for off-line two- factor user authentication
US20090199272A1 (en) Authentication using a turing test to block automated attacks
CN108229956A (en) Network bank business method, apparatus, system and mobile terminal
SG189120A1 (en) System and method for two-factor user authentication
EP1549011A1 (en) Communication method and system between a terminal and at least a communication device
US11693944B2 (en) Visual image authentication
CN110380864A (en) Method, equipment and the system of human face data acquisition, verifying
CN106326763A (en) Method and device for obtaining electronic file
US11128453B2 (en) Visual image authentication
CN107994994A (en) Image authentication code verification method, system, server and terminal
JP2007511841A (en) Transaction authorization
CN108073820A (en) Security processing, device and the mobile terminal of data
CN108989038A (en) It is a kind of for the identification equipment of geographic position authentication, system and method
CN107483456A (en) Identity identifying method and device
CN108234125A (en) For the system and method for authentication
EP3681098A1 (en) Authentication system with reduced attack surface
CN108322907B (en) Card opening method and terminal
CN109086624A (en) login method and device
KR20180116628A (en) User access authentication system based on personal image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504