CN107994994A - Image authentication code verification method, system, server and terminal - Google Patents
Image authentication code verification method, system, server and terminal Download PDFInfo
- Publication number
- CN107994994A CN107994994A CN201711187860.0A CN201711187860A CN107994994A CN 107994994 A CN107994994 A CN 107994994A CN 201711187860 A CN201711187860 A CN 201711187860A CN 107994994 A CN107994994 A CN 107994994A
- Authority
- CN
- China
- Prior art keywords
- image
- authentication code
- code
- identifying code
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention proposes a kind of image authentication code verification method, and image authentication code verification method includes:Receive the upload image sent by terminal;Handled using emulation technology uploading image, to generate image authentication code, image authentication storehouse is generated according to image authentication code;Receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code matches consistent with image authentication code, is verified, otherwise, authentication failed.By this programme, user can select uploading pictures to generate identifying code according to the wish of oneself, it is achieved thereby that the personalized customization of identifying code.On the premise of ensureing to verify safety, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
Description
Technical field
The present invention relates to verification field, in particular to a kind of image authentication code verification method, device, a kind of service
Device and a kind of terminal.
Background technology
The appearance of identifying code is to be used to prevent machine automatic identification, and violence uses a kind of technological means of system, to current
Untill, the skill level of the identifying code full maturity for security standpoint, however as the raising of security, effective
While preventing machine recognition, also become difficult as using identification of the user that identifying code is verified for identifying code, go out
Now repeatedly attempt just be proved to be successful, largely have impact on the ease of use of user, the main original of the above situation occur
Because be checking information that system provides not known to user, user cannot provide correct judgement for strange information.
Therefore, a kind of people-oriented, one kind safety for being formed from the wish of user, easy-to-use verification method are designed
As urgent problem to be solved.
The content of the invention
It is contemplated that at least solve one of technical problem present in the prior art or correlation technique.
For this reason, first aspect present invention is, it is proposed that a kind of image authentication code verification method, for server.
The second aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, for server.
The third aspect of the present invention is, it is proposed that a kind of server.
The fourth aspect of the present invention is, it is proposed that a kind of image authentication code verification method, for terminal.
The fifth aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, for terminal.
The sixth aspect of the present invention is, it is proposed that a kind of terminal.
In view of this, first aspect present invention is, it is proposed that a kind of image authentication code verification method, for server,
Described image verification code verification method includes:Receive the upload image sent by terminal;Using emulation technology to upload image into
Row processing, to generate image authentication code, image authentication storehouse is generated according to image authentication code;Receive the login authentication sent by terminal
Code is simultaneously matched with image authentication code, when login authentication code matches consistent with image authentication code, is verified, otherwise, is tested
Card failure.
In the technical scheme, image is uploaded or local image is uploaded directly into server, server root by taking pictures
According to the image received, by specifying emulation technology to be emulated, identifying code is acquired, when logging in, by the login of selection
Identifying code is matched with the identifying code of the emulation generation in server, only in the case where matching unanimous circumstances, is proved to be successful simultaneously
Log in, relative to technical solution at this stage, in the technical scheme, user can select uploading pictures according to the wish of oneself
To generate identifying code, i.e., when making choice out logon authentication code to identifying code, correct identifying code is image known to user,
And be then unfamiliar for other users, it is achieved thereby that the personalized customization of identifying code.Therefore, verification peace is being ensured
On the premise of complete, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
In addition, above-mentioned image authentication code verification method also has following additional technical feature according to the present invention:
In the above-mentioned technical solutions, it is preferable that receive the upload image sent by terminal and specifically include:Receive encryption storage
Upload image in terminal browser sessionStorage;Persistence is carried out to uploading image.
In the technical scheme, the upload image being stored encrypted in terminal browser sessionStorage is received, and
Persistence is carried out to uploading image, so that the storage of the personal settings of user is carried out, when user logs in next time, service
Device no longer needs to obtain the image that terminal uploads, and the image call that directly can be uploaded first time is simultaneously emulated, and is avoided
Malice uploads image to update the image of generation identifying code in user setting, so as to cause user to lose.SessionStorage,
That is session storage object, window data is preserved for browser temporarily.Server obtains the image of designated position, effectively avoids disliking
Meaning application replaces the image so that more newly-generated identifying code by distorting information using other images.User is according to the selection of oneself
Identifying code is configured, under the premise of verification safely is ensured, personalized customization checking information is realized, since checking information is complete
Select to set by user oneself entirely, therefore also improve the accuracy rate of verification.
In the above-mentioned technical solutions, it is preferable that handled using emulation technology uploading image, to generate image authentication
Code, generates image authentication storehouse according to image authentication code and specifically includes:Using BufferedImage emulation image technologies to upper blit
As being emulated, image authentication code is generated, and image authentication storehouse is generated according to image authentication code;Send image authentication code and
Identifying code is disturbed to terminal, so that terminal makes a choice and sends login authentication code.
In the technical scheme, emulated using BufferedImage emulation image technologies to uploading image, so that will
Uploading pictures are handled, and obtain image authentication storehouse, and BufferedImage is the image buffer storage that picture is loaded into memory
Area, modifies the image operation, such as using buffer area:Size conversion, picture are graying, set picture transparent or opaque
Deng;For contrasting with the mode of existing identifying code generation, identifying code that existing scheme obtains is to be entirely by giving birth at random from the background
Into, user is also to be unfamiliar with completely for identifying code, and generation identifying code has certain create-rule in existing scheme,
The identifying code of generation can not be controlled by user, and situation cannot be identified by user easily occur, and in the present solution, user can root
According to the original image of itself wish selection identifying code generation, also it is easy to be distinguished hence for the identifying code user of generation,
In addition the image authentication storehouse generated by using BufferedImage emulation image technologies can effectively ensure that image authentication code not
, so that on the basis of ensureing to verify safety, personalized customization checking information can be realized because being revealed there are create-rule,
Since checking information selects setting by user oneself completely, the accuracy rate of verification is also improved.
In the above-mentioned technical solutions, it is preferable that before sending image authentication code and interference identifying code to terminal, also wrap
Include:Image authentication code and interference identifying code are encrypted using RSA Algorithm.
In the technical scheme, due to easily occurring exchanging data appearance when carrying out information communication between terminal and server
The situation of leakage, is encrypted exchange data using RSA Algorithm the safety that can effectively ensure that data, even if there is data quilt
Malicious application is stolen, can not direct or encrypted content, so as to ensure that security of the identifying code in data transmission procedure,
So as to support this verification method on security standpoint, it is achieved thereby that personalized customization checking information, RSA Algorithm, i.e. RSA
Algorithm, is based on two prime numbers multiplications by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand and holds
Easily calculate, but a kind of factorization algorithm that extremely difficult principle proposes is carried out for result of product;Since verification is believed
Breath is selected to set by user oneself completely, therefore also improves the accuracy rate of verification.
In the above-mentioned technical solutions, it is preferable that upload image and include human face's information.
In the technical scheme, the original image that user is used using personal face-image as emulation, due to everyone
Having differences property of facial characteristics, that is to say, that facial information is different, and facial characteristics has the characteristics of not reproducible, this
Outside, oneself known appearance feature of user, the identifying code generated according to the image comprising oneself facial characteristics, user can easily into
The correct selection of row, not only has the characteristics that highly safe, the characteristics of resolution is high is also equipped with, so as to evade identifying code selection mistake
Situation.
The second aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, including:Receiving unit, is used for
Receive the upload image sent by terminal;Processing unit, for being handled using emulation technology uploading image, to generate figure
As identifying code, image authentication storehouse is generated according to image authentication code;Matching unit, for receiving the login authentication code sent by terminal
And matched with image authentication code, when login authentication code matches consistent with image authentication code, it is verified, otherwise, verification
Failure.
In the technical scheme, receiving unit uploads image or local image is uploaded directly into server by taking pictures,
Server specifies emulation technology to be emulated, acquires identifying code, Yong Hu according to the image received by processing unit
During login, matching unit is matched the login authentication code of selection with the identifying code that the emulation in server generates, and is only existed
Match under unanimous circumstances, be proved to be successful and log in, relative to technical solution at this stage, in the technical scheme, Yong Huke
To select uploading pictures to generate identifying code according to the wish of oneself, i.e., identifying code is being made choice so as to logon authentication code
When, correct identifying code is image known to user, and is then unfamiliar for other users, it is achieved thereby that verification
The personalized customization of code.Therefore, on the premise of ensureing to verify safety, improve user and select accuracy rate so that verification logs in
More it is applicable in.
In the above-mentioned technical solutions, it is preferable that receiving unit specifically includes:Receiving subelement, for receiving encryption storage
Upload image in terminal browser sessionStorage;Storage unit, for carrying out persistence to uploading image.
In the technical scheme, the upload image being stored encrypted in terminal browser sessionStorage is received, is deposited
Storage unit carries out persistence to uploading image, so that the storage of the personal settings of user is carried out, when user logs in next time
To wait, server no longer needs to obtain the image that terminal uploads, and the image call that directly can be uploaded first time is simultaneously emulated,
The identifying code that malice uploads image update user setting is it also avoid at the same time, so as to cause the appearance of user's damaed cordition.
SessionStorage, i.e. session storage object, window data is preserved for browser temporarily.Server obtains designated position
Image, effectively avoids malicious application by distorting information using other images instead of so as to update identifying code, causing above-mentioned danger
Situation.User is configured identifying code according to the selection of oneself, under the premise of verification safely is ensured, realizes personalized customization
Checking information, since checking information selects setting by user oneself completely, also improves the accuracy rate of verification.
In the above-mentioned technical solutions, it is preferable that processing unit specifically includes:Simulation unit, for using
BufferedImage emulation image technologies are emulated to uploading image, generate image authentication code;And according to image authentication code
Generate image authentication storehouse;Transmitting element, for sending image authentication code and interference identifying code to terminal, so that terminal makes choosing
Select and send login authentication code.
In the technical scheme, emulated using BufferedImage emulation image technologies to uploading image, so that will
Uploading pictures are handled, and obtain image authentication storehouse, and BufferedImage is the image buffer storage that picture is loaded into memory
Area, modifies the image operation, such as using buffer area:Size conversion, picture are graying, set picture transparent or opaque
Deng;For contrasting with the mode of existing identifying code generation, identifying code that existing scheme obtains is to be entirely by giving birth at random from the background
Into, user is also to be unfamiliar with completely for identifying code, and generation identifying code has certain create-rule in existing scheme,
The identifying code of generation can not be controlled by user, and situation cannot be identified by user easily occur, and in the present solution, user can root
According to the original image of itself wish selection identifying code generation, also it is easy to be distinguished hence for the identifying code user of generation,
In addition the image authentication storehouse generated by using BufferedImage emulation image technologies can effectively ensure that image authentication code not
, so that on the basis of ensureing to verify safety, personalized customization checking information can be realized because being revealed there are create-rule,
Since checking information selects setting by user oneself completely, the accuracy rate of verification is also improved.
In the above-mentioned technical solutions, it is preferable that further include:Encryption unit, is tested for sending image authentication code and interference
Before demonstrate,proving code to terminal, image authentication code and interference identifying code are encrypted using RSA Algorithm.
In the technical scheme, due to easily occurring exchanging data appearance when carrying out information communication between terminal and server
The situation of leakage, is encrypted exchange data using RSA Algorithm the safety that can effectively ensure that data, even if there is data quilt
Malicious application is stolen, can not direct or encrypted content, so as to ensure that security of the identifying code in data transmission procedure,
So as to support this verification method on security standpoint, it is achieved thereby that personalized customization checking information, RSA Algorithm, i.e. RSA
Algorithm, is based on two prime numbers multiplications by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand and holds
Easily calculate, but a kind of factorization algorithm that extremely difficult principle proposes is carried out for result of product;Since verification is believed
Breath is selected to set by user oneself completely, therefore also improves the accuracy rate of verification.
The third aspect of the present invention is, it is proposed that a kind of server, including any of the above-described described image identifying code are tested
Card device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
The fourth aspect of the present invention is, it is proposed that a kind of image authentication code verification method, for terminal.
Described image verification code verification method specifically includes:Obtain and upload image;Using RSA cryptographic algorithms to uploading image
It is encrypted, and encrypted upload image is stored to the sessionStorage of browser;Send and upload image, so that
Server is matched to uploading image.
In the technical scheme, sessionStorage in browser, i.e. session storage object, are protected temporarily for browser
Window data is deposited, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image,
It can guarantee that being normally carried out for storage, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs
And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but factorization is carried out but extremely for result of product
A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, will upload image
It is stored in browser sessionStorage, when carrying out login authentication, uploads the image for being stored in sessionStorage,
So that server to upload image match, when both match it is consistent when, the verification of next step could be carried out.Server obtains
Designated position image is matched, and is verified whether end message is included in server database according to matching result, is worked as matching
When consistent, server just can send checking information to terminal.With this, ensure the security of the transmission of Sign-On authentication information, avoid
The appearance of checking information situation can all be sent when receiving any request by server occur, also, user can be by using
The renewal and replacement of checking information are realized in image change in browser sessionStorage, so as to be carried out to identifying code a
Propertyization is set.
In addition, above-mentioned image authentication code verification method also has following additional technical feature according to the present invention:
In the above-mentioned technical solutions, it is preferable that send after uploading image, further include:Receive the figure sent by server
As identifying code and interference identifying code;Image authentication code and interference identifying code are made choice, obtain login authentication code;Use
Login authentication code is encrypted in RSA Algorithm, and by encrypted login authentication code to server, so that server carries out
Match somebody with somebody.
In the technical scheme, terminal is used multiple during login authentication code is sent to server using RSA Algorithm
Login authentication code is encrypted in miscellaneous logical calculated so that and login authentication code is guaranteed safely in transmitting procedure, in addition,
The correct decryption of login authentication code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating terminal and carries out identifying code
Verification.
The fifth aspect of the present invention is, it is proposed that a kind of image authentication code verifies device, for terminal, including:Obtain
Unit, image is uploaded for obtaining;First storage unit, for being encrypted using RSA cryptographic algorithms to uploading image, and
Encrypted upload image is stored to the sessionStorage of browser;First transmitting element, image is uploaded for sending,
So that server is matched to uploading image.
In the technical scheme, sessionStorage in browser, i.e. session storage object, are protected temporarily for browser
Window data is deposited, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image,
It can guarantee that being normally carried out for storage, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs
And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but factorization is carried out but extremely for result of product
A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, acquiring unit obtain
Upload image is taken, the first storage unit is stored in image is uploaded in browser sessionStorage, and is carrying out login authentication
When, the image for being stored in sessionStorage is uploaded, so that server is matched to uploading image, when both match unanimously
When, the verification of next step could be carried out.Server obtains designated position image and is matched, and terminal letter is verified according to matching result
Whether breath is included in server database, and when matching consistent, server just can send checking information to terminal.With this, protect
The security of the transmission of Sign-On authentication information is demonstrate,proved, checking information can all be sent when receiving any request by avoiding the occurrence of server
The appearance of situation, also, user can realize checking information by using the image change in browser sessionStorage
Renewal and replacement so as to identifying code carry out personal settings.
In the above-mentioned technical solutions, it is preferable that further include:First receiving unit, for receiving the figure sent by server
As identifying code and interference identifying code;Selecting unit, for being made choice to image authentication code and interference identifying code, is stepped on
Record identifying code;Second transmitting element, is tested for login authentication code to be encrypted using RSA Algorithm, and by encrypted login
Code is demonstrate,proved to server, so that server is matched.
In the technical scheme, terminal is used multiple during login authentication code is sent to server using RSA Algorithm
Login authentication code is encrypted in miscellaneous logical calculated so that and login authentication code is guaranteed safely in transmitting procedure, in addition,
The correct decryption of login authentication code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating terminal and carries out identifying code
Verification.
The sixth aspect of the present invention is, it is proposed that a kind of terminal, including the verification of any of the above-described described image identifying code
Device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
The additional aspect and advantage of the present invention will become obvious in following description section, or the practice by the present invention
Recognize.
Brief description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become in the description from combination accompanying drawings below to embodiment
Substantially and it is readily appreciated that, wherein:
Fig. 1 shows the flow diagram of the image authentication code verification method of one embodiment of the present of invention;
Fig. 2 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Fig. 3 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Fig. 4 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Fig. 5 shows the schematic block diagram of the image authentication code verification device 500 of an alternative embodiment of the invention;
Fig. 6 shows the schematic block diagram of the image authentication code verification device 600 of an alternative embodiment of the invention;
Fig. 7 shows the schematic block diagram of the image authentication code verification device 700 of an alternative embodiment of the invention;
Fig. 8 shows the schematic block diagram of the image authentication code verification device 800 of an alternative embodiment of the invention;
Fig. 9 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Figure 10 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention;
Figure 11 shows the schematic block diagram of the image authentication code verification device 1100 of an alternative embodiment of the invention;
Figure 12 shows the schematic block diagram of the image authentication code verification device 1200 of an alternative embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that aforementioned aspect of the present invention, feature and advantage
Mode is applied the present invention is further described in detail.It should be noted that in the case where there is no conflict, the implementation of the application
Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be implemented using other different from other modes described here, therefore, protection scope of the present invention is not limited to following public affairs
The limitation for the specific embodiment opened.
The embodiment of first aspect present invention, it is proposed that a kind of image authentication code verification method, Fig. 1 show the present invention's
The flow diagram of the image authentication code verification method of one embodiment, including:
Step 102, the upload image sent by terminal is received;
Step 104, handled using emulation technology uploading image, to generate image authentication code, according to image authentication
Code generation image authentication storehouse;
Step 106, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code
When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, upload image or local image is uploaded directly into server by taking pictures, server according to
The image received, by specifying emulation technology to be emulated, acquires identifying code, and when logging in, the login of selection is tested
Card code is matched with the identifying code of the emulation generation in server, only in the case where matching unanimous circumstances, is proved to be successful and is stepped on
Record, relative to technical solution at this stage, in the technical scheme, user can be selected according to the wish of oneself uploading pictures come
Generate identifying code, i.e., when making choice out logon authentication code to identifying code, correct identifying code is image known to user, and
It is then unfamiliar for other users, it is achieved thereby that the personalized customization of identifying code.Such as:User selects one certainly
Image known to oneself, and in this, as the image of image simulation, the image that the image by emulating generation is selected with user has
Certain similitude, it can very easily be distinguished by user from other identifying codes, so as to fulfill the correct of identifying code
Matching.Also, on the premise of ensureing to verify safety, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
Fig. 2 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Wherein, should
Image authentication code verification method includes:
Step 202, the upload image being stored encrypted in terminal browser sessionStorage is received;
Step 204, persistence is carried out to uploading image;
Step 206, handled using emulation technology uploading image, to generate image authentication code, according to image authentication
Code generation image authentication storehouse;
Step 208, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code
When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, the upload image being stored encrypted in terminal browser sessionStorage is received, and it is right
Upload image and carry out persistence, so that the storage of the personal settings of user is carried out, when user logs in next time, server
No longer need to obtain the image that terminal uploads, the image call that directly can be uploaded first time is simultaneously emulated, while is also kept away
The identifying code that malice uploads image update user setting is exempted from, so as to cause the appearance of user's damaed cordition.
SessionStorage, i.e. session storage object, window data is preserved for browser temporarily.Such as:Uploaded for the first time in user
After image, server can store the image, and when user carries out register, server will not be again to terminal request figure
As being emulated and being generated identifying code, figure that only user's request is modified Shi Caihui and is uploaded to user for uploading image
As making requests on, in this process, non-essential request between server and terminal is reduced, improves the speed of service.In addition,
Server obtains the image of designated position, effectively avoids malicious application from being replaced by distorting information using other images so as to update
Identifying code.User is configured identifying code according to the selection of oneself, and under the premise of verification safely is ensured, it is personalized fixed to realize
Checking information processed, since checking information selects setting by user oneself completely, also improves the accuracy rate of verification.
Fig. 3 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Wherein, should
Image authentication code verification method includes:
Step 302, the upload image being stored encrypted in terminal browser sessionStorage is received;
Step 304, persistence is carried out to uploading image;
Step 306, emulated using BufferedImage emulation image technologies to uploading image, generate image authentication
Code, and image authentication storehouse is generated according to image authentication code;
Step 308, image authentication code and interference identifying code are sent to terminal, so that terminal makes a choice and sends login
Identifying code;
Step 310, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code
When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, emulated using BufferedImage emulation image technologies to uploading image, so that will be upper
Blit piece is handled, and obtains image authentication storehouse, and BufferedImage is the image buffer storage area that picture is loaded into memory,
Modified using buffer area to the image operation, such as:Size conversion, picture are graying, set picture transparent or opaque etc.;With
For the mode of existing identifying code generation contrasts, identifying code that existing scheme obtains be entirely by generating at random from the background,
User is also to be unfamiliar with completely for identifying code, and generation identifying code has certain create-rule in existing scheme, generates
Identifying code can not be controlled by user, situation cannot be identified by user easily occur, and in the present solution, user can according to from
The uploading pictures of body wish selection identifying code generation, are also easy to be distinguished hence for the identifying code user of generation, such as:
User takes pictures to decorating and being laid out in the family of oneself, and using this photo as image is uploaded, according to testing for emulation generation
Code is demonstrate,proved to be familiar with decoration and layout in own home with the feature in user family, user, easily can test it from interference
Chosen in card code, so as to complete correctly to verify.In addition by using the generation of BufferedImage emulation image technologies
Image authentication storehouse can effectively ensure that image authentication code will not be revealed because of there are create-rule, so as to ensure verification safety
On the basis of, personalized customization checking information is realized, since checking information selects setting by user oneself completely, is also carried
The high accuracy rate of verification.
Fig. 4 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Wherein, should
Image authentication code verification method includes:
Step 402, the upload image being stored encrypted in terminal browser sessionStorage is received;
Step 404, persistence is carried out to uploading image;
Step 406, emulated using BufferedImage emulation image technologies to uploading image, generate image authentication
Code, and image authentication storehouse is generated according to image authentication code;
Step 408, image authentication code and interference identifying code are encrypted using RSA Algorithm;
Step 410, image authentication code and interference identifying code are sent to terminal, so that terminal makes a choice and sends login
Identifying code;
Step 412, receive the login authentication code sent by terminal and matched with image authentication code, when login authentication code
When matching consistent with image authentication code, it is verified, otherwise, authentication failed.
In this embodiment, let out due to easily occurring exchanging data when carrying out information communication between terminal and server
The situation of leakage, is encrypted exchange data using RSA Algorithm the safety that can effectively ensure that data, is disliked even if there are data
Meaning application is stolen, can not direct or encrypted content, so as to ensure that security of the identifying code in data transmission procedure, from
And this verification method is supported on security standpoint, it is achieved thereby that personalized customization checking information, RSA Algorithm, i.e. RSA
Algorithm, is based on two prime numbers multiplications by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand and holds
Easily calculate, but a kind of factorization algorithm that extremely difficult principle proposes is carried out for result of product;Since verification is believed
Breath is selected to set by user oneself completely, therefore also improves the accuracy rate of verification.
In the image authentication code verification method of an alternative embodiment of the invention, upload image and include human face's information.
In this embodiment, the original image that user is used using personal face-image as emulation, due to everyone face
Having differences property of portion's feature, that is to say, that facial information is different, and facial characteristics has the characteristics of not reproducible, in addition,
Oneself known appearance feature of user, the identifying code generated according to the image comprising oneself facial characteristics, user can carry out easily
Correct selection, not only has the characteristics that highly safe, the characteristics of resolution is high is also equipped with, so as to evade identifying code selection mistake
Situation.
The second aspect of the present invention is, it is proposed that a kind of image authentication code verifies device 500, as shown in figure 5, including:
Receiving unit 502, for receiving the upload image sent by terminal;Processing unit 504, for using emulation technology to upper blit
As being handled, to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit 506, for receiving
By terminal send login authentication code and matched with image authentication code, when login authentication code matches unanimously with image authentication code
When, it is verified, otherwise, authentication failed.
In this embodiment, receiving unit 502 uploads image or local image is uploaded directly into server by taking pictures,
Server specifies emulation technology to be emulated, acquires identifying code, use according to the image received by processing unit 504
When logging in, matching unit 506 is matched the login authentication code of selection with the identifying code that the emulation in server generates at family,
Only in the case where matching unanimous circumstances, it is proved to be successful and logs in, relative to technical solution at this stage, in the technical scheme,
For the upload image of generated code to be specified according to the selection of user oneself, that is to say, that made choice to identifying code
During so as to logon authentication code, correct identifying code is image known to user, and for other users be then it is unfamiliar,
It is achieved thereby that the personalized customization of identifying code.Such as:User selects oneself known image, and is imitated in this, as image
Genuine image, the image that the image by emulating generation is selected with user have certain similitude, and user can be very easily
It is distinguished from other identifying codes, so as to fulfill the correct matching of identifying code.Also, in the premise for ensureing verification safety
Under, improve user and select accuracy rate so that verification, which logs in, to be more applicable in.
Fig. 6 shows the schematic block diagram of the image authentication code verification device 600 of an alternative embodiment of the invention.Such as Fig. 6
Shown, image authentication code verification device 600 includes:Receiving unit 602, processing unit 604, matching unit 606.Receiving unit
602 specifically include:Receiving subelement 608 and storage unit 610.
Wherein receiving unit 602 is used to receive the upload image sent by terminal;Processing unit 604, for using emulation
Technology is handled uploading image, and to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit
606, for receiving the login authentication code sent by terminal and being matched with image authentication code, when login authentication code is tested with image
When card code matching is consistent, it is verified, otherwise, authentication failed;Receiving subelement 608, end is stored encrypted in specifically for receiving
Hold the upload image in browser sessionStorage;Storage unit 610, for carrying out persistence to uploading image.
In this embodiment, receiving subelement 608 is received and is stored encrypted in terminal browser sessionStorage
Upload image, storage unit 610 carries out persistence to uploading image, so as to carry out the storage of the personal settings of user, with
When login next time of family, server no longer needs to obtain the image that terminal uploads, the image that directly can be uploaded first time
Call and emulated, while it also avoid the identifying code that malice uploads image update user setting, so as to cause user to lose
The appearance of situation.SessionStorage, i.e. session storage object, window data is preserved for browser temporarily.Such as:In user
For the first time upload image after, server can store the image, user carry out register when, server will not again to
Terminal request image is emulated and is generated identifying code, only user request for upload image be modified Shi Caihui to
The image that family uploads makes requests on, and in this process, reduces non-essential request between server and terminal, improves operation
Speed.In addition, server obtains the image of designated position, malicious application is effectively avoided to use other image generations by distorting information
For so as to update identifying code.User is configured identifying code according to the selection of oneself, under the premise of verification safely is ensured, realizes
Personalized customization checking information, since checking information completely is selected to set by user oneself, also improves the standard of verification
True rate.
Fig. 7 shows the schematic block diagram of the image authentication code verification device 700 of an alternative embodiment of the invention.Such as Fig. 7
Shown, image authentication code verification device 700 includes:Receiving unit 702, processing unit 704, matching unit 706, receiving subelement
708th, storage unit 710, processing unit 704 specifically include:Simulation unit 712 and transmitting element 714.
Wherein receiving unit 702 is used to receive the upload image sent by terminal;Processing unit 704, for using emulation
Technology is handled uploading image, and to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit
706, for receiving the login authentication code sent by terminal and being matched with image authentication code, when login authentication code is tested with image
When card code matching is consistent, it is verified, otherwise, authentication failed;Receiving subelement 708, it is clear to be stored encrypted in terminal for reception
The upload image look in device sessionStorage;Storage unit 710, for carrying out persistence to uploading image;Simulation unit
712, specifically for being emulated using BufferedImage emulation image technologies to uploading image, image authentication code is generated, with
And image authentication storehouse is generated according to image authentication code;Transmitting element 714, for sending image authentication code and interference identifying code extremely
Terminal, so that terminal makes a choice and sends login authentication code.
In this embodiment, simulation unit 712 is imitated uploading image using BufferedImage emulation image technologies
Very, so that uploading pictures be handled, and image authentication storehouse is obtained, BufferedImage is that picture is loaded into memory
Image buffer storage area, modifies the image operation, such as using buffer area:Size conversion, picture be graying, set picture transparent or
It is opaque etc.;For contrasting with the mode of existing identifying code generation, identifying code that existing scheme obtains is to be entirely by backstage
Generate at random, user is also to be unfamiliar with completely for identifying code, and it is to have certain generation that identifying code is generated in existing scheme
Rule, the identifying code of generation can not be controlled by user, and situation cannot be identified by user easily occur, and in the present solution, with
Family can according to itself wish select identifying code generate uploading pictures, hence for generation identifying code user be also easy into
Row discrimination, such as:User in the family of oneself decorate and be laid out take pictures, and using this photo as upload image, according to
The identifying code of emulation generation has the feature in user family, and user is familiar with decoration and layout in own home, can be easily
It is chosen from interference identifying code, so as to complete correctly to verify.In addition by using BufferedImage analogous diagrams
As technology generate image authentication storehouse can effectively ensure that image authentication code will not be revealed because of create-rule, so as to ensure
On the basis of verifying safety, personalized customization checking information is realized, since checking information selects setting by user oneself completely,
Therefore the accuracy rate of verification is also improved.
Fig. 8 shows the schematic block diagram of the image authentication code verification device 800 of an alternative embodiment of the invention.Such as Fig. 8
Shown, image authentication code verification device 800 includes:Receiving unit 802, processing unit 804, matching unit 806, receiving subelement
808th, storage unit 810, simulation unit 812, transmitting element 814 and encryption unit 816.
Wherein receiving unit 802 is used to receive the upload image sent by terminal;Processing unit 804, for using emulation
Technology is handled uploading image, and to generate image authentication code, image authentication storehouse is generated according to image authentication code;Matching unit
806, for receiving the login authentication code sent by terminal and being matched with image authentication code, when login authentication code is tested with image
When card code matching is consistent, it is verified, otherwise, authentication failed;Receiving subelement 808, it is clear to be stored encrypted in terminal for reception
The upload image look in device sessionStorage;Storage unit 810, for carrying out persistence to uploading image;Simulation unit
812, for being emulated using BufferedImage emulation image technologies to uploading image, generate image authentication code, Yi Jigen
According to image authentication code generation image authentication storehouse;Transmitting element 814, for sending image authentication code and interference identifying code to end
End, so that terminal makes a choice and sends login authentication code;Encryption unit 816, is tested for sending image authentication code and interference
Before demonstrate,proving code to terminal, image authentication code and interference identifying code are encrypted using RSA Algorithm.
In this embodiment, let out due to easily occurring exchanging data when carrying out information communication between terminal and server
Exchange data are encrypted using RSA Algorithm the safety that can effectively ensure that data in the situation of leakage, encryption unit 816, even if
There are data to be stolen by malicious application, can not direct or encrypted content, so as to ensure that identifying code in data transfer mistake
The security of journey, so as to support this verification method on security standpoint, it is achieved thereby that personalized customization checking information, RSA is calculated
Method, i.e. RSA algorithm, two are based on by Peter Lonard Lee Vista, A Di Shamirs and Leonard's Armand
Prime number, which is multiplied, easily to be calculated, but carries out a kind of factorization algorithm that extremely difficult principle proposes for result of product;
Since checking information selects setting by user oneself completely, the accuracy rate of verification is also improved.
The embodiment of third aspect present invention, it is proposed that a kind of server 900, including any of the above-described image authentication code are tested
Card device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
The embodiment of fourth aspect present invention, proposes a kind of image authentication code verification method, for terminal.As shown in figure 9,
Including:
Step 902, obtain and upload image;
Step 904, it is encrypted using RSA cryptographic algorithms to uploading image, and encrypted upload image is stored
To the sessionStorage of browser;
Step 906, send and upload image, so that server is matched to uploading image.
In this embodiment, sessionStorage in browser, i.e. session storage object, preserve temporarily for browser
Window data, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image, ability
Ensure storage be normally carried out, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs with
And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but it is but extremely tired to carry out factorization for result of product
A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, will upload image and deposits
Storage is in browser sessionStorage, when carrying out login authentication, uploads the image for being stored in sessionStorage, with
Make server to upload image match, when both match it is consistent when, the verification of next step could be carried out.Server, which obtains, to be referred to
Determine location drawing picture to be matched, verify whether end message is included in server database according to matching result, when matching one
During cause, server just can send checking information to terminal.With this, ensure the security of the transmission of Sign-On authentication information, avoid out
Existing server can all send the appearance of checking information situation when receiving any request, also, user can be by using clear
The renewal and replacement of checking information are realized in the image change look in device sessionStorage, so as to carry out individual character to identifying code
Change and set.
In addition, above-mentioned image authentication code verification method also has following additional technical feature according to the present invention:
Figure 10 shows the flow diagram of the image authentication code verification method of an alternative embodiment of the invention.Such as Figure 10
Shown, which includes:
Step 1002, obtain and upload image;
Step 1004, it is encrypted using RSA cryptographic algorithms to uploading image, and encrypted upload image is stored
To the sessionStorage of browser;
Step 1006, send and upload image, so that server is matched to uploading image;
Step 1008, the image authentication code sent by server and interference identifying code are received;
Step 1010, image authentication code and interference identifying code are made choice, obtains login authentication code;
Step 1012, login authentication code is encrypted using RSA Algorithm, and encrypted login authentication code is extremely serviced
Device, so that server is matched.
In this embodiment, terminal is used complicated during login authentication code is sent to server using RSA Algorithm
Logical calculated login authentication code is encrypted so that login authentication code is guaranteed safely in transmitting procedure, in addition, stepping on
The correct decryption of record identifying code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating terminal and carries out identifying code
Verification.
The embodiment of fifth aspect present invention, proposes a kind of image authentication code verification device, for terminal.
As shown in figure 11, image authentication code verification device 1100 includes:Acquiring unit 1102, image is uploaded for obtaining;
First storage unit 1104, for being encrypted using RSA cryptographic algorithms to uploading image, and by encrypted upload image
Store to the sessionStorage of browser;First transmitting element 1106, for sending the upload image, so that server
Matched to uploading image.
In this embodiment, sessionStorage in browser, i.e. session storage object, preserve temporarily for browser
Window data, directly can not store uploading pictures, it is necessary to be encrypted by using RSA cryptographic algorithms to uploading image, ability
Ensure storage be normally carried out, RSA Algorithm, i.e. RSA algorithm, by Peter Lonard Lee Vista, A Di Shamirs with
And Leonard's Armand is based on two prime numbers multiplications and easily calculates, but it is but extremely tired to carry out factorization for result of product
A kind of algorithm that difficult principle proposes.In addition, the encrypted security for uploading image and also can guarantee that data, acquiring unit 1102
Obtain and upload image, the first storage unit 1104 is stored in image is uploaded in browser sessionStorage, and is being stepped on
During record verification, upload and be stored in the image of sessionStorage so that server is matched to uploading image, when both
With it is consistent when, the verification of next step could be carried out.Server obtains designated position image and is matched, and is verified according to matching result
Whether end message is included in server database, and when matching consistent, server just can send checking information to terminal.With
This, ensures the security of the transmission of Sign-On authentication information, avoids the occurrence of server and can all be sent when receiving any request and is tested
The appearance of information state is demonstrate,proved, also, user can be tested by using the image change realization in browser sessionStorage
The renewal and replacement of information are demonstrate,proved, so as to carry out personal settings to identifying code.
Figure 12 shows the schematic block diagram of the image authentication code verification device of an alternative embodiment of the invention.Such as Figure 12 institutes
Show, image authentication code verification device 1200 includes:Acquiring unit 1202, the first storage unit 1204, the first transmitting element 1206,
First receiving unit 1208, selecting unit 1210, the second transmitting element 1212.
Wherein the first receiving unit 1208, for receiving the image authentication code sent by server and interference identifying code;
Selecting unit 1210, for being made choice to image authentication code and interference identifying code, obtains login authentication code;Second sends list
Member 1212, for login authentication code to be encrypted using RSA Algorithm, and by encrypted login authentication code to server, with
Matched server.
In this embodiment, terminal second transmitting element 1212 during login authentication code is sent to server uses
RSA Algorithm is encrypted login authentication code using complicated logical calculated so that login authentication code safety in transmitting procedure
It is guaranteed, in addition, the correct decryption of login authentication code also can guarantee that the accurate of terminal determines, avoids other-end malice from imitating
Terminal carries out the verification of identifying code.
The embodiment of sixth aspect present invention, it is proposed that a kind of terminal 1300, including any of the above-described image authentication code are tested
Card device, and with the beneficial effect of any of the above-described described image identifying code verification device, details are not described herein.
In the description of this specification, the description of term " one embodiment ", " some embodiments ", " specific embodiment " etc.
Mean to combine at least one reality that the particular features, structures, materials, or characteristics that the embodiment or example describe are contained in the present invention
Apply in example or example.In the present specification, schematic expression of the above terms is not necessarily referring to identical embodiment or reality
Example.Moreover, description particular features, structures, materials, or characteristics can in any one or more embodiments or example with
Suitable mode combines.
It these are only the preferred embodiment of the present invention, be not intended to limit the invention, for those skilled in the art
For member, the invention may be variously modified and varied.Any modification within the spirit and principles of the invention, being made,
Equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.
Claims (15)
- A kind of 1. image authentication code verification method, for server, it is characterised in that:Receive the upload image sent by terminal;The upload image is handled using emulation technology, to generate image authentication code, is given birth to according to described image identifying code Into image authentication storehouse;Receive the login authentication code sent by the terminal and matched with described image identifying code, when the login authentication code When matching consistent with described image identifying code, it is verified, otherwise, authentication failed.
- 2. image authentication code verification method according to claim 1, for server, it is characterised in that the reception is by end The upload image that end is sent specifically includes:Receive the upload image being stored encrypted in terminal browser sessionStorage;Persistence is carried out to the upload image.
- 3. image authentication code verification method according to claim 1 or claim 2, it is characterised in thatIt is described that the upload image is handled using emulation technology, to generate image authentication code, verified according to described image Code generation image authentication storehouse specifically includes:The upload image is emulated using BufferedImage emulation image technologies, generates described image identifying code, with AndImage authentication storehouse is generated according to described image identifying code;Described image identifying code and interference identifying code are sent to the terminal, so that the terminal makes a choice and sends described Login authentication code.
- 4. image authentication code verification method according to claim 3, it is characterised in thatBefore sending described image identifying code and interference identifying code to the terminal, further include:Using RSA Algorithm to the figure As identifying code and the interference identifying code are encrypted.
- 5. code verification method is verified according to any one of claims 1 to 4 described image, it is characterised in thatThe upload image includes human face's information.
- 6. a kind of image authentication code verifies device, it is characterised in thatReceiving unit, for receiving the upload image sent by terminal;Processing unit, for being handled using emulation technology the upload image, to generate image authentication code, according to described Image authentication code generation image authentication storehouse;Matching unit, for receiving the login authentication code sent by the terminal and being matched with described image identifying code, when When the login authentication code matches consistent with described image identifying code, it is verified, otherwise, authentication failed.
- 7. image authentication code verification device according to claim 6, it is characterised in that the receiving unit specifically includes:Receiving subelement, for receiving the upload image being stored encrypted in terminal browser sessionStorage;Storage unit, for carrying out persistence to the upload image.
- 8. device is verified according to 6 or 7 described image identifying code of claim, it is characterised in that the processing unit specifically includes:Simulation unit, for being emulated using BufferedImage emulation image technologies to the upload image, described in generation Image authentication code, andImage authentication storehouse is generated according to described image identifying code;Transmitting element, for sending described image identifying code and interference identifying code to the terminal, so that the terminal is made Select and send the login authentication code.
- 9. image authentication code verification device according to claim 8, it is characterised in that further include:Encryption unit, for before described image identifying code and interference identifying code to the terminal is sent, using RSA Algorithm Described image identifying code and the interference identifying code are encrypted.
- A kind of 10. server, it is characterised in that including:The image authentication code verification dress as any one of claim 6 to 9 Put.
- A kind of 11. image authentication code verification method, for terminal, it is characterised in thatObtain and upload image;The upload image is encrypted using RSA cryptographic algorithms, andThe encrypted upload image is stored to the sessionStorage of browser;The upload image is sent, so that server matches the upload image.
- 12. code verification method is verified according to claim 11 described image, it is characterised in thatAfter sending the upload image, further include:Receive the image authentication code sent by the server and interference identifying code;Described image identifying code and interference identifying code are made choice, obtain login authentication code;The login authentication code is encrypted using RSA Algorithm, and by the encrypted login authentication code to the service Device, so that the server is matched.
- 13. a kind of image authentication code verifies device, for terminal, it is characterised in that including:Acquiring unit, image is uploaded for obtaining;First storage unit, for the upload image to be encrypted using RSA cryptographic algorithms, andThe encrypted upload image is stored to the sessionStorage of browser;First transmitting element, for sending the upload image, so that server matches the upload image.
- 14. device is verified according to claim 13 described image identifying code, it is characterised in thatFurther include:First receiving unit, for receiving the image authentication code sent by the server and interference identifying code;Selecting unit, for being made choice to described image identifying code and interference identifying code, obtains login authentication code;Second transmitting element, for the login authentication code to be encrypted using RSA Algorithm, and by the encrypted login Identifying code is to the server, so that the server is matched.
- A kind of 15. terminal, it is characterised in that including:As 13 or 14 described image identifying code of claim verifies device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711187860.0A CN107994994A (en) | 2017-11-24 | 2017-11-24 | Image authentication code verification method, system, server and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711187860.0A CN107994994A (en) | 2017-11-24 | 2017-11-24 | Image authentication code verification method, system, server and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107994994A true CN107994994A (en) | 2018-05-04 |
Family
ID=62031855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711187860.0A Pending CN107994994A (en) | 2017-11-24 | 2017-11-24 | Image authentication code verification method, system, server and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107994994A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110798435A (en) * | 2018-08-03 | 2020-02-14 | 广州小鹏汽车科技有限公司 | Verification code verification method and device |
CN112311806A (en) * | 2020-11-08 | 2021-02-02 | 杭州有数金融信息服务有限公司 | Method for generating geographic information authentication verification code |
CN112671738A (en) * | 2020-12-16 | 2021-04-16 | 平安普惠企业管理有限公司 | Login method, device, terminal and storage medium of enterprise internal system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970307A (en) * | 2012-12-21 | 2013-03-13 | 网秦无限(北京)科技有限公司 | Password safety system and password safety method |
CN103595744A (en) * | 2012-08-16 | 2014-02-19 | 腾讯科技(深圳)有限公司 | Information management method and client |
CN105141430A (en) * | 2015-09-22 | 2015-12-09 | 中国科学院信息工程研究所 | Identity authentication system based on portrait and intelligent server and authentication method |
CN106453209A (en) * | 2015-08-07 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Identity verifying method and apparatus |
CN106909684A (en) * | 2017-03-06 | 2017-06-30 | 青岛鹏海软件有限公司 | Panoramic picture is retrieved and methods of exhibiting |
CN107220000A (en) * | 2017-04-19 | 2017-09-29 | 深圳中兴网信科技有限公司 | Picture compression method and picture compression device |
-
2017
- 2017-11-24 CN CN201711187860.0A patent/CN107994994A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103595744A (en) * | 2012-08-16 | 2014-02-19 | 腾讯科技(深圳)有限公司 | Information management method and client |
CN102970307A (en) * | 2012-12-21 | 2013-03-13 | 网秦无限(北京)科技有限公司 | Password safety system and password safety method |
CN106453209A (en) * | 2015-08-07 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Identity verifying method and apparatus |
CN105141430A (en) * | 2015-09-22 | 2015-12-09 | 中国科学院信息工程研究所 | Identity authentication system based on portrait and intelligent server and authentication method |
CN106909684A (en) * | 2017-03-06 | 2017-06-30 | 青岛鹏海软件有限公司 | Panoramic picture is retrieved and methods of exhibiting |
CN107220000A (en) * | 2017-04-19 | 2017-09-29 | 深圳中兴网信科技有限公司 | Picture compression method and picture compression device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110798435A (en) * | 2018-08-03 | 2020-02-14 | 广州小鹏汽车科技有限公司 | Verification code verification method and device |
CN110798435B (en) * | 2018-08-03 | 2021-12-07 | 广州小鹏汽车科技有限公司 | Verification code verification method and device |
CN112311806A (en) * | 2020-11-08 | 2021-02-02 | 杭州有数金融信息服务有限公司 | Method for generating geographic information authentication verification code |
CN112311806B (en) * | 2020-11-08 | 2022-09-20 | 浙江有数数智科技有限公司 | Method for generating geographic information authentication verification code |
CN112671738A (en) * | 2020-12-16 | 2021-04-16 | 平安普惠企业管理有限公司 | Login method, device, terminal and storage medium of enterprise internal system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105516104B (en) | A kind of auth method and system of the dynamic password based on TEE | |
US20190260748A1 (en) | Securing a transaction performed from a non-secure terminal | |
US20160034682A1 (en) | Visual image authentication | |
CN106612180A (en) | Method and device for realizing session identifier synchronization | |
CN107294900A (en) | Identity registration method and apparatus based on biological characteristic | |
CN107294721A (en) | The method and apparatus of identity registration, certification based on biological characteristic | |
SG189122A1 (en) | System, method and program for off-line two- factor user authentication | |
US20090199272A1 (en) | Authentication using a turing test to block automated attacks | |
CN108229956A (en) | Network bank business method, apparatus, system and mobile terminal | |
SG189120A1 (en) | System and method for two-factor user authentication | |
EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
US11693944B2 (en) | Visual image authentication | |
CN110380864A (en) | Method, equipment and the system of human face data acquisition, verifying | |
CN106326763A (en) | Method and device for obtaining electronic file | |
US11128453B2 (en) | Visual image authentication | |
CN107994994A (en) | Image authentication code verification method, system, server and terminal | |
JP2007511841A (en) | Transaction authorization | |
CN108073820A (en) | Security processing, device and the mobile terminal of data | |
CN108989038A (en) | It is a kind of for the identification equipment of geographic position authentication, system and method | |
CN107483456A (en) | Identity identifying method and device | |
CN108234125A (en) | For the system and method for authentication | |
EP3681098A1 (en) | Authentication system with reduced attack surface | |
CN108322907B (en) | Card opening method and terminal | |
CN109086624A (en) | login method and device | |
KR20180116628A (en) | User access authentication system based on personal image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |