CN110378095B - Interactive verification method, device, medium and computing equipment based on verification code - Google Patents

Interactive verification method, device, medium and computing equipment based on verification code Download PDF

Info

Publication number
CN110378095B
CN110378095B CN201910648059.4A CN201910648059A CN110378095B CN 110378095 B CN110378095 B CN 110378095B CN 201910648059 A CN201910648059 A CN 201910648059A CN 110378095 B CN110378095 B CN 110378095B
Authority
CN
China
Prior art keywords
dimensional
shape
verification
verification code
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910648059.4A
Other languages
Chinese (zh)
Other versions
CN110378095A (en
Inventor
黄霞君
张宇
徐国智
董彬
李雨珂
朱浩齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Netease Zhiqi Technology Co Ltd
Original Assignee
Hangzhou Netease Zhiqi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Netease Zhiqi Technology Co Ltd filed Critical Hangzhou Netease Zhiqi Technology Co Ltd
Priority to CN201910648059.4A priority Critical patent/CN110378095B/en
Publication of CN110378095A publication Critical patent/CN110378095A/en
Application granted granted Critical
Publication of CN110378095B publication Critical patent/CN110378095B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The embodiment of the invention provides an interactive verification method based on verification codes, which is applied to a server and comprises the following steps: responding to the verification request, and acquiring verification code parameters; generating at least one three-dimensional captcha element based on the captcha parameters and a three-dimensional model generator, wherein the three-dimensional model generator is trained based on a generative confrontation network; sending the at least one three-dimensional verification code element to a client for displaying; obtaining attribute information related to an interactive operation for the at least one three-dimensional captcha element; and determining whether the interactive operation passes the verification based on the attribute information. The embodiment of the invention also provides an interactive verification device, a medium and a computing device based on the verification code.

Description

Interactive verification method, device, medium and computing equipment based on verification code
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to an interactive verification method, an interactive verification device, an interactive verification medium and a computing device based on verification codes.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
With the continuous development of internet technology, the internet brings great convenience to various industries and users, each industry provides services to the users through the internet, and the users interact with each industry through the internet. Although most of the industries deploy security protection strategies for internet services opened to the outside at present, with the rapid development of services and products, especially the rapid increase of personal online services, information security protection of each industry faces more and more serious challenges. For example, the internet service interacts with the user by setting a login interface, and in order to prevent hackers and other lawless persons from invading the system and breaking violently, an authentication mode is added to an internet website opened to the outside to prevent an attacker from invading illegally and bringing unnecessary loss.
In the prior art, a two-dimensional image verification code is mostly adopted for verifying the authenticity of a user, for example, the user needs to input the content on the two-dimensional image verification code while logging in, if the verification code is input correctly, the current operating party is determined to be a real user, and if the verification code is input incorrectly, the current operating party is determined to be a machine. However, with the rapid development of computer vision and deep learning technology, the machine can rapidly identify the two-dimensional image verification code, which brings potential safety hazard.
Disclosure of Invention
In this context, embodiments of the present invention are intended to provide an interactive verification method and apparatus based on verification codes.
In a first aspect of the embodiments of the present invention, there is provided an interactive verification method based on verification codes, applied to a server, including: responding to the verification request, and acquiring verification code parameters; generating at least one three-dimensional captcha element based on the captcha parameters and a three-dimensional model generator, wherein the three-dimensional model generator is trained based on a generative confrontation network; sending the at least one three-dimensional verification code element to a client for displaying; obtaining attribute information related to an interactive operation for the at least one three-dimensional captcha element; and determining whether the interactive operation passes the verification based on the attribute information.
In an embodiment of the present invention, the verification code parameter includes at least one parameter information, and each parameter information includes shape coding, view coding, and texture coding. Generating at least one three-dimensional captcha element based on the captcha parameters and the three-dimensional model generator includes: inputting the shape code of one parameter information in the verification code parameters into the three-dimensional model generator to obtain a three-dimensional pixel grid model corresponding to the one parameter information; and rendering the stereoscopic pixel grid model based on the view coding and the texture coding of the parameter information to obtain a three-dimensional verification code element corresponding to the parameter information.
In another embodiment of the present invention, the method further includes: after the generating of the at least one three-dimensional captcha element, determining presentation information of the at least one three-dimensional captcha element, the presentation information including: a presentation position and a presentation time of each of the at least one three-dimensional captcha element. The sending the at least one three-dimensional verification code element to the client for displaying includes: and sending the at least one three-dimensional verification code element and the display information of the at least one three-dimensional verification code element to the client, so that the client displays the at least one three-dimensional verification code element based on the display position and the display time of each three-dimensional verification code element.
In still another embodiment of the present invention, the attribute information includes: location information of the interactive operation and time information of the interactive operation. The determining whether the interactive operation passes the verification based on the attribute information includes: and if the time information of the interactive operation is determined to be matched with the preset time interval and the position information of the interactive operation is determined to be matched with the preset position, the interactive operation is confirmed to pass the verification.
In a further embodiment of the present invention, the method further includes: a target captcha element is determined from the at least one three-dimensional captcha element. The sending the at least one three-dimensional verification code element to the client for display further includes: and sending the identifiers indicating the target verification code elements to a client side together so that the client side outputs prompt information for carrying out interactive operation on the target verification code elements. The predetermined time interval includes: the presentation time of the target captcha element. The predetermined positions include: and the display position of the target verification code element corresponding to the time information or the auxiliary operation position set aiming at the target verification code element.
In another embodiment of the present invention, the determining that the time information of the interactive operation matches the predetermined time interval includes: and determining that the time point represented by the time information of the interactive operation falls within the preset time interval.
In another embodiment of the present invention, the determining that the position information of the interactive operation matches the predetermined position includes: and calculating the Euclidean distance between the preset position and the position represented by the interactive operation position information, and when the Euclidean distance is smaller than a preset threshold value, confirming that the interactive operation position information is matched with the preset position.
In a further embodiment of the present invention, the method further includes: creating a generation countermeasure network composed of a shape generator and a shape discriminator; using shape codes of a first number of two-dimensional image samples as input of the shape generator, and using a stereoscopic pixel grid model output by the shape generator as input of the shape discriminator; optimizing parameters of the shape generator based on a discrimination result output by the shape discriminator; optimizing parameters of the shape discriminator based on a second number of real three-dimensional model samples; alternately optimizing parameters of the shape generator and the shape discriminator until an optimized shape generator and an optimized shape discriminator are obtained; and, using the optimized shape generator as the three-dimensional model generator.
In a second aspect of the embodiments of the present invention, there is provided an interactive verification apparatus based on verification codes, applied to a server, including: the device comprises a first acquisition module, a generation module, an output module, a second acquisition module and a verification module. The first obtaining module is used for responding to the verification request and obtaining the verification code parameters. The generation module is used for generating at least one three-dimensional verification code element based on the verification code parameters and a three-dimensional model generator, wherein the three-dimensional model generator is obtained based on generation of confrontation network training. And the output module is used for sending the at least one three-dimensional verification code element to a client for displaying. The second obtaining module is used for obtaining attribute information related to the interactive operation aiming at the at least one three-dimensional verification code element. The verification module is used for determining whether the interactive operation passes the verification or not based on the attribute information.
In one embodiment of the present invention, the captcha parameters include at least one parameter information, each of which includes shape coding, view coding, and texture coding. The generation module comprises: an input sub-module and a rendering sub-module. The input submodule is used for inputting the shape code of one parameter information in the verification code parameters into the three-dimensional model generator to obtain a three-dimensional pixel grid model corresponding to the one parameter information. The rendering submodule is used for rendering the three-dimensional pixel grid model based on the view coding and the texture coding of the parameter information to obtain a three-dimensional verification code element corresponding to the parameter information.
In another embodiment of the present invention, the apparatus further includes a display information determining module, configured to determine display information of at least one three-dimensional captcha element after the generating module generates the at least one three-dimensional captcha element, where the display information includes: a presentation position and a presentation time of each of the at least one three-dimensional captcha element. The output module comprises a display submodule for sending the at least one three-dimensional verification code element and display information of the at least one three-dimensional verification code element to the client, so that the client can display the at least one three-dimensional verification code element based on the display position and the display time of each three-dimensional verification code element.
In still another embodiment of the present invention, the attribute information includes: location information of the interactive operation and time information of the interactive operation. The verification module is specifically configured to confirm that the interactive operation passes verification when it is determined that the time information of the interactive operation matches a predetermined time interval and it is determined that the position information of the interactive operation matches a predetermined position.
In a further embodiment of the present invention, the apparatus further includes a target determining module, configured to determine a target captcha element from the at least one three-dimensional captcha element. The output module further comprises a target prompt submodule for sending the identifier indicating the target verification code element to a client together, so that the client outputs prompt information for performing interactive operation on the target verification code element. The predetermined time interval includes: a presentation time of the target captcha element. The predetermined locations include: and displaying the target verification code element corresponding to the time information, or setting an auxiliary operation position aiming at the target verification code element.
In a further embodiment of the present invention, the verification module is configured to determine that the time information of the interactive operation matches the predetermined time interval when the time point represented by the time information of the interactive operation falls within the predetermined time interval.
In a further embodiment of the present invention, the verification module is further configured to calculate a euclidean distance between the predetermined location and a location represented by the location information of the interactive operation, and when the euclidean distance is smaller than a predetermined threshold, confirm that the location information of the interactive operation matches the predetermined location.
In a further embodiment of the present invention, the apparatus further comprises a model training module for creating a generating confrontation network composed of a shape generator and a shape discriminator; using shape codes of a first number of two-dimensional image samples as input of the shape generator, and using a stereoscopic pixel grid model output by the shape generator as input of the shape discriminator; optimizing parameters of the shape generator based on a discrimination result output by the shape discriminator; optimizing parameters of the shape discriminator based on a second number of real three-dimensional model samples; alternately optimizing parameters of the shape generator and the shape discriminator until an optimized shape generator and an optimized shape discriminator are obtained; and, using the optimized shape generator as the three-dimensional model generator.
In a third aspect of embodiments of the present invention, there is provided a medium storing computer-executable instructions that, when executed by a processor, are operable to: the interactive verification method based on verification codes in any one of the above embodiments.
In a fourth aspect of embodiments of the present invention, there is provided a computing device comprising: a memory, a processor, and executable instructions stored on the memory and executable on the processor, the processor when executing the instructions implementing: the interactive verification method based on verification codes in any one of the above embodiments.
According to the interactive verification method and device based on the verification code, when the fact that whether an operator operating at a client side is a real user needs to be verified or not is verified, verification code parameters are obtained, and a three-dimensional model generator is obtained based on generation of confrontation network training. And generating at least one three-dimensional verification code element based on the verification code parameters and the three-dimensional model generator for displaying by the client. And when the client displays the at least one three-dimensional verification code element, guiding a current operator to execute interactive operation aiming at the at least one three-dimensional verification code element. And then, determining the identification condition of the current operator to the at least one three-dimensional verification code element according to the attribute information related to the interactive operation, and further determining whether the current operator is a real user, namely whether the current operator passes the verification. Compared with the scheme of verifying by using the two-dimensional image verification code in the prior art, the process can accurately and effectively generate the three-dimensional verification code elements which are low in identification difficulty for real users but high in identification difficulty for machines based on the verification code parameters and the three-dimensional model generator, and the safety of interactive verification based on the verification code is improved.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
fig. 1 schematically illustrates an application scenario of an interactive authentication method based on an authentication code and an apparatus thereof according to an embodiment of the present invention;
FIG. 2 schematically illustrates a flow diagram of a captcha-based interactive verification method, according to one embodiment of the invention;
FIG. 3A schematically illustrates a schematic diagram of a voxel grid model generated by a three-dimensional model generator, in accordance with one embodiment of the present invention;
FIG. 3B schematically illustrates a schematic diagram of a three-dimensional captcha element, according to one embodiment of the present invention;
3C-3E schematically illustrate a client-side rendering of three-dimensional captcha elements, according to one embodiment of the invention;
FIG. 4 schematically illustrates a block diagram of an interactive authentication apparatus based on an authentication code according to an embodiment of the present invention;
FIG. 5 schematically illustrates a block diagram of an interactive authentication apparatus based on an authentication code according to another embodiment of the present invention;
FIG. 6 schematically shows a schematic view of a computer-readable storage medium product according to an embodiment of the invention; and
FIG. 7 schematically shows a block diagram of a computing device according to an embodiment of the present invention.
In the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Detailed Description
The principles and spirit of the present invention will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the invention, and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to the embodiment of the invention, an interactive verification method, an interactive verification device, an interactive verification medium and computing equipment based on verification codes are provided.
In this context, it is to be understood that the terms referred to include: three-dimensional captcha elements, three-dimensional model generators, generate confrontation networks (GAN), and the like. Wherein the three-dimensional captcha element is an image captcha element having a three-dimensional pose. A three-dimensional model generator is a generator that is capable of encoding and mapping a shape of a two-dimensional image sample into a three-dimensional model. The generation and confrontation network is structurally inspired by two-person zero-sum games in game theory and consists of a generator and a discriminator, and the goal of learning in a game mode by the generator and the discriminator is to achieve Nash Equilibrium (Nash Equilibrium). Moreover, any number of elements in the drawings are by way of example and not by way of limitation, and any nomenclature is used solely for differentiation and not by way of limitation.
The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments of the invention.
Summary of The Invention
Aiming at the problem of low safety of the existing interactive verification based on verification codes, the embodiment of the invention provides an interactive verification method and device based on verification codes. In a first obtaining procedure, a verification code parameter is obtained in response to a verification request. And then, performing a generating process, and generating at least one three-dimensional verification code element to perform an output process based on the acquired verification code parameters and a three-dimensional model generator obtained by training a generated countermeasure network. In the output process, the at least one three-dimensional verification code element is sent to the client for displaying, and the client guides the operator to carry out interactive operation on the at least one three-dimensional verification code element, so that a second acquisition process is realized, namely attribute information related to the interactive operation on the at least one three-dimensional verification code element is acquired. And then executing a verification process based on the attribute information to determine whether the interactive operation passes the verification.
Having described the general principles of the invention, various non-limiting embodiments of the invention are described in detail below.
Application scene overview
First, referring to fig. 1, an application scenario of the interactive verification method based on verification codes and the device thereof according to the embodiment of the present invention is described in detail.
Fig. 1 schematically illustrates an application scenario of an interactive authentication method based on an authentication code and an apparatus thereof according to an embodiment of the present invention, and in the application scenario illustrated in fig. 1, terminal devices 101, 102, and 103, a network 104, and a server 105 may be included.
The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. Various client applications may be installed on the terminal devices 101, 102, 103, such as a tools-like application, a social-like application, a shopping-like application, a web browser application, a search-like application, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the interactive verification method based on verification codes provided by the embodiments of the present disclosure may be generally executed by the server 105. Accordingly, the interactive authentication device based on the authentication code provided by the embodiment of the present disclosure may be generally disposed in the server 105. The interactive authentication method based on the authentication code provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Correspondingly, the interactive verification device based on verification codes provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired.
Exemplary method
In the following, in conjunction with the application scenario of fig. 1, an interactive authentication method based on authentication codes according to an exemplary embodiment of the present invention is described with reference to fig. 2 to 3E. It should be noted that the above application scenarios are merely illustrated for the convenience of understanding the spirit and principles of the present invention, and the embodiments of the present invention are not limited in this respect. Rather, embodiments of the present invention may be applied to any scenario where applicable.
Fig. 2 schematically shows a flow chart of an interactive authentication method based on authentication codes according to an embodiment of the present invention.
As shown in fig. 2, the method is applied to a server and may include operations S201 to S205 as follows.
In operation S201, in response to the verification request, a verification code parameter is acquired.
In operation S201, the authentication request is from the client, for example, when the client responds to operations such as login, registration, and access, the client sends an authentication request to the server to verify whether the operator currently performing the operation is a real user. The server responds to the verification request, acquires verification code parameters from local or third-party equipment, wherein the verification code parameters are used for generating verification code elements so that a subsequent client can display the verification code elements, and judges whether an operator operating at the client is a machine or a real user according to the identification condition of the verification code elements.
In operation S202, at least one three-dimensional captcha element is generated based on the captcha parameters and the three-dimensional model generator.
The three-dimensional model generator is obtained based on the training of the generation countermeasure network, the generation countermeasure network is inspired by the two-person zero-sum game in the game theory structurally, and the three-dimensional model generator is composed of a generator and a discriminator. The generator captures potential distributions of real data samples and generates new data samples. The discriminator discriminates whether the input is real data or a generated data sample. The generation of the countermeasure network is learned by letting the generators and discriminators play games with the goal of achieving nash equilibrium. The three-dimensional model generator in operation S202 is obtained through the learning process. The three-dimensional identifying code element is different from the two-dimensional image identifying code in the prior art, is an image element with three-dimensional posture information, and can increase the difficulty of machine identification.
Operation S203, sending the at least one three-dimensional verification code element to the client for displaying.
In operation S204, attribute information related to the interactive operation with respect to the at least one three-dimensional captcha element is obtained.
The attribute information related to the interactive operation aiming at the at least one three-dimensional verification code element can reflect the identification condition of an operator of the interactive operation aiming at the at least one three-dimensional verification code element.
In operation S205, it is determined whether the interactive operation with respect to the at least one three-dimensional captcha element is verified based on the attribute information.
And when the attribute information related to the interactive operation indicates that the currently verified operator can identify the at least one three-dimensional verification code element, determining that the interactive operation passes the verification and confirming that the operator is a real user. Otherwise, when the attribute information related to the interactive operation indicates that the currently verified operator cannot identify the at least one three-dimensional verification code element, determining that the interactive operation is not verified, and confirming that the operator is a machine.
Those skilled in the art can understand that, when it is required to verify whether an operator operating at a client is a real user, the method shown in fig. 2 obtains a verification code parameter, and obtains a three-dimensional model generator based on the generated countermeasure network training. And generating at least one three-dimensional verification code element based on the verification code parameters and the three-dimensional model generator for displaying by the client. And when the client displays the at least one three-dimensional verification code element, guiding a current operator to execute interactive operation aiming at the at least one three-dimensional verification code element. And then, determining the identification condition of the current operator to the at least one three-dimensional verification code element according to the attribute information related to the interactive operation, and further determining whether the current operator is a real user, namely whether the current operator passes the verification. Compared with the scheme of verifying by using the two-dimensional image verification code in the prior art, the process can accurately and effectively generate the three-dimensional verification code elements which are low in identification difficulty for real users but high in identification difficulty for machines based on the verification code parameters and the three-dimensional model generator, and the safety of interactive verification based on the verification code is improved.
Illustratively, to obtain the three-dimensional captcha elements for verification as described above, a three-dimensional model generator needs to be trained in advance. In an embodiment of the present disclosure, the interactive verification method based on verification codes according to an embodiment of the present disclosure may further include: first, a generation countermeasure network composed of a shape generator and a shape discriminator is created. Wherein the shape generator is configured to generate a grid of voxels, the grid of voxels being configured to characterize a shape, and the shape discriminator is configured to discriminate whether the grid of voxels is a real image or a generated image. Then, using the shape code of the first number of two-dimensional image samples as input to the shape generator, using the voxel grid model output by the shape generator as input to the shape discriminator, optimizing the parameters of the shape generator based on the discrimination result output by the shape discriminator, and optimizing the parameters of the shape discriminator based on the second number of real three-dimensional model samples. And alternately optimizing the parameters of the shape generator and the shape discriminator until the loss function of the generated countermeasure network converges to obtain the optimized shape generator and the optimized shape discriminator. By this point, the training process ends. And taking the optimized shape generator obtained by training as the three-dimensional model generator required for generating the three-dimensional identifying code element.
The essential role of the three-dimensional model generator is to create a three-dimensional model based on the collected two-dimensional image samples. The training process essentially maps the shape code of any two-dimensional image to a voxel grid model by learning a shape generation countermeasure network, i.e. three-dimensional shape prior templates for an object are learned from a large number of shape sets, and the prior templates are only related to the type of the object and are independent of other factors (such as view angle, texture and the like). The above-described process of learning a shape generation countermeasure network is to train a shape generator and a shape discriminator at the same time, and may be performed, for example, as follows.
Defining a generative model as a shape generator GshapeIs capable of generating a shape GshapeAn image coding vector is input, and the output is a three-dimensional pixel grid model. And, a classifier is defined as the shape discriminator DshapeFor discriminating whether the voxel grid model is true (from a true 3D model sample in the dataset) or false (by the shape generator G)shapeThe generated voxel grid model). The shape generator G can be randomly initializedshapeAnd a shape discriminator DshapeThe parameter (c) of (c).
Then, a set of 3D model samples v of a set of real 3D objects is prepared1,v2,...,vN}. Then collecting a group of 2D image samples, and uniformly generating shape codes z according to the distribution of the 2D image samplesshapeSet of (2) { z }1,z2,...,zNThe shape generator can encode z from each shapeshape(which may be expressed as shape-coded vectors) a voxel grid model of size W x W is generated.
To improve the quality and diversity of the results, the example illustratively uses the Wasserstein distance in the WGAN-GP model to adjust the loss function. Specifically, the above-mentioned shape generating the training target and the loss function of the countermeasure network may include:
Figure BDA0002133422710000111
Figure BDA0002133422710000121
wherein E isvPresentation pair shape discriminator DshapeAveraging the output values for the real 3D model samples, EzshapePresentation pair shape discriminator DshapeFor shape generator GshapeShape coding z based on 2D image samplesshapeThe output values of the generated voxel grid model are averaged.
Next, the fixed shape generator GshapeOf the real 3D model sample { v }1,v2,...,vNAnd shape generator GshapeGenerated voxel grid model { Gshape(zshape) Is used as an entry parameter and sent to a shape discriminator DshapeTraining shape discriminator DshapeDiscriminating as accurately as possible real 3D model samples { v }1,v2,...,vNAnd the generated voxel grid model { G }shape(zshape) The process is that in the formula (1)
Figure BDA0002133422710000122
And (3) a stage of (a). In updating the shape discriminator DshapeAfter the parameters (D), the shape discriminator DshapeFixing parameters, encoding shape zshapeWith the real 3D model samples { v1,v2,...,vNIs input as an input to a shape generator GshapeTraining shape generator GshapeThe difference between the voxel grid model it generates and the real 3D model sample is minimized. The above training process is repeated repeatedly, with the final goal of making the shape discriminator DshapeNo discriminant sample is from the shape generator GshapeThe output of the optimal shape generator is still the real data, namely the final sample discrimination probability is 0.5, so that an optimal shape discriminator and an optimal shape generator are obtained, and the optimal shape generator is used as a three-dimensional model generator.
On the basis of the three-dimensional model generator obtained by training, the generation process of the three-dimensional identifying code elements can be carried out. In one embodiment of the present disclosure, the captcha parameters may include at least one parameter information, and each parameter information may include shape coding, view coding, and texture coding. The process of generating at least one three-dimensional captcha element based on captcha parameters and a three-dimensional model generator described above may be performed as follows: for each parameter information in the verification code parameters, inputting the shape code of the parameter information into a three-dimensional model generator to obtain a three-dimensional pixel grid model corresponding to the parameter information, and then rendering the obtained three-dimensional pixel grid model based on the view angle code and the texture code of the parameter information to obtain a three-dimensional verification code element corresponding to the parameter information. And respectively executing the operation on each parameter information in the verification code parameters to respectively obtain the three-dimensional verification code elements corresponding to each parameter information in the verification code parameters.
For example, the server receives a verification request sent by the client, and analyzes verification code parameters from the verification request, wherein the verification code parameters comprise parameter information, and the parameter information comprises shape coding ZshapeView angle coding ZviewAnd texture coding Ztexture. First encode the shape ZshapeSending the shape data to a pre-trained three-dimensional model generator to obtain a shape code ZshapeA corresponding voxel grid model. Then, the view coding Z based on the parameter informationviewAnd texture coding ZtextureAnd rendering the obtained three-dimensional pixel grid model to obtain a three-dimensional verification code element corresponding to the parameter information. Referring to FIGS. 3A-3B, FIG. 3A schematically illustrates a three-dimensional model generator according to an embodiment of the invention, and FIG. 3B schematically illustrates a three-dimensional model generator according to an embodiment of the inventionSchematic illustration of three-dimensional captcha elements of an embodiment.
As shown in FIGS. 3A-3B, illustratively, the shape code Z in this exampleshapeIs a shape-coded vector of a 2D image sample of a car, based on the three-dimensional model generator output and the shape code ZshapeThe corresponding voxel grid model is a 3D model of the car shown in fig. 3A. Then, Z is encoded by using the view angleviewFixing the horizontal and vertical equidirectional angles of the 3D model of the car, generating a sketch of the car, and encoding Z by using texturestextureRendering the colors, stripes and the like of the cars to finally obtain the three-dimensional verification code elements of the cars with various angles, colors and materials shown in fig. 3B. The obtained three-dimensional verification code elements can be returned to the client for displaying.
After the three-dimensional captcha elements are generated, an output process may be performed. When M (M is a positive integer) pieces of parameter information are included in the captcha parameters, M three-dimensional captcha elements can be generated. And the server sends the M three-dimensional verification code elements to the client for displaying, and the client guides the current operator to execute interactive operation aiming at the M three-dimensional verification code elements. For example, the attribute information related to the interactive operation with respect to the M three-dimensional captcha elements may include: location information of the interactive operation and time information of the interactive operation. On this basis, the above process of determining whether the interaction operation passes the verification based on the attribute information may be: and if the time information of the interactive operation is determined to be matched with the preset time interval and the position information of the interactive operation is determined to be matched with the preset position, confirming that the interactive operation passes the verification.
Further, in an embodiment of the present disclosure, the interactive verification method based on verification codes according to an embodiment of the present disclosure may further include: after generating at least one three-dimensional captcha element, presentation information for the at least one three-dimensional captcha element is determined. For example, the display information of the M three-dimensional captcha elements includes: the display position and the display time of each three-dimensional verification code element in the M three-dimensional verification code elements, wherein the display position of each three-dimensional verification code element may be fixed or may change with time. Therefore, the sending the M three-dimensional verification code elements to the client for display includes: and sending the M three-dimensional verification code elements and the display information of the M three-dimensional verification code elements to the client together, so that the client displays the M three-dimensional verification code elements based on the display position and the display time of each three-dimensional verification code element.
The verification process of the three-dimensional captcha elements is described next by way of one embodiment. Illustratively, the interactive verification method based on verification codes according to the embodiment of the present disclosure may further include: a target captcha element is determined from the generated at least one three-dimensional captcha element. On this basis, the sending of the at least one three-dimensional captcha element to the client for presentation further includes: and sending the identifiers indicating the target verification code elements to the client together so that the client outputs prompt information for carrying out interactive operation on the target verification code elements, thereby guiding a current operator to carry out interactive operation on the target verification code elements. Then, the second obtaining process obtains attribute information related to the interactive operation, where the attribute information includes location information of the interactive operation and time information of the interactive operation. And then, judging whether the interactive operation passes the verification or not based on the attribute information, and if the time information of the interactive operation is determined to be matched with the preset time interval and the position information of the interactive operation is determined to be matched with the preset position, confirming that the interactive operation passes the verification. The predetermined time interval may be a display time of the target verification code element, for example, the display time of the target verification code element is 3 to 5 seconds, and the predetermined time interval may be a time interval of 3 to 5 seconds in the total display time. Further, the predetermined position may be a presentation position of the target captcha element corresponding to the time information of the interactive operation, or the predetermined position may be an auxiliary operation position set for the target captcha element. For example, the display position of the target authenticator element is changed along with time, the time information of the interactive operation is 3 rd second, the display position of the target authenticator element corresponding to the 3 rd second can be used as the predetermined position, or an auxiliary operation position of the target authenticator element, such as an auxiliary icon, can be displayed when the target authenticator element is displayed, and the auxiliary operation position can also be used as the predetermined position.
For example, the determining that the time information of the interactive operation matches the predetermined time interval may include: and determining that the time point represented by the time information of the interactive operation falls within the preset time interval. And, the determining that the location information of the interactive operation matches the predetermined location may include: and calculating the Euclidean distance between the preset position and the position represented by the interactive operation position information, and when the Euclidean distance is smaller than a preset threshold value, confirming that the interactive operation position information is matched with the preset position.
For example, 3 three-dimensional captcha elements are generated via the generation process described above: "N", "D" and "A". And respectively determining the display information of the 3 three-dimensional identifying code elements, and determining the three-dimensional identifying code element D as a target identifying code element. And sending the 3 three-dimensional verification code elements, the display information of the 3 verification code elements and the identifier indicating that the three-dimensional verification code element D is the target verification code element to the client together. The client displays the 3 three-dimensional verification code elements according to the display information, and displays the prompt information to guide the current operating policy to perform interactive operation on the target verification code element, please refer to fig. 3C to 3E.
Fig. 3C-3E schematically illustrate a client presenting three-dimensional captcha elements, according to an embodiment of the invention. As shown in fig. 3C to 3E, the client displays 3 bases and a hammer icon as the auxiliary operation positions of the 3 three-dimensional authentication code elements, respectively. The operator can click on the hammer or 3 bases or the three-dimensional verification code element to realize the knocking operation aiming at any three-dimensional verification code element. The client outputs information indicating that the operator taps against the target captcha element "D". When the presentation is started, the three-dimensional verification code elements appear from the corresponding bases and are presented for a certain time. For example, the three-dimensional verification code element 'N' appears on the first base within the time interval of 1-2 seconds, and the three-dimensional verification code element 'D' appears within the time interval of 3-5 seconds"appear on the second mount, etc. In this example, the time interval of 3 to 5 seconds is determined as the predetermined time interval, and the position (on the second base) where the target verification code element "D" is located in the time interval of 3 to 5 seconds is determined as the predetermined position (x)0,y0). When the operator performs a click operation on the screen of the client, a click time (e.g., 3.5 seconds) and a click position (x) are obtainedhit,yhit). And determining that the time information of the interactive operation is matched with the preset time interval because the click time (3.5 th second) falls into the preset time interval (3 rd-5 th second time interval). Then calculate the click position (x)hit,yhit) Euclidean distance L from the predetermined position:
Figure BDA0002133422710000151
and when the Euclidean distance L is smaller than a preset threshold value, determining that the position information of the interactive operation is matched with the preset position. And when the time information of the interactive operation is matched with the preset time interval and the position information of the interactive operation is matched with the preset position, determining that the interactive operation passes the verification, and further determining that the operation party executing the interactive operation is the real user. In other embodiments, the position of the second base corresponding to the target verification code element or the position of the hammer icon may also be used as a predetermined position to determine whether the positions are matched, and the principle is the same, which is not described herein again.
In another embodiment, for 3 three-dimensional captcha elements generated by the above generation process: the client side can display the 3 three-dimensional verification code elements in other forms according to different display information determined by the server side, and display prompt information guides the current operating policy to carry out interactive operation on the target verification code element (such as 'D'). Illustratively, the client presents 3 bases and a hammer icon, respectively, as the secondary operating positions for the 3 three-dimensional captcha elements. The operator can realize any three-dimensional experiment by clicking the hammer or 3 bases or the three-dimensional verification code elementAnd (5) knocking operation of the certificate code element. When the display is started, each three-dimensional verification code element appears above the display interface of the client and falls down according to a preset track and speed until the three-dimensional verification code element falls into the corresponding base. For example, in the time interval of 1 ~ 2 seconds, the three-dimensional captcha element "N" appears above the screen and falls at the velocity v1, in the time interval of 3 ~ 5 seconds, the three-dimensional captcha element "D" appears above the screen and falls at the velocity v2, and so on. In this example, since the target verification code element is "D", the time interval of 3 rd to 5 th seconds is determined to be the predetermined time interval. When the operator performs a click operation on the screen, the click time (e.g., 3.5 seconds) and the click position (x) of the click operation are obtainedhit,yhit). The predetermined position (x) can be determined in this example based on the time of the click0,y0) The position of the three-dimensional authentication code element "D" corresponding to the click time, or the position of the second base or the hammer icon corresponding to the target authentication code element may be used as the predetermined position (x)0,y0). When the time point represented by the click time is determined to fall into a preset time interval, and the click position (x)hit,yhit) And a predetermined position (x)0,y0) When the three-dimensional verification code element is matched (the matching judgment mode is described above, and is not described herein again), it is equivalent to implementing the tapping operation for the three-dimensional verification code element "D", and at this time, the descending speed of the three-dimensional verification code element "D" is increased and falls into the second base quickly, which indicates that the interactive operation is determined to pass the verification. In other embodiments, the display information of the three-dimensional captcha element may be set as required, and there are many variations, and the interaction operation for the three-dimensional captcha element may be in various forms, and the above examples are only illustrative and are not limited herein.
Exemplary devices
Having described the method of the exemplary embodiment of the present invention, the interactive authentication device based on authentication code of the exemplary embodiment of the present invention will be explained in detail.
FIG. 4 schematically shows a block diagram of an interactive authentication device based on authentication codes according to one embodiment of the present invention.
As shown in fig. 4, the interactive authentication apparatus 400 based on an authentication code is applied to a server, and may include: a first acquisition module 410, a generation module 420, an output module 430, a second acquisition module 440, and a verification module 450.
The first obtaining module 410 is configured to obtain the verification code parameter in response to the verification request.
The generating module 420 is configured to generate at least one three-dimensional captcha element based on the captcha parameters and the three-dimensional model generator. Wherein the three-dimensional model generator is trained based on generating the confrontation network.
The output module 430 is configured to send the at least one three-dimensional captcha element to the client for display.
The second obtaining module 440 is configured to obtain attribute information related to an interaction operation for the at least one three-dimensional captcha element.
The verification module 450 is configured to determine whether the interactive operation with respect to the at least one three-dimensional captcha element is verified based on the attribute information.
Fig. 5 schematically shows a block diagram of an interactive authentication apparatus based on an authentication code according to another embodiment of the present invention.
As shown in fig. 5, the interactive authentication device 500 based on the authentication code is applied to a server and may include: a first acquisition module 510, a generation module 520, an output module 530, a second acquisition module 540, and a verification module 550. The first obtaining module 510, the generating module 520, the outputting module 530, the second obtaining module 540, and the verifying module 550 respectively have the same functions as the first obtaining module 410, the generating module 420, the outputting module 430, the second obtaining module 440, and the verifying module 450, and repeated parts are not repeated.
In one embodiment of the present invention, the captcha parameters include at least one parameter information, each of which includes shape coding, view coding, and texture coding. On this basis, the generating module 520 may include: an input submodule 521 and a rendering submodule 522.
The input submodule 521 is configured to input the shape code of one parameter information in the verification code parameters to the three-dimensional model generator, so as to obtain a three-dimensional pixel mesh model corresponding to the parameter information. The rendering submodule 522 is configured to perform rendering processing on the above-mentioned one stereoscopic pixel mesh model based on the view coding and the texture coding of the parameter information, so as to obtain a three-dimensional verification code element corresponding to the parameter information.
In another embodiment of the present invention, the interactive verification apparatus 500 based on verification codes further includes a display information determining module 560, configured to determine display information of at least one three-dimensional verification code element after the generating module 520 generates the at least one three-dimensional verification code element. The display information includes: a presentation position and a presentation time of each of the at least one three-dimensional captcha element. The output module 530 includes a display sub-module 531, configured to send the at least one three-dimensional barcode element and the display information of the at least one three-dimensional barcode element to the client, so that the client displays the at least one three-dimensional barcode element based on the display position and the display time of each three-dimensional barcode element.
In another embodiment of the present invention, the attribute information of the interactive operation may include: location information of the interactive operation and time information of the interactive operation. The verification module 550 is specifically configured to confirm that the interactive operation passes the verification when it is determined that the time information of the interactive operation matches the predetermined time interval and it is determined that the position information of the interactive operation matches the predetermined position.
In a further embodiment of the present invention, the apparatus 500 further includes a target determination module 570 for determining a target captcha element from at least one three-dimensional captcha element. The output module 530 further includes a target prompt submodule 532, configured to send an identifier indicating the target captcha element to the client together, so that the client outputs prompt information for performing an interactive operation on the target captcha element. According to the present embodiment, the predetermined time interval includes: presentation time of target captcha elements. The predetermined locations include: and the display position of the target verification code element corresponding to the time information of the interactive operation, or an auxiliary operation position set for the target verification code element.
In a further embodiment of the present invention, the verification module 550 is configured to determine that the time information of the interactive operation matches the predetermined time interval when the time point represented by the time information of the interactive operation falls within the predetermined time interval.
In a further embodiment of the present invention, the verification module 550 is further configured to calculate a euclidean distance between the predetermined location and a location characterized by the location information of the interactive operation, and when the euclidean distance is less than a predetermined threshold, confirm that the location information of the interactive operation matches the predetermined location.
In yet another embodiment of the present invention, the interactive verification device 500 further comprises a model training module 580 for creating a generation countermeasure network composed of a shape generator and a shape discriminator, and then using the shape codes of the first number of two-dimensional image samples as the input of the shape generator, and using the voxel grid model output by the shape generator as the input of the shape discriminator. The parameters of the shape generator are then optimized based on the discrimination results output by the shape discriminator, and the parameters of the shape discriminator are optimized based on a second number of real three-dimensional model samples. Alternately optimizing parameters of the shape generator and the shape discriminator until the optimized shape generator and the optimized shape discriminator are obtained; and, using the optimized shape generator as a three-dimensional model generator.
It should be noted that the implementation, solved technical problems, implemented functions, and achieved technical effects of each module/unit/subunit and the like in the apparatus part embodiment are respectively the same as or similar to the implementation, solved technical problems, implemented functions, and achieved technical effects of each corresponding step in the method part embodiment, and are not described herein again.
Exemplary Medium
Having described the method and apparatus of exemplary embodiments of the present invention, a medium for implementing an interactive authentication method based on an authentication code of exemplary embodiments of the present invention will be described.
An embodiment of the present invention provides a medium storing computer-executable instructions, which when executed by a processor, are configured to implement the authentication code-based interactive authentication method according to any one of the above method embodiments.
In some possible embodiments, aspects of the present invention may also be implemented in the form of a program product comprising program code for causing a computing device to perform the operational steps of the authentication code based interactive authentication method according to various exemplary embodiments of the present invention described in the above section "exemplary methods" of this specification, when the program product is run on the computing device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Fig. 6 schematically shows a schematic diagram of a computer-readable storage medium product according to an embodiment of the present invention, and as shown in fig. 6, a program product 60 for implementing an authentication code-based interactive authentication method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a computing device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Exemplary computing device
Having described the method, medium, and apparatus of exemplary embodiments of the present invention, a computing device for implementing an authentication code based interactive authentication method according to another exemplary embodiment of the present invention is next described.
An embodiment of the present invention further provides a computing device, including: the authentication code-based interactive authentication system comprises a memory, a processor and executable instructions stored on the memory and executable on the processor, wherein the processor executes the instructions to realize the authentication code-based interactive authentication method in any one of the above method embodiments.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
In some possible embodiments, a computing device for implementing an authentication code based interactive authentication method according to the present invention may comprise at least one processing unit, and at least one memory unit. Wherein the storage unit stores program code which, when executed by the processing unit, causes the processing unit to perform the operational steps of the interactive authentication method based on authentication code according to various exemplary embodiments of the present invention described in the above section "exemplary method" of this specification.
A computing device 70 for implementing the captcha-based interactive authentication method according to this embodiment of the present invention is described below with reference to fig. 7. The computing device 70 shown in FIG. 7 is only one example and should not be taken to limit the scope of use and functionality of embodiments of the present invention.
As shown in fig. 7, computing device 70 is embodied in the form of a general purpose computing device. Components of computing device 70 may include, but are not limited to: the at least one processing unit 701, the at least one memory unit 702, and a bus 703 that couples various system components including the memory unit 702 and the processing unit 701.
Bus 703 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures.
The storage unit 702 can include readable media in the form of volatile memory, such as Random Access Memory (RAM)7021 and/or cache memory 7022, and can further include Read Only Memory (ROM) 7023.
Storage unit 702 may also include a program/utility 7025 having a set (at least one) of program modules 7024, such program modules 7024 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Computing device 70 may also communicate with one or more external devices 704 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with computing device 70, and/or with any devices (e.g., router, modem, etc.) that enable computing device 70 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 705. Moreover, computing device 70 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) through network adapter 706. As shown, network adapter 706 communicates with the other modules of computing device 70 via bus 703. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computing device 70, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
It should be noted that although in the above detailed description several units/modules or sub-units/modules of the captcha-based interactive proof device are mentioned, this division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the units/modules described above may be embodied in one unit/module according to embodiments of the invention. Conversely, the features and functions of one unit/module described above may be further divided into embodiments by a plurality of units/modules.
Moreover, while the operations of the method of the invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
While the spirit and principles of the invention have been described with reference to several particular embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, nor is the division of aspects, which is for convenience only as the features in such aspects may not be combined to benefit. The invention is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (8)

1. An interactive verification method based on verification codes is applied to a server and comprises the following steps:
responding to a verification request, and acquiring verification code parameters, wherein the verification code parameters comprise at least one parameter message, and each parameter message comprises shape coding, view coding and texture coding;
generating at least one three-dimensional captcha element based on the captcha parameters and a three-dimensional model generator includes: inputting the shape code of one parameter information in the verification code parameters into a three-dimensional model generator to obtain a three-dimensional pixel grid model corresponding to the one parameter information; rendering the three-dimensional pixel grid model based on the view coding and the texture coding of the parameter information to obtain a three-dimensional verification code element corresponding to the parameter information, wherein the three-dimensional model generator is obtained based on generation of confrontation network training;
sending the at least one three-dimensional verification code element to a client for displaying;
obtaining attribute information related to an interactive operation for the at least one three-dimensional captcha element; and
determining whether the interactive operation passes verification based on the attribute information;
wherein the attribute information includes: the position information of the interactive operation and the time information of the interactive operation; the determining whether the interaction operation is verified based on the attribute information comprises: if the time information of the interactive operation is determined to be matched with a preset time interval and the position information of the interactive operation is determined to be matched with a preset position, the interactive operation is confirmed to pass the verification;
wherein the method further comprises:
creating a generation countermeasure network composed of a shape generator and a shape discriminator;
using shape codes of a first number of two-dimensional image samples as input of the shape generator, and using a stereoscopic pixel grid model output by the shape generator as input of the shape discriminator;
optimizing parameters of the shape generator based on a discrimination result output by the shape discriminator;
optimizing parameters of the shape discriminator based on a second number of real three-dimensional model samples;
alternately optimizing parameters of the shape generator and the shape discriminator until an optimized shape generator and an optimized shape discriminator are obtained; and
using the optimized shape generator as the three-dimensional model generator.
2. The method of claim 1, further comprising: after the generating of the at least one three-dimensional captcha element, determining presentation information of the at least one three-dimensional captcha element, the presentation information including: a display position and a display time of each three-dimensional captcha element of the at least one three-dimensional captcha element; and
the sending the at least one three-dimensional verification code element to the client for display comprises: and sending the at least one three-dimensional verification code element and the display information of the at least one three-dimensional verification code element to the client, so that the client displays the at least one three-dimensional verification code element based on the display position and the display time of each three-dimensional verification code element.
3. The method of claim 1, further comprising: determining a target captcha element from the at least one three-dimensional captcha element;
the sending the at least one three-dimensional verification code element to the client for display further comprises: sending the identifiers indicating the target verification code elements to a client side together so that the client side can output prompt information for carrying out interactive operation on the target verification code elements;
the predetermined time interval includes: a presentation time of the target captcha element; and
the predetermined locations include: and displaying the target verification code element corresponding to the time information, or setting an auxiliary operation position aiming at the target verification code element.
4. The method of claim 1, wherein the determining that the time information of the interaction matches a predetermined time interval comprises:
and determining that the time point represented by the time information of the interactive operation falls within the preset time interval.
5. The method of claim 1, wherein the determining that the location information of the interaction matches the predetermined location comprises:
and calculating the Euclidean distance between the preset position and the position represented by the interactive operation position information, and when the Euclidean distance is smaller than a preset threshold value, confirming that the interactive operation position information is matched with the preset position.
6. An interactive verification device based on verification codes is applied to a server and comprises:
the first obtaining module is used for responding to a verification request and obtaining verification code parameters, wherein the verification code parameters comprise at least one parameter message, and each parameter message comprises shape coding, view coding and texture coding;
a generating module, configured to generate at least one three-dimensional verification code element based on the verification code parameter and the three-dimensional model generator, and specifically, to input a shape code of one parameter information of the verification code parameter to the three-dimensional model generator, so as to obtain a voxel grid model corresponding to the one parameter information; rendering the three-dimensional pixel grid model based on the view coding and the texture coding of the parameter information to obtain a three-dimensional verification code element corresponding to the parameter information, wherein the three-dimensional model generator is obtained based on generation of confrontation network training;
the output module is used for sending the at least one three-dimensional verification code element to a client for displaying;
a second obtaining module, configured to obtain attribute information related to an interactive operation for the at least one three-dimensional captcha element; and
the verification module is used for determining whether the interactive operation passes the verification or not based on the attribute information;
wherein the attribute information includes: location information of the interactive operation and time information of the interactive operation; the verification module is specifically used for confirming that the interactive operation passes the verification when the time information of the interactive operation is matched with a preset time interval and the position information of the interactive operation is matched with a preset position;
wherein the apparatus further comprises:
the model training module is used for creating a generation countermeasure network consisting of a shape generator and a shape discriminator; using shape codes of a first number of two-dimensional image samples as input of the shape generator, and using a stereoscopic pixel grid model output by the shape generator as input of the shape discriminator; optimizing parameters of the shape generator based on a discrimination result output by the shape discriminator; optimizing parameters of the shape discriminator based on a second number of real three-dimensional model samples; alternately optimizing parameters of the shape generator and the shape discriminator until an optimized shape generator and an optimized shape discriminator are obtained; and using the optimized shape generator as the three-dimensional model generator.
7. A medium storing computer executable instructions, which when executed by a processor, are operable to implement:
the interactive authentication method based on an authentication code according to any one of claims 1 to 5.
8. A computing device, comprising: a memory, a processor, and executable instructions stored on the memory and executable on the processor, the processor when executing the instructions implementing:
the interactive authentication method based on an authentication code according to any one of claims 1 to 5.
CN201910648059.4A 2019-07-17 2019-07-17 Interactive verification method, device, medium and computing equipment based on verification code Active CN110378095B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910648059.4A CN110378095B (en) 2019-07-17 2019-07-17 Interactive verification method, device, medium and computing equipment based on verification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910648059.4A CN110378095B (en) 2019-07-17 2019-07-17 Interactive verification method, device, medium and computing equipment based on verification code

Publications (2)

Publication Number Publication Date
CN110378095A CN110378095A (en) 2019-10-25
CN110378095B true CN110378095B (en) 2022-02-25

Family

ID=68253788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910648059.4A Active CN110378095B (en) 2019-07-17 2019-07-17 Interactive verification method, device, medium and computing equipment based on verification code

Country Status (1)

Country Link
CN (1) CN110378095B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110942463B (en) * 2019-10-30 2021-03-16 杭州电子科技大学 Video target segmentation method based on generation countermeasure network
CN110766529B (en) * 2019-10-31 2022-05-03 广东美的制冷设备有限公司 Operation verification method and device, air conditioner and storage medium
CN110995706B (en) * 2019-12-03 2021-09-21 广州市百果园信息技术有限公司 Authentication system, method, device and storage medium for communication application
CN112685725B (en) * 2020-12-30 2022-12-06 上海掌门科技有限公司 Security verification method and device
CN114218166A (en) * 2021-11-04 2022-03-22 北京百度网讯科技有限公司 Data processing method and device, electronic equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355072A (en) * 2016-08-19 2017-01-25 沈建国 Implementation method and device for three-dimensional model verification code
CN107154924A (en) * 2016-03-04 2017-09-12 阿里巴巴集团控股有限公司 Authentication processing method and device based on identifying code
CN107846412A (en) * 2017-11-28 2018-03-27 五八有限公司 Identifying code request processing method, device and identifying code processing system
CN108809654A (en) * 2018-06-29 2018-11-13 苏州科达科技股份有限公司 Dynamic authentication code generating method, verification method and device based on dynamic verification code

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685078A (en) * 2011-03-17 2012-09-19 中国电信股份有限公司 Method for verifying verification code and server
EP2509019A1 (en) * 2011-04-04 2012-10-10 Sony Ericsson Mobile Communications AB Security arrangement

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154924A (en) * 2016-03-04 2017-09-12 阿里巴巴集团控股有限公司 Authentication processing method and device based on identifying code
CN106355072A (en) * 2016-08-19 2017-01-25 沈建国 Implementation method and device for three-dimensional model verification code
CN107846412A (en) * 2017-11-28 2018-03-27 五八有限公司 Identifying code request processing method, device and identifying code processing system
CN108809654A (en) * 2018-06-29 2018-11-13 苏州科达科技股份有限公司 Dynamic authentication code generating method, verification method and device based on dynamic verification code

Also Published As

Publication number Publication date
CN110378095A (en) 2019-10-25

Similar Documents

Publication Publication Date Title
CN110378095B (en) Interactive verification method, device, medium and computing equipment based on verification code
US10218506B1 (en) Cross-device authentication
US8141146B2 (en) Authentication server, authentication method and authentication program
CN110399712B (en) Interactive verification method, device, medium and computing equipment based on verification code
CN104834839B (en) A kind of code generating method, method for authenticating and associated terminal based on bar code
WO2014044052A1 (en) Validation processing method, user equipment, and server
CN108229220B (en) System and method for trusted presentation of information on untrusted user devices
CN102957682A (en) Method and equipment for providing picture verification code based on verification security level
JP6480710B2 (en) Handwritten data verification method and user authentication method
US9497293B2 (en) Mechanism for pairing user's secondary client device with a data center interacting with the users primary client device using QR codes
US20110283346A1 (en) Overlay human interactive proof system and techniques
CN110795714A (en) Identity authentication method and device, computer equipment and storage medium
CN107888553A (en) A kind of verification method, server and system
CN103514393A (en) Method for achieving three-dimensional verification code
CN111563746A (en) Method, device, electronic equipment and medium for user identity authentication
CN109118233A (en) Authentication method and device based on recognition of face
US10628998B2 (en) System and method for three dimensional object reconstruction and quality monitoring
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN110519269B (en) Verification method, device and system for image-text click data and mobile terminal
CN114826604A (en) Applet login verification method, device and equipment based on face recognition and storage medium
CN111382403A (en) Training method, device, equipment and storage medium of user behavior recognition model
US20240214374A1 (en) Multi-factor authentication using symbols
US20230215220A1 (en) Liveness detection based on reflections analysis
CN113518061B (en) Data transmission method, equipment, device, system and medium in face recognition
CN110740112B (en) Authentication method, apparatus and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210926

Address after: 310052 Room 408, building 3, No. 399, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Netease Zhiqi Technology Co.,Ltd.

Address before: 310052 Building No. 599, Changhe Street Network Business Road, Binjiang District, Hangzhou City, Zhejiang Province, 4, 7 stories

Applicant before: NETEASE (HANGZHOU) NETWORK Co.,Ltd.

GR01 Patent grant
GR01 Patent grant