[go: up one dir, main page]

CN113901427A - Verification method, verification device, communication equipment and readable storage medium - Google Patents

Verification method, verification device, communication equipment and readable storage medium Download PDF

Info

Publication number
CN113901427A
CN113901427A CN202111213874.1A CN202111213874A CN113901427A CN 113901427 A CN113901427 A CN 113901427A CN 202111213874 A CN202111213874 A CN 202111213874A CN 113901427 A CN113901427 A CN 113901427A
Authority
CN
China
Prior art keywords
verification
information
block
authentication
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111213874.1A
Other languages
Chinese (zh)
Other versions
CN113901427B (en
Inventor
雷微
孙燕
唐少杰
刘小东
胡芹瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
MIGU Culture Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
MIGU Culture Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, MIGU Culture Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202111213874.1A priority Critical patent/CN113901427B/en
Priority claimed from CN202111213874.1A external-priority patent/CN113901427B/en
Publication of CN113901427A publication Critical patent/CN113901427A/en
Application granted granted Critical
Publication of CN113901427B publication Critical patent/CN113901427B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a verification method, a verification device, a communication device and a readable storage medium. The verification method comprises the following steps: sending verification request information to a server, wherein the verification request information comprises verification area information; receiving rendering information which is sent by a server and corresponds to the verification area information, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of an identifier on the first verification block; rendering the first verification block and the second verification block in the verification area according to the rendering information, controlling the second verification block to move in the verification area based on the movement information, and controlling the first verification block to move in the verification area based on the first input; under the condition that the first input is finished, sending verification information to the server, wherein the verification information comprises the position information of the second verification block and the position information of the first verification block; and receiving a verification result which is sent by the server and corresponds to the verification information.

Description

Verification method, verification device, communication equipment and readable storage medium
Technical Field
The embodiment of the application relates to the technical field of internet, in particular to a verification method, a verification device, communication equipment and a readable storage medium.
Background
With the development of internet technology, many internet application systems use authentication methods to perform human-computer identification so as to prevent machine access and improve access security. The current common verification method is to render an incomplete puzzle on an access page, and a user can complete verification by dragging the puzzle to a corresponding position. In the verification method, the verification means is simple, the user behavior is easy to be simulated by a machine, and the accuracy of the verification result is low.
Disclosure of Invention
The embodiment of the application provides a verification method, a verification device, communication equipment and a readable storage medium, and aims to solve the problems that the existing verification method is simple and the accuracy of a verification result is low.
To solve the above problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a verification method, which is applied to a terminal, and includes:
sending verification request information to a server, wherein the verification request information comprises verification area information;
receiving rendering information corresponding to the verification area information, which is sent by the server, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of an identifier on the first verification block;
rendering the first and second proof blocks in the proof area according to the rendering information, and controlling the second proof block to move in the proof area based on the movement information, and controlling the first proof block to move in the proof area based on a first input;
transmitting authentication information to the server in a case where the first input is ended, the authentication information including location information of the second authentication block and location information of the first authentication block;
and receiving the verification result sent by the server.
In a second aspect, an embodiment of the present application provides a verification method, applied to a server, including:
receiving verification request information sent by a terminal, wherein the verification request information comprises verification area information;
generating rendering information corresponding to the verification area information, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of the identifier on the first verification block;
receiving authentication information sent by the terminal, wherein the authentication information comprises position information of the first authentication block and position information of the second authentication block, and the first input is used for controlling the first authentication block to move in the authentication area;
and sending a verification result to the terminal, wherein the verification result is determined based on the verification information.
In a third aspect, an embodiment of the present application further provides a verification apparatus, including:
a first transceiver to:
sending verification request information to a server, wherein the verification request information comprises verification area information;
receiving rendering information corresponding to the verification area information, which is sent by the server, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of an identifier on the first verification block;
a first processor to: rendering the first and second proof blocks in the proof area according to the rendering information, and controlling the second proof block to move in the proof area based on the movement information, and controlling the first proof block to move in the proof area based on a first input;
the first transceiver is further configured to:
transmitting authentication information to the server in a case where the first input is ended, the authentication information including location information of the second authentication block and location information of the first authentication block;
and receiving the verification result sent by the server.
In a fourth aspect, an embodiment of the present application further provides an authentication apparatus, including:
a second transceiver to: receiving verification request information sent by a terminal, wherein the verification request information comprises verification area information;
a second processor to: generating rendering information corresponding to the verification area information, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of the identifier on the first verification block;
the second transceiver is further configured to:
receiving authentication information sent by the terminal, wherein the authentication information comprises position information of the first authentication block and position information of the second authentication block, and the first input is used for controlling the first authentication block to move in the authentication area;
and sending a verification result to the terminal, wherein the verification result is determined based on the verification information.
In a fifth aspect, an embodiment of the present application further provides a communication device, including: a transceiver, a memory, a processor, and a program stored on the memory and executable on the processor; the processor, configured to read a program in the memory to implement the steps of the method according to the first aspect; or, a step in a method as described in the second aspect above.
In a sixth aspect, embodiments of the present application further provide a readable storage medium for storing a program, where the program, when executed by a processor, implements the steps in the method according to the foregoing first aspect, or implements the steps in the method according to the foregoing second aspect.
In the embodiment of the application, the authentication is performed by the second authentication block which moves based on the movement information and the first authentication block operated by the user, and the server can pass the authentication when the second authentication block is matched with the identification shape on the first authentication block. Therefore, the complexity of verification can be improved, and the accuracy of the verification result can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of a network system to which an embodiment of the present application is applicable;
fig. 2 is a schematic flowchart of an authentication method provided in an embodiment of the present application;
FIG. 3a is a schematic illustration of an authentication scheme provided by an embodiment of the present application;
FIG. 3b is a second schematic illustration of the verification provided by the embodiment of the present application;
FIG. 3c is a third exemplary verification diagram provided in accordance with an embodiment of the present invention;
FIG. 3d is a fourth exemplary verification scheme provided by the embodiments of the present application;
fig. 4 is a second schematic flowchart of an authentication method according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an exemplary configuration of an authentication device in accordance with the present application;
FIG. 6 is a second schematic structural diagram of an authentication device provided in the present application;
fig. 7 is a schematic structural diagram of a communication device provided in this application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the embodiments of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Further, as used herein, "and/or" means at least one of the connected objects, e.g., a and/or B and/or C, means 7 cases including a alone, B alone, C alone, and both a and B present, B and C present, both a and C present, and A, B and C present.
Referring to fig. 1, fig. 1 is a block diagram of a network system to which an embodiment of the present invention is applicable, and as shown in fig. 1, includes a terminal 11 and a server 12. Communication is possible between the terminal 11 and the server 12.
The terminal 11 may also be called a User Equipment (UE), and in practical applications, the terminal may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or a vehicle-mounted Device.
The following describes a verification method provided in an embodiment of the present application.
Referring to fig. 2, fig. 2 is a schematic flowchart of an authentication method provided in an embodiment of the present application. The authentication method shown in fig. 2 can be applied to a terminal.
As shown in fig. 2, the authentication method may include the steps of:
step 201, sending verification request information to a server, wherein the verification request information comprises verification area information.
The verification request information is used for triggering the server to generate and sending rendering information corresponding to a verification area to the terminal so that a user can execute verification operation, and then the server performs man-machine verification.
The authentication area information may include shape information of the authentication area. In the embodiment of the present application, the shape information of X may include description information such as a shape and/or a size of X, and X may be, but is not limited to, the verification area and the like. Such as: when the authentication area is rectangular, the authentication area information may include a length and a width of the authentication area.
In specific implementation, the terminal may determine the verification area according to shape information of a display area of the terminal, where the verification area may be a part or all of the display area, and may specifically be determined according to an actual situation, which is not limited in this embodiment of the present application.
Optionally, the terminal may send the authentication request information to the server when receiving a first request, where the first request may be an access request, a login request, a subscription request, or the like.
Step 202, receiving rendering information corresponding to the verification area information, which is sent by the server, where the rendering information includes shape information of a first verification block, shape information of a second verification block, and movement information of the second verification block, where the shape of the second verification block matches the identification shape on the first verification block.
In a specific implementation, the first verification block and the second verification block may have the following implementation manners:
the first implementation mode comprises the following steps: the first proof block and the second proof block may constitute a complete proof block, such as: the first verification block is a verification block with a notch, and the second verification block is a missing block; or, the first verification block is a missing block, and the second verification block is a verification block with a notch. In this implementation, the matching of the shape of the second proof mass with the identification shape on the first proof mass may be understood as: the shape of the gap block is matched with that of the gap. In this case, when the missing block is placed in the gap, the missing block is matched with the gap, and the first verification block and the second verification block form a complete verification block without the gap, and verification can be passed at this time.
The second implementation mode comprises the following steps: in this implementation, the shape of the identifier on the first proof mass may be located at a certain position of the first proof mass, and the shape of the identifier is the same as that of the second proof mass, such as: assuming that the first proof block is a triangle, the second proof block is a square, and the shape of the mark on the first proof block may be a square on a certain vertex of the triangle, in this case, when the square falls on the vertex of the triangle, the square is matched with the shape of the mark on the triangle, and the verification is passed.
The movement information of the second proof block may include: a movement start position P of the second proof masssThe moving trajectory s of the second verification block in a first direction and the moving speed v of the second verification block in a second direction are, the first direction is perpendicular to the second direction, and if the first direction is a left-right direction and the second direction is an up-down direction, the movement of the second verification block can be regarded as falling. The movement track of the second verification block may be characterized by a relative movement position in the first direction between every two adjacent movement unit times (e.g., an ith movement unit time and an (i + 1) th movement unit time), or the movement track of the second verification block may be characterized by a movement track function, which may be determined according to an actual situation, and is not limited in this embodiment of the present application.
Step 203, rendering the first verification block and the second verification block in the verification area according to the rendering information, controlling the second verification block to move in the verification area based on the movement information, and controlling the first verification block to move in the verification area based on a first input.
In specific implementation, the terminal may render the first verification block according to the shape information of the first verification block; the second proof block may be rendered according to shape information of the second proof block.
After rendering the second proof block, the terminal may control the second proof block to move within the proof area based on movement information of the second proof block. After rendering the first proof block, a user may perform a first input for controlling the first proof block to move within the proof area, so that the second proof block fits the shape of the mark on the first proof block, thereby achieving the proof.
In implementation, the first input may be an input for directly or indirectly dragging the first verification block, which may be determined according to actual conditions, and this is not limited in this embodiment of the application. And under the condition that the first input is the input of directly dragging the first verification block, the dragging object of the first input is the first verification block. In a case where the first input is an input indirectly dragging the first verification block, a dragging object of the first input is not the first verification block, but an input effect of the first input may act on the first verification block such that the first verification block moves within the verification area.
And 204, sending verification information to the server under the condition that the first input is finished, wherein the verification information comprises the position information of the second verification block and the position information of the first verification block.
In specific implementation, the terminal may obtain the verification information and send the verification information to the server for the server to perform human-machine verification when detecting that the first input is ended.
In practice, the location information of the second proof mass and the location information of the first proof mass may be used by the server to verify whether the second proof mass conforms to the shape of the identifier on the first proof mass. In the embodiment of the present application, the position information of Y may be determined with reference to the verification area, and Y may be, but is not limited to, the second verification block or the first verification block.
In order to further improve the accuracy of the verification, the verification information may further include other information for assisting the server in performing human-machine verification, and optionally, the verification information may further include at least one of the following: input trajectory information of the first input, input length information of the first input. In implementation, the input trajectory information of the first input may be used for the server to confirm whether the first input is a legal input, that is, whether the first input is a human behavior; the input duration information of the first input may be used to determine whether the input duration of the first input matches the falling duration of the second proof mass, that is, whether a time difference between the input duration of the first input and the falling duration of the second proof mass is within a preset range.
And step 205, receiving the verification result sent by the server.
In a specific implementation, the verification result may be a verification success (i.e., a verification pass) or a verification failure (i.e., a verification fail). In case of successful authentication, the terminal may accept the first request, allowing to perform an access operation, a login operation, or a subscription operation. In case of a failure of the authentication, the terminal may reject the first request, refrain from performing an access operation, a login operation, or a subscription operation.
In the verification method of the embodiment of the application, the terminal may send a verification request to the server to render the second verification block and the first verification block with the gap in the verification area, and then the terminal may control the second verification block to move in the verification area according to the movement information of the second verification block and control the first verification block to move in the verification area based on the first input. In this way, verification information including the position information of the second verification block and the position information of the first verification block can be sent to the server, so that the server can determine whether the second verification block is matched with the identification shape on the first verification block or not, and verification is achieved. Therefore, the complexity of verification can be improved, and the accuracy of the verification result can be improved.
Optionally, the first input comprises a touch sub-input and a slide sub-input;
the rendering the first verification block and the second verification block in the verification area according to the rendering information, controlling the second verification block to move in the verification area based on the movement information, and controlling the first verification block to move in the verification area based on a first input, includes:
rendering a slide control and a slide track of the slide control in the verification area;
under the condition that the touch sub-input to the sliding control is received, rendering the first verification block and the second verification block in the verification area according to the rendering information, and controlling the second verification block to move in the verification area according to the movement information;
and under the condition that a sliding sub-input to the sliding control is received, controlling the sliding control to move on the sliding track, and controlling the first verification block to move in the verification area, wherein the movement track of the first verification block is matched with the movement track of the sliding control.
In this optional embodiment, after the terminal sends the authentication request information, as shown in fig. 3a, a slide control 31 and a slide track 32 may be rendered in the authentication area 30, and the slide control 31 may slide left and right in the slide track 32. The slider control 31 is in the first display state at this time.
Thereafter, after detecting that the slider control 31 is touched, as shown in fig. 3b, the first verification block 33 and the second verification block 34 may be rendered in the verification area 30 according to the received rendering information. In fig. 3b to 3d, the first verification block 33 is a notched slider and the second verification block 34 is a notched block, which are illustrated, but do not limit the expressions of the first verification block 33 and the second verification block 34.
As shown in fig. 3c, after rendering the second authentication block 34, the terminal may control the second authentication block 34 to move within the authentication area 30 according to the movement information. When the sliding control 31 is detected to be dragged, the terminal can be triggered to control the first verification block 33 to move left and right. The moving track of the first verification block 33 matches with the moving track of the sliding control 31, which can be expressed as: the position of the center point of the first proof mass 33 in the left-right direction is the same as the position of the slide control 31 in the left-right direction.
After detecting that the dragging operation of the slider control 31 is finished, as shown in fig. 3d, the display state of the slider control 31 may be switched from the first display state to the second display state, the verification information is collected, and the verification information is sent to the server.
In addition, in fig. 3a to 3d, a closing control 35 may be further displayed in the verification area 30, and the user may cancel verification by touching the closing control 35.
It should be understood that fig. 3a to 3d are only examples, and do not limit the expression form of the verification area, the first verification block, the second verification block, the sliding control, and the sliding track, which may be set according to actual requirements and is not limited in this embodiment of the present application.
Therefore, in the optional embodiment, the terminal may render the background images such as the sliding control and the sliding track first, and render the first verification block and the second verification block after the sliding control is touched, so that the verification area is prevented from being used for verification by the screenshot, and the verification safety can be improved. In addition, the verification is carried out through the second verification block which moves randomly, and the final position of the second verification block cannot be predicted, so that the simulation difficulty of the machine can be increased, and the verification accuracy can be improved.
Referring to fig. 4, fig. 4 is a second flowchart of the verification method provided in the embodiment of the present application. The verification method of the embodiment of the application can be applied to a server.
As shown in fig. 4, the authentication method may include the steps of:
step 401, receiving authentication request information sent by a terminal, where the authentication request information includes authentication area information.
Step 402, generating rendering information corresponding to the verification area information, where the rendering information includes shape information of a first verification block, shape information of a second verification block, and movement information of the second verification block, where a shape of the second verification block matches an identification shape on the first verification block.
Step 403, receiving authentication information sent by the terminal, where the authentication information includes location information of the first authentication block and location information of the second authentication block, and the first input is used to control the first authentication block to move in the authentication area.
Step 404, sending a verification result to the terminal, wherein the verification result is determined based on the verification information.
It should be noted that, this embodiment is implemented as a server corresponding to the above method embodiment, and therefore, reference may be made to the relevant description in the above method embodiment, and the same beneficial effects may be achieved. To avoid repetition of the description, the description is omitted.
In the verification method of this embodiment, the server may send rendering information to the terminal in response to a verification request sent by the terminal, so that the terminal renders the second verification block and the first verification block with the gap in the verification area, and then the terminal may control the second verification block to move in the verification area according to the movement information of the second verification block and control the first verification block to move in the verification area based on the first input. The server may determine whether the second verification block matches the shape of the identifier on the first verification block according to verification information including the location information of the second verification block and the location information of the first verification block, which is sent by the terminal, to implement verification. Therefore, the complexity of verification can be improved, and the accuracy of the verification result can be improved.
Optionally, after receiving the verification information sent by the terminal and before the verification result sent to the terminal, the method further includes:
determining whether the second verification block is identical to the identifier shape on the first verification block or not according to the position information of the first verification block and the position information of the second verification block to obtain a first determination result;
and determining the verification result according to the first determination result.
For the first proof mass and the second proof mass in the foregoing first implementation, whether the second proof mass is identical to the shape of the identifier on the first proof mass or not may be understood as follows: whether the missing piece falls into the gap. During implementation, if the distance value between the central position of the notch and the central position of the notch is smaller than a preset value, the notch can be seen to be matched with the notch, otherwise, the notch can be seen to be not matched with the notch.
For the first proof mass and the second proof mass in the foregoing second implementation, whether the second proof mass is identical to the shape of the identifier on the first proof mass or not may be understood as follows: whether the second proof mass falls within an identification shape on the first proof mass. In implementation, if the distance value between the center position of the second verification block and the center position of the identification shape on the first verification block is smaller than a preset value, the second verification block can be considered to be matched with the identification shape on the first verification block, otherwise, whether the second verification block is not matched with the identification shape on the first verification block can be considered.
In the case that the first determination result is that the second verification block is identical to the identification shape on the first verification block, it may be determined that the verification result is successful; in a case where the first determination result is that the second proof mass does not coincide with the notch on the first proof mass, it may be determined that the proof result is a proof failure.
In this way, the server can verify the first verification block only if the second verification block is matched with the identification shape on the first verification block. As the verification is carried out through the second verification block which moves randomly, the final position of the second verification block cannot be predicted, so that the simulation difficulty of the machine can be increased, and the verification accuracy can be improved.
Optionally, the determining whether the second proof mass is matched with the identifier shape on the first proof mass according to the position information of the first proof mass and the position information of the second proof mass includes:
determining whether the second verification block is located at a preset position according to the position information of the second verification block;
determining whether the first verification block is located in a preset range according to the position information of the first verification block;
determining that the second verification block is matched with the mark shape on the first verification block under the condition that the second verification block is located at the preset position and the first verification block is located in the preset range;
wherein the preset position is determined based on movement information of the second authentication block, and the preset position range is determined based on the preset position. The preset position range may be [ preset position- Δ S, preset position + Δ S ]. Δ S may be set based on actual requirements, e.g., Δ S may be based on 0.5 pixels, or based on the size of the notch.
For convenience of understanding, the verification area is a rectangular area of x y, the second verification block falls in the verification area, and the falling starting position of the second verification block is PsThe falling speed of the second verification block is v, and the moving track of the second verification block is exemplified by representing the relative moving position of every two adjacent moving units in the left-right direction.
Assuming that the falling time of the second verification block is 1 unit time, n is y/v unit times in total, and n is a positive integer, with respect to the falling speed v of the second verification block.
And if the second verification block moves leftwards by one second verification block unit in the falling process and is marked as-1, the second verification block moves leftwards and rightwards without falling and is marked as 0, and the second verification block moves rightwards by one second verification block unit in the falling process and is marked as 1. The second proof mass drop trajectory s can be recorded as:
s={s1,...,si,...,sn},-1≤si≤1,1≤i≤n
according to the falling track s of the second verification block, the preset position of the second verification block is as follows:
Figure BDA0003309937870000111
it should be noted that, in practical applications, the terminal may determine, according to a preset sequence, at least one of whether the second verification block is located at a preset position and whether the first verification block is located within a preset range, until the two determination operations are completed, or a determination result of the first determination operation is negative determination.
The embodiment of the present application does not limit the execution order of the two determination operations. If the terminal determines that the second verification block is located at a preset position, if the position of the second verification block sent by the terminal is the preset position, it can be continuously determined whether the first verification block is located within a preset range, if the first verification block is located within the preset range, it can be determined that the second verification block is identical to the identifier shape on the first verification block, and if the first verification block is not located within the preset range, it can be determined that the second verification block is not identical to the identifier shape on the first verification block; if the position of the second verification block sent by the terminal is not the preset position, the second verification block can be directly determined to be not matched with the identification shape on the first verification block, and whether the first verification block is located in the preset range is abandoned. Therefore, the burden of the terminal can be reduced on the basis of improving the verification accuracy.
Optionally, the verification information further comprises at least one of: input track information of the first input and input duration information of the first input;
the determining the verification result according to the first determination result includes:
in the case that the first determination result is that the second verification block is matched with the identification shape on the first verification block, performing at least one of the following operations in a preset order: determining whether the first input is a legitimate input; determining whether the input duration of the first input is within a preset time range;
and determining that the verification result is successful if the determination result of the at least one operation is a positive result.
In a specific implementation, whether the first input is a legal input may be understood as: whether the first input is an input by a user. In implementation, the server may determine whether the first input is a legal input based on a machine learning algorithm of the random forest and behavior data of the user in a history verification process.
The preset time range may be determined based on the moving time t of the second proof mass, and the preset time range may be [ t- Δ t, t + Δ t ]. Δ t may be set based on actual requirements, which is not limited in the embodiments of the present application.
In this optional embodiment, in a case that the verification information includes input trajectory information of the first input and input duration information of the first input, the terminal may perform at least one of a determination operation on whether the first input is a legal input and whether the input duration of the first input is within a preset time range in a preset order until both of the determination operations are performed, or a determination result of the first determination operation is a negative determination.
Through the mode, the verification is successful only when the second verification block is matched with the identification shape on the first verification block, the first input is legal input, and the input duration of the first input is within the preset time range, so that the verification accuracy can be further improved.
The various optional implementations described in the embodiments of the present application may be implemented in combination with each other or implemented separately without conflicting with each other, and the embodiments of the present application are not limited to this.
For ease of understanding, examples are illustrated below:
in the following examples, the first proof mass is a slider with a notch, and the second proof mass is a notch having the same shape as the notch.
The verification method of the present example may include the steps of:
step one, a client (namely a terminal) calculates the information (length x and width y) of the slide-testing area according to the terminal information and submits the information to a server to request the slide-testing information.
Step two, the server side randomly generates a block missing position p according to the sliding verification area informationsAnd setting the falling speed v of the missing block, randomly generating a falling track s, and returning the sliding verification information to the client.
The specific slide test information data can meet the following conditions:
1) in order to improve the user experience, the initial position p of the missing block can be setsThe following restrictions are made: x/2<ps<x;
2) If the falling time of a missing block can be called 1 unit time, n is y/v unit times (n is an integer) in total for the falling speed v of the missing block;
3) the trajectory s is generated as follows:
and recording a missing block unit moving leftwards in the falling process of the missing block as-1, recording the missing block unit moving leftwards without moving leftwards as 0, and recording the missing block unit moving rightwards in the falling process as 1.
The falling trajectory of the missing block can be recorded as: s ═ s1,...,si,...,sn},-1≤si≤1,1≤i≤n。
According to the falling track s of the lacking block, the final position of the falling of the lacking block is as follows:
Figure BDA0003309937870000131
step three, rendering a slide check background by the client, and prompting the user to drag a slide button, as shown in fig. 3 a.
And step four, the user touches the sliding block, and the client renders the missing block and the missing block, as shown in fig. 3 b.
And step five, in the sliding process of the user, the missing block falls down at the speed v and the track s returned by the server side, as shown in a graph c.
The client collects the sliding track of the user, once the user leaves the slider, the collected verification information is submitted to the server for verification, and the verification information comprises the sliding track of the user and the slider position p when the verification is submittede
After submitting verification, the client analyzes the user track to judge whether the user track is man-made operation or not, and if the user track is not man-made operation, the server directly returns failure; if the operation is manual operation, whether the operation slides to the specified position is continuously judged, if the operation is successful, the operation is returned (shown in figure 3 d), otherwise, the operation is failed.
The server check logic is as follows:
1) and checking the user behavior.
And analyzing the sliding track of the user through a machine learning algorithm based on a random forest to judge whether the user is true.
2) And checking the position of the missing block.
According to the falling track of the missing block, the position of the missing block when the user submits verification should be at
Figure BDA0003309937870000132
When the position of the missing block is not satisfied
Figure BDA0003309937870000133
If so, the check fails.
3) Slider position verification
Judging the position p of the slider when submitting the verification requesteWhether within a specified location range. If p iseThe verification is successful if the following conditions are met, and deltas represents the error tolerated.
Figure BDA0003309937870000134
4) And (5) verifying the submission time.
And submitting the time of verification according to the falling speed v of the missing block. t should satisfy the following condition, Δ t represents the error tolerated:
y/v-Δt≤t≤y+Δt
if the four check logics are simultaneously satisfied, the verification is successful.
In the embodiment of the application, when the client side renders the slide check, the background picture is rendered first, the slider is rendered after the user slides, and once the user releases the slider, the verification is submitted, so that the condition that the user is used for identification by the screenshot in advance is avoided. A solution is proposed to add a movable segment above. The initial position and the moving track of the missing block are randomly generated, and the final position of the missing block cannot be predicted, so that the difficulty of machine simulation by an attacker is greatly improved.
Referring to fig. 5, fig. 5 is a structural diagram of an authentication apparatus provided in an embodiment of the present application. As shown in fig. 5, the authentication apparatus 500 includes:
a first transceiver 501 for:
sending verification request information to a server, wherein the verification request information comprises verification area information;
receiving rendering information corresponding to the verification area information, which is sent by the server, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of an identifier on the first verification block;
a first processor 502 for: rendering the first and second proof blocks in the proof area according to the rendering information, and controlling the second proof block to move in the proof area based on the movement information, and controlling the first proof block to move in the proof area based on a first input;
the first transceiver 501 is further configured to:
transmitting authentication information to the server in a case where the first input is ended, the authentication information including location information of the second authentication block and location information of the first authentication block;
and receiving the verification result sent by the server.
Optionally, the first input comprises a touch sub-input and a slide sub-input;
a first processor 502 for: rendering a slide control and a slide track of the slide control in the verification area;
under the condition that the touch sub-input to the sliding control is received, rendering the first verification block and the second verification block in the verification area according to the rendering information, and controlling the second verification block to move in the verification area according to the movement information;
and under the condition that a sliding sub-input to the sliding control is received, controlling the sliding control to move on the sliding track, and controlling the first verification block to move in the verification area, wherein the movement track of the first verification block is matched with the movement track of the sliding control.
Optionally, the verification information further comprises at least one of: input trajectory information of the first input, input length information of the first input.
The verification apparatus 500 can implement each process of the method embodiment in fig. 2 in the embodiment of the present application, and achieve the same beneficial effects, and for avoiding repetition, the details are not described here again.
Referring to fig. 6, fig. 6 is a second structural diagram of the verification apparatus provided in the embodiment of the present application. As shown in fig. 6, the authentication apparatus 600 includes:
a second transceiver 601 for: receiving verification request information sent by a terminal, wherein the verification request information comprises verification area information;
a second processor 602 for: generating rendering information corresponding to the verification area information, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of the identifier on the first verification block;
the second transceiver 601 is further configured to:
receiving authentication information sent by the terminal, wherein the authentication information comprises position information of the first authentication block and position information of the second authentication block, and the first input is used for controlling the first authentication block to move in the authentication area;
and sending a verification result to the terminal, wherein the verification result is determined based on the verification information.
Optionally, the second processor 602 is further configured to:
determining whether the second verification block is identical to the identifier shape on the first verification block or not according to the position information of the first verification block and the position information of the second verification block to obtain a first determination result;
and determining the verification result according to the first determination result.
Optionally, the second processor 602 is further configured to:
determining whether the second verification block is located at a preset position according to the position information of the second verification block;
determining whether the first verification block is located in a preset range according to the position information of the first verification block;
determining that the second verification block is matched with the mark shape on the first verification block under the condition that the second verification block is located at the preset position and the first verification block is located in the preset range;
wherein the preset position is determined based on movement information of the second authentication block, and the preset position range is determined based on the preset position.
Optionally, the verification information further comprises at least one of: input track information of the first input and input duration information of the first input;
a second processor 602, further configured to:
in the case that the first determination result is that the second verification block is matched with the identification shape on the first verification block, performing at least one of the following operations in a preset order: determining whether the first input is a legitimate input; determining whether the input duration of the first input is within a preset time range;
and determining that the verification result is successful if the determination result of the at least one operation is a positive result.
The verification apparatus 600 can implement each process of the method embodiment in fig. 4 in the embodiment of the present application, and achieve the same beneficial effects, and is not described herein again to avoid repetition.
The embodiment of the application also provides communication equipment. Referring to fig. 7, a communication device may include a processor 701, a memory 702, and a program 7021 stored on the memory 702 and executable on the processor 701.
In the case that the communication device is a terminal, when being executed by the processor 701, the program 7021 may implement any steps in the method embodiment corresponding to fig. 2 and achieve the same beneficial effects, and is not described herein again.
In the case that the communication device is a server, when being executed by the processor 701, the program 7021 may implement any steps in the method embodiment corresponding to fig. 4 and achieve the same beneficial effects, and will not be described herein again.
Those skilled in the art will appreciate that all or part of the steps of the method according to the above embodiments may be implemented by hardware associated with program instructions, and the program may be stored in a readable medium. An embodiment of the present application further provides a readable storage medium, where a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, any step in the method embodiment corresponding to fig. 2 or fig. 4 may be implemented, and the same technical effect may be achieved, and in order to avoid repetition, details are not repeated here.
The storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
While the foregoing is directed to the preferred embodiment of the present application, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the principles of the disclosure, and it is intended that such changes and modifications be considered as within the scope of the disclosure.

Claims (11)

1. An authentication method applied to a terminal, the method comprising:
sending verification request information to a server, wherein the verification request information comprises verification area information;
receiving rendering information corresponding to the verification area information, which is sent by the server, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of an identifier on the first verification block;
rendering the first and second proof blocks in the proof area according to the rendering information, and controlling the second proof block to move in the proof area based on the movement information, and controlling the first proof block to move in the proof area based on a first input;
transmitting authentication information to the server in a case where the first input is ended, the authentication information including location information of the second authentication block and location information of the first authentication block;
and receiving the verification result sent by the server.
2. The method of claim 1, wherein the first input comprises a touch sub-input and a slide sub-input;
the rendering the first verification block and the second verification block in the verification area according to the rendering information, controlling the second verification block to move in the verification area based on the movement information, and controlling the first verification block to move in the verification area based on a first input, includes:
rendering a slide control and a slide track of the slide control in the verification area;
under the condition that the touch sub-input to the sliding control is received, rendering the first verification block and the second verification block in the verification area according to the rendering information, and controlling the second verification block to move in the verification area according to the movement information;
and under the condition that a sliding sub-input to the sliding control is received, controlling the sliding control to move on the sliding track, and controlling the first verification block to move in the verification area, wherein the movement track of the first verification block is matched with the movement track of the sliding control.
3. The method according to claim 1 or 2, wherein the verification information further comprises at least one of: input trajectory information of the first input, input length information of the first input.
4. An authentication method applied to a server, the method comprising:
receiving verification request information sent by a terminal, wherein the verification request information comprises verification area information;
generating rendering information corresponding to the verification area information, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of the identifier on the first verification block;
receiving authentication information sent by the terminal, wherein the authentication information comprises position information of the first authentication block and position information of the second authentication block, and the first input is used for controlling the first authentication block to move in the authentication area;
and sending a verification result to the terminal, wherein the verification result is determined based on the verification information.
5. The method according to claim 4, wherein after receiving the authentication information sent by the terminal and before the authentication result sent to the terminal, the method further comprises:
determining whether the second verification block is identical to the identifier shape on the first verification block or not according to the position information of the first verification block and the position information of the second verification block to obtain a first determination result;
and determining the verification result according to the first determination result.
6. The method of claim 5, wherein determining whether the second proof mass conforms to the shape of the mark on the first proof mass based on the location information of the first proof mass and the location information of the second proof mass comprises:
determining whether the second verification block is located at a preset position according to the position information of the second verification block;
determining whether the first verification block is located in a preset range according to the position information of the first verification block;
determining that the second verification block is matched with the mark shape on the first verification block under the condition that the second verification block is located at the preset position and the first verification block is located in the preset range;
wherein the preset position is determined based on movement information of the second authentication block, and the preset position range is determined based on the preset position.
7. The method of claim 5, wherein the verification information further comprises at least one of: input track information of the first input and input duration information of the first input;
the determining the verification result according to the first determination result includes:
in the case that the first determination result is that the second verification block is matched with the identification shape on the first verification block, performing at least one of the following operations in a preset order: determining whether the first input is a legitimate input; determining whether the input duration of the first input is within a preset time range;
and determining that the verification result is successful if the determination result of the at least one operation is a positive result.
8. An authentication apparatus, comprising:
a first transceiver to:
sending verification request information to a server, wherein the verification request information comprises verification area information;
receiving rendering information corresponding to the verification area information, which is sent by the server, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of an identifier on the first verification block;
a first processor to: rendering the first and second proof blocks in the proof area according to the rendering information, and controlling the second proof block to move in the proof area based on the movement information, and controlling the first proof block to move in the proof area based on a first input;
the first transceiver is further configured to:
transmitting authentication information to the server in a case where the first input is ended, the authentication information including location information of the second authentication block and location information of the first authentication block;
and receiving the verification result sent by the server.
9. An authentication apparatus, comprising:
a second transceiver to: receiving verification request information sent by a terminal, wherein the verification request information comprises verification area information;
a second processor to: generating rendering information corresponding to the verification area information, wherein the rendering information comprises shape information of a first verification block, shape information of a second verification block and movement information of the second verification block, and the shape of the second verification block is matched with the shape of the identifier on the first verification block;
the second transceiver is further configured to:
receiving authentication information sent by the terminal, wherein the authentication information comprises position information of the first authentication block and position information of the second authentication block, and the first input is used for controlling the first authentication block to move in the authentication area;
and sending a verification result to the terminal, wherein the verification result is determined based on the verification information.
10. A communication device, comprising: a transceiver, a memory, a processor, and a program stored on the memory and executable on the processor; -wherein the processor, for reading the program in the memory, implements the steps in the authentication method according to any one of claims 1 to 3; or, a step in the validation method according to any of claims 4 to 7.
11. A readable storage medium storing a program, wherein the program, when executed by a processor, implements the steps in the authentication method according to any one of claims 1 to 3; or, a step in the validation method according to any of claims 4 to 7.
CN202111213874.1A 2021-10-19 Verification method, device, communication equipment and readable storage medium Active CN113901427B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111213874.1A CN113901427B (en) 2021-10-19 Verification method, device, communication equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111213874.1A CN113901427B (en) 2021-10-19 Verification method, device, communication equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN113901427A true CN113901427A (en) 2022-01-07
CN113901427B CN113901427B (en) 2025-04-11

Family

ID=

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872435A (en) * 2016-09-27 2018-04-03 中兴通讯股份有限公司 A method and device for security verification
CN108011868A (en) * 2017-11-09 2018-05-08 武汉极意网络科技有限公司 One kind slides verification method and mobile terminal
CN108154019A (en) * 2017-11-30 2018-06-12 天脉聚源(北京)科技有限公司 A kind of method and device of image authentication
CN109241709A (en) * 2018-08-03 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on the verifying of sliding block identifying code
CN109782989A (en) * 2017-11-14 2019-05-21 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN112199658A (en) * 2020-10-16 2021-01-08 咪咕文化科技有限公司 Verification method, system, client device and server device for verification code
CN112257052A (en) * 2020-10-22 2021-01-22 上海悦易网络信息技术有限公司 Verification method and device based on picture
CN112699362A (en) * 2020-12-28 2021-04-23 平安普惠企业管理有限公司 Login verification method and device, electronic equipment and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872435A (en) * 2016-09-27 2018-04-03 中兴通讯股份有限公司 A method and device for security verification
CN108011868A (en) * 2017-11-09 2018-05-08 武汉极意网络科技有限公司 One kind slides verification method and mobile terminal
CN109782989A (en) * 2017-11-14 2019-05-21 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN108154019A (en) * 2017-11-30 2018-06-12 天脉聚源(北京)科技有限公司 A kind of method and device of image authentication
CN109241709A (en) * 2018-08-03 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on the verifying of sliding block identifying code
CN112199658A (en) * 2020-10-16 2021-01-08 咪咕文化科技有限公司 Verification method, system, client device and server device for verification code
CN112257052A (en) * 2020-10-22 2021-01-22 上海悦易网络信息技术有限公司 Verification method and device based on picture
CN112699362A (en) * 2020-12-28 2021-04-23 平安普惠企业管理有限公司 Login verification method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
Serwadda et al. When kids' toys breach mobile phone security
CN107018121B (en) User identity authentication method and device
WO2018032947A1 (en) Method for realizing three-dimensional model authentication code and device thereof
CN106293074B (en) Emotion recognition method and mobile terminal
KR101963782B1 (en) Method for identifying user operation mode on handheld device and handheld device
CN106778151B (en) Handwriting-based user identity recognition method and device
CN108804885B (en) Man-machine verification method and device, storage medium and processor
KR20130015922A (en) Method and apparatus for input password in using game
CN111782068B (en) Method, device and system for generating mouse track and data processing method
CN107194213A (en) A kind of personal identification method and device
CN110138800A (en) Interface alternation and its verification method, log on request generation and verification method and device
CN113496017A (en) Verification method, device, equipment and storage medium
CN103092519A (en) Unlocking method and unlocking device of touch screen mobile phone
US9357388B2 (en) Symbol selection for swipe based authentication
CN106504001A (en) Method of payment and device in a kind of VR environment
CN105068653A (en) Method and apparatus for determining touch event in virtual space
CN111090849A (en) Memory, verification code implementation method, device and equipment
CN113901427A (en) Verification method, verification device, communication equipment and readable storage medium
CN111062022B (en) Slider verification method and device based on disturbance visual feedback and electronic equipment
CN113901427B (en) Verification method, device, communication equipment and readable storage medium
CN110795706B (en) Hash-based verification method, equipment, storage medium and device
US20170168581A1 (en) Method and Device for Controlling Operation Components Based on Somatosensory
CN117170505B (en) Virtual keyboard control method and system
CN112487376A (en) Man-machine verification method and device
CN111859322A (en) Identity verification method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant