CN-121980554-A - Man-machine verification method, device, electronic equipment and storage medium
Abstract
The application relates to a man-machine verification method, a device, electronic equipment and a storage medium, which comprise the steps of responding to a man-machine verification request of a user, obtaining a workload certification verification code and displaying the workload certification verification code to the user, wherein the workload certification verification code is determined based on the request frequency of the man-machine verification request received by a system, responding to the verification operation of the workload certification verification code by the user, verifying user information submitted by the user, responding to the verification passing of the user information, obtaining a background image and a geometric verification code, displaying the background image and the geometric verification code to the user, and responding to the verification operation of the geometric verification code by the user, and confirming that the man-machine verification passes. The method can not only effectively resist automatic attack, but also provide good user experience.
Inventors
- JIANG LIXIN
- WANG LU
- CHEN JIAYI
- ZHANG SHUHUI
- LI ZHANSHAN
Assignees
- 吉林大学
Dates
- Publication Date
- 20260505
- Application Date
- 20251211
Claims (10)
- 1. A human-machine authentication method, the method comprising: responding to a man-machine verification request of a user, acquiring a workload proving verification code, and displaying the workload proving verification code to the user, wherein the workload proving verification code is determined based on the request frequency of the man-machine verification request received by a system; responding to the verification operation of the user on the workload proof verification code, and verifying the user information submitted by the user; responding to the verification of the user information, acquiring a background image and a geometric verification code, and displaying the background image and the geometric verification code to the user; And responding to the verification operation of the user on the geometric verification code, and confirming that the man-machine verification is passed.
- 2. The method according to claim 1, wherein the method further comprises: acquiring the request frequency of man-machine verification requests received by a current time system; Determining verification difficulty according to the request frequency; determining constraint conditions according to the verification difficulty; And generating the workload certification verification code according to the constraint condition and based on a hash algorithm.
- 3. The method of claim 2, wherein said determining the difficulty of verification based on the frequency of requests comprises: when the request frequency exceeds a first set frequency value, determining that the verification difficulty is a first difficulty value; When the request frequency exceeds a second set frequency value and does not exceed the first set frequency value, determining that the verification difficulty is a second difficulty value; Determining that the verification difficulty is a default difficulty value when the request frequency does not exceed the second set frequency value; The first difficulty value is larger than the second difficulty value, and the second difficulty value is larger than the default difficulty value.
- 4. The method of claim 2, wherein the presenting the proof of work verification code to the user comprises: Displaying the workload certification verification code and the random verification code to the user; The responding to the verification operation of the user on the workload certification verification code comprises the following steps: if the operation information fed back by the user through the front end is received in the set time, determining a verification code corresponding to the operation information fed back by the front end; And checking whether the corresponding verification code meets the verification condition or not through the constraint condition and based on the hash algorithm, if so, responding to the verification operation of the user on the workload proving verification code.
- 5. The method according to claim 1, wherein the method further comprises: Randomly generating a plurality of geometric figures in the background graph, and configuring the colors of lines of the geometric figures based on the colors of the background graph; configuring the interference lines of the geometric figures based on the number of the geometric figures; And generating the geometric verification code based on the configured geometric figure.
- 6. The method according to any one of claims 1-5, further comprising: Acquiring a picture to be processed; After converting the picture to be processed into an HSV mode, randomly adjusting hue shift and enhancing saturation to obtain a preliminary processed picture; and carrying out red-green gradient layer processing at random angles on the preliminary processing picture to obtain the background picture.
- 7. The method of claim 1, wherein the geometric verification code is a plurality of geometric verification codes, each geometric verification code corresponds to a background image, and the presenting the background images and the geometric verification code to the user comprises: sequentially displaying each geometric verification code and a corresponding background image to the user; the responding to the verification operation of the geometric verification code by the user comprises the following steps: and responding to the user to finish the verification operation of the corresponding geometric verification code in each displayed background image in turn.
- 8. A human-machine authentication device, the device comprising: The first display module is used for responding to a man-machine verification request of a user, acquiring a workload verification code and displaying the workload verification code to the user, wherein the workload verification code is determined based on the request frequency of the man-machine verification request received by the system; The first verification module is used for responding to the verification operation of the user on the workload proof verification code and verifying the user information submitted by the user; The second display module is used for responding to the verification of the user information, acquiring a background image and a geometric verification code, and displaying the background image and the geometric verification code to the user; and the second verification module is used for responding to the verification operation of the user on the geometric verification code and confirming that the man-machine verification passes.
- 9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any one of claims 1 to 7 when the computer program is executed by the processor.
- 10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any one of claims 1 to 7.
Description
Man-machine verification method, device, electronic equipment and storage medium Technical Field The present application relates to the field of verification code processing technologies, and in particular, to a man-machine verification method, a device, an electronic apparatus, and a storage medium. Background The verification code technology is originally derived from scientific research projects of higher institutions, which are all called 'Completely Automated Public Turing test to tell Computers and Humans Apart', namely 'full-automatic distinguishing Turing test of computers and human beings'. As an automated program for distinguishing whether an object is a computer or a human, a verification code provides an important security for preventing access of a malicious program or machine. The key idea of the verification code is that a question is automatically generated through a computer, and the question is judged according to the answer of a user, wherein the answer is correct, the answer is judged to be human, and the answer is wrong, the answer is judged to be machine. Generally, a verification code is considered to have a high validity if its human correct pass rate is higher than 90% and its machine pass rate is lower than 1%. With the rapid development of deep learning technology, an automatic attack means is continuously upgraded, and the existing mainstream man-machine verification method faces double bottlenecks, namely, the existing mainstream man-machine verification method is insufficient in complex attack resistance and difficult to cope with a novel machine breakthrough means, and the existing mainstream man-machine verification method is high in user interaction cost and easy to cause poor experience. Therefore, the development of the man-machine verification method which can not only effectively resist automatic attack, but also provide good user experience has important research value and application prospect. Disclosure of Invention Based on this, it is necessary to provide a man-machine verification method, a device, an electronic apparatus and a storage medium, which can not only effectively resist an automation attack, but also provide a good user experience. According to a first aspect of certain exemplary embodiments of the present application, there is provided a human-machine verification method, comprising obtaining a workload certification verification code in response to a human-machine verification request of a user and presenting the workload certification verification code to the user, wherein the workload certification verification code is determined based on a request frequency of the human-machine verification request received by a system, verifying user information submitted by the user in response to a verification operation of the workload certification verification code by the user, obtaining a background image and a geometric verification code in response to a verification pass of the user information, and presenting the background image and the geometric verification code to the user, and confirming that the human-machine verification pass in response to a verification operation of the geometric verification code by the user. In one example, the man-machine verification method further comprises the steps of obtaining the request frequency of man-machine verification requests received by the current time system, determining verification difficulty according to the request frequency, determining constraint conditions according to the verification difficulty, and generating a workload certification verification code according to the constraint conditions and based on a hash algorithm. In one example, determining the verification difficulty according to the request frequency includes determining that the verification difficulty is a first difficulty value when the request frequency exceeds a first set frequency value, determining that the verification difficulty is a second difficulty value when the request frequency exceeds a second set frequency value and does not exceed the first set frequency value, and determining that the verification difficulty is a default difficulty value when the request frequency does not exceed the second set frequency value, wherein the first difficulty value is greater than the second difficulty value and the second difficulty value is greater than the default difficulty value. In one example, the method comprises the steps of displaying a workload proof verification code and a random verification code to a user, responding to verification operation of the workload proof verification code by the user, determining the verification code corresponding to the operation information fed back by the front end if the operation information fed back by the front end by the user is received in a set time, and verifying whether the corresponding verification code meets the verification condition or not through constraint conditions and based on a h