Verification method and device

ABSTRACT

Machine-based verification is minimized by presenting a web page to a user that includes a number of objects in a verification image, and then instructing the user to click on the objects in the verification image in a particular order. The user selected order is then compared to a known correct order, and verification is complete when the user selected order matches the known correct order.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/898,071, filed on Feb. 15, 2018, which claims priority to ChinesePatent Application No. 201710090776.0, filed on Feb. 20, 2017, thedisclosure and content of each of which are incorporated herein byreference in their entireties.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The present application relates to the field of information securityand, in particular, to a verification method and device.

2. Description of the Related Art

In the prior art, verification programs are set in multiple browserpages or applications, and information input by users is verified toprevent malicious cyber activity. In order to prevent verificationcontent in the verification process from being automatically recognizedby malicious cyber activity, the prior art provides the followingverification methods:

(1) A verification code image is presented on a browser page, and a useris prompted to type object words letter by letter in the verificationcode image to perform verification. In this verification method, theobject words in the verification code image are generally an orderedfixed-length string of words. If the verification code is simple, amachine quickly recognizes it and the letters of the object words can beinput through the machine, lowering the verification security. If theverification code is complex, it is also difficult for a human torecognize it, assuring a high rate of verification failure. Moreover,the user is required to input the object words in this method, making ita complicated operation.

(2) A verification image matrix and object prompt message are presentedto prompt a user to select an object image from the verification imagematrix. In this verification method, generally one object is prompted inthe object prompt message, the verification image matrix has multipleanswers, and if a high resolution verification image matrix is set, theverification image matrix is easily learned and recognized by a machine,lowering the verification security. If a low resolution verificationimage matrix is set, the verification image matrix has poordiscrimination and is also difficult for the user to recognize, assuringa high rate of verification failure.

No effective solution has been proposed at present for theaforementioned problem of low verification security.

SUMMARY OF THE INVENTION

The present invention provides a verification process that is difficultfor a machine to execute without human interaction, thereby limiting theability of bots to enter human-only sites. The present inventionincludes a verification method. The verification method comprisesgenerating a random sequence of randomly determined objects. Theverification method also comprises generating a verification image thatcomprises a plurality of object images for the randomly determinedobjects, and a message that instructs a user to sequentially click onthe plurality of object images in the verification image in a specifiedorder. The verification method also comprises converting the messageinto a picture.

The present invention also includes a non-transitory computer-readablemedium that has computer executable instructions stored thereon thatwhen executed by a processor cause the processor to implement a methodof verification. The method comprises generating a random sequence ofrandomly determined objects. The method also comprises generating averification image that comprises a plurality of object images for therandomly determined objects, and a message that instructs a user tosequentially click on the plurality of object images in the verificationimage in a specified order. The method also comprises converting themessage into a picture.

The present invention additionally includes a verification device. Theverification device comprises a memory that stores instructions, and aprocessor coupled to the memory. The processor to execute theinstructions to generate a random sequence of randomly determinedobjects. The processor to further generate a verification image thatcomprises a plurality of object images for the randomly determinedobjects, and a message that instructs a user to sequentially click onthe plurality of object images in the verification image in a specifiedorder. Further, the processor to further convert the message into apicture.

A better understanding of the features and advantages of the presentinvention will be obtained by reference to the following detaileddescription and accompanying drawings which set forth an illustrativeembodiment in which the principals of the invention are utilized.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings described herein are used for providingfurther understanding of the present application and constitute a partof the present application. Exemplary embodiments of the presentapplication and the description thereof are used for explaining thepresent application instead of constituting improper limitations on thepresent application.

FIG. 1 is a diagram illustrating an example of a computer system 100 inaccordance with the present invention.

FIG. 2(a) is a flow chart illustrating an example of a verificationmethod 200 in accordance with the present invention.

FIG. 2(b) is a flow chart illustrating a method 220 that generates averification image and a prompt message in accordance with the presentinvention.

FIG. 3 is a flow chart illustrating an example of a verification method300 in accordance with the present invention.

FIG. 4 is a flow chart illustrating an example of a method 400 inaccordance with the present invention.

FIG. 5 is a block diagram illustrating an example of a verificationdevice 500 in accordance with the present invention.

FIG. 6 is a block diagram illustrating an example of a computer terminal600 (or mobile apparatus) in accordance with the present invention.

DETAILED DESCRIPTION OF THE INVENTION

To enable those skilled in the art to better understand the solutions ofthe present application, the technical solutions in the embodiments ofthe present application will be described clearly and completely belowwith reference to the drawings in the embodiments of the presentapplication. It is apparent that the described embodiments are merelysome, rather than all, of the embodiments of the present application. Onthe basis of the embodiments in the present application, all otherembodiments obtained by those of ordinary skill in the art withoutmaking creative efforts shall fall within the protection scope of thepresent application.

It should be noted that the terms such as “first” and “second” in thespecification, the claims, and the aforementioned drawings of thepresent application are used to distinguish between similar objects, andare not necessarily used to describe a specific sequence or priority. Itshould be understood that numbers used in this way are interchangeablein a suitable situation, so that the embodiments of the presentapplication described herein can be implemented in a sequence inaddition to a sequence shown or described herein. In addition, termssuch as “include” and “have” and any variation thereof are intended tocover non-exclusive inclusion, for example, processes, methods, systems,products, or apparatuses including a series of steps or units are notnecessarily limited to the steps or units that are clearly listed, andmay include other steps or units that are not dearly listed or that areinherent to the processes, methods, products, or apparatuses.

The following interpretation applies to Verification code (CAPTCHA): apublic automatic program for recognizing whether a user is a computer ora human. The verification code can be used to prevent malicious passwordcracking, ticket brushing, and forum trolling. The verification code canalso effectively prevent a certain hacker from making constant loginattempts on a specific registered user by brute-force cracking using aspecific program.

It should be noted that steps shown in the flowcharts in the drawingsmay be executed in a computer system, such as a set of computerexecutable instructions, Furthermore, although the logic sequence isshown in the flowcharts, in some cases, the shown or described steps maybe executed in a sequence different from the sequence herein.

FIG. 1 shows a diagram that illustrates an example of a computer system100 in accordance with the present invention. As shown in FIG. 1,computer system 100 includes a terminal 110, a server 120, and a network130 that couples terminal 110 to server 120.

Terminal 110 can be implemented with, but is not limited to, any mobilecomputing device, such as a smart phone, as well as a computer terminal,a tablet computer, or a similar computing device. Network 130 can beimplemented with, but is not limited to, a wide area network, ametropolitan area network, a local area network, the internet, or othertypes of data networks.

Terminal 110 may perform a network service that is performed by a serveror a group of servers. A network server is a network-based user service,such as a verification service, a social networking service, a cloudresource, email, online payment, or other online applications.

In operation, terminal 110 establishs a connection to server 120 throughdata network 130 by generating and sending a verification request toserver 120. Server 120 generates a verification image and a promptmessage, and presents the verification image and the prompt message toterminal 110 for display to a user. For example, the prompt message caninstruct the user to click on a number of objects within theverification image in a particular order.

The user may input operations on terminal 110 in response to the promptmessage, such as by clicking a number of positions on the verificationimage. Terminal 110 records the positions on the verification image thatwere clicked on by the user, and submits the information of thepositions that were clicked on by the user to server 120 forverification. Performing the verification method in this embodiment ofthe present invention by terminal 110 is performing the verificationmethod by client software installed thereon.

In an alternative embodiment, the verification method is applied toterminal 110, that is, the verification method in this embodiment of thepresent invention can be implemented without the need to include aserver in the network environment. Specifically, a processor of terminal110 receives a generated verification request and sends the verificationrequest to a verification processor of terminal 110 (the verificationprocessor may be a virtual processing unit in the processor of terminal110). Terminal 110 generates a verification image and a prompt message,and displays the verification image and the prompt message to a user.The user may input operations on a screen of terminal 110. The processorrecords the positions clicked on by the user on the verification image,and verifies the submitted information of the positions clicked on bythe user.

It should be noted herein that terminal 100 shown in FIG. 1 can includea touch display (also referred to as “touch screen” or “touch displayscreen”). In some embodiments, terminal 110 (or mobile apparatus) shownin FIG. 1 has a graphical user interface (GUI) that allows the user toperform man-machine interaction with the GUI through finger contact onthe touch screen surface and/or a gesture.

The man-machine interaction function includes the followinginteractions: inputting a predetermined verification operation, webpagecreating, plotting, word processing, electronic document making, gaming,video conferencing, instant messaging, receiving and sending of emails,call interfacing, digital video playing, digital music playing and/ornetwork browsing, and so on. Executable instructions for executing theman-machine interaction function are configured/stored in one or moreprocessor executable computer program products or readable storagemedia.

FIG. 2(a) shows a flow chart that illustrates an example of averification method 200 in accordance with the present invention. Asshown in FIG. 2(a), method 200 includes the following steps.

Step S201: An operator enters a page requiring verification through anapplication of a terminal, such as terminal 110.

Step S203: Generate a verification request through the page requiringverification.

The page may be an information presentation page in the application, ormay be a browser page (not limited in the present invention), so as togenerate a verification request. The verification request may begenerated by triggering entry into the page requiring verification. Theverification request may also be generated by performing an operationrequiring verification on the page requiring verification. For example,a submit operation is performed on the page requiring verification, anda verification request is generated upon detecting that execution of thesubmit operation needs to be verified. The aforementioned methods forgenerating a verification request are merely examples for descriptionand do not specifically limit the present application.

Step S205: After receiving the verification request, a server, such asserver 120, generates a verification image and a prompt message.

Step S207: Display the verification image and the prompt message on theterminal.

After generating the verification image and the prompt message, theserver may send the verification image and the prompt message to theterminal, and in an embodiment, may send the verification image and theprompt message together to a client (logging in to the terminal).

After receiving the verification image and the prompt message, theterminal presents the verification image and the prompt message in apredetermined format. For example, the prompt message is presented inthe upper left corner, top center, upper right corner, lower leftcorner, bottom center, or lower right corner of the verification image,or the prompt message is presented in an empty area of the verificationimage. Therefore, the location of the prompt message is not limited inthe present invention.

Step S209: Acquire operations input by the user.

The user may sequentially click corresponding positions on theverification image according to the prompt message, and the terminalrecords the operations input by the user. The user may submitverification after the operations are complete, and the terminal maysubmit the recorded operations input by the user to the server.

Step S211: Perform verification according to the operations input by theuser.

It is verified whether the operations input by the user are consistentwith the order of position information of the multiple objects in apredetermined range. If yes, the verification is successful. Otherwise,the verification is unsuccessful.

FIG. 2(b) shows a flow chart that illustrates a method 220 thatgenerates a verification image and a prompt message in accordance withthe present invention. Method 220, which can be used to implement stepS205 in FIG. 2(a), includes the following steps.

Step S202: Acquire multiple objects.

The terminal sends the generated verification request to the server, andthe server acquires multiple objects for verification in response to theverification request.

In an alternative embodiment, multiple objects may be pre-stored in adatabase, and upon receiving a verification request, the server randomlydetermines the quantity and type of objects, and acquires multipleobjects from the database according to the randomly determined quantityand type of the objects. The random determining operation herein may beimplemented through a random function. In another embodiment, the serveracquires a group of pre-stored information from the database, whereinthe information contains multiple objects.

In still another embodiment, the server may collect objects (forexample, word objects “How”, “are”, “you”, and “?”) generated by theuser in the historical verification process, and store them in thedatabase. Upon receiving a verification request, the server extracts oneor more historically collected objects from the database.

The multiple objects for verification comprise: one or more words and/orpictures recording entity information or words. For example, the objectsmay be words “Patent” and “Invention.” In an embodiment, the quantity ofthe multiple objects may be a fixed quantity or an unfixed quantity,that is, the number of objects may also be variable. For example, themultiple objects may be four objects: “How”, “are”, “you”, and “?”, ormay be two objects: “Patent” and “Invention”, and are therefore notlimited in the present invention.

The entities in the aforementioned embodiment may refer to any tangiblesubstances existing objectively in nature, for example, animals, plants,fruits, buildings, or head portraits.

Step S204: Generate an order of the multiple objects.

In an embodiment, an order of the multiple objects may be randomlygenerated using a random function. For example, a number of each objectis set, a sequence corresponding to multiple numbers is generated, andthe order of the multiple objects is set corresponding to the order ofthe numbers in the sequence. For example, four object words “How”,“are”, “you”, and “?” are acquired, numbers of the four object words areset, which are respectively: “How” corresponds to 1, “are” correspondsto 2, “you” corresponds to 3, and “?” corresponds to 4, a sequence“2134” of the numbers is generated, and then the determined order of themultiple objects is “are”, “How”, “you”, and “?”.

In another embodiment, the order of the multiple objects is generatedaccording to an acquisition order of the multiple objects.

Step S206: Generate a verification image according to the multipleobjects, wherein the multiple objects are scattered in a predeterminedrange to form the verification image.

In an embodiment, a verification image corresponding to the multipleobjects is generated according to a predetermined range, wherein thepredetermined range is a predetermined size of the verification image.In an embodiment, the predetermined range is consistent with the size ofthe finally generated verification image.

The generating a verification image corresponding to the multipleobjects according to a predetermined range includes determiningcoordinates in the predetermined range corresponding to an objectquantity, selecting a coordinate of each object from the determinedcoordinates, and generating the verification image according to thecoordinate and the multiple objects, wherein a coordinate of an objectin the verification image matches the object coordinate selected fromthe determined coordinates.

In an embodiment, if a vector difference between the coordinate of theobject in the verification image and the object coordinate selected fromthe determined coordinates is less than a predetermined vectordifference, it is determined that the coordinate of the object in theverification image matches the object coordinate selected from thedetermined coordinates. Otherwise, it is determined that the coordinateof the object in the verification image does not match the objectcoordinate selected from the determined coordinates.

Further, in an embodiment, the determining coordinates in thepredetermined range corresponding to an object quantity may beimplemented by acquiring a quantity of the multiple objects, andrandomly generating the coordinates in the predetermined rangecorresponding to the object quantity after determining the quantity ofthe multiple objects.

It should be further noted that after the coordinates corresponding tothe quantity of the multiple objects are randomly generated in thepredetermined range, it is detected whether a distance between every twocoordinates is greater than a predetermined safe distance. If thedistance between every two coordinates is greater than the safedistance, the generated coordinates are determined as coordinates of themultiple objects. If the distance between every two coordinates is lessthan the safe distance, the generated coordinates are adjusted so thatthe distance between every two coordinates is greater than thepredetermined safe distance.

In the aforementioned embodiment, the predetermined safe distance may bea preset distance, and the distance between the coordinates or thepredetermined safe distance may be represented by pixels or a vectorlength. For example, the quantity of pixels between two coordinates isdetermined as a distance between the two coordinates, or the length of avector formed by two coordinates is set as a distance between the twocoordinates.

The predetermined safe distance may be a distance pre-stored in thedatabase, or may be determined based on information lengths of themultiple objects. In an embodiment, a maximum information length in themultiple objects is set as the predetermined safe distance. For example,a maximum information length in the multiple objects is 15 pixels, andthen the predetermined safe distance is 15 pixels.

Through the aforementioned embodiment, the relationship betweencoordinates of the objects is defined so that the objects do not overlapeach other in the generated verification image, thereby facilitatinguser recognition.

In the aforementioned embodiment, a verification image is generatedaccording to multiple objects so that the randomicity of generating theverification image is further increased, and the security of averification code is further improved.

Further, a corresponding verification answer may be generated while orafter the verification image is automatically generated according to themultiple generated objects.

In an embodiment, while the verification image is automaticallygenerated according to the multiple generated objects, positioninformation of the objects in the verification image can be obtained,and multiple pieces of ordered position information are generated toserve as an answer for determining whether the verification issuccessful.

Specifically, the position information may be a coordinate point or asize range. For example, a central coordinate of each object is acquiredand the acquired central coordinate is set as position information ofthe object, and so on, so as to obtain multiple pieces of positioninformation of the multiple objects.

For another example, a size of each object is acquired, and a size rangecorresponding to each object is determined based on the size. Further,after the size of each object is acquired, the size is enlarged by apredetermined ratio, and the size after enlargement is determined as asize range corresponding to each object.

In this embodiment, an enlarged size of an object is used as a sizerange corresponding to the object, instead of directly using a size ofthe object as the size range of the object, thereby avoiding failure toperform verification due to the deviation of a manual operation positionof a user, and increasing the verification success rate.

Step S208: Present the verification image and prompt message, whereinthe prompt message is used for instructing a user to operate the objectsin the verification image according to the order so as to performverification.

After the verification image is generated, the server generates theprompt message corresponding to the verification image to prompt theuser to sequentially operate the objects in the verification image toperform verification, and presents the verification image and the promptmessage to the user.

For example, the prompt message can be “Please sequentially click“Patent” and “Invention” in the figure”, or “Please sequentially click‘Apple, Banana, and Cup’ in the figure”, or “Please sequentially click‘Apple, Patent, and Banana’ in the figure”, or the like.

In an embodiment, when the objects are pictures, generating averification image according to the multiple objects may includeacquiring at least one of the multiple pictures for variationprocessing, and generating the verification image using the multiplepictures after the variation processing, The variation processingincludes at least one of transformation, rotation, scaling, andblurring.

The transformation operation refers to “narrowing” by a lens or digitalprocessing method in a horizontal direction or a vertical direction soas to change an original aspect ratio of a picture without changing theresolution of the picture. The rotation operation refers to an operationof rotating a picture about a vertex by a certain angle in a plane.

The scaling operation refers to a process of adjusting the size of apicture. After the size of a picture is increased, the visibility ofpixels constituting the picture becomes higher. On the contrary,shrinkage of a picture increases the smoothness and definition of thepicture, The blurring operation may refer to an operation of reducingthe resolution of a picture.

In an alternative embodiment, presenting the prompt message includespresenting the prompt message using text, or converting the promptmessage into a picture and displaying the picture.

Through the aforementioned embodiment, the prompt message for multipleordered objects may be presented to the user by text or by convertingthe prompt message into an image, and the conversion of the promptmessage into an image can further improve security and avoid automaticrecognition and attack by a machine.

In order to further increase the difficulty of recognizing averification code by a machine, converting the prompt message into apicture and displaying the picture includes adding interferenceinformation to a region in the picture wherein the prompt message isdisplayed, and displaying the picture to which the interferenceinformation is added, The interference information is used for coveringor disturbing a meaning expressed by the prompt message.

In order to increase the difficulty of recognizing a verification codeby the machine without affecting the user's recognition of the objects,resolutions of the objects and the interference information may be setto be different. For example, the set resolution of the objects ishigher than the resolution of the interference information. Further, inan embodiment, a difference between the resolution of the objects andthe resolution of the interference information is less than apredetermined difference.

According to the aforementioned embodiment of the present application,the presenting prompt message may comprise sending the prompt message tothe user through a short message or instant messaging tool so as topresent the prompt message.

In an embodiment, the verification image is presented on the screen ofthe terminal, and the prompt message is sent to the user through a shortmessage or other instant messaging tools (for example, an instantapplication) so that the verification image and the prompt message canbe sent separately. In this way, even if the machine recognizesinformation in the verification image, the verification operation cannotbe accurately performed as the order prompted by the prompt messagecannot be known, thereby further ensuring verification security.

According to the aforementioned embodiment of the present invention,after the verification image has been generated according to themultiple objects, the method may further include determining positioninformation of the multiple objects in the predetermined range, andacquiring position information of operations performed by the user inthe predetermined range. In addition, the method includes recording anorder of the position information of the performed operations, anddetermining whether the order of the position information of theoperations performed by the user is consistent with an order of theposition information of the multiple objects in the predetermined range.If yes, the verification is successful.

In an embodiment, the multiple pieces of ordered position informationsubmitted by the user are compared with the automatically generatedanswer in the aforementioned embodiment to determine whether they areconsistent and, if yes, the verification is successful. Otherwise, theverification is unsuccessful. When the judgment is made, the positioninformation is not required to be completely the same for the sake offault tolerance.

In an embodiment, the aforementioned operations may be click operations.Position information of the multiple objects in the predetermined rangeis determined, position information of operations performed by the userin the predetermined range is acquired, and an order of the positioninformation of the performed operations is recorded. It is determinedwhether the order of the position information of the operationsperformed by the user is consistent with an order of the positioninformation of the multiple objects in the predetermined range. If yes,the verification is successful.

In this embodiment of the present application, a user sequentiallyclicks multiple objects on an image and it is verified whether the clickorder and positions are correct so as to complete the verificationprocess. The verification process can be completed with just clicks fromthe user, thereby simplifying the operation process. Meanwhile, averification answer is ordered and variable in length and positioninformation is automatically and randomly generated, making it difficultto be recognized by the machine so that manual judgment is required,thus achieving higher security.

FIG. 3 shows a flow chart that illustrates an example of a verificationmethod 300 in accordance with the present invention. Method 300 includesthe following steps.

Step S301: Acquire a verification request.

Step S302: Generate a prompt message for multiple ordered objects and averification image.

In an embodiment, after a verification request is received, multipleordered objects are automatically generated, a prompt message forprompting the order is generated, and a verification image isautomatically generated according to the multiple generated objects. Inan embodiment, while the verification image is generated, step S307 maybe performed. In step S307, an answer is generated according to positioninformation of the generated objects in the verification image. That is,multiple pieces of ordered position information are generated accordingto the position information of the generated objects in the verificationimage so as to serve as the answer for determining whether theverification is successful.

The objects for verification may be words, or may be of a recognizabletype such as articles. In addition, the number of the objects may alsobe variable. For example, the objects for verification may be “Pleasesequentially click ‘Patent’ and ‘Invention’ in the figure”, or may be“Please sequentially click ‘Apple’, ‘Banana’, and ‘Cup’ in the figure”,or may be “Please sequentially click ‘Apple’, ‘Patent’, and ‘Banana’ inthe figure”, or the like.

Step S303: Present the verification image and the prompt message thatare generated to a user.

In an embodiment, the prompt message for the multiple ordered objectsand the verification image that are generated are together presented tothe user. The prompt message for the multiple ordered objects may bepresented to the user by text or by converting the prompt message intoan image, and the conversion of the prompt message into an image canfurther improve security and avoid automatic recognition and attack bythe machine.

Step S304: Record positions clicked on by the user on the verificationimage.

In an embodiment, operations of the user sequentially clickingcorresponding positions on the verification image according to theprompt message are received, and information of the positions clicked onby the user s recorded in turn through a system.

Step S305: Submit the information of the positions clicked on by theuser for verification.

In an embodiment, the user submits verification after completingclicking, and the system submits the received position information forverification. After the user completes clicking, the system mayautomatically enter the verification process, or the user may submitverification by clicking “OK”.

Step S306: Compare the information of the positions clicked on by theuser with the answer, and determine whether they are the same.

In an embodiment, multiple pieces of ordered position information of theoperations of the user are compared with the automatically generatedanswer to determine whether they are consistent. If yes, step S308 isperformed. Otherwise, step S309 is performed and the verification isunsuccessful.

Further, in an embodiment, when the judgment is made, the positioninformation is not required to be completely the same for the sake offault tolerance.

In the aforementioned embodiment, a verification answer is ordered andvariable in length and position information is randomly generated,making it difficult to be recognized by the machine so that manualjudgment is required, thus improving verification security.

FIG. 4 shows a flow chart that illustrates an example of a method 400 inaccordance with the present invention. Method 400 generates averification image, a prompt message, and an answer. In an embodiment,an object library and an image library (or a vector library)corresponding to objects may be prepared offline in advance, and data inthe libraries may be self-defined according to the situation. Eachobject, in turn, may correspond to multiple pieces of image or vectordata, Method 400 includes the following steps.

Step S401: Randomly generate a sequence of multiple ordered objectsaccording to the object library.

For example, “Apple, Patent, and Banana”, Meanwhile, image data orvector data corresponding to each object may be obtained. If the objectcorresponds to multiple pieces of image or vector data, one piece ofimage or vector data is randomly selected.

Step S402: Randomly generate position information of the objects.

In an embodiment, position information is randomly generated for eachobject in a size range of a verification image. The position informationgenerated herein should be properly scattered to avoid obstructing eachother by object images.

Step S403: Generate a prompt message according to the object sequence,for example, “Please sequentially click ‘Apple, Patent, and Banana’ inthe figure”.

Step S404: Synthesize a verification image according to the positioninformation of the objects and images corresponding to the objects.

In an embodiment, image data or vector data corresponding to each objectis transformed, for example, rotated or scaled, to a certain extent soas to generate new object image data and synthesize the finalverification image.

Step S405: Generate an answer. In an embodiment, a group of multiplepieces of ordered position information is obtained according to theobject sequence and position information corresponding to the objects soas to serve as the verification answer.

In an embodiment, a verification image may be generated before averification request is made, so as to reduce the time of theverification process.

Through the aforementioned embodiment, an ordered, variable-length, andrandom-position verification answer can be randomly generated, andverification objects are set as more than a single type of objects,words, articles, other recognizable articles, and so on. Through theaforementioned embodiment, a user performs verification by clicking sothat the operation is simple, easy recognition for humans, and difficultrecognition for machines are achieved, thereby greatly improvingverification security.

It should be noted that in order to describe the foregoing methodembodiments briefly, all the method embodiments are expressed as acombination of a series of actions, but those skilled in the art shouldknow that the present application is not limited by the sequence of thedescribed actions because certain steps can adopt other sequences or canbe carried out at the same time according to the present application.Secondly, those skilled in the art should also know that all theembodiments described in the specification belong to preferredembodiments, and the involved actions and modules are not necessarilyrequired by the present application.

Through the preceding description of the embodiments, those skilled inthe art can clearly understand that the method according to theaforementioned embodiment may be implemented by software plus anecessary general hardware platform, and certainly may also beimplemented by hardware. In most cases, however, the former is thepreferred implementation. Based on such understanding, the essence ofthe technical solutions of the present application or the part thatmakes contributions to the prior art may be embodied in the form of asoftware product. The computer software product is stored in a storagemedium (for example, a ROM/RAM, a magnetic disk, or an optical disc) andincludes several instructions for instructing a terminal apparatus(which may be a mobile phone, a computer, a server, a network apparatus,or the like) to perform the methods described in the embodiments of thepresent application.

FIG. 5 shows a block diagram that illustrates an example of averification device 500 in accordance with the present invention.Verification device 500 can implement the aforementioned verificationmethod. As shown in FIG. 5, verification device 500 includes a firstacquisition unit 510, which is configured to acquire multiple objects,and a first generation unit 530, which is configured to generate anorder of the multiple objects.

As further shown in FIG. 5, verification device 500 also includes asecond generation unit 550, which is configured to generate averification image according to the multiple objects. The multipleobjects, in turn, are scattered in a predetermined range to form theverification image, Device 500 further includes a presentation unit 570,which is configured to present the verification image and a promptmessage, The prompt message is used for instructing a user to operatethe objects in the verification image according to the order so as toperform verification.

Through the aforementioned embodiment, after first acquisition unit 510acquires multiple objects, an order of the multiple objects is generatedby first generation unit 530, and a verification image is generated bysecond generation unit 550 according to the multiple objects, Themultiple objects are scattered in a predetermined range to form theverification image, and the verification image and the prompt messageare presented by the presentation unit. The prompt message is used forinstructing a user to operate the objects in the verification imageaccording to the order so as to perform verification. In theaforementioned embodiment, multiple ordered objects are generated, andthe multiple ordered objects are scattered in a predetermined range togenerate a verification image, and a user is prompted to performverification according to the order of the multiple objects. Since boththe objects and the order of the objects are randomly generated, it isdifficult for the machine to recognize them, thereby solving the problemof low verification security in the prior art and improving verificationsecurity.

In an embodiment, triggered by a request for generating a verificationimage, multiple objects are acquired. A page requiring verification (thepage may be an information presentation page in an application, or maybe a browser page, therefore it is not limited in the presentapplication) is entered through a screen of a terminal so as to generatea verification request. The verification request may be generated bytriggering entry into the page requiring verification. The verificationrequest may also be generated by performing an operation requiringverification on the page requiring verification, For example, a submitoperation is performed on the page requiring verification, and averification request is generated upon detecting that execution of thesubmit operation needs to be verified. The aforementioned method forgenerating a verification request is merely an example for descriptionand does not specifically limit the present application.

After a verification request is generated, the verification request issent to a server or a verification processor of the terminal, and theverification processor acquires multiple objects in response to theverification request. The objects are objects for verification, and theobjects are represented in many forms. For example, the objects forverification may be words, or may be of a recognizable type such asarticles. For example, the objects may be words “Patent” and“Invention”, In an embodiment, the quantity of the objects may be afixed quantity or an unfixed quantity, that is, the number of theobjects may also be variable. For example, the objects may be words“How”, “are”, “you”, and “?”, or may be words “Patent” and “Invention”.Therefore, the objects are not limited in the present invention.

In an alternative embodiment, multiple objects may be pre-stored in adatabase, and upon receiving a verification request, the quantity andtype of objects are randomly determined, and multiple objects areacquired from the database according to the randomly determined quantityand type of the objects. The random determining operation herein may beimplemented through a random function.

In an alternative embodiment, a sequence of multiple objects is randomlygenerated, and an order of the multiple objects is set according to thesequence.

In an alternative embodiment, an order of multiple objects is randomlygenerated. For example, a number of each object is set, a sequencecorresponding to multiple numbers is generated, and the order of themultiple objects is set corresponding to the order of the numbers in thesequence, For example, four object words “How”, “are”, “you”, and “?”are acquired, numbers of the four object words are set, which arerespectively: “How” corresponds to 1, “are” corresponds to 2, “you”corresponds to 3, and “?” corresponds to 4, a sequence “2134” of thenumbers is generated, and then the determined order of the multipleobjects is “are”, “How”, “you”, and “?”.

In another alternative embodiment, the order of the multiple objects isgenerated according to an acquisition order of the multiple objects.

In an embodiment, a verification image corresponding to the multipleobjects is generated according to a predetermined range, wherein thepredetermined range is a predetermined size of the verification image.In an embodiment, the predetermined range is consistent with the size ofthe finally generated verification image.

The generating a verification image corresponding to the multipleobjects according to a predetermined range includes determiningcoordinates in the predetermined range corresponding to an objectquantity, selecting a coordinate of each object from the determinedcoordinates, and generating the verification image according to thecoordinate and the multiple objects, wherein a coordinate of an objectin the verification image matches the object coordinate selected fromthe determined coordinates.

In an embodiment, if a vector difference between the coordinate of theobject in the verification image and the object coordinate selected fromthe determined coordinates is less than a predetermined vectordifference, it is determined that the coordinate of the object in theverification image matches the object coordinate selected from thedetermined coordinates. Otherwise, it is determined that the coordinateof the object in the verification image does not match the objectcoordinate selected from the determined coordinates.

Further, in an embodiment, the determining coordinates in thepredetermined range corresponding to an object quantity may beimplemented by acquiring a quantity of the multiple objects, andrandomly generating the coordinates in the predetermined rangecorresponding to the object quantity after determining the quantity ofthe multiple objects.

It should be further noted that after the coordinates corresponding tothe quantity of the multiple objects are randomly generated in thepredetermined range, it is detected whether a distance between every twocoordinates is greater than a predetermined safe distance. In addition,if the distance between every two coordinates is greater than the safedistance, the generated coordinates are determined as coordinates of themultiple objects. Further, if the distance between every two coordinatesis greater than the safe distance, the generated coordinates areadjusted so that the distance between every two coordinates is greaterthan the predetermined safe distance.

In the aforementioned embodiment, the predetermined safe distance may bea preset distance, and the distance between the coordinates or thepredetermined safe distance may be represented by pixels or a vectorlength, For example, the quantity of pixels between two coordinates isdetermined as a distance between the two coordinates, or the length of avector formed by two coordinates is set as a distance between the twocoordinates.

The predetermined safe distance may be a distance pre-stored in thedatabase, or may be determined based on information lengths of themultiple objects. In an embodiment, a maximum information length in themultiple objects is set as the predetermined safe distance. For example,a maximum information length in the multiple objects is 15 pixels, andthen the predetermined safe distance is 15 pixels.

Through the aforementioned embodiment, the relationship betweencoordinates of the objects is defined so that the objects do not overlapeach other in the generated verification image, thereby facilitatinguser recognition.

In an embodiment, while the verification image is automaticallygenerated according to the multiple generated objects, positioninformation of the objects in the verification image can be obtained,and multiple pieces of ordered position information are generated toserve as an answer for determining whether the verification issuccessful.

Specifically, the position information may be a coordinate point or asize range. For example, a central coordinate of each object is acquiredand the acquired central coordinate is set as position information ofthe object, and so on, so as to obtain multiple pieces of positioninformation of the multiple objects.

For another example, a size of each object is acquired, and a size rangecorresponding to each object is determined based on the size. Further,after the size of each object is acquired, the size is enlarged by apredetermined ratio, and the size after enlargement is determined as asize range corresponding to each object.

In this embodiment, an enlarged size of an object is used as a sizerange corresponding to the object, instead of directly using a size ofthe object as the size range of the object, thereby avoiding failure toperform verification due to the deviation of a manual operation positionof a user, and increasing the verification success rate.

In an embodiment, the presentation unit includes either a firstpresentation module, which is configured to present the prompt messageusing text, or a first display module, which is configured to convertthe prompt message into a picture and display the picture.

After the verification image is generated, the prompt messagecorresponding to the verification image is generated to prompt the userto sequentially operate the objects in the verification image to performverification, and the verification image and the prompt message arepresented to the user.

For example, the prompt message may be “Please sequentially click‘Patent’ and ‘Invention’ in the figure”, or “Please sequentially click‘Apple, Banana, Cup’ in the figure”, or “Please sequentially click‘Apple, Patent, Banana’ in the figure”, or the like.

In an embodiment, when the objects are pictures, the generating averification image according to the multiple objects includes acquiringat least one of the multiple pictures for variation processing, andgenerating the verification image using the multiple pictures after thevariation processing, The variation processing includes one or more of atransformation, rotation, scaling, and blurring.

Through the aforementioned embodiment, prompt message for multipleordered objects may be presented to the user by text or by convertingthe prompt message into an image, and the conversion of the promptmessage into an image can further improve security and avoid automaticrecognition and attack by the machine.

In an embodiment, the first display module includes an adding submodule,which is configured to add interference information to a region in thepicture wherein the prompt message is displayed, and a displaysubmodule, which is configured to display the picture to which theinterference information is added. The interference information is usedfor partially covering or disturbing a meaning expressed by the promptmessage.

In order to increase the difficulty of recognizing a verification codeby the machine without affecting the user's recognition of the objects,resolutions of the objects and the interference information may be setto be different. For example, the set resolution of the objects ishigher than the resolution of the interference information, Further, inan embodiment, a difference between the resolution of the objects andthe resolution of the interference information is less than apredetermined difference.

According to the aforementioned embodiment, the presentation unit maycomprise a sending module, which is configured to send the promptmessage to the user through a short message or instant messaging tool soas to present the prompt message.

In an alternative embodiment, the second generation unit includes anacquisition module, which is configured to acquire, when the objects arepictures, at least one of the multiple pictures for variationprocessing, and a generation module, which is configured to generate theverification image using the multiple pictures after the variationprocessing. The the variation processing includes one or more oftransformation, rotation, scaling, and blurring.

Further, in an embodiment, the device further includes a firstdetermining unit that is configured to determine position information ofthe multiple objects in the predetermined range after the verificationimage is generated according to the multiple objects. The device alsoincludes a second acquisition unit that is configured to acquireposition information of operations performed by the user in thepredetermined range, and record an order of the position information ofthe performed operations. The device further includes a seconddetermining unit that is configured to determine whether the order ofthe position information of the operations performed by the user isconsistent with an order of the position information of the multipleobjects in the predetermined range. If yes, the verification issuccessful.

In this embodiment of the present application, a user sequentiallyclicks multiple objects on the verification image, and it is verifiedwhether the click order and positions are correct so as to complete theverification process, The verification process can be completed withjust clicks from the user, thereby simplifying the operation process.Meanwhile, a verification answer is ordered and variable in length andposition information is automatically and randomly generated, making itdifficult to be recognized by a machine so that manual judgment isrequired, thus achieving higher security.

It should be noted herein that the example and application scenario forimplementing the aforementioned modules are the same as those of thecorresponding steps, but are not limited to the contents disclosed inthe aforementioned embodiment. It should be noted that theaforementioned modules, as a part of the device, may run in the hardwareenvironment shown in the aforementioned embodiment, and may beimplemented by software, or may be implemented by hardware.

An embodiment of the present application may provide a computerterminal, wherein the computer terminal may be any computer terminalapparatus in a computer terminal group. In an embodiment, in thisembodiment, the aforementioned computer terminal may also be replacedwith a terminal apparatus such as a mobile terminal.

In an embodiment, the aforementioned computer terminal may be at leastone network apparatus in multiple network apparatuses located in acomputer network, The method embodiment provided in FIGS. 2(a) and 2(b)may be implemented in a mobile terminal, a computer terminal, or asimilar computing device.

FIG. 6 shows a block diagram that illustrates an example of a computerterminal 600 (or mobile apparatus) in accordance with the presentinvention, Computer terminal 600 can implement a verification method. Asshown in FIG. 6, computer terminal 600 (or mobile apparatus) includesone or more (shown as 602 a, 602 b, . . . , 602 n in the figure)processors 602. (Processor 602 may include, but is not limited to, aprocessing device such as a microprocessor (MCU) or a programmable logicdevice (FPGA)). Computer terminal 600 also includes a memory 604configured to store data, and a transmission module 606 configured toimplement a communication function. In addition, computer terminal 600may further comprise: a display, an input/output interface (I/Ointerface), a universal serial bus (USB) port (which may be included asone of ports of the I/O interface), a network interface, a power sourceand/or a camera. Those of ordinary skill in the art can understand thatthe structure shown in FIG. 6 is merely exemplary and does notconstitute limitation to the structure of the aforementioned electronicdevice, For example, computer terminal 600 may further comprise more orfewer components than those shown in FIG. 6, or have a differentconfiguration from that shown in FIG. 6.

It should be noted that the aforementioned one or more processors 602and/or other data processing circuits may usually be referred to as“data processing circuits” in this text. The data processing circuit maybe fully or partially embodied as software, hardware, firmware, or anyother combination. In addition, the data processing circuit may be asingle independent processing module or fully or partially integratedinto any of other elements of computer terminal 600 (or mobileapparatus). As concerned in the embodiment of the present application,the data processing circuit controls (for example, selection of a pathof a terminal with variable resistance connected to an interface) as aprocessor.

Memory 604 may be configured to store software programs of applicationsoftware and modules, for example, program instructions corresponding tothe verification method in the embodiments of the present application/adata storage device. Processor 602 runs the software programs and themodules stored in memory 604 to execute various function applicationsand data processing, namely, implement the aforementioned verificationmethod. Memory 604 may include a high-speed random access memory, andmay further include a non-volatile memory, for example, one or moremagnetic storage devices, a flash memory, or another non-volatilesolid-state memory. In some examples, memory 604 may further includememories disposed remotely from processor 602, and these remote memoriesmay be connected to computer terminal 600 through a network. Examples ofthe aforementioned network include, but are not limited to, an internet,an intranet, a local area network, a mobile communication network, and acombination thereof.

Transmission device 606 is configured to receive or send data through anetwork. A specific example of the aforementioned network may comprise awireless network provided by a communication provider of computerterminal 600. In one example, transmission device 606 comprises anetwork adapter (network interface controller, NIC), which may beconnected to other network apparatuses through a base station so as tocommunicate with the Internet. In one example, transmission device 606may be a radio frequency (RF) module, which is configured to communicatewith the Internet in a wireless manner.

The display may be, for example, a touch-screen liquid crystal display(LCD), and the liquid crystal display can enable a user to interact witha user interface of computer terminal 600 (or mobile apparatus).

Processor 602 may invoke information and applications stored in memory604 through transmission device 606 so as to perform the followingsteps: acquiring multiple objects; generating an order of the multipleobjects; generating a verification image according to the multipleobjects, wherein the multiple objects are scattered in a predeterminedrange to form the verification image; and presenting the verificationimage and prompt message, wherein the prompt message is used forinstructing a user to operate the objects in the verification imageaccording to the order so as to perform verification.

In an embodiment, the aforementioned processor may further executeprogram code of the following step to present the prompt message:presenting the prompt message using text, or converting the promptmessage into a picture and displaying the picture.

In an embodiment, the aforementioned processor may further executeprogram code of the following steps to convert the prompt message into apicture and display the picture: adding interference information to aregion in the picture wherein the prompt message is displayed, anddisplaying the picture to which the interference information is added.The interference information is used for covering or disturbing ameaning expressed by the prompt message.

In an embodiment, the aforementioned processor may further executeprogram code of the following step to present the prompt message:sending the prompt message to the user through a short message orinstant messaging tool so as to present the prompt message.

In an embodiment, the aforementioned processor may further executeprogram code of the following steps to, when the objects are pictures,generate the verification image according to the multiple objects:acquiring at least one of the multiple pictures for variationprocessing, and generating the verification image using the multiplepictures after the variation processing. The variation processingincludes one or more of transformation, rotation, scaling, and blurring.

In an embodiment, the aforementioned processor may further executeprogram code of the following steps: after the verification image isgenerated according to the multiple objects, determining positioninformation of the multiple objects in the predetermined range. Next,acquiring position information of operations performed by the user inthe predetermined range, and recording an order of the positioninformation of the performed operations. Following this, determiningwhether the order of the position information of the operationsperformed by the user is consistent with an order of the positioninformation of the multiple objects in the predetermined range. If yes,the verification is successful.

By means of the embodiments of the present application, after multipleobjects are acquired, an order of the multiple objects is generated, anda verification image is generated according to the multiple objects,wherein the multiple objects are scattered in a predetermined range toform the verification image. In addition, the verification image and aprompt message are presented, wherein the prompt message is used forinstructing a user to operate the objects in the verification imageaccording to the order so as to perform verification. In theaforementioned embodiment, multiple ordered objects are generated, andthe multiple ordered objects are scattered in a predetermined range togenerate a verification image. A user is prompted to performverification according to the order of the multiple objects. Since boththe objects and the order of the objects are randomly generated, it isdifficult for a machine to recognize them, thereby solving the problemof low verification security in the prior art and improving verificationsecurity.

Those of ordinary skill in the art can understand that the structureshown in FIG. 6 is merely exemplary, and the computer terminal may alsobe a terminal apparatus such as a smart phone (for example, an Androidphone or an iOS phone), a tablet computer, a palm computer, a mobileInternet device (MID), or a PAD, FIG. 6 does not constitute limitationto the structure of the aforementioned electronic device. For example,computer terminal 600 may further comprise more or fewer components (forexample, a network interface or a display device) than those shown inFIG. 6, or have a different configuration from that shown in FIG. 6.

Those of ordinary skill in the art can understand that all or part ofthe steps in various methods according to the aforementioned embodimentsmay be implemented by a program instructing relevant hardware of aterminal apparatus. The program may be stored in a computer readablestorage medium. The storage medium may comprise: a flash drive, aread-only memory (ROM), a random access memory (RAM), a magnetic disk,an optical disc, or the like.

An embodiment of the present application further provides a storagemedium. In an embodiment, the aforementioned storage medium may be usedfor storing program code executed by the verification method provided inthe aforementioned FIGS. 2(a) and 2(b).

In an embodiment, the aforementioned storage medium may be located inany computer terminal in a computer terminal group in a computernetwork, or located in any mobile terminal in a mobile terminal group.

In an embodiment, the storage medium is configured to store program codefor performing the following steps: acquiring multiple objects;generating an order of the multiple objects; generating a verificationimage according to the multiple objects, wherein the multiple objectsare scattered in a predetermined range to form the verification image;and presenting the verification image and prompt message, wherein theprompt message is used for instructing a user to operate the objects inthe verification image according to the order, so as to performverification.

In an embodiment, the storage medium is configured to store program codefor performing the following step to present the prompt message:presenting the prompt message using text, or converting the promptmessage into a picture and displaying the picture.

In an embodiment, the storage medium is configured to store program codefor performing the following steps to convert the prompt message into apicture and display the picture: adding interference information to aregion in the picture wherein the prompt message is displayed, anddisplaying the picture to which the interference information is added,The interference information is used for covering or disturbing ameaning expressed by the prompt message.

In an embodiment, the storage medium is configured to store program codefor performing the following step to present the prompt message: sendingthe prompt message to the user through a short message or instantmessaging tool so as to present the prompt message.

In an embodiment, the storage medium is configured to store program codefor performing the following steps to, when the objects are pictures,generate the verification image according to the multiple objects:acquiring at least one of the multiple pictures for variationprocessing, and generating the verification image using the multiplepictures after the variation processing. The variation processingincludes one or more of transformation, rotation, scaling, and blurring.

In an embodiment, the storage medium is configured to store program codefor performing the following steps: after the verification image isgenerated according to the multiple objects, determining positioninformation of the multiple objects in the predetermined range. Thesteps also include acquiring position information of operationsperformed by the user in the predetermined range, and recording an orderof the position information of the performed operations. The stepsfurther include determining whether the order of the positioninformation of the operations performed by the user is consistent withan order of the position information of the multiple objects in thepredetermined range. If yes, the verification is successful.

By means of the embodiment of the present application, after multipleobjects are acquired, an order of the multiple objects is generated, anda verification image is generated according to the multiple objects,wherein the multiple objects are scattered in a predetermined range toform the verification image. In addition, the verification image andprompt message are presented, wherein the prompt message is used forinstructing a user to operate the objects in the verification imageaccording to the order so as to perform verification. In theaforementioned embodiment, multiple ordered objects are generated, themultiple ordered objects are scattered in a predetermined range togenerate a verification image, and a user is prompted to performverification according to the order of the multiple objects. Since boththe objects and the order of the objects are randomly generated, it isdifficult for the machine to recognize them, thereby solving the problemof low verification security in the prior art and improving verificationsecurity.

The aforementioned sequence numbers of the embodiments of the presentapplication are merely for the convenience of description, and do notimply the preference among the embodiments.

In the aforementioned embodiments of the present application, thedescription of each embodiment has its own emphasis and, for a part thatis not detailed in a certain embodiment, reference can be made to therelevant description of other embodiments.

In a few embodiments provided in the present application, it should beunderstood that the disclosed technical contents may be implemented inother manners. The device embodiments described above are merelyexemplary. For example, the division of units is merely logical functiondivision and may be other division in actual implementation. Forexample, multiple units or components may be combined or integrated intoanother system, or some features may be ignored or not performed. Inaddition, the displayed or discussed mutual couplings or directcouplings or communication connections may be implemented through someinterfaces, and the indirect couplings or communication connectionsbetween units or modules may be implemented in electrical or otherforms.

The units described as separate parts may be or may not be physicallyseparate, and the parts shown as units may be or may not be physicalunits, and not only can be located in one place, but also can bedistributed onto multiple network units. Part or all of the units can bechosen to implement the purpose of the solutions of this embodimentaccording to actual requirements.

In addition, respective functional units in respective embodiments ofthe present application may be integrated into one processing unit, orrespective units may physically exist alone, or two or more units may beintegrated into one unit. The integrated unit can be implemented in theform of hardware or in the form of a software functional unit.

When being implemented in the form of a software functional unit andsold or used as a separate product, the integrated unit may be stored ina computer readable storage medium. Based on such understanding, theessence of the technical solutions of the present application or thepart that makes contributions to the prior art, or all or part of thetechnical solutions may be embodied in the form of a software product.The computer software product is stored in a storage medium and includesseveral instructions for instructing a computer apparatus (which may bea personal computer, a server, a network apparatus, or the like) toperform all or part of the steps in the methods described in theembodiments of the present application. The foregoing storage mediumcomprises: various media capable of storing program code, such as a USBflash drive, a read-only memory (ROM), a random access memory (RAM), amobile hard disk, a magnetic disk, or an optical disc.

The above descriptions are merely preferred embodiments of the presentapplication, It should be pointed out that those of ordinary skill inthe art can make several improvements and modifications withoutdeparting from the principle of the present application, and theimprovements and modifications should also be construed as fallingwithin the protection scope of the present application.

What is claimed is:
 1. A verification method, comprising: generating arandom sequence of randomly determined objects; generating averification image that comprises a plurality of object images for therandomly determined objects, and a message that instructs a user tosequentially click on the plurality of object images in the verificationimage in a specified order, wherein the specified order is set accordingto the random sequence; and converting the message into a picture,wherein the converting the message into the picture comprises addinginterference information to the picture, and wherein the adding theinterference information to the picture comprises setting a resolutionof the plurality of object images and a resolution of the interferenceinformation to be different.
 2. The verification method of claim 1,wherein the interference information is added to a region in the picturewhere the message is displayed, the interference information partiallycovering or disturbing a meaning expressed by the message.
 3. Theverification method of claim 1, wherein the resolution of the pluralityof object images is set higher than the resolution of the interferenceinformation.
 4. The verification method of claim 1, wherein a differencebetween the resolution of the plurality of object images and theresolution of the interference information is less than a predetermineddifference.
 5. The verification method of claim 1, wherein the pluralityof object images is scattered in a predetermined range for generatingthe verification image, and wherein the predetermined range comprises apredetermined size of the verification image.
 6. The verification methodof claim 1, wherein the randomly determined objects are pre-stored in adatabase, and wherein upon receiving a verification request, a quantityand a type of an object of the randomly determined objects isdetermined.
 7. The verification method of claim 1, further comprising:acquiring a size of each object associated with the plurality of objectimages; and determining a size range corresponding to each object basedon the size of each object.
 8. The verification method of claim 7,wherein the size of each object is enlarged by a predetermined ratio,and wherein the enlarged size is determined as the size rangecorresponding to each object.
 9. The verification method of claim 1,wherein objects associated with the plurality of object images compriseat least one of words and pictures, and wherein when the objectscomprise pictures, the method further comprises: acquiring one or morepictures of the pictures for variation processing; and generating theverification image after the variation processing of the one or morepictures, wherein the variation processing comprises at least one of:transformation, rotation, scaling, and blurring of the one or morepictures.
 10. The verification method of claim 1, further comprising:randomly positioning the plurality of object images within theverification image; detecting an order input by the user, wherein theorder input by the user comprises a plurality of positions clicked bythe user on the verification image; determining whether the order inputby the user matches the specified order of the plurality of objectimages; and verifying the user to be a human and not a machine when theorder input by the user matches the specified order of the plurality ofobject images.
 11. A non-transitory computer-readable medium havingcomputer executable instructions stored thereon that when executed by aprocessor cause the processor to implement a method of verification, themethod comprising: generating a random sequence of randomly determinedobjects; generating a verification image that comprises a plurality ofobject images for the randomly determined objects, and a message thatinstructs a user to sequentially click on the plurality of object imagesin the verification image in a specified order, wherein the specifiedorder is set according to the random sequence; and converting themessage into a picture, wherein the converting the message into thepicture comprises adding interference information to the picture, andwherein the adding the interference information to the picture comprisessetting a resolution of the plurality of object images and a resolutionof the interference information to be different.
 12. The non-transitorycomputer-readable medium of claim 11, wherein the interferenceinformation is added to a region in the picture where the message isdisplayed, the interference information partially covering or disturbinga meaning expressed by the message.
 13. The non-transitorycomputer-readable medium of claim 11, wherein the plurality of objectimages is scattered in a predetermined range for generating theverification image, and wherein the predetermined range comprises apredetermined size of the verification image.
 14. The non-transitorycomputer-readable medium of claim 11, wherein the method furthercomprises: acquiring a size of each object associated with the pluralityof object images; and determining a size range corresponding to eachobject based on the size of each object.
 15. The non-transitorycomputer-readable medium of claim 11, wherein objects associated withthe plurality of object images comprise at least one of words andpictures, and wherein when the objects comprise pictures, the methodfurther comprises: acquiring one or more pictures of the pictures forvariation processing; and generating the verification image after thevariation processing of the one or more pictures, wherein the variationprocessing comprises at least one of: transformation, rotation, scaling,and blurring of the one or more pictures.
 16. A verification device,comprising: a memory that stores instructions; and a processor coupledto the memory, wherein the processor is configured to execute theinstructions to: generate a random sequence of randomly determinedobjects; generate a verification image that comprises a plurality ofobject images for the randomly determined objects, and a message thatinstructs a user to sequentially click on the plurality of object imagesin the verification image in a specified order, wherein the specifiedorder is set according to the random sequence; and convert the messageinto a picture, wherein the converting of the message into the picturecomprises adding interference information to the picture, and whereinthe adding the interference information to the picture comprises settinga resolution of the plurality of object images and a resolution of theinterference information to be different.
 17. The verification device ofclaim 16, wherein the interference information is added to a region inthe picture where the message is displayed, the interference informationpartially covering or disturbing a meaning expressed by the message. 18.The verification device of claim 16, wherein the plurality of objectimages is scattered in a predetermined range to generate theverification image, and wherein the predetermined range is apredetermined size of the verification image.
 19. The verificationdevice of claim 16, wherein the processor is further configured to:acquire a size of each object associated with the plurality of objectimages; and determine a size range corresponding to each object based onthe size of each object.
 20. The verification device of claim 16,wherein objects associated with the plurality of object images compriseat least one of words and pictures, and wherein when the objectscomprise pictures, the processor is further configured to: acquire oneor more pictures of the pictures for variation processing; and generatethe verification image after the variation processing of the one or morepictures, wherein the variation processing comprises at least one of:transformation, rotation, scaling, and blurring of the one or morepictures.