Method for obtaining length variable interactivity identifying code based on Ajax

A verification code and verification code picture technology, which is applied in the field of network security protection using verification codes, can solve problems such as unsatisfactory security, achieve the effects of increasing anti-cracking capabilities, ensuring security, and solving user information leakage

Inactive Publication Date: 2008-03-12
HARBIN ENG UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the forms of verification codes are becoming more and more abundant, from digital verification to picture verification, but their own security is not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining length variable interactivity identifying code based on Ajax

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention is described in more detail below in conjunction with accompanying drawing example:

[0022] In conjunction with accompanying drawing, concrete implementation steps of the present invention are:

[0023] (1) The user requests a page that needs to fill in the verification code;

[0024] (2) Server settings generate a session session;

[0025] (3) Store the length of the verification code in this session in the session, generally 4 to 6 digits;

[0026] (4) The server returns the page to the client;

[0027] (5) The user fills in the basic information in the page form, and the user prepares to fill in the verification code;

[0028] (6) The client submits a request to generate a verification code to the server through Ajax;

[0029] (7) The server program receives the client request, and judges whether there is a session of the verification code in the current session, if there is no session, turn to (8), otherwise turn to (9);

[0030] (8) The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model provides a Ajax-based method for obtaining the lengthened interactivity identifying code. The user needs to fill out the identifying code page, the identifying code length of the system initiation and other information; when preparing for filling in the identifying code, the system will produce two-bit identifying code; As each identifying code is inputted, the system will produce the next identifying code, so that the existing identifying code is shifted to the left for one bit. Meanwhile, the identifying code to be produced will be added. Then, the user submits the identifying code to the page. The utility model is characterized in that as filling in the identifying code page, the total length of the identifying code is random within a certain scope, so that the length of the identifying code is different as logging onto the page at different period of time. Each identifying code is produced according to the user's input instead of displayed on the page once a time. In addition, Ajax technique is introduced to guarantee the non-refresh data acquisition during the interactive process, so as to improve the user's experience.

Description

(1) Technical field [0001] The invention relates to a network security protection method, in particular to a network security protection method using verification codes. (2) Background technology [0002] With the development of technology, the Internet provides people with a convenient platform for information exchange, and at the same time provides a broad space for hackers. Online cracking poses an increasing threat to network security. With the security of data submission, etc., to prevent software brute force cracking, more and more websites now use captcha technology. At present, the forms of verification codes are becoming more and more abundant, from digital verification to picture verification, but their own security is not ideal. [0003] The patent application numbers are 200510111302.7 and 200510111902.3, and the technical solution recorded in the patent application document named "Implementation Method of Picture Verification Code" is to use a simple picture as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 张健沛杨静徐泼薛大伟刘泽胤张刚刚吴寒姚松平艾国辉董喜双
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products