Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for verifying generated identity based on coordinate technology

An identity verification method and technology, which is applied in the direction of user identity/authority verification, instrument, character and pattern recognition, etc., can solve the problem of difficult to identify verification codes, achieve enhanced security, prevent malicious registration, and enhance the fun of use Effect

Inactive Publication Date: 2010-05-05
CHINA IWNCOMM
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And now the popular method of judging whether the access to the WEB program is a legitimate user or a malicious operation is to use a technology called "picture verification code". This is because people can easily see the meaning in the picture, but if it is A piece of client attack code, it is difficult to identify the verification code by general means

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In a specific embodiment of the present invention, a square picture verification code is divided into 32 equal parts, and its specific implementation method is as follows:

[0015] 1) Divide a square picture verification code into 3 2 Equal parts, place a small picture on each equal part, so that there are two identical small pictures on a straight line (a straight line on a horizontal, vertical, and diagonal line), leaving an equal part (ie, the verification area) It is used for verification, so that 24 different picture verification codes can be combined;

[0016] 2) Save the codes of all combined (ie 24) square picture verification codes and the coordinate range of the verification area in an array;

[0017] 3) During identity verification, a completely non-repeating picture verification code is randomly generated;

[0018] 4) The user clicks the small picture on the picture verification code;

[0019] 5) Obtain the relative coordinate point on this small picture,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for verifying a generated identity based on a coordinate technology, which comprises the steps of: 1) dividing a square picture into n2 (n is more than or equal to 3) equal parts, assembling 2*(n2+n) different picture verification codes, wherein each picture verification code comprises n-1 equal part on a straight line, and reaming one equal part on the straight line to be taken as a verification area; 2) conserving the code of all the assembled picture verification codes and the coordinate range of the verification area corresponding to the each picture verification code into an array; 3) when verifying the identity, randomly generating one picture verification code; 4) clicking the picture verification code by a user; and 5) obtaining a relative coordinate point on the picture verification code clicked by the user, if the coordinate point is positioned within the verification area of the picture verification code, passing the verification. The method can prevent a browse webpage in a network from being attacked by a rogue program, can prevent a machine program from being abusively registered, and enhances the safety of network information and the use interest of the user.

Description

field of invention [0001] The invention relates to a method for generating identity verification based on coordinate technology. Background technique [0002] With the rapid development of the Internet today, the speed of the network is no longer the bottleneck of network access. While providing faster access speed for people to surf the Internet, it also provides hackers with a broader space for development. Online cracking is increasingly threatening cyber security. And now the popular method of judging whether the access to the WEB program is a legitimate user or a malicious operation is to use a technology called "picture verification code". This is because people can easily see the meaning in the picture, but if it is A piece of client attack code, it is difficult to identify the verification code through general means. This can ensure that the current access is from a person rather than a machine, so adding a dynamic verification code when logging in to a web page wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06K9/00
Inventor 樊绿林李卫东梁朝晖曹军张强
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products