Verification interactive method, associated device and communication system

A technology for verifying pictures and relative positions, applied in the field of Internet security, which can solve the problem of preventing malicious clients from brute force cracking, etc.

Inactive Publication Date: 2016-03-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The inventors of the present invention have found in the course of research and practice that there are at least the following technical problems in the prior art: since current malicious clients mainly stitch sub-pictures based on the similarity of sub-picture edges, this makes existing Technology becomes more difficult to prevent malicious clients from brute-forcing during the verification process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification interactive method, associated device and communication system
  • Verification interactive method, associated device and communication system
  • Verification interactive method, associated device and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The embodiment of the present invention verifies the interaction method, related devices and communication system, so as to improve the ability of preventing malicious client brute force cracking during the verification process.

[0046] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0047] Each will be described in detail below.

[0048] The terms "first", "second", "third" an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a verification interactive method, an associated device and a communication system. The method comprises a receiving a verification request message from a client, a step of sending a first verification interactive message comprising N1 sub images to the client, wherein the N1 sub images comprise a bottom image and N1-1 option images, the bottom image comprises N1-1 deletion areas, the length of an external rectangle of a deletion area j is smaller than that of an option image i, and / or the width of the external rectangle of the deletion area j is smaller than that of the option image i, and a step of determining a verification result based on a connected image and a verification image if a second verification interactive message comprising the connected image obtained by connecting the N1 sub images from the client is received. According to the embodiment of the invention, the improvement of the ability of preventing malicious client brute force in the verification process is facilitated.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a verification interaction method, a related device and a communication system. Background technique [0002] Verification codes are commonly used in Internet business, and are used as an additional verification method against batches of malicious clients. Verification codes are mainly used in scenarios such as account registration, account login, forum posting, and Weibo speeches. [0003] The jigsaw verification code is a new type of verification code. The server cuts a verification picture into multiple sub-pictures and sends the multiple sub-pictures to the client. After the client splices multiple sub-pictures to obtain a spliced ​​picture, the spliced ​​picture is sent to the server, and the server determines whether the verification is successful according to the comparison result of the spliced ​​picture and the original verification picture. [0004] At presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 张东蕊陈远斌陈辉付晓强宋梁山
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products