Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security verification method and system

A security verification and verification code technology, applied in user identity/authority verification, digital data authentication, etc., can solve the problems of low resolution and poor experience of 12306 verification codes, solve the problem of incompatibility between security and user experience, and improve accuracy rate effect

Inactive Publication Date: 2017-03-22
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although it effectively prevents scalpers, it also makes the user experience worse
[0014] In addition, although it is difficult, with the maturity of Baidu image recognition and Google image recognition technology, and the 12306 verification code uses low-resolution images, it is enough to crack it with Baidu image recognition and Google image recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method and system
  • Security verification method and system
  • Security verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 As shown, it is a flowchart of a security verification method according to an embodiment of the present invention, including the following steps:

[0061] Step 101, randomly generating a verification code and a point-and-click operation interface for inputting the verification code;

[0062] Step 102, acquiring the behavior data of the user inputting the verification code through the point-and-click operation interface;

[0063] What needs to be explained here is that what is acquired is the behavior data of inputting "the said verification code". Therefore, if it is not the said verification code, that is, if the input verification code is wrong, it will be ignored directly, and the behavior data will not be obtained and stored any more; at the same time Prompt the user for re-enter.

[0064] Step 103, if it is determined that the behavior data does not conform to the preset machine behavior data, the verification is passed.

[0065] preferred,

[...

Embodiment 2

[0092] Such as image 3 As shown, it is a schematic flowchart of the security verification method in this embodiment.

[0093] In this embodiment, the verification code is a digital verification code, and the point-and-click operation interface is a nine-square grid as an example for illustration.

[0094] Step 201, randomly generate a verification code and a Jiugongge for inputting the verification code.

[0095] In this embodiment, preferably, the verification code is a 4-digit verification code. In this embodiment, the verification code is 2971 for illustration.

[0096] There are nine numbers from 1 to 9 on the Jiugong grid, which can be arranged in any order.

[0097] Step 202, acquiring behavior data of the user inputting the verification code.

[0098] Here firstly it is necessary to judge whether the verification code input by the user is 2971, and if so, proceed to step 203 to perform the Turing test, if not, then there is no need to perform the Turing test again, ...

Embodiment 3

[0117] Such as Figure 4 Shown is a schematic structural diagram of a security verification system according to an embodiment of the present invention, including:

[0118] A verification code generating unit 301, configured to randomly generate a verification code and a point-and-click operation interface for inputting the verification code;

[0119] A user behavior data acquisition unit 302, configured to acquire the behavior data of the user inputting the verification code through the point-and-click operation interface;

[0120] What needs to be explained here is that what is acquired is the behavior data of inputting "the said verification code". Therefore, if it is not the said verification code, that is, if the input verification code is wrong, it will be ignored directly, and the behavior data will not be obtained and stored any more; at the same time Prompt the user for re-enter.

[0121] The Turing test unit 303 is configured to pass the verification when it is dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and particularly provides a security verification method and system. The method comprises the following technical measures: randomly generating a verification code and a clicking operation interface for a user to input the verification code, acquiring behavior data of inputting the verification code by the user through the clicking operation interface, and performing a Turing test on the behavior data, and if the condition that the behavior data do not conform to preset machine behavior data is determined, determining that the verification is successful. By means of providing the clicking operation interface for the user to input and acquiring a large amount of behavior data that machines cannot imitate, the method and system solve the problem that the security and the user experience cannot be balanced in the existing verification method, and achieve the technical effects of simultaneously enhancing the user experience and improving the Turing test accuracy.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security verification method and system. Background technique [0002] CAPTCHA is the abbreviation of "Completely Automated Public Turing test to tell Computers and Humans Apart" (Turing Test to Tell Computers and Humans Apart), commonly known as verification code, is a public fully automatic program to distinguish whether the user is a computer or a human . It can prevent: malicious cracking of passwords, swiping tickets, flooding of forums, malicious registration of trumpets, etc., effectively preventing a hacker from making continuous login attempts to a specific registered user with a specific program brute force cracking method. This question can be generated and judged by a computer, but only a human can answer it. [0003] Currently commonly used verification codes include the following: [0004] Image verification code: It is a common verification method, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36H04L9/32
Inventor 虞子晗
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products