Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A verification code identification input method and system based on sliding verification

An input method and verification code technology, which is applied in the field of verification code identification input based on sliding verification, can solve problems such as single sliding track, increased waiting time for business flow, cumbersome and complicated operations, etc., and achieve the effect of solving obstacles

Active Publication Date: 2020-12-11
XIAMEN 258 GRP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The random forest method needs to use a series of algorithms and mathematical formulas to obtain trajectory parameters and submit them to the server, and the operation is cumbersome and complicated
[0005] In order to pass the sliding verification rules smoothly, a verification code input system, such as a coding system, is used in the existing industry, and the interfaces required for verification are concentrated in the system. Manual verification requires a lot of manpower and time costs.
Due to the uncontrollable factors of manual operation behavior, the business flow often increases the waiting time or even terminates in the sliding verification link, making the automatic business process passive, and the verification code input system has high management costs and low efficiency, and urgently needs technical improvement.
[0006] The sliding verification code is based on the response time, dragging speed, time, location, trajectory, and number of retries of people interacting with the slider to evaluate the risk. Some current sliding verification technologies automatically pass the technology, such as by recording the sliding track. At the same position, use trajectory array replay, single sliding trajectory, easy to perform too mechanized in terms of dragging speed and time, it is judged as machine behavior operation, low efficiency and low pass rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification code identification input method and system based on sliding verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0062] As an implementation manner of the present invention, the vertical size pixel threshold is 20, and the number threshold is 5.

[0063] Described method also comprises, 1, whether the mouse track of verification simulation is verified successfully, if verification " success " will success signal notification service end; Otherwise " failure " will click " retry " and the track notification service end record of failure.

[0064] A verification code identification input system based on sliding verification, which facilitates the realization of the above verification code identification input method, and is characterized in that it includes,

[0065] Image 1 acquisition module, find the position of the puzzle, and obtain the original image through the screenshot function of selenium+phantomjs, that is, image 1; collect image materials, and record the type of image;

[0066] Picture 2 acquisition module, automatically recognizes and controls the mouse cursor to click on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification code identification input method and system based on sliding verification. The method includes: finding out the position of a mosaic and obtaining a picture 1 through the screenshot function of selenium+phantomjs; automatically identifying and controlling the slider in the mouse cursor point, and performing screenshot to get a picture 2 after a time thresholdis set; carrying out image processing and recognition on the picture 2 to obtain a contrast picture 3; calculating that center distance of the black region in the picture 3, and obtaining the distancen to be displaced by the mouse; according to the distance n, outputting the most real sliding track of human through the analysis of the moving track of real human mouse; increasing the random valueof some moving points according to the mouse simulation moving trajectory; phantomjs simulating the mouse trajectory, and the mouse clicking on the slider to simulate real human sliding. Compare withthat prior art, the method and the system have the advantages that the automatic identification of the sliding authentication code is carried out simply and accurately, and the blocking effect of thesliding authentication code on the traffic flow is solved.

Description

technical field [0001] The invention relates to a verification code identification input method and system based on sliding verification, belonging to the field of the Internet. Background technique [0002] The sliding module verification method can analyze the behavioral characteristics of the user in the process of completing the jigsaw puzzle, and judge whether it is a human or a machine through data analysis. It can comprehensively monitor suspicious machine attacks, and the characteristics of the entire network are dynamically updated every 30 minutes to quickly respond to emergencies. Up to 5 layers of heterogeneous security model filters to protect website security from multiple angles. At the same time, users do not have to face dazzling English characters or Chinese characters. Compared with traditional digital, text, and character-type verification codes, it is more humane, and the user verification time is shorter and more interactive. This new verification serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F3/0485G06F9/451G06F16/583G06T7/60
CPCG06F3/0485G06F21/36G06F2221/2133G06T7/60G06F9/451
Inventor 李恺弘郭小伟庄良基林溪庄永梁
Owner XIAMEN 258 GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products