An anti-cracking verification code generation method

A verification code and anti-cracking technology, applied in the field of anti-cracking verification code generation, can solve the problems of loss of verification code, reducing the difficulty of cracking the verification code in pictures, and discounting the defense effect of verification code, so as to increase security and increase automatic identification. Difficulty, the effect of increasing the difficulty of cracking

Active Publication Date: 2021-07-16
成都知道创宇信息技术有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, the ability and accuracy of computer image recognition are already very high, which can directly solve the problems hidden in the picture, greatly reducing the defense effect of the verification code
At the same time, the computer image recognition technology is very mature and popular, which reduces the difficulty of cracking the picture verification code; makes the verification code lose its original meaning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-cracking verification code generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments. The core idea of ​​the present invention is to process the verification code questions out of order, and encrypt the verification code question number (ID), so that the computer cannot directly identify it, and must rely on human subjective knowledge and understanding, so as to prevent the verification code from being cracked. .

[0028] The flow chart of the verification code generation method in this embodiment is as follows figure 1 As shown, the specific steps are as follows:

[0029] Step 1: Create a verification code question bank; the questions should be open-ended as much as possible, and there is no unique standard answer.

[0030] For example, if the question is "Which value is your height closest to?", the alternative answers are "0.1", "10", "170", "1000000", and the exact answer is "170".

[0031] Step 2: Make pictures o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-cracking verification code generation method, which randomly rearranges the characters of the question stems of the verification code to generate a picture sequence P; and performs an XOR operation with a random number R and a serial number ID to obtain an encrypted question number EID; send the candidate answer group A, question number EID, and picture sequence P to the requesting end; then perform an XOR operation with the random number R and the question number EID returned by the requesting end to obtain the real question number ID, Find the exact answer a corresponding to the question number ID, compare the found exact answer a with the selected answer a1 returned by the requester, and obtain the verification result. The present invention greatly increases the difficulty of automatic identification of the computer, greatly increases the difficulty of cracking the verification code, effectively achieves the purpose of preventing cracking of the verification code, and increases the security of the web system.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an anti-cracking verification code generation method. Background technique [0002] In the process of identity verification of web services, in order to avoid CC attacks, malicious cracking of passwords, swiping tickets, flooding forums, etc., verification codes are generally used; verification codes identify normal human beings by providing some questions that are difficult for computers to understand Behavior to filter out illegal and abnormal behaviors. [0003] In the prior art, the verification problem is usually placed in the picture, which increases the difficulty of automatic computer recognition. However, at present, the ability and accuracy of computer image recognition are already very high, and it can directly solve the problems hidden in the picture, greatly reducing the defensive effect of the verification code. At the same time, computer image recognitio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/08G06F21/36G06F21/44
CPCG06F21/36G06F21/44G06F2221/2133H04L9/0861H04L9/0869H04L67/02
Inventor 陈海洋叶兴张文宇郑斌
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products