Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Memory, verification code implementation method, device and equipment

An implementation method and verification code technology, which is applied in the direction of digital data authentication, can solve the problems of user identity authentication security risks and high probability of cracking, and achieve the effect of reducing the probability of passing verification and improving security

Inactive Publication Date: 2020-05-01
WUHAN JIYI NETWORK TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] With the continuous development of computer graphics recognition technology and processing capabilities, the verification code implementation method in the above-mentioned prior art has a high probability of being cracked by a computer, thus causing a security risk for user identity authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory, verification code implementation method, device and equipment
  • Memory, verification code implementation method, device and equipment
  • Memory, verification code implementation method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] figure 1A flowchart showing a method for implementing a verification code provided by an embodiment of the present invention, the method may be executed by an electronic device, such as a network device, a terminal device, or a server device. In other words, the method can be implemented by software or hardware installed on network equipment, terminal equipment or server equipment. The server includes, but is not limited to: a single server, a server cluster, and the like. refer to Figure 1 to Figure 4 , the method includes the following steps.

[0055] S11. Obtain a verification picture including a preset graphic;

[0056] The inventor found through research that in the prior art, in the verification method of dragging the slider to the target position, the number of trajectory answers is very limited; specifically, from the starting point of the slider to the farthest position, from the shape of the motion trajectory Said to be a straight line, the pixel length o...

Embodiment 2

[0076] Figure 5 It shows a schematic structural diagram of the device for realizing the verification code provided by the embodiment of the present invention, and the device for realizing the verification code is a device corresponding to the method for realizing the verification code described in Embodiment 1, that is, the method in Embodiment 1 is realized by means of a virtual device. The verification code realization method and each virtual module constituting the verification code realization apparatus can be executed by electronic equipment, such as network equipment, terminal equipment, or server.

[0077] Specifically, the verification code implementation device in the embodiment of the present invention includes:

[0078] The verification picture acquisition unit 01 is used to obtain a verification picture including a preset graphic; the prompt unit 02 is used to prompt the user to draw in the verification picture according to the trajectory of the preset graphic; th...

Embodiment 3

[0086] An embodiment of the present invention provides a memory, and the memory may be a non-transitory (non-volatile) computer storage medium, and the computer storage medium stores computer-executable instructions, and the computer-executable instructions can execute any of the above methods to implement Each step of the verification code implementation method in the example, and achieve the same technical effect.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a memory, a verification code implementation method, a verification code implementation device and verification code implementation equipment. The verification code implementation method comprises the following steps: acquiring a verification picture comprising a preset graph; prompting a user to draw in the verification picture according to the track of the preset graph; generating a drawing result according to the drawing behavior of the user; judging whether the drawing result is matched with the track of the preset graph or not; and generating a verification resultaccording to the judgment result. According to the method and the device, the difficulty of obtaining the graph consistent with the preset graph by a malicious computer program in a traversal mode isgreat, the operand is very large, and the required time length is very long, so that the method and the device are difficult to realize in a verification process. Therefore, through the embodiment ofthe invention, the probability that the malicious computer program passes the verification can be effectively reduced, and the safety of identity verification is further improved.

Description

technical field [0001] The invention relates to the field of Internet information security, in particular to a memory, a verification code realization method, device and equipment. Background technique [0002] Captcha, also known as Turing Test (Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA), is a public fully automatic program to distinguish whether the user is a computer or a human. [0003] Verification of user identity through verification code technology can filter out malicious behaviors such as malicious cracking of passwords, swiping tickets, and flooding forums. [0004] As an important technology and application of human-machine identification, the verification code has experienced various forms and technological innovations; the more popular forms include the early character recognition verification code, and the sliding generated when the mouse drags the slider. track to verify the method. This method breaks through the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36
CPCG06F21/36
Inventor 陈国庆
Owner WUHAN JIYI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products