Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security verification code generation method and system based on track drawing interaction and medium

A security verification code and verification code technology, which is applied in the field of security verification code generation based on trajectory drawing interaction, can solve the problems of increasing the difficulty of human identification, increase the difficulty of cracking, etc., so as to prevent the behavior of machine simulation generation of trajectory and improve security. and correctness, the effect of preventing cracking

Pending Publication Date: 2022-01-11
JINAN UNIVERSITY
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to increase the difficulty of cracking, some verification codes blindly add noise to the background image. Although the difficulty of image recognition increases, it also increases the difficulty of human recognition.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification code generation method and system based on track drawing interaction and medium
  • Security verification code generation method and system based on track drawing interaction and medium
  • Security verification code generation method and system based on track drawing interaction and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] The solution described in this embodiment proposes a security verification code generation method based on trajectory drawing interaction. Among them, the "title" of the verification code is a word between two and four characters, and the user needs to pass a Sequentially drag the mouse or touch the screen to draw sliding tracks, and connect the given words in order, such as figure 1 shown.

[0056] The solution described in this embodiment mainly includes four roles: user, client, server, and database. The client, server and database communicate through the HTTP protocol, wherein the user is the subject of verification in the present invention; the client is mainly responsible for monitoring and recording user behavior and resisting various attacks against verification codes; the server is mainly responsible for generating verification codes. Code information to verify user behavior; the database is mainly responsible for storing verification code topic data and rela...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security verification code generation method and system based on track drawing interaction and a medium. The method comprises the steps of formulating a security rule; enabling the client to request the server for identity authentication; enabling the server to generate a data token, a verification code question and a picture, and storing the related information into a database; adding the interference to the generated picture, and transmitting the picture to a client; enabling the client to recover and display the disordered verification code picture; recording track information drawn by a user, encrypting track information data and a data token, and transmitting the data and the data token to a server; and enabling the server side to judge the track information and return a result to the client side. According to the invention, the transmitted data is encrypted using an RC4 encryption algorithm; when the headless browser is detected in the JavaScript, the verification is rejected; the machine behavior is judged by using an algorithm for extracting human drawing trajectory feature design, the safety and correctness are improved by the technical means, and the cracking of an OCR picture recognition technology and the behavior of generating a trajectory by machine simulation can be effectively prevented.

Description

technical field [0001] The invention belongs to the technical field of verification code security, and in particular relates to a method, system and medium for generating a security verification code based on trajectory drawing interaction. Background technique [0002] In the process of user authentication, there are a large number of security verification operations mainly in the form of verification codes. However, most verification codes currently on the market have relatively easy cracking methods, and their security performance is low. However, a small number of verification codes with high security blindly increase the difficulty of recognition, which is difficult not only for machines but also for humans, and the user experience is extremely poor. [0003] At present, there are several mainstream behavior verification codes on the market, such as text input verification code and text selection verification code. Although these two types of verification codes are sim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60G06F8/41
CPCG06F21/31G06F21/602G06F8/41
Inventor 高博宇李宸刘鑫卿雨平
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products