Unlock instant, AI-driven research and patent intelligence for your innovation.

Picture validation code generating method and device

A technology for image verification codes and generating devices, which is applied in the field of network applications, can solve problems such as potential safety hazards, and achieve the effects of improving security, resisting brute force cracking, and increasing costs and costs

Active Publication Date: 2008-05-21
SHENZHEN TENCENT COMP SYST CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to this feature, the cracker can first manually enter the characters corresponding to several verification codes, and directly submit the verification code characters recorded manually before encountering repeated pictures, so that the verification code can be bypassed by extracting characters from the pictures cracked, resulting in a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Picture validation code generating method and device
  • Picture validation code generating method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] In an embodiment of the present invention, a method for generating a picture verification code that effectively prevents brute force cracking based on a high picture repetition rate is proposed. First, a random pixel position and a changed pixel value corresponding to the random pixel position are determined, and then the pixel value at the random pixel position in the image verification code is changed to the changed pixel value, thereby effectively preventing brute force cracking and increasing the difficulty of cracking.

[0025] FIG. 1 is a schematic flowchart of a method for generating a picture verification code according to the present invention.

[0026] As shown in Figure 1, the method includes:

[0027] Step 101: Det...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generating method for image checking codes and a generating device for image checking codes. The generating method comprises following steps: the position of a random pixel and a changing pixel value corresponding with the position of the random pixel are determined; a value of a pixel on the position of the random pixel in image checking codes is changed for the changing pixel value. The invention has the advantages of effective prevention of brutal force attack and improvement in safety of image checking codes.

Description

technical field [0001] The present invention relates to the technical field of network application (Application), and more specifically, the present invention relates to a method for generating a picture verification code and a device for generating a picture verification code. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. Network development brings various challenges while providing convenience. Some people with ulterior motives will use robot programs to improperly use a large number of free Internet resources, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the service. Some people even try to use brute force cracking and other means to steal virtual property. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00H04L9/32
Inventor 王亮王建宇
Owner SHENZHEN TENCENT COMP SYST CO LTD