Unlock instant, AI-driven research and patent intelligence for your innovation.

Picture identifying code generation method and generation device

A picture verification code and picture verification technology, which are applied in the field of picture verification code generation method and picture verification code generation device, can solve problems such as easy cracking, hidden danger of network security, etc., and achieve the effect of improving network security and enhancing difficulty

Active Publication Date: 2011-04-06
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, only a single type of verification code is used in the verification code system of the prior art, and a single type of verification code has limited randomness. With the increase of online time, it is easy to be cracked, which brings serious problems to network security. Hidden danger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Picture identifying code generation method and generation device
  • Picture identifying code generation method and generation device
  • Picture identifying code generation method and generation device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0022] In the embodiment of the present invention, multiple verification code fusion strategies are adopted, and different types of picture verification codes can be selected for the user to verify during the verification process.

[0023] Fig. 1 is a schematic flowchart of a method for generating a picture verification code according to an embodiment of the present invention.

[0024] As shown in Figure 1, the method includes:

[0025] Step 101: Establish a picture verification code library including N types of picture verification codes, where N is a natural number greater than or equal to 2.

[0026] Step 102: Generate picture verification code category number N i , select the Nth from the picture verification code library i A p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating a picture identifying code. The method comprises the following steps that: a picture identifying code base including N picture identifying codes is established, wherein, N is a natural number greater than or equal to 2; a category sequence number of the picture identifying code of Ni is generated, the Ni picture identifying code is chosen from the picture identifying code base and is shown to a user. The invention also discloses a picture identifying code generating device. The invention can increase the difficulty of the picture identifying code to be cracked and improves the security of the network.

Description

technical field [0001] The present invention relates to the technical field of network application (Application), and more specifically, the present invention relates to a method for generating a picture verification code and a device for generating a picture verification code. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. Network development brings various challenges while providing convenience. Some people with ulterior motives will use robot programs to improperly use a large number of free Internet resources, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the service. Some people even try to use brute force cracking and other means to steal virtual property. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/36
Inventor 王建宇王亮
Owner TENCENT TECH (SHENZHEN) CO LTD