Picture identifying code creation method and device

A technology of picture verification code and generating device, which is applied in the field of picture verification code generation, can solve problems such as being unable to effectively resist verification code cracking, and achieve the effect of preventing cracking

Active Publication Date: 2009-01-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous improvement of program recognition capabilities, similar figure 1 The dynamic picture shown can still be intercepted by the program at a certain moment to capture the pictures containing all the verification codes by means of screenshots, and then realize the cracking of the picture verification codes through the cracking method of the static picture verification codes. In this way, it is also unable to effectively fight against the machine Cracking the Captcha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Picture identifying code creation method and device
  • Picture identifying code creation method and device
  • Picture identifying code creation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Figure 3a It is a plan view at the initial moment of a layer structure of the present invention, the layer structure includes two layers, the two layers are parallel, and the vertical distance between the layers is not limited. Among them, the layer at the bottom includes the verification code graphic AJMKI ( Figure 3a Not shown in ), the verification code graphic AJMKI is included in the rectangular picture 321 ( Figure 3a not shown in), such as Figure 3b As shown; this picture 321 can be the form of static picture verification code in the prior art, and picture 321 can also include other graphics such as noises that do not affect the observation verification code figure, is not limited here; An opaque rectangular picture 311 .

[0047] Assuming that the length of picture 311 and picture 321 is a and the width is b, the content contained in picture 311 is not limited, but it is preferably distinguishable from the verification code graphics. For example, in this ...

Embodiment 2

[0053] Figure 4 It is another layer structure side view of the present invention, such as Figure 4 As shown, the layer structure includes a layer 410 and a layer 420, wherein the layer 420 is located under the layer 410, and the layer 410 and the layer 420 are not parallel, and there is a certain angle, and the specific angle is not limited.

[0054] Such as Figure 4 and Figure 4a As shown, the layer 420 includes a verification code graphic AJMKI, which is included on the rectangular picture 421, and exists in the plane where the layer 420 is located in the form of a static picture verification code in the prior art, and the picture 421 Other graphics such as noises that do not affect the observation of the verification code graphics may also be included in , which is not limited here. Assuming that the length of the rectangular picture 421 is a and the width is b, the layer 410 includes a rectangular picture 411 with a length of 3a / 5 and a width of b / 2 in the top view....

Embodiment 3

[0057] Figure 5a Shown is a side view of the initial moment of another layer structure, such as Figure 5a As shown, the verification code includes three layers, wherein the bottom layer includes a verification code graphic 531, and the verification code in the verification code graphic 531 is specifically AJMKI (not shown in the figure); while other layers Include picture 511 and picture 521 respectively. In this embodiment, picture 511 is white and opaque, and contains a through hole (not shown in the figure) above, through which can expose the Content; picture 521 is opaque and contains horizontal stripes. Of course, the picture 511 and the picture 521 may also contain other content that will not confuse the verification code graphic 531 , which will not be repeated here.

[0058] The top view of the layer structure at the initial moment is as follows Figure 5b As shown, at this time, since the verification code pattern 531 and the picture 521 are completely covered by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating an image verification code. The method comprises the following steps: at least two layers are established, wherein, the bottom layer at least comprises a verification code graphic, layers apart from the bottom layer respectively include images for covering the verification code graphic; the graph of the verification code and the images included in the layers apart from the bottom layer move relatively, and the images partially cover the verification code graphic at any time; at least two established layers are combined to generate an image verification code in an animation form. The invention also discloses a device for generating an image verification code, which comprises a layer establishment module and an image formation module. The image verification code generated by adopting the method and device of the invention can effectively prevent procedures from cracking the verification code graphic.

Description

technical field [0001] The invention relates to image processing technology in network applications, in particular to a method and device for generating image verification codes. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. While the development of the network provides convenience, it also brings various challenges. Some people with ulterior motives will use robot programs to improperly use a large number of free network resources, such as mass spam, etc., which will greatly reduce the performance of the server; some people will use the program to continuously send service request responses and carry out "saturation attacks" to paralyze the server Some people even try to use brute force cracking and other means to steal virtual property. In order to avoid the above-mentioned malicious behaviors, it is extremely important to provide a solution tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T13/00H04L9/32G06T13/80
Inventor 蒂吉斯·泰尔劳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products