Method and device for generating three-dimensional dynamic verification code

A three-dimensional dynamic and verification code technology, applied in computer security devices, digital data authentication, instruments, etc., can solve problems such as difficult to identify symbols, interference pictures, and normal users are difficult to identify, so as to improve the ability to resist attacks and make identification simple and easy Effect

Inactive Publication Date: 2010-06-16
WUHAN UNIV
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The two-dimensional graphic verification code is a picture containing characters automatically generated by the server. The characters in this picture are usually distorted or added with some noise under the premise of ensuring human visual recognition, so as to increase the difficulty of automatic program recognition
For the current verification code generation method in static image format, a malicious user can easily obtain the entire verification code image containing all characters through a machine program, and then extract all characters from background noise through character segmentation and other recognition methods. So as to be able to crack the two-dimensional graphic verification code
Therefore, in the design of related algorithms, designers often add a lot of interference information to the picture, making it difficult for the computer to recognize the symbols in the picture, so as to improve security
However, excessive interference with the symbols in the picture often makes it difficult for normal users to recognize, which makes it difficult to balance the security and usability of the two-dimensional graphic verification code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating three-dimensional dynamic verification code
  • Method and device for generating three-dimensional dynamic verification code
  • Method and device for generating three-dimensional dynamic verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The generation method of the three-dimensional dynamic verification code provided by the present invention, the generation process is as follows:

[0026] a. Randomly generate verification code information, and set the position where the verification code information is displayed on the screen of the three-dimensional video;

[0027] b. Establish a three-dimensional space of a certain size, and generate a three-dimensional geometric primitive in the three-dimensional space; said generating a three-dimensional geometric primitive includes setting the position attribute, geometric attribute and motion track of the three-dimensional geometric primitive, and the position attribute includes a three-dimensional geometric primitive The three-dimensional coordinates of , the geometric attributes include the brightness, shape, size and color attributes of the three-dimensional geometric primitives;

[0028] c. Judging whether the three-dimensional geometric primitive is located ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for generating a three-dimensional dynamic verification code. The invention adopts a technical scheme which comprises the following steps: randomly generating the verification code and determining the position at which the verification code is displayed in a screen; generating a three-dimensional geometric primitive and judging whether the positions of the three-dimensional geometric primitive and the verification code information displayed in the screen are the same or not; if so, changing a designated changed attribute of the three-dimensional geometric primitive; otherwise not changing the designated changed attribute of the three-dimensional geometric primitive; and moving the designated changed attribute of the three-dimensional geometric primitive according to a motion trail to realize the three-dimensional dynamic verification code. In the invention, the content of the verification code is displayed by changing the attribute of the geometric primitive and each frame does not reveal the verification code information out, so that the traditional two-dimensional image verification code attack means cannot separate the content of the verification code from a single-frame image; and at the same time, because different motion trail of each geometric primitive is set by a special method, the identification and attack difficulties of the traditional technology tracing a moving object in a video are increased and anti-attack capability of the verification code finally is improved effectively.

Description

technical field [0001] The invention belongs to the field of computer network security, in particular to a method and device for generating a three-dimensional dynamic verification code. Background technique [0002] Exchanging information with servers through computer networks has become the most common way for people to obtain information services in their daily lives and work. Among them, a large number of network services provide online interactive services for individual users. However, there are currently a large number of program-based attacks that pretend to be browsers to automatically connect to servers on the Internet, and then launch further intrusion attacks. For example: fake login, modify password, publish false news, steal confidential information, etc. [0003] In order to ensure that the requests submitted by the client are from the online operations of individual users, rather than the data automatically sent by malicious software, many scholars have beg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T17/00G06F21/00G06F21/44
Inventor 崔竞松张达梅婧婷汪霞杜海坤方秦伟张琳
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products