Method for verifying verification code and server

A verification code and server technology, applied to electrical components, transmission systems, etc., can solve problems such as difficult to balance security and usability, and achieve the effects of improving anti-cracking ability, easy identification, and increasing difficulty

Inactive Publication Date: 2012-09-19
CHINA TELECOM CORP LTD
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a method and server for verifying verification codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying verification code and server
  • Method for verifying verification code and server
  • Method for verifying verification code and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated.

[0024] figure 1 It is a schematic flow chart of a method for verifying a verification code in the present invention, including the following steps:

[0025] In step 101, when the server receives the verification request from the client, it returns M 3D model reference images and the unique identifier corresponding to each 3D model reference image to the client, where M is a positive integer greater than 0.

[0026] The 3D model reference graph is a graph obtained by performing 3D modeling on the item in 3D space. The items may be common items such as airplanes, vases, dogs, etc. in the real world. 3D modeling is to build models with 3D geometry and surfaces.

[0027] The unique identifier refers to the different numbers, letters, or combinations of numbers and letters assigned by the server to d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying a verification code and a server. When a server side receives a verification request sent by a client side, M three-dimensional model reference pictures and the single corresponding identification are returned to the client side; when the server side selects N pictures from the three-dimensional model reference pictures, transformation is performed according to the spatial geometry transformation algorithm, the single identification of the N selected three-dimensional model reference pictures respectively serves as the single identification of transformed N ordered pictures; the transformed N ordered pictures are returned to the client side; the three-dimensional model reference pictures corresponding to the ordered pictures are selected, the single identification of the selected three-dimensional model reference pictures is led to serve as the verification code which is sent to the server side through the client side; and the verification code is compared with the single identification on the server side, and verification is passed if the verification code coincides with the single identification. By aid of the method and the server, decoding resistance of the verification code is improved, the verification code can be recognized by human eyes easily, and both safety and availability are considered.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a method and server for verifying verification codes. Background technique [0002] Exchanging information with servers through computer networks has become the most common way for people to obtain information services in their daily lives and work. A large number of network services provide online interactive services for individual users. The verification code technology is to prevent hackers from using malicious programs to automatically register and log in, launch malicious flooding, maliciously increase database access, and steal confidential information and other attacks. [0003] The verification code technology is currently represented by a two-dimensional graphic verification code. A two-dimensional graphic verification code is a two-dimensional picture containing characters generated by the server. The characters in this picture are usually distorted or distort...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 林立宇陈云海刘晓玲
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products