Safe protecting method and device for Web verification code with combined picture and characters

A security protection and verification code technology, applied in the field of information security, can solve problems such as high difficulty, difficult to recognize by human eyes, and limited application scope, and achieve the effect of reducing the automatic recognition rate, not easy to read the wrong answer, and improving the recognition rate.

Active Publication Date: 2012-10-10
SOUTH CHINA UNIV OF TECH
View PDF1 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Disadvantages: OCR (Optical Symbol Recognition) technology is relatively mature, as long as the attacker has such a technology or program, its automatic program can almost 100% identify the correct Web verification code, thus making the existing technology invalid
[0010] Cons: This is a palliative, not a permanent solution
[0013] Disadvantages: It requires the professional knowledge of the viewer, which may not be applicable to ordinary people
Manual production of professional questions is more difficult, and the number of questions is limited. It is easy for automatic programs to store all the correspondence between questions and answers, and use the look-up table method to crack
[0014] To sum up, the security protection methods of web verification codes in the prior art are either easy to be cracked, difficult to recognize by human eyes, or too professional and limited in scope of application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe protecting method and device for Web verification code with combined picture and characters
  • Safe protecting method and device for Web verification code with combined picture and characters
  • Safe protecting method and device for Web verification code with combined picture and characters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] Such as figure 1 As shown, a graphic-text combined web verification code security protection device includes:

[0057] Gallery 101, used to store and manage pictures related to Web verification codes;

[0058] Question bank 102, used for storing and managing questions related to pictures;

[0059] Answer library 103, used for storing and managing answers related to questions;

[0060] Mapping relationship manager 104, used to store and manage the many-to-many relationship between pictures and questions;

[0061] The function mapping manager 105 is used to store and manage the function mapping relationship between pictures, question pairs and answers, that is: many-to-one mapping relationship;

[0062] The random number generator 106 is used to generate a plurality of random numbers, which are respectively provided to the mapping relationship manager 104 to screen pictures and question pairs, and to the function mapping manager 105 to screen the correct answer and oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe protecting method and a safe protecting device for a Web verification code with combined picture and characters. The method comprises the following steps that a Web server randomly displays a meaningful picture, gives a related question and randomly lists more than two selection answers, wherein only one answer is correct and the position of the correct answer in the selection answers is random; picture and the character backgrounds of the answer are added into random noise points; the Web verification code input by a user consists of acronyms and the position sequence number of the answer; and a server terminal verifies the correction of the Web verification code provided by a browser, wherein the judgment standard for the passing of verification is under the condition that both the acronyms and the position sequence number are correct. By the method and the device, the problem that the Web verification code is either difficultly identified and easy to mistakenly identify or is easy to identify but is easily cracked by a computer automatically in the prior art is solved.

Description

technical field [0001] The invention relates to an information security technology for Internet sites to defend against automatic program attacks, in particular to a method and device for security protection of Web authentication codes combined with graphics and text. Background technique [0002] The World Wide Web (abbreviated as WWW or Web) is one of the most common applications on the Internet, and the problem of security attacks against Web applications is also prominent. One type of security attack is called automatic program attack (if it is a script program, it is called automatic script attack), which is characterized in that the attack action is automatically controlled by the program without manual operation, which greatly improves the attack efficiency Attack effects that are difficult to achieve, such as guessing website login passwords with exhaustive methods, crowding message board space with spam, and so on. [0003] One way to defend against bot attacks is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 覃健诚陆以勤
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products