Unlock instant, AI-driven research and patent intelligence for your innovation.

Generation method of image checking code

A technology of picture verification code and verification code request, which is applied in the field of designing computers, can solve the problems that the database cannot withstand violent attacks, lack of security, complex forms, etc., and achieve the effect of friendly interface, high security and convenient verification

Active Publication Date: 2015-05-13
XIANGTAN UNIV
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

DCG captchas are highly usable and unlike other known captchas, add some resistance to relay attacks, but they are also vulnerable to our new dictionary-based automated attack
For example, the U.S. patent application number US 20120323700 A1 published on December 20, 2012 discloses a verification code technical solution. The verification code requires the user to complete a task, that is, to generate a row of objects in a certain order, which is judged by the user. And drag the qualified object to the specified position, such as completing the operation correctly, passing the verification, this non-verification code has a good effect on preventing OCR, etc., but due to the limitations of the database itself, it is not conducive to resisting brute force attacks promotion, complex
[0008] Traditional character verification codes generate a picture from a string of randomly generated numbers or symbols, add some interference lines, noise points, local expansion or distortion, etc. to the picture to generate a verification code picture, because of its data volume It can effectively deal with exhaustive attacks, but the development of OCR (Optical Character Recognition, optical character recognition) technology has made it lack of security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method of image checking code
  • Generation method of image checking code
  • Generation method of image checking code

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0078] Take N=30, X=8, Y=8 as an example to illustrate the workflow of the present invention.

[0079] Such as figure 1 As shown, the flow chart of generating the verification code:

[0080] Including the following steps:

[0081] (1) The client sends a long image request to the server.

[0082] (2) The server receives the "send long image request" request and performs the following processing:

[0083] Call Math.random() to generate four random characters (0-9, A-Z), and call java.awt.Graphics class to write random characters into the picture, and draw noise and interference lines; compress the picture into 64*64px size, and save this image as a base image.

[0084] Call Math.random() to generate a [0,29] random number T=20 as the reference picture number, and save it on the server side.

[0085] Copy 29 copies of the reference picture to generate copy pictures, and distort each copy picture as follows:

[0086] The copied picture is divided into squares by 8 rows and 8...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for generating an image checking code. The method comprises the steps of generating a background image; adding four randomly-generated characters, numbers, noise points and interference line to generate a reference image; randomly numbering the reference image; generating a plurality of deformed images by using the reference image as a mother board; numbering the new generated deformed images; forming a long image with the reference image according to the number and sending to a client; dragging the long image by a user to select the reference image for checking. With the adoption of the checking method, the behavior checking safety is improved, a robot attack can be effectively resisted, and moreover, input of the traditional keyboard can be avoided.

Description

technical field [0001] The invention relates to the computer field, in particular to a method for generating a picture verification code. Background technique [0002] While the rapid development of information technology and network communication has brought us convenience, it has also created a series of unstable factors. Such as spam attacks, batch registration and distribution of stolen resources, and fake votes on the online voting system make the authenticity and security of the network impossible to guarantee. At present, the verification code technology is generally adopted on the website to deal with this problem. [0003] While the rapid development of information technology and network communication has brought us convenience, it has also created a series of unstable factors. Such as spam attacks, batch registration and distribution of stolen resources, and fake votes on the online voting system make the authenticity and security of the network impossible to gua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/36G06T11/60
Inventor 欧阳建权王泽颖罗新高唐欢容
Owner XIANGTAN UNIV