Authentication method and device
An identity verification method and identity technology, applied in the field of computer networks, can solve problems such as insufficient security, affecting the efficiency of identity verification, and increasing the difficulty of machines to crack verification codes, so as to reduce pressure and improve processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0043] see image 3 , shows a flow chart of the identity verification method provided by the first embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server, and the identity verification method provided by this embodiment includes the following steps:
[0044] In step S11, the server receives the verification code pull request sent by the user terminal.
[0045] In this step, the user terminal may send a verification code pull request to a pre-configured server, for example, a webpage address, to obtain the verification code. Specifically, the verification code pull request can carry a page identifier (checkcode). The page identifier is used to identify a unique page. For example, it can be a number. The page identifier will change every time the page is refreshed. It is different from the verification code pull request. have a corresponding relationship.
[0046] Step S12, randomly extract a verification code and ...
no. 2 example
[0053] Figure 4 It is a schematic flowchart of the identity verification method in the second embodiment of the present invention. Please combine figure 1 , this embodiment describes the processing flow of the server, and the identity verification method in this embodiment includes:
[0054] Step S201, the server generates multiple verification codes and one or more passwords corresponding to each of the verification codes, and stores the multiple verification codes and corresponding passwords in a buffer pool, and the verification codes It includes a first verification code picture, the first verification code picture is spliced by multiple sub-pictures, and the password includes preset processing rules corresponding to the multiple sub-pictures.
[0055] There is no limit to the form of splicing multiple sub-pictures into the first verification code picture. For example, all sub-pictures can be arranged in the same row to form a long strip-shaped large picture, or the s...
no. 3 example
[0070] see Figure 5 , shows a flow chart of the identity verification method provided by the third embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server, and the identity verification method in this embodiment includes:
[0071] In step S31, the user terminal sends a verification code pull request to the server.
[0072] Step S32, receiving the verification code issued by the server and the password corresponding to the verification code, the verification code includes a first verification code picture, and the first verification code picture is composed of multiple sub-pictures, so The password includes preset processing rules corresponding to the plurality of sub-pictures.
[0073] Step S33 , according to the preset processing rules in the password, adjust the positions of multiple sub-pictures in the first verification code picture of the verification code to form a second verification code picture and presen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


