Method, device and system for realizing identifying code

An implementation method and verification code technology, applied in the field of verification code implementation, can solve the problems of adding verification codes, high difficulty in verification code identification, and inability to meet the needs of the Internet, so as to achieve the effect of ensuring security and high anti-cracking ability

Active Publication Date: 2015-08-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the means of improving the anti-cracking ability of the verification code is usually to increase the difficulty of identifying the verification code, but if the identification difficulty of the verification code is too high, the probability of user passing will be reduced and the user exper

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing identifying code
  • Method, device and system for realizing identifying code
  • Method, device and system for realizing identifying code

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0032] refer to image 3 As shown, the first embodiment of the present invention provides a verification code implementation method, the verification code implementation method includes the following steps:

[0033] Step S1, when receiving a user access request from the terminal 3, sending a verification code input request to the terminal 3;

[0034] Step S2, obtaining the verification code sent by the terminal 3, the verification code being the movement mode signal generated by the gravity sensing module 32 in the terminal 3 in response to the movement of the terminal 3 after the terminal 3 receives the verification code input request;

[0035] Step S3, analyzing the motion mode signal to obtain the actual motion mode of the terminal 3, and judging whether the verification code is correct according to the actual motion mode of the terminal 3.

[0036] According to the above-mentioned implementation method of the verification code, after receiving the verification code input ...

no. 2 example

[0052] refer to Figure 6 As shown, the second embodiment of the present invention provides a verification code implementation method, which is executed interactively by the server 1 and the terminal 3 . The implementation method of the verification code includes the following steps:

[0053] Step S11 , when receiving a user access request from the terminal 3 , the server 1 sends a verification code input request to the terminal 3 . The verification code input request includes a verification code prompt interface, and the verification code prompt interface prompts the preset motion mode of the terminal 3 . The preset motion mode includes a preset motion track or a preset rotation mode. The preset rotation mode includes a rotation direction and a rotation angle.

[0054] Step S12, after receiving the verification code input request, the terminal 3 obtains the movement mode signal generated by the gravity sensing module 32 in the terminal 3 in response to the movement of the ...

no. 3 example

[0058] refer to Figure 7 As shown, the third embodiment of the present invention provides a device 100 for implementing a verification code. The device 100 for implementing a verification code runs in the server 1 and includes a sending module 101 , an obtaining module 102 and a judging module 103 . It can be understood that the above-mentioned modules refer to computer programs or program segments for performing one or more specific functions. In addition, the distinction between the above modules does not mean that the actual program code must also be separated.

[0059] The sending module 101 is configured to send a verification code input request to the terminal 3 when receiving a user access request from the terminal 3 . The verification code input request includes a verification code prompt interface, and the verification code prompt interface prompts the preset motion mode of the terminal 3 . The preset motion mode includes a preset motion track or a preset rotation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing an identifying code. The method comprises the following steps: when a user access request from a terminal is received, sending a request by a server for inputting the identifying code to the terminal; after the terminal receives the request for inputting the identifying code, obtaining a movement mode signal generated from movement of a gravity sensing module, responding to the terminal, in the terminal; taking the movement mode signal as the indentifying code, and sending the movement mode signal to the server; analyzing the movement mode signal by the server to obtain an actual movement mode of the terminal; and judging if the indentifying code is right according to the actual movement mode of the terminal. The invention also provides a device and system for realizing the indentifying code. By using the method, device and system, the user experience requirement is satisfied, and safety of the indentifying code is ensured.

Description

technical field [0001] The specific embodiments of the present invention relate to the technical field of network security, in particular to a verification code implementation method, device and system. Background technique [0002] Captcha, also known as Turing Test (Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA for short), is a public fully automatic program that distinguishes whether a user is a computer or a human. In the actual use of the verification code, the computer as the server will automatically generate questions for the user to answer, and judge whether the user's answer is correct. The question must be answered only by a human, not by a computer. Therefore, users who answer the question correctly are considered human. The use of verification codes can prevent malicious cracking of passwords, swiping tickets, flooding forums, etc., thereby ensuring network security. [0003] In order to improve the security of the verifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F3/01
CPCH04L63/0838H04L63/10
Inventor 秦铭雪
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products