Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An adaptive verification code design method and system

A verification code, self-adaptive technology, applied in the field of computer network, can solve problems such as increasing the difficulty level of verification code, increasing the difficulty of verification code, affecting user operation, etc., and achieves the effect of reasonable difficulty level upgrade, flexible threshold setting, and guaranteeing system security.

Active Publication Date: 2019-05-03
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] 1. The existing verification code interference strategy has little impact on the machine, but greatly affects the identification of people, and cannot simultaneously ensure system security and human experience;
[0018] 2. The verification code difficulty level upgrade strategy adopts a single indicator. If the network speed is not good and clicks to submit the request repeatedly, it will cause the verification code difficulty level to increase, which will affect the enthusiasm and experience of users;
[0019] 3. Most of the threshold settings in the verification code difficulty level upgrade strategy are for all applications. The user's verification code difficulty upgrade in one application of the system will cause the verification code difficulty in other applications to increase accordingly. Good guarantee of user experience;
[0020] 4. The existing verification code systems that have different security levels and can be automatically upgraded according to user behavior, etc., all use IP for statistical restrictions. For universities or large companies with very few external network IPs, the scope of influence Too large, seriously affecting user operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An adaptive verification code design method and system
  • An adaptive verification code design method and system
  • An adaptive verification code design method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0061] figure 1 It is a schematic diagram of main steps of an adaptive verification code design method according to an embodiment of the present invention. Depend on figure 1 It can be seen that the adaptive verification code design method of the present invention mainly includes the following steps S11 to S13.

[0062] Step S11: The service identifier corresponding to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an adaptive verification code design method and system, so that when an automatic upgrade policy is used to handle an illegal request, other normal users are affected as less as possible, thereby ensuring user experience while protecting system security, and improving verification efficiency of a verification code. The method comprises: performing computation on a service identifier, corresponding to a service for which a user sends a verification code request, and a unique identifier of the user, to obtain a string with a fixed length, and generating a session identifier; according to the generated session identifier, reading a verification code security level of the session identifier from a buffer, and then generating a verification code; and performing verification according to the session identifier and the input verification code, and feeding back a verification result.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an adaptive verification code design method and system. Background technique [0002] In Internet applications, in order to prevent malicious users from performing a large number of illegal operations automatically submitted through the program, most websites use verification code technology to prevent the system from being maliciously attacked, so as to achieve the purpose of protecting the normal operation of the system. However, with the development of artificial intelligence and the improvement of computer processing capabilities, the recognition success rate of simple picture verification codes is also getting higher and higher. In order to prevent the verification code from being cracked by the robot, the difficulty of the verification code becomes higher and higher. This can indeed prevent the automatic recognition of the robot, but at the same time, the difficul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36
CPCG06F21/36G06F2221/2133
Inventor 闪光辉罗治凡刘深
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products