A verification code security defense method, system and device
A security defense and verification code technology, applied in the field of designing verification codes, can solve problems such as indistinguishability with the naked eye, and achieve the effect of enhancing security and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.
[0058] see figure 1 , is a verification code security defense method of the present invention, comprising the steps of:
[0059] S100: The server generates first verification code information; and then transmits the generated first verification code information to the client. The generation may also be that the client retrieves some data from a previously received verification code database as the first verification code. Wherein, the verification code information may be implemented in the form of pictures, animated gifs, texts, letters, and the like.
[0060] The client proceeds to step S102: generating second verification code information based on the first verification code information, the second verification code information is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


