Unlock instant, AI-driven research and patent intelligence for your innovation.

A verification code security defense method, system and device

A security defense and verification code technology, applied in the field of designing verification codes, can solve problems such as indistinguishability with the naked eye, and achieve the effect of enhancing security and increasing difficulty

Active Publication Date: 2019-07-09
FUJIAN TQ DIGITAL
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, verification codes are usually set up for user registration, login or other channels for verification. The verification codes set are all displayed as a dot matrix verification code for users to input or click content for verification, and there is no brute force cracking of the program. In order to prevent brute-force cracking, some verification codes keep shrinking the characters and overlapping each other, so that the naked eyes can’t tell them apart

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification code security defense method, system and device
  • A verification code security defense method, system and device
  • A verification code security defense method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0058] see figure 1 , is a verification code security defense method of the present invention, comprising the steps of:

[0059] S100: The server generates first verification code information; and then transmits the generated first verification code information to the client. The generation may also be that the client retrieves some data from a previously received verification code database as the first verification code. Wherein, the verification code information may be implemented in the form of pictures, animated gifs, texts, letters, and the like.

[0060] The client proceeds to step S102: generating second verification code information based on the first verification code information, the second verification code information is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a verification code security defensing method, system and apparatus. The method comprises the following steps of: generating first verification code information; based on the first verification code information, generating second verification code information, wherein the amount of the second verification code information is less than that of the first verification code information; displaying the second verification code information in a client; receiving to-be-verified data in the client; determining whether the to-be-verified data and the second verification code information are the same; and when it is determined that the to-be-verified data and the second verification code information are the same, displaying verification success information in the client. The method, the system and the apparatus provided by the present invention effectively improve the security of using verification codes.

Description

technical field [0001] The invention relates to the application field of verification codes, and in particular relates to a method for security defense of verification codes. Background technique [0002] At present, verification codes are usually set up for user registration, login or other channels for verification. The verification codes set are all displayed as a dot matrix verification code for users to input or click content for verification, and there is no brute force cracking of the program. In order to prevent brute-force cracking, some verification codes keep shrinking the characters and overlapping each other, so that the naked eyes can't tell them apart. Contents of the invention [0003] Therefore, it is necessary to provide a verification code security defense method to improve the security of the verification code. [0004] In order to achieve the above purpose, the inventor provides a verification code security defense method, including the following step...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F21/55H04L9/32
CPCG06F21/36G06F21/55H04L9/3228
Inventor 詹彦安范福生江洪黄钟贵李正郑晟陈宏展刘德建
Owner FUJIAN TQ DIGITAL