Verification method and verification device

A verification method and a technology for verifying information, which are applied in the field of verification methods and devices, can solve problems such as poor security, and achieve the effects of improving security, avoiding losses, and increasing the difficulty of cracking

Active Publication Date: 2016-01-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the characters in the picture are generally letters or numbers, and the automaton has the ability of picture recognition, which can automatically recognize these characters and then pass the verification. Therefore, the security of this verification method is poor
Once the user confirms the preset track, the preset track is static, and the automaton can brute force the preset track according to the keyboard, and then pass the verification. Therefore, the security of this verification method is also poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and verification device
  • Verification method and verification device
  • Verification method and verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] figure 1 is a schematic structural diagram of a verification system provided by an embodiment of the present invention, see figure 1 , the verification system includes: a server and a terminal, the server and the terminal are connected through a network.

[0043] Wherein, the terminal is configured to send a verification request to the server when receiving an instruction to be verified, and the server is configured to generate a verificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification method and a verification device, and belongs to the technical field of network. The method comprises the steps as follows: generating a verification prompt picture when receiving a verification request sent by a terminal, wherein the verification prompt picture includes multiple first positions and connection prompt information, and the connection prompt information is used for indicating a user to connect the multiple first positions according to a first connection order; sending the verification prompt picture to the terminal to enable the terminal to capture a position selection operation by the user, generating connection verification information which includes multiple second positions selected by the user and a second connection order, and returning the connection verification information; receiving the connection verification information sent by the terminal; and passing verification when determining that the connection prompt information matches the connection verification information. According to the invention, the difficulty in cracking an automat is increased, the security is improved, malicious operation on an automat is avoided, and loss brought to other users is avoided.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a verification method and device. Background technique [0002] With the development of computer technology, automatic machines can perform malicious operations such as brute force cracking passwords, swiping tickets, flooding forums, etc. These malicious operations will disrupt the order of the network and bring losses to other users. [0003] In order to prevent these malicious operations, the current user can be verified to determine whether the current user is an automaton or a human being. Taking terminal verification as an example, the terminal can generate a picture containing characters and require the current user to input the characters in the picture in the specified input field. When the characters entered by the current user match the characters in the picture, the current user can be considered as If the user is a human, the verification passes. Or, the user pred...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/36
Inventor 王进颜国平刘海生许灿冲李智慧胡育辉余传生
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products