Identifying code generating method, safety identification method, safety identification device and safety identification system

A security verification and verification code technology, applied in transmission systems, electrical components, etc., can solve the problems of low cheating cost, long time required, cumbersome operation, etc., and achieve the effect of blocking cheating behavior, improving user experience, and increasing the difficulty of cracking

Active Publication Date: 2016-04-06
BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method, due to the distortion of the verification code and the influence of interference factors in the verification picture, also easily makes it difficult for the user to recognize the verification code in the verification picture
However, under the premise of ensuring that the user can normally identify it, due to the limitation of the interactive mode of the verification code, it is difficult to increase the cost of cracking the verification code, which makes the cost of cheating low, the reliability of the statistical results obtained is low, and it also increases network traffic and website servers. The resource overhead reduces the operational reliability of the website server; furthermore, since the verification code is included in the verification picture, the user needs to identify the verification code in the verification picture, and then according to the recognized verification code, through the keyboard, enter the Enter the identified verification code to complete the security verification process, which makes the security verification take a long time and reduces the user's operational efficiency
For example, when the user opens the questioning website with the mouse, when there is a verification code in the questioning website, the user needs to identify the verification code from the verification picture, then put down the mouse, and then manually enter the recognized verification code through the keyboard, and then click the mouse to submit To perform security authentication, the operation is cumbersome and takes a long time, which reduces the user's operation efficiency and is not conducive to the improvement of user service experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying code generating method, safety identification method, safety identification device and safety identification system
  • Identifying code generating method, safety identification method, safety identification device and safety identification system
  • Identifying code generating method, safety identification method, safety identification device and safety identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Embodiment 1. A security verification method.

[0033] figure 1 It is a schematic flowchart of a security verification method provided by an embodiment of the present invention. see figure 1 , the process includes:

[0034] Step 101, determine that security verification is required, and send a verification request to the website server;

[0035]In this step, when the user logs in to the forum, the questioning website, the user click volume statistics website, the user rating website and other website servers through the client browser, or when the user needs to post content or give a rating or submit a question after logging in to the website server, Trigger security verification. For example, when a user logs in to a BBS forum through a client browser, when starting the BBS server login interface, in order to prevent the machine program from automatically logging in, the client can determine that the user needs to perform security verification, thereby automaticall...

Embodiment 2

[0141] Embodiment 2, a method for generating a verification code.

[0142] image 3 It is a schematic flowchart of a method for generating a verification code provided by an embodiment of the present invention. see image 3 , the method includes:

[0143] Step 301, selecting a verification area from a pre-stored verification area library;

[0144] In this step, the website server pre-stores a verification area database containing various verification areas, wherein, as an optional embodiment, the website server may select a verification area from the verification area library in a random manner, or may select a verification area according to a preset The selection rule for selecting a verification area from the verification area library.

[0145] Step 302: From the verification code library mapped to the selected verification area, select a pre-set verification code and corresponding prompt information for prompting the user to operate the verification code; or, in the sel...

Embodiment 3

[0175] Embodiment 3, safety verification device.

[0176] Figure 4 It is a structural schematic diagram of the safety verification device provided by the embodiment of the present invention. see Figure 4 , the device includes: a verification request processing module, a verification area display module and a verification information generation module, wherein,

[0177] A verification request processing module, configured to determine that security verification is required, and send a verification request to the website server;

[0178] In the embodiment of the present invention, the verification request response includes: the verification area and the prompt information corresponding to the verification sub-area used for selecting the verification code in the verification area; The prompt information of the verification sub-area as the verification code.

[0179] In the embodiment of the present invention, the verification request response is encrypted using one or more ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identifying code generating method, a safety identification method, a safety identification device and a safety identification system, wherein the safety verification method mainly comprises the steps of determining a fact that safety identification is required, transmitting an identification request to a website server; receiving an identification request response which is returned from the website server, acquiring an identification area which comprises a plurality of identification sub-areas, displaying the acquired identification area; acquiring identification sub-areas which are successively selected according to prompting information contained in the identification request response, generating identification information and transmitting the identification information to the website server, so that the website server identifies the received identification information according to a stored identifying code, wherein the stored identifying code is generated by the website server in response to the identification request. The identifying code generating method, the safety identification method, the safety identification device and the safety identification system provided by the technical solution of the invention have advantages of further reducing time required for safety identification, and improving safety identification efficiency.

Description

[0001] Technology category [0002] The invention relates to information security technology, in particular to a method for generating verification codes and a method, device and system for safety verification. Background technique [0003] With the development of computer technology and the continuous improvement of hacker technology, website servers often encounter malicious attacks from clients (clients), for example, in forums, question websites, user click count websites, and user rating websites (the above can Collectively referred to as the website server), the attacker defrauds the identity by writing pre-set codes in the client script, and using the code written in the script, the client can repeatedly log in to the website server, or repeatedly submit to the website server Garbage data, thereby triggering the website server to execute the corresponding account creation, or to perform operations such as machine filling, machine hacking, machine batch cheating, malicio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 廖锐
Owner BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products