Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Graphic verification code generation method

A graphic verification code and verification code technology, applied in the field of computer information, can solve problems such as interfering with website business, consuming network bandwidth, occupying website resources, etc., to achieve the effect of enhancing the ability to resist attacks and increasing the difficulty

Inactive Publication Date: 2016-05-11
ANHUI ETUO COMM TECH GRP
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While these services have brought a lot of popularity to the website, they have also brought many false users such as "network robots". These visits brought by false users consume valuable network bandwidth, occupy a large amount of website resources, and interfere with normal website business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Graphic verification code generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The preferred modes of the present invention will be described in further detail below in conjunction with the examples.

[0015] Such as figure 1 As shown, a method for generating a graphic verification code includes the following steps:

[0016] S1. The system first selects two original images containing numbers or letters from the gallery inside the system, superimposes the two original images to form a verification code graphic, and saves the verification code graphic in the system.

[0017] S2. Add the background, interference lines and interference pixels to the two original images respectively, and then superimpose them to form the bottom layer.

[0018] S3. Cover multiple layers of interfering layers including dynamic pictures on the lowest layer to form a graphic verification code.

[0019] The invention proposes a method for generating a graphic verification code. Compared with the existing method for generating a graphic verification code, this method super...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a graphic verification code generation method. The method comprises the following steps: S1, selecting two original graphs from a graph library in a system by the system, superposing the two original pictures to form a verification code graph, and storing the verification code graph in the system; S2, adding backgrounds, interference lines and interference pixels for the two original graphs and superposing the two original graphs to form a bottommost graphic layer; and S3, covering the bottommost graphic layer with a plurality of interference graphic layers to form a graphic verification code. According to the graphic verification code generation method proposed by the invention, the two graphs are superposed to form the verification graph, so that the difficulty in program identification is increased; and the method proposed by the invention can effectively increase the difficulty in automatic verification code program identification and improve the attack resistance of the system.

Description

technical field [0001] The invention belongs to the technical field of computer information, and in particular relates to a method for generating a graphic verification code. Background technique [0002] With the development of network technology, various services have been widely used on the network. While these services have brought a lot of popularity to the website, they have also brought many false users such as "network robots". These visits brought by false users consume valuable network bandwidth, occupy a large amount of website resources, and interfere with normal website business. In order to distinguish which of the users who visit the website are real and valid users and which are generated by the program, people use verification code technology. The so-called verification code is to display some information composed of numbers, letters or text on a picture, and at the same time use interference technology to make people recognize the information, but the pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36
CPCG06F21/36
Inventor 陈玉兵武明根
Owner ANHUI ETUO COMM TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products