Image identifying code achievement method based on text adhesion and visual compensation

A picture verification code and visual compensation technology, which is applied in the field of network security, can solve the problem that the click input is easy to be cracked by violence, etc., and achieve the effect of easy automatic recognition, easy recognition, and good usability

Inactive Publication Date: 2016-07-20
XIAMEN UNIV TAN KAH KEE COLLEGE
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, by increasing the number of candidate code items to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image identifying code achievement method based on text adhesion and visual compensation
  • Image identifying code achievement method based on text adhesion and visual compensation
  • Image identifying code achievement method based on text adhesion and visual compensation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solution of the present invention will be described in detail below in conjunction with the drawings.

[0043] The present invention proposes a method for implementing image verification code based on text adhesion and visual compensation, which includes verification code and candidate code generation, verification code input and verification code verification.

[0044] (1) Generation of verification code and candidate code

[0045] 1. The server side randomly generates 4-32 different text characters according to the requirements of the user's corresponding preset verification level, these characters are used as candidate characters, and a 4-32 bit all 0 series number S0 is generated at the same time, each character Corresponds to one of the serial numbers. In this embodiment, all users are initially normal users by default, and only require general level verification. At this time, the server generates 8 different text characters; if the user is verifying, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image identifying code achievement method based on text adhesion and visual compensation.The image identifying code achievement method comprises the steps of identifying code and candidate code generation, identifying code input and identifying code identification.The step of identifying code and candidate code generation comprises the sub-steps that a server side generates candidate characters and correspondingly generates serial numbers S0; identifying characters are selected form the candidate characters, and the serial numbers S0 are correspondingly set; the identifying characters are randomly arranged, and the output positions of the identifying characters are set; the character sizes, character fonts, colors, shapes and image backgrounds and interference backgrounds of the identifying characters are set; image identifying codes for random text adhesion are formed by combining with the identifying characters, the image backgrounds and the interference backgrounds, each candidate code correspondingly generates an independent character image, and the character images are directly output to a web page to be identified and are combined with the identifying codes to serve as web page candidate codes.By the adoption of the image identifying code achievement method, the problem that identifying codes are not easily identified and cracked by machines automatically but are easily identified and input by users is solved.

Description

Technical field [0001] The invention relates to the field of network security, in particular to a method for implementing image verification codes based on text adhesion and visual compensation. Background technique [0002] The technologies currently used in verification codes are divided into the following categories [0003] 1. Verification code generation technology [0004] (1). Text verification code [0005] (2). Image verification code [0006] (3). Audio verification code [0007] (4). Video verification code [0008] (5) The above comprehensive technology [0009] 2. Technology used to enhance the anti-cracking ability of verification codes [0010] (1). Character bonding technology [0011] (2). Character distortion technology [0012] (3) Background interference technology [0013] (4). Other [0014] 3. Verification code input technology [0015] (1). User manual input [0016] (2). Click to enter [0017] (3) Drag and drop input [0018] (4). Other [0019] Since audio and video verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/36G06K9/00
CPCG06F21/36G06F2221/2133G06V30/413
Inventor 曾党泉
Owner XIAMEN UNIV TAN KAH KEE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products