Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method of setting random comparison verification code in Internet webpage login system

A technology of login system and implementation method, which is applied in the direction of transmission system, electrical components, etc., can solve problems such as difficult identification of users, poor user experience, troubles, etc., and achieve the effect of protecting security, increasing complexity, and improving security

Active Publication Date: 2019-04-12
南通江凌织造有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Currently, in the system login, registration, and comment interfaces, in order to prevent the automatic behavior of the machine program, a verification code system is provided to intercept the login, registration, and comment interfaces. The traditional verification code method is a scrambled text image method. With the image recognition With the continuous development of technology, pure text and picture verification codes can be read and cracked by machines, while overly complex and scrambled verification code images make it difficult for users to identify, and the user experience is poor
Just like the 12306 train ticket ordering system, the verification code images encountered in the system whether it is the user login or the ticket purchase process are not only unclear, but also often display some images that the user does not know what they are, causing users to use the system as a whole. The process is very troublesome, and even delays the passenger's booking process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of setting random comparison verification code in Internet webpage login system
  • Implementation method of setting random comparison verification code in Internet webpage login system
  • Implementation method of setting random comparison verification code in Internet webpage login system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0015] like figure 1 As shown, the implementation method of setting a random control verification code in the Internet web page login system of the present invention, that is, when the user logs in to the system, the server side of the login system randomly uses the generated algorithm of the operation container module according to the user information to encrypt the graph. A set of verification data and a set of comparison tables are generated in the form and reflected on the login interface at the same time. In this process, a randomly generated parameter number a (the number of digits of a is greater than or equal to 1) is preset in the system as the verification data, and then set The letter parameter b of 26 English letters with a value ran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for setting random comparison verification code in an Internet webpage login system. According to the method, when a user logs in the system, a server side logging in the system generates a set of verification data and a set of comparison tables by a generation algorithm of an operation container module in an encryption graph form according to user information and reflects the data and the tables on a login interface, and in this way, the user can obtain the final verification code by referring to the comparison tables according to the verification data, input the verification code into the system and log in the system successfully. According to the method, colored graphs of English letters or Chinese characters corresponding to a set of 10 random numbers are provided for the numbers of the verification code, clear comparison table texts are beneficial for reading and selection of the user, the security of the verification code is improved, and moreover, the user can read and input the verification code conveniently.

Description

Technical field: [0001] The invention relates to the application fields of system software, Internet and mobile phone APP, in particular to a realization method of setting a random check verification code in an Internet web page login system. Background technique: [0002] Currently, in the system login, registration, and comment interfaces, in order to prevent the automatic behavior of the machine program, a verification code system is provided to intercept the login, registration, and comment interfaces. The traditional verification code method is a scrambled text image method. With the image recognition With the continuous development of technology, pure text and picture verification codes can be read and cracked by machines, while overly complex and scrambled verification code images make it difficult for users to identify, resulting in poor user experience. Just like the 12306 train ticket ordering system, the verification code images encountered in the system whether i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/083
Inventor 孟大川
Owner 南通江凌织造有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products