Authentication method and system adopting captchas

A verification code and legal technology, applied in the field of verification code verification methods and systems, can solve problems such as normal operation, Internet application system attacks, and easy cracking, and achieve the effect of avoiding automatic identification of illegal programs and improving security.

Active Publication Date: 2016-08-17
BEIJING JINGDONG ZHENSHI INFORMATION TECH CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The disadvantage of the existing plain text verification code technology is that the number of texts is limited, and the cracking is very simple. It is easy to crack after swiping a few times
For graphic verification codes, since they are usually composed of geometric elements such as points, lines, surfaces, and bodies, and non-geometric attributes such as grayscale, color, linetype, and line width, as current computers perform basic two-dimensional graphic elements (such as image Pixels, lines, surfaces, etc.) and color difference analysis and processing capabilities are gradually improved, and it is also easier to be cracked by hacker software
In this way, the verification code is easy to be automatically recognized by the software, which will cause the Internet application system to be attacked by hackers and cannot operate normally.
[0009] It can be seen that the existing verification code technology has the problem of being easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system adopting captchas
  • Authentication method and system adopting captchas

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] The core idea of ​​the present invention is to introduce the sliding unlocking technology, and the webpage server controls the display of the verification code on the webpage by monitoring the sliding unlocking action of the user. In this way, during the monitoring process, it can identify Whether the sliding operation is performed manually or triggered by software, so as to ensure that the verification code can be sent to the client and displayed only during manual operation, so that the verification code can be effectively prevented from being automatically recognized by the software.

[0025] figure 1 It is a schematic flow diagram of the method of the embodiment of the present invention, such as figure 1 As shown, this embodim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and system adopting captchas. The authentication method comprises the following steps: a, when the condition that an unlocking slider on the current page slides to a preset detection position is detected by a client, the unlocking slider is set in an non-movable state, an authentication request carrying the current point-in-time information, sliding progress information and client identification is sent to a web server; b, the web server judges whether the authentication request is legal, if yes, whether the sliding progress indicated by the authentication request is 100% is judged, if yes, a captcha is generated and sent to the client and a step d is executed, otherwise, a sliding continuing instruction is sent to the client, and a step c is executed; c, the client sets the unlocking slider to be in a movable state according to the sliding continuing instruction, and operation shifts to the step a; d, the client displays the captcha and sends the captcha determined by a user to the web server, and the web server checks the captcha. With adoption of the authentication method, automatic identification of the captchas by an illegal program can be avoided.

Description

technical field [0001] The invention relates to computer application technology, in particular to a method and system for verifying verification codes. Background technique [0002] With the deepening of the social Internet, there are more and more Internet-based application systems, and these systems are facing more and more online attacks. As an auxiliary security means, verification code has a special status in Web security. Captcha is a public fully automatic procedure to distinguish whether a user is a computer or a human. It can prevent: malicious cracking of passwords, swiping tickets, and flooding of forums, so as to prevent a hacker from making continuous login attempts to a specific registered user with a specific program brute force cracking method. Currently, verification codes are widely used by many websites. [0003] The existing main technologies for realizing verification codes include: plain text verification codes use plain text and graphic verification...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/06H04L63/083
Inventor 吕波
Owner BEIJING JINGDONG ZHENSHI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products