Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method based on interaction operation, server, terminal equipment and system

A verification method and interactive operation technology, applied in the field of server, interactive operation-based verification method, terminal equipment and system, to prevent machine verification, improve security and verification efficiency, and facilitate verification operations

Inactive Publication Date: 2017-04-26
JIANGSU PAYEGIS TECH CO LTD
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, there is a lack of a verification method that can effectively prevent the use of machine verification and facilitate users to perform verification operations in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method based on interaction operation, server, terminal equipment and system
  • Verification method based on interaction operation, server, terminal equipment and system
  • Verification method based on interaction operation, server, terminal equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0042] figure 1 It shows a schematic flow chart of Embodiment 1 of the verification method based on interactive operation provided by the present invention, the method is executed on the server side, such as figure 1 As shown, the method includes the following steps:

[0043] Step S100, receiving a verification request sent by a terminal device.

[0044] When it is necessary to verify the user on the terminal device side, the ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method based on interaction operation, a server, terminal equipment and a system; the verification method based on interaction operation comprises the following steps: receiving a verification request sent by the terminal equipment; forming a verification image containing a verification curve according to the verification request; sending the verification image to the terminal equipment; receiving curve slide operation information sent by the terminal equipment; verifying the curve slide operation information according to the verification curve in the verification image, thus obtaining a verification result. The method can effectively prevent robot verification, so user can easily carry out verification, thus improving safety and verification efficiency, and optimizing the verification modes.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a verification method based on interactive operation, a server, terminal equipment and a system. Background technique [0002] Verification code technology is used to prevent the use of machines for automatic registration, login, swiping tickets, flooding forums, and maliciously cracking passwords. The current common verification code technology is to allow users to input distorted and deformed random characters, numbers, and letter combinations displayed on the verification picture. The distorted deformation is to prevent the machine from automatically identifying the verification code by using technologies such as optical character recognition. In addition, in order to make it difficult for the machine to recognize the verification code easily, some interfering line segments or interfering points can also be added to the verification picture. Therefore, the verification c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 汪德嘉郭宇王彪宋润生
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products