Identity verifying method, device and system

An identity verification method and a verification code technology are applied in the fields of devices and systems, and identity verification methods to achieve the effect of simple verification process and high difficulty in deciphering

Inactive Publication Date: 2017-05-17
苏州仙度网络科技有限公司
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, the verification code generated by various methods such as deformed text can be easily deciphered by the machine at low cost, and other graphic verifications such as dragging the slider can also be easily deciphered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verifying method, device and system
  • Identity verifying method, device and system
  • Identity verifying method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0041] This embodiment provides an authentication method for such as figure 2 The authentication system shown. See image 3 , the method includes:

[0042] Step S110: the server 200 sends multiple sub-images to the user terminal 100 as a verification code, and the multiple sub-images are obtained by cutting an original image.

[0043] When the user terminal 100 conducts a visit that requires verification, the server 200 sends multiple sub-images obtained by cutting an original image to the user terminal 100 for verification. Preferably, in this embodiment, the original image may include a graphic that is natural and reasonable for users to recognize, such as a car, a mobile phone, a fruit, one or more vegetables, etc., such as Figure 4 , so that the user can easily distinguish the positional relationship between the sub-images when stitching multiple sub-images obtained by cutting the original image.

[0044] The multiple sub-images may be obtained by cutting the origina...

no. 2 example

[0077] This embodiment provides an identity verification method, which is applied to the user terminal 100, please refer to Figure 15 , the method includes:

[0078] Step S210: Receive the multi-block sub-images used as the verification code sent by the server 200, the multi-block sub-images are obtained by cutting an original image.

[0079] Step S220: Displaying the multiple sub-images in random order and simultaneously displaying a mosaic frame for placing the mosaic image, so that the user can mosaic the multiple sub-images into a mosaic image within the mosaic frame.

[0080] Step S230: According to the operation acting on the display interface, the multiple sub-images are spliced ​​within the puzzle frame.

[0081] Step S240: When it is detected that the size of the current mosaic image in the mosaic frame reaches a predetermined size, send the mosaic image in the current mosaic frame to the server 200 so that the server 200 can verify the mosaic image.

[0082] For t...

no. 3 example

[0084] This embodiment provides an authentication method, which is applied to the server 200, please refer to Figure 16 , the method includes:

[0085] Step S310: Send multiple sub-images to the user terminal 100 as a verification code, so that the user can splicing the multiple sub-images through the user terminal 100 for identity verification, and the multiple sub-images are obtained by cutting an original image;

[0086] Step S320: Receive the spliced ​​image returned by the user terminal 100 and obtained by the user after splicing multiple sub-images.

[0087] Step S330: Calculate the feature value of the stitched image, and when the difference between the feature value of the stitched image and the feature value of the original image is within a preset threshold range, it is determined that the user identity verification corresponding to the user terminal 100 is passed .

[0088] For the specific implementation manner of each step in this embodiment, reference may be m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity verifying method, device and system, which are applied to the Internet field. The method includes the following steps: receiving multiple sub-images that are sent from a server and serve as CAPTCHAs (Completely Automated Public Turing Test to Tell Computers and Humans Apart), the multiple sub-images obtained through cutting of an original image; conducting disorder displaying of the multiple sub-images and simultaneously displaying a splice frame for holding splice images, so that a user splices the multiple sub-images together to form a spliced image in the splice frame; splicing the multiple sub-images together in the splice frame according to operations acting on a display interface; and if detecting that the size of the current spliced image in the splice frame reaches preset dimensions, sending the current spliced image in the splice frame to the server so that the server verifies the spliced image. According to the scheme, the sub-images obtained from cutting of the entire original image are sent to the user to be spliced together. The whole verifying process is easy for the user who is a human, but decoding is more difficult for a machine.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to an identity verification method, device and system. Background technique [0002] Verification code (CAPTCHA, Completely Automated Public Turing test to tell Computers and Humans Apart, fully automatic Turing test to distinguish between computers and humans) is a public fully automatic program to distinguish whether the user is a computer or a human. It can prevent malicious cracking of passwords, swiping tickets, flooding forums, and effectively prevent hackers from making continuous login attempts to a specific registered user through brute force cracking of specific programs. Nowadays, many websites use a relatively simple way to realize the function of the verification code, which is generated and judged by a computer, but it must be a question that only humans can answer. Since computers cannot answer CAPTCHA questions, users who answer the questions can be considered hu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/36
CPCH04L63/08G06F21/36
Inventor 王碧波董雪梅
Owner 苏州仙度网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products