Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for verifying verification code

A verification method and a verification device technology, which are applied in the field of Internet security, can solve problems such as low security, and achieve the effect of improving security

Inactive Publication Date: 2017-11-03
BEIJING BANGCLE TECH CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that the security of the verification code verification method in the prior art is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying verification code
  • Method and device for verifying verification code
  • Method and device for verifying verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] The execution subject of a verification code verification method provided in the embodiment of this application may be a server, for example, a server of an e-mail website, a server of a forum website, a cloud storage server, etc.; or, the execution subject of this method may also be a terminal device, For example, a smart phone, a tablet computer, a notebook computer or a desktop computer, etc.; in addition, the execution subject of the method may also be an application program or the like. The executive body described does not constitute a limitation to this application.

[0062] Please refer to figure 1 , figure 1 It shows a schematic flowchart of the implementation of a verification code verification method provided in Embodiment 1 of the present application. The method can include:

[0063] S101. Receive a state adjustment instruction for the verification object in the verification code;

[0064] The verification code can be generated by the server or the termi...

Embodiment 2

[0103] Based on the aforementioned embodiment 1, the inventive concept of the present application has been described in detail. In order to facilitate a better understanding of the technical features, means and effects of the present application, the verification code verification method of the present application will be further described below, thus forming another of the present application. Example.

[0104] The verification code verification process in Embodiment 2 of this application is similar to the verification code verification process described in Embodiment 1. For other steps not introduced in Embodiment 2, please refer to the relevant description in Embodiment 1, which will not be repeated here repeat.

[0105] Please refer to figure 2 , figure 2 A schematic flow chart showing the implementation of a verification code verification method provided in Embodiment 2 of the present application is shown. In this embodiment, the displayed verification code includes ...

Embodiment 3

[0128] Based on the aforementioned embodiment 1 and embodiment 2, the inventive concept of the present application is described in detail. In order to facilitate a better understanding of the technical features, means and effects of the present application, the verification code verification method of the present application will be further explained below, thus forming Yet another embodiment of the present application.

[0129] The verification code verification process in Embodiment 3 of the present application is similar to the verification code verification process described in Embodiment 1 and Embodiment 2. For other steps not introduced in Embodiment 3, please refer to Embodiment 1 and Embodiment 2. The related descriptions will not be repeated here.

[0130] Please refer to Figure 5 , Figure 5It shows a schematic flowchart of an implementation of a verification code verification method provided in Embodiment 3 of the present application. In this embodiment, the ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and device for verifying a verification code. The method can comprise the steps of: receiving and responding to a state regulation instruction for a verification object in the verification code, and regulating a state of the verification object in the verification code, wherein the state comprises: a direction and / or a position; and judging whether the regulated state of the verification object in the verification code accords with a preset requirement, if yes, determining that verification is passed, or otherwise determining that verification is failed. Compared with the prior art, the method has the advantage that characters input by a user through a preset input frame are not used as a verification answer to be compared with a standard answer so as to obtain a verification result. The user can rapidly identify whether the state of the verification object in the verification code accords with the preset requirement by naked eyes, but identification software cannot carry out identification, and thus, even though the identification software can identify contents displayed in the verification code, successful verification of the verification code also cannot be implemented. Therefore, security of a verification mode of the verification code can be improved.

Description

technical field [0001] The present application relates to the technical field of Internet security, and in particular to a verification code verification method and device. Background technique [0002] With the development of Internet technology, the network has been integrated into every aspect of people's daily life. During the process of using the Internet, users usually encounter situations where they need to enter a verification code to perform further operations. Through the verification code, the website or application can distinguish whether the object of the request to perform the operation is a machine or a human. Then, by setting the verification code, it can effectively prevent the machine from maliciously cracking the account login password, swiping tickets, flooding the forum and other malicious behaviors. [0003] Common picture verification codes are generally characters or combinations of characters such as text, numbers, or letters. When verifying the ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/12
Inventor 阚志刚陈彪葛洋方宁卢佐华
Owner BEIJING BANGCLE TECH CO LTD