Clock based verification method and system
A verification method and verification system technology, applied in the field of clock-based verification methods and systems, can solve problems such as poor user experience, high difficulty, waste, etc., and achieve the effects of reducing verification costs, ensuring security, and being easy to operate.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0067] First, combine Figures 2 to 6 The above steps of the verification method according to the first embodiment of the present invention will be described one by one.
[0068] S1: The step of generating the verification code picture
[0069] Randomly generate a piece of time information, and through calculation, for example, according to the comparison result of the time information and the pre-stored table, obtain the pointer angle corresponding to the time information, and generate the verification of the clock at the pointer angle according to the pointer angle code picture. The pre-stored table indicates the relationship between time and pointer angle, which is the angle of the pointer relative to a specific position (for example, the 12 o'clock position).
[0070] For example, firstly, a piece of time information (10,11,30) is randomly generated, and the corresponding time is 10:11:30. Then substitute the randomly generated time information into the pre-stored table...
no. 2 example
[0081] S1: Generate a verification code image
[0082] A piece of time information is randomly generated, and a verification code image representing the character information of the time information is directly generated.
[0083] For example, after a time information (10, 11, 30) is randomly generated, a verification code image representing the character information of the time information is directly generated, such as Figure 7 It is shown as 10:11:30, which is a commonly used representation of time, and other representations may also be used. Similarly, the time information may only include hours and minutes, for example, 10:11.
[0084] S2: Process the verification code image
[0085] Next, process the verification code picture including the character information representing the time information, and the processing steps are the same as those in the above-mentioned first embodiment.
[0086] S3: Perform input operation
[0087] After the user recognizes the time indic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


