Unlock instant, AI-driven research and patent intelligence for your innovation.

Clock based verification method and system

A verification method and verification system technology, applied in the field of clock-based verification methods and systems, can solve problems such as poor user experience, high difficulty, waste, etc., and achieve the effects of reducing verification costs, ensuring security, and being easy to operate.

Inactive Publication Date: 2017-11-17
北京一亩田新农网络科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, for image-based verification codes such as the verification code in the 12306 ticketing system and the Jiugongge verification code, in order to ensure security, it is difficult to set up questions and the interactive operation of the verification system is relatively complicated. Said that the cost of understanding the verification is too high, which makes it difficult for the user to answer the correct verification code answer, which makes the user waste more time verifying the verification code, and the user experience is poor.
On the other hand, such as a verification system based on simple pictures, although it ensures that users can easily operate to identify the verification code, but its security cannot be guaranteed, and the risk of being cracked by machines is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Clock based verification method and system
  • Clock based verification method and system
  • Clock based verification method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0067] First, combine Figures 2 to 6 The above steps of the verification method according to the first embodiment of the present invention will be described one by one.

[0068] S1: The step of generating the verification code picture

[0069] Randomly generate a piece of time information, and through calculation, for example, according to the comparison result of the time information and the pre-stored table, obtain the pointer angle corresponding to the time information, and generate the verification of the clock at the pointer angle according to the pointer angle code picture. The pre-stored table indicates the relationship between time and pointer angle, which is the angle of the pointer relative to a specific position (for example, the 12 o'clock position).

[0070] For example, firstly, a piece of time information (10,11,30) is randomly generated, and the corresponding time is 10:11:30. Then substitute the randomly generated time information into the pre-stored table...

no. 2 example

[0081] S1: Generate a verification code image

[0082] A piece of time information is randomly generated, and a verification code image representing the character information of the time information is directly generated.

[0083] For example, after a time information (10, 11, 30) is randomly generated, a verification code image representing the character information of the time information is directly generated, such as Figure 7 It is shown as 10:11:30, which is a commonly used representation of time, and other representations may also be used. Similarly, the time information may only include hours and minutes, for example, 10:11.

[0084] S2: Process the verification code image

[0085] Next, process the verification code picture including the character information representing the time information, and the processing steps are the same as those in the above-mentioned first embodiment.

[0086] S3: Perform input operation

[0087] After the user recognizes the time indic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a clock based verification method. The method is characterized by comprising a verification code picture generating step for generating a verification code picture which corresponds to randomly-generated time information, an input operation step for inputting an input result corresponding to the time information based on the verification code picture, and an input result verification step for comparing the input result with the time information so as to check whether the verification is passed.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a clock-based verification method and system. Background technique [0002] With the development of computer and network technology, Internet technology is increasingly widely used in various fields of production and life. However, while the Internet brings convenience to humans, it also inevitably brings challenges, for example, how to effectively prevent malicious cracking of passwords and malicious flooding of forums and other issues. Verification methods and systems such as verification code technology play an important role in solving the above-mentioned problems as a public automatic program capable of distinguishing whether the current user is a computer or a human (CAPTCHA). [0003] As an excellent verification system, it needs to meet two conditions: "ease of use" and "security", that is, the two conditions that human users are easy to identify and input, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/60
Inventor 王云吉宋柏林张振海晋京白文路曹志攀
Owner 北京一亩田新农网络科技有限公司