Image-based verification code implementation method and device

An implementation method and verification code technology, which are applied in secure communication devices, user identity/authority verification, digital data authentication, etc., can solve the problems of not preventing automatic recognition of machines, negative effects on user experience, and users cannot see characters clearly. Good user experience, strong security protection, and low cost

Inactive Publication Date: 2017-12-08
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For ordinary character pictures, it is easy to recognize the characters on the picture verification code. Although the automatic recognition of the machine is interfered with by additional interference factors, such as adding random pixels, random lines and random picture distortions on the picture, but in this way Not only did not prevent the machine from automatically recognizing the characters on the picture, but it made it difficult for normal users to see the characters on the picture, which increased the user's error rate and negatively affected the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image-based verification code implementation method and device
  • Image-based verification code implementation method and device
  • Image-based verification code implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention aims to provide a method and device for realizing a verification code based on a picture, which can effectively prevent malicious access of a machine, and at the same time, realize simple implementation and easy operation, and can bring good user experience.

[0046] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0047] Such as figure 1 As shown, the image-based verification code implementation method provided by the embodiment of the present invention includes the following steps:

[0048] S101. Randomly extract a first number of forward pictures ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an image-based verification code implementation method and device. Malicious machine accessing can be effectively prevented, and implementation is easy and operation is easy and convenient. The image-based verification code implementation method comprises the steps that the first number of forward images of which the direction is identifiable are randomly extracted from an image library, and the second number of images are randomly selected from all the extracted forward images to be rotated; the first number of images are spliced into two-dimensional matrix verification images, and position relation information of the rotated images is correspondingly recorded; when a verification request is received, one spliced two-dimensional matrix verification image and the position relation information of the rotated images are acquired; the two-dimensional matrix verification image is returned to a client side to be displayed; and the position relation information of the clicked image of the user in the two-dimensional matrix verification image transmitted by the client side is received and compared with the position relation information of the rotated images, and whether verification of the user is passed is judged according to the comparison result.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a method and device for realizing a verification code based on a picture. Background technique [0002] Verification code, also known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart, fully automatic public Turing test to distinguish between computers and humans), is a public fully automatic program to distinguish whether the user is a machine or a human. In the prior art, the mainstream verification code implementation method usually adopts the form of a combination of characters and picture backgrounds, and may add certain interference pixels at the same time, and prevent malicious access to the machine by identifying the content of the verification code input by the user. [0003] Nowadays, OCR (Optical Character Recognition, Optical Character Recognition) technology has developed very maturely. OCR technology converts the text ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/36
CPCG06F21/36H04L9/3228H04L63/0838
Inventor 潘帅企
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products