Generation and verification method and device of verification code picture
A technology of a verification code picture and a verification method, which is applied in the verification method and device, and the field of generation of verification code pictures, and can solve problems such as being unable to effectively prevent machine programs from recognizing verification codes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0077] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference figure 2 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.
[0078] figure 2 It schematically shows the flow of an embodiment of a method for generating a verification code picture in an embodiment of the present invention.
[0079] Such as figure 2 As shown, the method for generating a verification code image in this embodiment may specifically include, for example:
[0080] Step 201: Select a plurality of first elements and a plurality of second elements, wh...
no. 2 example
[0092] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference image 3 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.
[0093] image 3 The flow of an embodiment of the verification method in the embodiment of the present invention is schematically shown.
[0094] Such as image 3 As shown, the verification method of this embodiment may specifically include, for example:
[0095] Step 301: Receive a verification request, verify that the request carries the position of at least one connection track, and then enter step 30...
no. 3 example
[0117] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference Figure 4 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.
[0118] Figure 4 The flow of an embodiment of the verification method in the embodiment of the present invention is schematically shown.
[0119] Such as Figure 4 As shown, the verification method of this embodiment may specifically include, for example:
[0120] Step 401: Receive a verification code picture, where the verification code picture includes a plurality of first elements and a plurality of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com