Generation and verification method and device of verification code picture

A technology of a verification code picture and a verification method, which is applied in the verification method and device, and the field of generation of verification code pictures, and can solve problems such as being unable to effectively prevent machine programs from recognizing verification codes

Inactive Publication Date: 2017-12-15
CHINA MOBILE COMM LTD RES INST +1
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above technical problems, the embodiments of the present invention provide a method and device for generating and verifying verification code pictures, which solves the problem that the prior art cannot effectively prevent machine programs from recognizing verification codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation and verification method and device of verification code picture
  • Generation and verification method and device of verification code picture
  • Generation and verification method and device of verification code picture

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0077] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference figure 2 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.

[0078] figure 2 It schematically shows the flow of an embodiment of a method for generating a verification code picture in an embodiment of the present invention.

[0079] Such as figure 2 As shown, the method for generating a verification code image in this embodiment may specifically include, for example:

[0080] Step 201: Select a plurality of first elements and a plurality of second elements, wh...

no. 2 example

[0092] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference image 3 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.

[0093] image 3 The flow of an embodiment of the verification method in the embodiment of the present invention is schematically shown.

[0094] Such as image 3 As shown, the verification method of this embodiment may specifically include, for example:

[0095] Step 301: Receive a verification request, verify that the request carries the position of at least one connection track, and then enter step 30...

no. 3 example

[0117] Combine below figure 1 Application scenarios, combined with the following figure 1 Application scenarios, reference Figure 4 The method of the verification method according to the exemplary embodiment of the present invention will be described. It should be noted that the above application scenarios are only shown to facilitate the understanding of the spirit and principle of the present invention, and the embodiments of the present invention are not limited in this respect. On the contrary, the embodiments of the present invention can be applied to any applicable scenarios.

[0118] Figure 4 The flow of an embodiment of the verification method in the embodiment of the present invention is schematically shown.

[0119] Such as Figure 4 As shown, the verification method of this embodiment may specifically include, for example:

[0120] Step 401: Receive a verification code picture, where the verification code picture includes a plurality of first elements and a plurality of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a generation and verification method and device of a verification code picture. The generation method comprises the following steps: selecting a plurality of first elements and a plurality of second elements, wherein there is a preset association relationship between each first element in the plurality of first elements and at least one second element in the plurality of second elements; determining a picture to be synthesized, and determining the positions of each first element and each second element in the picture to be synthesized; and synthesizing the plurality of first elements and the plurality of second elements to the picture to be synthesized according to the positions of each first element and each second element, and obtaining the verification code picture. The generation method of the verification code picture provided by the invention solves the problem that the prior art cannot effectively prevent a machine program from recognizing a verification code.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for generating and verifying a verification code picture. Background technique [0002] The verification code technology can distinguish whether the access operation is performed by a real and effective user, or whether it is automatically simulated by a machine program. Most of the verification codes currently in use are composed of numbers, letters or text. Such verification codes often add interference to prevent automatic recognition by machine programs. However, if too many interference factors are added, the recognition rate of the human eye will decrease and increase users. It is difficult to recognize the input, and this type of verification code can already be automatically recognized by the machine program. [0003] Aiming at the problem that the prior art cannot prevent automatic recognition by a machine program when the verification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3228H04L9/0863
Inventor 张艳彭华熹
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products