Supercharge Your Innovation With Domain-Expert AI Agents!

Verification method for dynamic shielded character string graphical verification code

A graphic verification code and verification method technology, applied in the field of computer software, can solve problems such as increasing the verification code recognition difficulty, and achieve the effect of preventing malicious screen capture and improving security.

Inactive Publication Date: 2018-01-23
卢安迪
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for graphic verification codes, how to increase the difficulty of verification code recognition, prevent machine cracking, and improve the security of verification codes is a major challenge in the field of verification codes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method for dynamic shielded character string graphical verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] Captcha contains more than one character. Such as figure 1 As shown in , after the client sends an access request to the server, the server will send a verification string consisting of four random characters (here as figure 1 As shown, for example, the verification strings sequenced as 1, 2, 3, 4) are embedded into pictures with interferences such as random curves and / or random noise to form a graphic verification code and send it to the client. When the graphical verification code is displayed on the client login interface, at least one character in the verification string of the graphical verification code is blocked by a block (here as figure 1 As shown, for example, the four characters 1, 2, 3, 4 in the verification string are all blocked by the occlusion block);

[0019] On the client login interface, the user sequentially recognizes and inputs each character in the verification string of the graphic verification code into the verification code input box accordi...

Embodiment 2

[0022] The graphic verification code contains more than one character, and the character of the verification string is input by the voice input method at the same time. When the client receives the graphical verification code and displays it on the client login interface, at least one character in the verification string of the graphical verification code is blocked by the occlusion block, and the first character is not blocked (here as figure 1 As shown, for example, the three characters 2, 3, 4, etc. in the verification string are all covered by the occlusion block, while the character 1 is not covered); when the client captures the voice of the user reading the first character After that, it can be judged that the user has started voice input of the verification code information and completed the recognition of the first character, and then removed the occlusion blocks that block characters 2, 3, and 4 in order to perform recognition and voice input; finally, the user The c...

Embodiment 3

[0024] There is only one character in the graphic captcha. The unique character in the verification string is blocked by the blocking block; when the client login interface judges that the cursor is located in the verification code input box, immediately remove the blocking block blocking the unique character, and the unique character is displayed. It recognizes and inputs it into the verification code input box, and then submits it to the server for login verification; if the login verification is not submitted immediately, the blocked block removed within 5 seconds will return to its original position and cover the unique character.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method for a dynamic shielded character string graphical verification code. The method comprises the following steps that a server embeds a verification character string formed by one or more characters into a graph to form a graphical verification code and sends the graphical verification code to a client after the client sends an access request to the server, wherein at least one character in the graphical verification code displayed on a client login interface is shielded and unrecognized; a user starts to identify each character in the graphical verification code in sequence, when the shielded character is identified, a shielding block is removed, so that the character is displayed to be convenient for identification, and the removed shielding block goes back to the original position later and the character is shielded again; and after the user completes identification of all characters of the graphical verification code, inputs the charactersinto a verification code input box and submits a content in the verification code input box to the server to carry out login verification. The characters of the graphical verification code are dynamically shielded, so that the machine cracking is prevented and the safety of the verification code is improved.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a method for verifying a dynamic masking character string graphic verification code. Background technique [0002] The verification code is a means to identify the user as a human rather than a computer, so as to prevent hackers from using automated programs to crack passwords, swipe tickets, flood forums and other malicious activities. [0003] Currently, the widely used captcha is a graphic captcha. Its basic principle is: the server embeds a randomly generated character string into a picture with random curves and / or random noise to form a graphic verification code and sends it to the client. After the client receives it, the user recognizes it with the naked eye. Output the character string in the graphic verification code, then input it into the verification code input box and submit it to the server for login verification. Only after the verification is successfu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36
Inventor 卢安迪
Owner 卢安迪
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More