Verification method and system, and server

A verification method and server technology, applied in transmission systems, digital transmission systems, digital data authentication, etc., to achieve the effect of ensuring advertising effects, ensuring security, and avoiding violent cracking

Active Publication Date: 2018-04-06
HUAWEI TECH CO LTD
View PDF14 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a verification method, server and system to solv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and system, and server
  • Verification method and system, and server
  • Verification method and system, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 As shown, the verification code system involved in the embodiment of the present invention can be implemented in the server-client system 100 . The server-client system 100 includes a verification code server 101 , a client 102 and a network 103 . The client 102 communicates with the verification code server 101 through the network 103 . Among them, the verification code server 101 is used to respond to the verification code acquisition request sent by the user through the client 102 for requesting the verification code picture, generate and store a random text as the system verification code, and convert the system verification code into a secret picture; Obtain the original picture from the picture library, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication, and provides a verification method. The verification method comprises the following steps: receiving, by a verification code server, a verificationcode acquisition request sent by a client; generating and storing a system verification code, wherein the system verification code is determined by a string of random texts; encoding the system verification code into n original pictures to generate k verification code pictures, wherein k and n are integers greater than 2, and k is less than or equal to n; sending the k verification code picturesto the client; receiving a verification request sent by the client, wherein the verification request carries a verification code input by a user according to the k verification code pictures; and determining whether the verification code input by the user is correct according to the system verification code. By adoption of the above scheme, the randomly generated system verification code is codedinto the n original pictures, which not only increases the difficulty of machine recognition, but also can ensure the security of the verification code.

Description

technical field [0001] The present invention relates to the communication field, in particular to a verification method, server and system. Background technique [0002] Currently, most websites require users to enter a verification code when registering or logging in. Verification codes can be used to prevent hackers from using tools to automatically register websites in batches, and using tools to brute force specific users, and then continue to log in and flood. Existing verification codes can be randomly generated numbers or letters, and are displayed to the user in the form of a picture, allowing the user to input as they are, and only when the input is correct can subsequent operations be performed. [0003] Therefore, the verification code has the feature of "forced attention", that is, the user has to pay attention. Utilizing the mandatory attention feature of the verification code, advertisers can sell the carrier carrying the verification code as an advertisement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/31
CPCH04L63/08G06F21/31H04L9/40
Inventor 欧锻灏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products