A verification method, server and system

A verification method and server technology, applied in transmission systems, digital transmission systems, digital data authentication, etc., to ensure security and avoid brute force cracking.

Active Publication Date: 2021-08-13
HUAWEI TECH CO LTD
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a verification method, server and system to solve the contradiction between advertisement effect and verification code security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method, server and system
  • A verification method, server and system
  • A verification method, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 As shown, the verification code system involved in the embodiment of the present invention can be implemented in the server-client system 100 . The server-client system 100 includes a verification code server 101 , a client 102 and a network 103 . The client 102 communicates with the verification code server 101 through the network 103 . Among them, the verification code server 101 is used to respond to the verification code acquisition request sent by the user through the client 102 for requesting the verification code picture, generate and store a random text as the system verification code, and convert the system verification code into a secret picture; Obtain the original picture from the picture library, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the communication field and provides a verification method. A verification code server receives a verification code acquisition request sent by a client; generates and saves a system verification code; wherein the system verification code is determined by a string of random text; and encodes the system verification code Generate k verification code pictures from n original pictures; among them, k and n are integers greater than or equal to 2, and k is less than or equal to n; send k verification code pictures to the client; receive the verification request sent by the client , the verification request carries the verification code entered by the user according to the k verification code pictures; according to the system verification code, determine whether the verification code entered by the user is correct. Through the above solution, the randomly generated system verification code is encoded into n original pictures, which not only increases the difficulty of machine recognition, but also ensures the security of the verification code.

Description

technical field [0001] The present invention relates to the communication field, in particular to a verification method, server and system. Background technique [0002] Currently, most websites require users to enter a verification code when registering or logging in. Verification codes can be used to prevent hackers from using tools to automatically register websites in batches, and using tools to brute force specific users, and then continue to log in and flood. Existing verification codes can be randomly generated numbers or letters, and are displayed to the user in the form of a picture, allowing the user to input as they are, and only when the input is correct can subsequent operations be performed. [0003] Therefore, the verification code has the feature of "forced attention", that is, the user has to pay attention. Utilizing the mandatory attention feature of the verification code, advertisers can sell the carrier carrying the verification code as an advertisement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/31
CPCH04L63/08G06F21/31H04L9/40
Inventor 欧锻灏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products