Method and device, storage medium, processor and terminal for generating verification code

A verification code and processor technology, applied in the field of generating verification codes, can solve problems such as being easily recognized by machines, a large number of databases, cracking, etc., and achieve the effect of improving the difficulty of recognition

Active Publication Date: 2018-06-15
NETEASE (HANGZHOU) NETWORK CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method, device, storage medium, processor, and terminal for generating a verification code, to at least solve the existing technolog

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device, storage medium, processor and terminal for generating verification code
  • Method and device, storage medium, processor and terminal for generating verification code
  • Method and device, storage medium, processor and terminal for generating verification code

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0032] It should be noted that the terms "first" and "second" in the specification and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, and not necessarily used to describe a specific sequence or sequence. It should be understood that the data used in this way can be interchanged under ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device, a storage medium, a processor and a terminal for generating a verification code. The method comprises the steps that at least one tag object is obtained, at least one tag object has preset tag information; according to the at least one tag object, a verification code picture is generated; according to the tag information of the tag object contained in the verification code picture, the tag information of the verification code picture is determined; according to the tag information of the verification code picture, at least one set of questions and answers corresponding to the verification code picture is generated. The method and device, storage medium, processor and terminal for generating the verification code solve the technical problem in the prior art that the implementation of a verification code scheme by using a dot or puzzle scheme needs a large number of databases and is easy to be solved by a machine recognition technology.

Description

technical field [0001] The present invention relates to the field of identity authentication, in particular to a method, device, storage medium, processor and terminal for generating verification codes. Background technique [0002] With the rapid development of Internet technology, information security issues have become increasingly prominent. In order to prevent malicious cracking of passwords, swiping tickets, and flooding forums, existing technologies mainly use verification codes to distinguish whether a user is a computer or a human. [0003] At present, the most commonly used verification code methods are "braille", "puzzle", and "picture recognition" (such as the verification code of the 12036 website). [0004] However, with the improvement of signal processing and image recognition technology, how to enrich the verification code database and how to increase the difficulty of machine cracking are problems that need to be solved urgently. [0005] For the above pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): A63F13/52A63F13/71G06F21/36
CPCA63F13/52A63F13/71G06F21/36
Inventor 范长杰胡志鹏冯潞潞刘柏周彩冬
Owner NETEASE (HANGZHOU) NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products