A verification information display method, mobile terminal

A technology for verifying information and mobile terminals, applied in the field of terminals, can solve problems such as machine snatching tickets, password brute force cracking, ticket purchase, etc., and achieve the effect of avoiding automatic identification

Active Publication Date: 2022-02-01
VIVO MOBILE COMM CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a verification information display method to solve the existing verification information can be recognized by the computer, which leads to the problems of machine snatching tickets, ticket purchases, password brute force cracking, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification information display method, mobile terminal
  • A verification information display method, mobile terminal
  • A verification information display method, mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 2 It is a schematic flowchart of a verification information display method provided in Embodiment 1 of the present invention, see figure 2 , the method may be executed by a processor of the mobile terminal, and may specifically include the following steps:

[0040] Step 22, determine target verification information;

[0041] Step 24, generating a target verification image, the target verification image is an image generated by adding shading to the target area containing the target verification information;

[0042] It should be noted that step 22 and step 24 are generally steps performed by the processor in the background, invisible to the user, and the first implementation method may be:

[0043] When it is detected that the mobile terminal is adjusted to an interface that requires input of verification information, a target verification information is obtained based on a random algorithm, for example: a combination of letters and numbers; then, a target ve...

Embodiment 2

[0069] Figure 4 It is a schematic flowchart of a verification information display method provided in Embodiment 2 of the present invention, see Figure 4 , the method may be executed by a processor of the mobile terminal, and may specifically include the following steps:

[0070] Step 42. Obtain a first picture, and the first picture carries a verification code;

[0071] It should be noted that the first implementation of step 42 may be:

[0072] Based on user operations, when the mobile terminal jumps to the verification code display interface, the processor determines the verification code to be displayed based on a random algorithm, such as a combination of letters and numbers, and displays it on the first picture, and then obtains The first picture with verification code.

[0073] The second implementation of step 42 can be:

[0074] Based on user operations, the terminal initiates a request for login, payment, etc. to the server, and the server returns a verification...

Embodiment 3

[0101] Figure 5 It is a schematic flowchart of a verification information display method provided in Embodiment 3 of the present invention, see Figure 5 , the present invention will be described in detail below from the perspective of examples:

[0102] Step 52, determine the first shading and the second shading

[0103] It should be noted that the rules for setting the first shading and the second shading are generally stored locally by the terminal, and then dynamically updated by the server. Therefore, the processor of the terminal can determine the first shading pattern and the second shading pattern based on the locally stored rules. For example:

[0104] A group of mathematical functions with the same slope (first slope) and different intercepts: y=k1x+ib1 (A1 function) realizes the same density curve group in the same shading direction, and obtains the first shading picture 61;

[0105] Use a linear mathematical function group y=k2x+ib2 (A2 function) with a differ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification information display method and a mobile terminal. The method includes: determining target verification information; generating a target verification image, the target verification image is an image generated by adding shading to a target area containing the target verification information; displaying the target verification image and the first image, the The first image is an image used to be overlaid on the target verification image to make the target verification information in the target verification image visible. In the embodiment of the present invention, a target verification image carrying invisible target verification information is generated by adding shading to the target verification information; and the target verification image is displayed to the user together with the pre-built first image, because the first It acts as a "decryption card", so the user can make the target verification information visible by overlaying the first image on the target verification image.

Description

technical field [0001] The invention relates to the field of terminals, in particular to a verification information display method and a mobile terminal. Background technique [0002] CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA) is the abbreviation of the Turing test that fully automatically distinguishes between computers and humans. It is a public fully automatic program that distinguishes whether a user is a computer or a human. It can be used to prevent malicious cracking of passwords, swiping tickets, flooding forums, and a hacker's continuous login attempts to a specific registered user with a specific program brute force cracking method, etc. [0003] At present, general verification codes, such as verification codes based on a limited image library, can be automatically recognized after there are enough samples for machine learning; another example, verification code images with noise and interference can also be incre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/14G06F21/36G06T11/40
CPCG06F3/14G06F21/36G06T11/40G06F2221/2133
Inventor 陈剑
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products