Method, terminal and server for authenticating user

A server and user technology, applied in the field of network communication, can solve the problems of legal human users unable to identify information, blurred images, etc.

Active Publication Date: 2018-12-18
BEIJING BANGCLE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of artificial intelligence technology, the ability of computers to recognize images is getting stronger and stronger, and some traditional image verification codes are difficult to effectively distinguish whether the registrant is a human or a machine
On the other hand, if the difficulty of the image verification code is further increased, such as making the image more blurred, it may cause legitimate human users to fail to recognize the information in the verification code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, terminal and server for authenticating user
  • Method, terminal and server for authenticating user
  • Method, terminal and server for authenticating user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings and examples. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0121] Those skilled in the art understand that in the embodiments of the present invention, the sequence numbers of the following steps do not mean the order of execution, and the order of execution of each step should be determined by its function and internal logic, and should not be used in the present invention. The implementation of the examples constitutes no limitation.

[0122] In addition, terms such as "first" and "second" in the present invention are only used to distinguish different steps, devices or modules, etc., and neither represent any specific technical meaning nor an inevitable logical sequence among them.

[0123]As a security mechanism, the verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a method, a terminal and a server for authenticating a user, and relates to the field of communications. The method includes: outputting a first image and a second image to a user, the first image being an initial image, and the second image being obtained by performing predetermined processing on pixel values of the first image; outputting an indication information for instructing the user to select the first image or the second image; receiving a selection input of the user to the first image or the second image, the selection input being used to determine whether the user is a human or a machine. The method significantly reduces the difficulty of human identification of the authentication code and enhances the user experience while maintaining or slightly increasing the difficulty of machine identification of the authentication code.

Description

technical field [0001] The present application relates to the field of network communication, in particular to a method for authenticating a user, a terminal and a server. Background technique [0002] With the development of network communication technology, more and more people start to use the Internet for work, entertainment and study. [0003] The network has greatly facilitated and enriched people's lives, and network security has become more and more important. In the existing network environment, some hackers will use a specific program to brute force the continuous login attempts of a specific registered account to steal the user's private information and threaten the user's network information security. [0004] Verification code (CAPTCHA) is a more effective way to prevent brute force cracking of user passwords. By setting the verification code, the website server can more effectively distinguish whether the login is a human or a machine, thereby preventing the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06T5/50
CPCG06T5/50G06T7/0002G06T2207/10004G06T2207/20221H04L63/0838
Inventor 阚志刚于魁飞陈彪
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products