Authentication code implementation method, apparatus, system, computing device and storage medium

An implementation method and verification code technology, applied in the fields of computing equipment and storage media, systems, devices, and verification code implementation methods, can solve problems such as friendliness being discounted, and achieve enhanced semantic complexity, reduced cognitive difficulty, and reduced Effects of Interaction and Cognitive Difficulty

Inactive Publication Date: 2018-12-21
ALIBABA (CHINA) CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

in addition Figure 1E The verification code shown, its semantic information difficulty is the same as Figure 1C and Figure 1D Almost, but the friendliness of the interaction has been compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication code implementation method, apparatus, system, computing device and storage medium
  • Authentication code implementation method, apparatus, system, computing device and storage medium
  • Authentication code implementation method, apparatus, system, computing device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Hereinafter, preferred embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although the drawings show preferred embodiments of the present disclosure, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to make the present disclosure more thorough and complete, and to fully convey the scope of the present disclosure to those skilled in the art.

[0054] As mentioned earlier, the design of the verification code should consider interaction friendly and convenient for users to complete the verification, and at the same time it needs to be difficult to be cracked to counter robots or automated tools. Among the existing various verification codes, most of the verification codes with better interactive experience have been cracked, and most of the verification codes that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication code implementation method, a device, a computing device and a storage medium. The method includes presenting a first state of an authentication code picture,the authentication code picture comprising a first portion and a second portion, the first portion being rotatable relative to the second portion, the different relative azimuth relationship of the first portion and the second portion corresponding to different states of the authentication code picture; in response to substantially rendering the authentication code picture in its second state whenthe rotation operation of the first portion by the user stops, it is determined that the authentication succeeded, otherwise it is determined that the authentication failed. Therefore, by providing anew verification code and its implementation, it can give attention to both semantic and behavioral verification, and provide a friendly interactive experience for users. Moreover, it can flexibly draw a variety of authentication code pictures, simplify the authentication operation to be performed by the user, reduce the difficulty of interaction and cognition, and can more flexibly deal with black products.

Description

Technical field [0001] The present disclosure relates to the field of computer technology, in particular to a verification code realization method, device, system, computing device and storage medium. Background technique [0002] The full name of the verification code is "Captcha, Completely Automated Public Turing Test to Tell Computers and Humans Apart" (Captcha, Completely Automated Public Turing Test to Tell Computers and Humans Apart), which is a public fully automatic program that distinguishes whether a user is a computer or a human. It can be used to prevent malicious password cracking, ticket swiping, forum irrigation, and effectively prevent hackers from performing continuous login / download operations through brute force cracking. In many scenarios, the verification code is the last protective door against the black industry. [0003] Most of the verification codes with friendly interactive experience are easy to be cracked, and most of the verification codes that are d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
CPCG06F21/36
Inventor 林嘉宇林万琪
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products