A verification code generation method based on hidden graphics

A verification code and graphic technology, applied in the fields of digital data authentication, electronic digital data processing, program/content distribution protection, etc., can solve the problems of machine automatic identification and user identification contradiction, the verification code input is not convenient enough, etc., to achieve convenient identification and verification code and input verification code, reduce the difficulty of identification, the effect of easy identification

Inactive Publication Date: 2019-02-01
XIAMEN UNIV TAN KAH KEE COLLEGE
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the purpose of the present invention is to provide a verification code generation method based on implicit graphics, to solve the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification code generation method based on hidden graphics
  • A verification code generation method based on hidden graphics
  • A verification code generation method based on hidden graphics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0038] The present invention provides a verification code generation method based on implicit graphics,

[0039] Step S1: if figure 1 As shown, the preset M large graphics, each of which contains N sub-graphics; the large graphic in this embodiment is a graphic from "Hidden Picture" from the Internet, and 13 sub-graphics are hidden in the figure, marked The part of is a subgraph.

[0040] Step S2: Carry out naming and individual graphic processing to these sub-graphics, wherein the naming method can use multiple languages, which can be Chinese or other languages, and the sub-graphics can also undergo various deformations. right figure 1 The 13 sub-graphics in the name and individual graphic processing, naming and individual graphic processing such as Figure 10 As shown:

[0041] Step S3: Randomly select J graphics and corresponding K sub-graphics ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a verification code generation method based on hidden graphics, which comprises the following steps: S1, presetting M large graphics, each containing N sub-graphics; 2, extract n sub-graphics from N sub-graphics of each large graphics, and preprocess that n sub-graphics; 3, randomly selecte J graphics and correspond pre-processed K sub-graphics from that large graphics; 4,randomly selecte k sub-graphics as a verification code accord to that K sub-graphics obtained after the pre-processing at random; S5: setting the obtained k subgraph number series to S0; S6: outputting the selected k verification codes to the front end, and simultaneously recording the output sequence S1 of the k verification codes; S7: outputting J large graphics to the front end S8: setting a rule for selecting an implied sub-graphics; S9, recording the input and the clicking sequence of the authentication code clicked by the user, and generating the input series S0 'and the sequence sequence S1'; S10, respectively comparing the values of S0 and S0 'and the values of S1 and S1', and judging whether the authentication code input by the user is correct or not.

Description

technical field [0001] The invention relates to a method for generating a verification code based on an implicit graph. Background technique [0002] At present, the technologies used in verification codes are divided into the following types: 1. Verification code generation technology: (1). Text verification code, (2). Image verification code, (3). Audio verification code, (4). Video verification code , (5). The above-mentioned comprehensive technology [0003] 2. Technologies used to enhance the anti-cracking ability of verification codes: (1). Character sticking technology, (2). Character distortion technology, (3). Background interference technology [0004] 3. Verification code input technology: (1). User manual input, (2). Click input (3). Drag input [0005] Because audio and video verification codes are used in some special occasions and have high requirements for bandwidth, they are rarely used. Currently, text verification codes and image verification codes are c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/36G06F21/16
CPCG06F21/16G06F21/36G06F2221/2133
Inventor 曾党泉
Owner XIAMEN UNIV TAN KAH KEE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products