Dynamic subgraph-based authentication method, device, user equipment and storage medium

A verification method and subgraph technology, applied in the field of data security, can solve the problems of complex character segmentation and the second case, and achieve the effect of avoiding illegal registration and network attacks

Inactive Publication Date: 2019-02-26
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] (2) Segmenting characters: Segmenting characters is more complicated, and there are many situations in the verification code image, as shown in the figure below, for the first case, it can be directly segmented, because the characters are not glued together, and the second case is a bit complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic subgraph-based authentication method, device, user equipment and storage medium
  • Dynamic subgraph-based authentication method, device, user equipment and storage medium
  • Dynamic subgraph-based authentication method, device, user equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0066] refer to figure 1 , figure 1 It is a schematic structural diagram of the user equipment of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0067] Such as figure 1 As shown, the user equipment may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the network interface 1004 may include a standard wired interface and a wireless inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, a device, a user equipment and a storage medium based on a dynamic sub-graph. As that verification map to be displayed is segmented, a plurality of sub-images to be displayed are obtained, the sub-image to be displayed is cyclically displayed at a display speed satisfying the visual retention effect of the human eye, Then the information to be verified inputted by the user is sent to the server, and the server verifies the information to be verified, which can ensure that the image interception technology and the image recognition technology can not obtain the effective information from a single sub-image to be displayed, and can effectively avoid various illegal registration and network attacks.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a verification method, device, user equipment and storage medium based on a dynamic subgraph. Background technique [0002] CAPTCHA is the abbreviation of "Completely Automated Public Turing test to tell Computers and Humans Apart" (Turing Test to Tell Computers and Humans Apart), which is a public fully automatic program to distinguish whether the user is a computer or a human. It can prevent: malicious cracking of passwords, swiping tickets, flooding forums, and effectively preventing a hacker from making continuous login attempts to a specific registered user with a specific program brute force cracking method. In fact, using verification codes is a common way for many websites now. [0003] In the prior art, verification codes usually take the following four forms: [0004] The first form: a combination of numbers, letters, and Chinese; this form of verificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06K9/34
CPCG06F21/36G06V30/153
Inventor 艾勇孙翀单业荣毛腾跃李子茂郑禄
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products