Sliding block verification code generation method and device, computer equipment and storage medium

A verification code and computer technology, applied in the field of Internet information security, can solve the problems of machine identification, low efficiency, insufficient interference, etc., and achieve the effect of easy generation, increased difficulty, and good interference effect.

Pending Publication Date: 2019-05-24
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, in the existing technical solutions, the interference is ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sliding block verification code generation method and device, computer equipment and storage medium
  • Sliding block verification code generation method and device, computer equipment and storage medium
  • Sliding block verification code generation method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0047] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the sequence number of the operation, such as S11, S12, etc., is only used to distinguish different operations, and the sequence number itself does not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sliding block verification code generation method, which comprises the following steps of: obtaining a preset sliding block graph and a background graph, and generating a target graph and a plurality of interference graphs according to the sliding block graph; embedding the target graph and the interference graph into the background graph to generate a content graph; and carrying out style conversion on the content graph by utilizing a preset style image to generate a sliding block verification code, so that a user slides the sliding block graph to a position matched with the target graph to carry out verification after sending the sliding block verification code to the user side. Through style transformation, the boundary of the interference graph and the boundaryof the target graph are fused, the difficulty of identifying the boundary of the position where the sliding block graph is located by a machine is increased, and therefore the safety and reliabilityof image verification are improved.

Description

technical field [0001] The invention relates to the field of Internet information security, in particular to a method, device, computer equipment and storage medium for generating a slider verification code. Background technique [0002] With the rapid development of the Internet, various verification code technologies are also emerging. The common forms of verification codes include: character recognition, slider dragging, picture clicking, picture text clicking, intellectual question answering, etc. Among them, the history of character recognition For a long time, due to the development of image recognition technology, its security has been greatly threatened, and the difficulty of cracking is relatively low. Due to its simple form and good user experience, the existing horizontal slider-drag verification code has a simple answer track and is easy to be simulated and thus cracked, and its safety factor is also low. [0003] The existing other forms of slider verification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/36
Inventor 徐介夫
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products