Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method and device based on verification code, electronic equipment and storage medium

A verification method and a technology of a verification device, which are applied in the Internet field and can solve problems such as low security of verification codes and poor user experience

Inactive Publication Date: 2019-06-25
GREE ELECTRIC APPLIANCES INC
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a verification code-based verification method, device, electronic equipment, and storage medium to solve the problems of low verification code security and poor user experience in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device based on verification code, electronic equipment and storage medium
  • Verification method and device based on verification code, electronic equipment and storage medium
  • Verification method and device based on verification code, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 This is a schematic diagram of the process of a verification code-based verification method provided by an embodiment of the present invention. The process includes the following steps:

[0043] S101: Display a display interface containing prompt information for drawing a target verification graph, where the prompt information is used to prompt the verification condition corresponding to the target verification graph.

[0044] In order to solve the problem that the currently used verification code is easy to be cracked, the user experience is low, and the advanced knowledge-free verification method requires complex technical support, and the cost is high, in the embodiment of the present invention, by acquiring the waiting list drawn on the display interface Verify the graph, determine whether the pair of graphs to be verified meets the verification conditions corresponding to the target verification graph, and then perform preset subsequent operations according to t...

Embodiment 2

[0057] In order to ensure the accuracy of verification code verification, on the basis of the foregoing embodiment, in the embodiment of the present invention, the determining whether the pattern to be verified meets the verification condition corresponding to the target verification pattern includes:

[0058] Determine whether the shape of the figure to be verified is the same as the shape of the target verification figure; and / or

[0059] It is determined whether the figure to be verified is located in the drawing area corresponding to the target verification figure.

[0060] In order to ensure the accuracy of verification code verification, in the embodiment of the present invention, corresponding verification conditions are preset for the target verification pattern. Specifically, the verification condition includes at least one of the following: the shape of the target verification graph, and the drawing area of ​​the target verification graph.

[0061] The judgment can be made b...

Embodiment 3

[0066] In order to improve the security of the verification code, on the basis of the foregoing embodiments, in an embodiment of the present invention, the determining whether the shape of the pattern to be verified and the target verification pattern are the same includes:

[0067] Using a preset algorithm according to the first coordinate information to determine a target regular figure corresponding to the figure to be verified, and the shape of the target regular figure is the same as the shape of the target verification figure;

[0068] Judging whether the coincidence degree of the graph to be verified and the target regular graph is within a preset coincidence degree threshold range;

[0069] If so, it is determined that the shape of the figure to be verified is the same as the shape of the target verification figure; otherwise, it is determined that the shape of the figure to be verified is different from the shape of the target verification figure.

[0070] In order to determin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method and device based on a verification code, electronic equipment and a storage medium, which are used for solving the problems of low security and poor userexperience of the verification code in the prior art. The method comprises the following steps: displaying a display interface containing prompt information for drawing a target verification graph, wherein the prompt information is used for prompting a verification condition corresponding to the target verification graph; Obtaining first coordinate information of a to-be-verified graph drawn on the display interface; Judging whether the to-be-verified graph meets a verification condition corresponding to the target verification graph or not according to the first coordinate information; And performing preset subsequent operation according to the judgment result.

Description

Technical field [0001] The present invention mainly relates to the field of Internet technology, and in particular to a verification method, device, electronic equipment and storage medium based on a verification code. Background technique [0002] The verification code is widely used in the security protection strategy of the website. Its main mechanism is to force human-computer interaction to resist hackers such as imitating login, maliciously cracking passwords, swiping tickets, forum watering, etc. Hackers use software to imitate normal users and automatically attack websites . [0003] Common verification codes mostly identify deformed numbers and letters in a picture. With the maturity of image recognition technology, such verification codes can be easily cracked. In response to this situation, some websites have increased the complexity of pictures as a response, such as text verification codes, image screening verification codes, dynamic image verification codes, and so o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
Inventor 韦泽光张玉甄志坚赖家劲赵慧子
Owner GREE ELECTRIC APPLIANCES INC