Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification code processing method and device

A processing method and technology of a processing device, which are applied in the field of verification code processing methods and devices, can solve problems such as cracking, exposure, and operation, and achieve the effects of high security, simple operation, and reduced complexity.

Inactive Publication Date: 2019-10-01
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In summary, the verification code method in the prior art mainly has the following three problems: the operation problem (partial operations increase the difficulty of understanding by the user), the cracking problem (can be broken by other computer systems), and the leakage problem (key attribute and logic code exposed)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code processing method and device
  • Verification code processing method and device
  • Verification code processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0054] In view of the need to improve the security and usability of the current verification code system in the prior art, the embodiments of the present invention provide a specific implementation of a verification code processing method, see figure 1 this method 10 Specifically include the following:

[0055] Step 100: Generate a random 3D sol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification code processing method and device, and the method comprises the steps: generating a random three-dimensional graph and a target rotation mode of the random three-dimensional graph according to a verification code service request of a client, and sending the three-dimensional graph and the target rotation mode of the random three-dimensional graph to the client; receiving rotation operation information of the three-dimensional graph by the client; and generating a verification result according to the target rotation mode and the rotation operation information. The invention provides a verification code processing method which is simple to operate and high in security.

Description

technical field [0001] The invention relates to the technical field of Internet security applications, in particular to a verification code processing method and device. Background technique [0002] Security is not only a very important function of current Internet products for users at all levels, but also a function that needs to be researched and developed for companies related to Internet products. The verification code system is divided into two forms, namely, an out-of-band identity verification code system (referred to as an identity verification code system) and a graphical man-machine distinguishing verification code system (referred to as a graphic verification code system). In the prior art, there are generally three related methods for preventing malicious attacks through a graphic verification code system: [0003] The first is to combine patterns and picture-type characters that cannot be recognized by computer programs to form a synthetic picture that real h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36G06F21/44G06T17/00
CPCG06F21/36G06F21/44G06F2221/2133G06T17/00
Inventor 滕飞罗涛夏冬
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products