Picture verification method and device, electronic equipment and computer readable storage medium

A technology for image verification and image verification, which is applied in the field of verification codes, can solve the problems of being unable to effectively block malicious machine traffic, verification codes being easily cracked by machines, etc.

Pending Publication Date: 2019-10-08
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disclosure provides a picture verification method, device, electronic equipment and computer-readable storage medium to solve the technical problem in the prior art that the verification code is easily cracked by a machine and cannot effectively block malicious machine traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Picture verification method and device, electronic equipment and computer readable storage medium
  • Picture verification method and device, electronic equipment and computer readable storage medium
  • Picture verification method and device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] At present, when a terminal uses some Internet applications, it needs to input a correct verification code before it can use the services provided by the Internet applications. By identifying whether the verification code is correct or not, it is judged whether the user operating the terminal is a real user, thereby blocking malicious machine traffic. Therefore, the input mechanism and identification mechanism of the verification code determine whether the scheme of inputting the verification code can effectively block the flow of malicious machines.

[0045] In the solution provided by the embodiment of the present invention, the rotated image is used as the verification code, and the user needs to operate the terminal to rotate the verification code so that it conforms to the orientation of the terminal, for example, the image is in the forward direction. The rotated image is used as the verification code, so that the verification code itself does not include the veri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a picture verification method and device, electronic equipment and a computer readable storage medium. The picture verification method comprises the steps that a terminal displays a verification image and a preset control; the terminal responds to dragging operation on the preset control, determines a rotation adjustment amount according to the dragging operation, and synchronizes the rotation verification image according to the rotation adjustment amount; and the terminal responds to a release dragging operation on the preset control, determines an actual rotation angleof the verification image, and determines whether the verification is passed or not according to the actual rotation angle. According to the scheme provided by the invention, the rotated image is used as the verification code, and verification can be realized in a mode of rotating the verification image by a user. As the verification code does not comprise the verification result, the verification result corresponding to the verification code cannot be directly determined in an image recognition mode. When a verification result is input, the rotation mode has various possibilities, so that the machine cannot be cracked by multiple attempts, and malicious machine flow can be effectively identified by the mode.

Description

technical field [0001] The present disclosure relates to verification code technology, and in particular to a picture verification method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] At present, Internet applications face a large amount of machine request traffic. Among them, some machine traffic is normal machine traffic, for example, a user operates a user terminal to access an Internet application. However, it also includes a large amount of malicious machine traffic, such as performing batch registration, login, posting, reptiles, and even lottery draws through machines. [0003] Therefore, in the prior art, in order to prevent malicious machine traffic, a verification code scheme is set up, and the application can be accessed only when the machine enters the correct verification code. The verification code in the prior art includes several forms, such as inputting the text displayed in the verification code, select...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0484G06F3/0486G06F21/36
CPCG06F3/04847G06F3/0486G06F21/36
Inventor 张国先
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products