Unlock instant, AI-driven research and patent intelligence for your innovation.

Hash-based verification method and device, equipment and storage medium

A verification method and hashing technology, applied in the field of network security, can solve problems such as low verification security and inaccurate identification of verification behaviors, and achieve the effect of improving verification security

Active Publication Date: 2020-02-14
WUHAN JIYI NETWORK TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a hash-based verification method, equipment, storage medium and device, aiming to solve the technology in the prior art that the verification behavior of machine or manual simulation operation cannot be accurately identified, resulting in low verification security question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash-based verification method and device, equipment and storage medium
  • Hash-based verification method and device, equipment and storage medium
  • Hash-based verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] refer to figure 1 , figure 1 It is a schematic structural diagram of a hash-based verification device of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0054] Such as figure 1 As shown, the hash-based verification device may include: a processor 1001 , such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display). The optional user interface 1003 may also include a standard wired interface and a wireless interface. The wired interface of the user interface 1003 may be a USB interf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hash-based verification method and device, equipment and a storage medium. The method comprises the following steps: acquiring a mouse movement track of a user on a login interface; obtaining a to-be-verified track input by the user in the verification interface and a corresponding to-be-verified duration; splicing the mouse movement track, the track to be verified and the corresponding duration to be verified; obtaining data to be verified, hash calculation is carried out on the to-be-verified data; according to the method, the to-be-verified hash code is obtained, whether hash collision is generated or not is judged according to the to-be-verified hash code, if the hash collision is generated, if the collision is encountered, it represents that the track is abnormal, the user request corresponding to the to-be-verified track is intercepted, machine simulation operation can be effectively recognized, and the verification safety is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a hash-based verification method, equipment, storage medium and device. Background technique [0002] Captcha is an anti-Turing test, which is used to distinguish between humans and machines, blocking machine interaction requests. The traditional verification code is a character type, which resists machine recognition by deforming, distorting, and adding interference to the characters in the picture. However, the verification behavior for machine simulation operations cannot be accurately identified, which threatens the security of verification such as login. [0003] The above content is only used to assist in understanding the technical solution of the present invention, and does not mean that the above content is admitted as prior art. Contents of the invention [0004] The main purpose of the present invention is to provide a hash-based verification method, equip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/316G06F2221/2133
Inventor 陈国庆汪智勇陈晨
Owner WUHAN JIYI NETWORK TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More