Verification code generation method, login verification method and login verification system

A technology for login verification and verification code, which is applied in the fields of login verification method, login verification system and verification code generation method, and can solve problems such as poor verification code security.

Pending Publication Date: 2020-04-10
河北网新科技集团股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention proposes a verification code generation method, a login verification method and a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code generation method, login verification method and login verification system
  • Verification code generation method, login verification method and login verification system
  • Verification code generation method, login verification method and login verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Such as figure 2 As shown, the verification code generation method of this embodiment includes the following steps:

[0054] S40: generating four spherical patterns;

[0055] S41: Control the four spherical patterns to move in translation at different speeds;

[0056] S42: selecting the fastest moving speed among the four spherical patterns as the target pattern.

Embodiment 2

[0058] Such as image 3 As shown, the verification code generation method of this embodiment includes the following steps:

[0059] S50: generating three spherical patterns and one square pattern;

[0060] S51: selecting a square pattern as the target pattern.

Embodiment 3

[0062] Such as Figure 4 As shown, the verification code generation method of this embodiment includes the following steps:

[0063] S60: generating four square patterns with arrows, wherein the arrows on three square patterns point to the left, and the arrows on the other square pattern point to the right;

[0064] S61: A square pattern with an arrow pointing to the right is selected as the target pattern.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and provides a verification code generation method, a login verification method and a verification login system. The method includes:generating at least two patterns; establishing an action instruction library, wherein the action instruction library comprises multiple groups of action instructions, and each group of action instructions corresponds to one judgment standard; randomly selecting a group of action instructions, controlling a plurality of patterns to execute the action instructions, and marking judgment standards corresponding to the action instructions as selected standards; and comparing execution results of the plurality of patterns, and selecting one pattern meeting a selected standard as a target pattern. Through the technical scheme, the problem of poor security of the verification code in the prior art is solved.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a verification code generation method, a login verification method and a login verification system. Background technique [0002] Captcha, also known as Turing Test (Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA for short), is a public fully automatic program that distinguishes whether a user is a computer or a human. In the actual use of the verification code, the computer as the server will automatically generate questions for the user to answer, and judge whether the user's answer is correct. The question must be answered only by a human, not by a computer. Therefore, users who answer the question correctly are considered human. The use of verification codes can prevent malicious cracking of passwords, swiping tickets, flooding forums, etc., thereby ensuring network security. At present, verification codes are easily cracked and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0815H04L63/083
Inventor 闫荣新
Owner 河北网新科技集团股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products