Unlock instant, AI-driven research and patent intelligence for your innovation.

Point contact type verification code automatic identification method based on LeNet and SSD

An automatic identification and verification code technology, applied in character and pattern recognition, digital data authentication, instruments, etc., can solve problems such as troubles, difficult to guarantee recognition accuracy, and low efficiency of sliding verification, and achieve the effect of improving recognition accuracy

Pending Publication Date: 2020-04-28
上海三零卫士信息安全有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existence of the verification code, for third-party testing, RPA (that is, Robotic Process Automation software process automation, refers to the use of software automation to realize the business that is originally done by manually operating computers in various industries), and scientific research units can effectively collect scientific research data on a large scale , Open up multiple systems within the organization and other work caused trouble
However, the shape, size, color and position of the fused text of the point-touch verification code are highly variable, and its recognition accuracy is difficult to guarantee, and the efficiency of the existing sliding verification is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Point contact type verification code automatic identification method based on LeNet and SSD
  • Point contact type verification code automatic identification method based on LeNet and SSD

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] see Figure 1-2 , the present invention provides a technical solution: a method for automatic recognition of point-touch verification codes based on LeNet and SSD, characterized in that it comprises the following steps:

[0029] Step 1, use packet capture tools such as Charls to capture the request and response of the verification code recognition process, analyze the response structure, use HttpURLConnection to realize the automation of recognition tex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a point contact type verification code automatic identification method based on LeNet and SSD. The method comprises the following steps: the step 1, capturing a request and a response of a verification code recognition process by using package capturing tools such as Charls, analyzing a response structure, realizing recognition text acquisition and image acquisition by using HttpURLConnection, simulating automation of a fragment graph synthesis process by referring to javascript, and finishing automation of web interaction; and the step 2, taking advantages of Matlab processing matrix image, using .m processing image DBSCAN clustering, binarization, dilatation expansion, output of images to be recognized and other functions, and packaging the images into a jar fileto be called by an automation program. According to the SSD and LeNet-based point contact type verification code recognition method, the characters of the point contact type verification code and thepositions of the characters in the background image can be automatically recognized, the verification process is completed through a series of web automatic interactions, and This method continuouslyimproves recognition precision according to the deep self-learning reinforcement of use.

Description

technical field [0001] The invention relates to the technical field of computer information processing, in particular to a method for automatically identifying point-touch verification codes based on LeNet and SSD. Background technique [0002] At present, when we use a browser to access a website or use an organization's internal business system, there are many business scenarios that require login to identify the user's identity. Software developers usually add human-computer interaction to prevent users from maliciously logging in and using the system. With the rapid development of technology, the form of human-computer interaction verification is constantly upgrading, especially various verification code technologies are also constantly being strengthened. In addition to character recognition verification codes, slider drag verification codes, picture touch verification codes, and quiz answers etc. [0003] The character verification code usually displays multiple disto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36G06K9/32G06K9/62G06N3/04
CPCG06F21/36G06V20/62G06N3/045G06F18/214
Inventor 刘彪王骁秦嘉伟
Owner 上海三零卫士信息安全有限公司