Check patentability & draft patents in minutes with Patsnap Eureka AI!

Dynamic verification code generation method

A dynamic verification code, currently generated technology, applied in the field of security verification, can solve problems such as easy to be cracked, unsatisfied security requirements, user end user authentication information leakage, etc., to avoid information security problems, suitable for promotion and use, to avoid easy cracked effect

Pending Publication Date: 2020-06-09
河北先见软件科技股份有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) The current dynamic verification code is usually garbled code directly generated by the dynamic token, which cannot be generated for different users. The password generation process of the dynamic token is easy to be cracked, resulting in low security of the verification process. The security requirements of the verification process for information confidentiality requirements or privacy confidentiality requirements cannot be met;
[0005] 2) Part of the current dynamic verification code is to complete the verification process on the server side by directly sending the user authentication information of the user terminal that initiated the verification request. Although the problem that the verification code is easy to be cracked is solved, the user terminal stored in the user terminal There is a risk of leakage of authentication information, and the problems of practicality and security cannot be considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic verification code generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 As shown, this embodiment provides a method for generating a dynamic verification code, including the following steps:

[0047] Detect in real time whether there is a request to generate a dynamic verification code, and if so, receive and analyze the current generation request;

[0048] Determine whether the current generation request includes a face image, if yes, obtain the current face image, if not, output a request error message;

[0049] Obtain the face area in the current face image, and then extract multiple feature points of the current face area;

[0050] Get the number sequence based on multiple feature points, and then get the initial password according to the number sequence;

[0051] The request time and the first dynamic random code in the current generated request are obtained, and then the initial password, the request time and the first dynamic random code are encrypted and calculated to obtain the dynamic verification code.

Embodiment 2

[0053] The technical solution provided in this embodiment is a further improvement made on the basis of the technical solution in embodiment 1. The difference between this embodiment and embodiment 1 is:

[0054] In this embodiment, after obtaining the dynamic verification code, the following steps are further included:

[0055] Generate a base layer based on the current dynamic verification code;

[0056] Obtain a second dynamic random code, and generate multiple interference layers according to the second dynamic random code;

[0057] Merge each interference layer separately with the base layer to form multiple composite frames;

[0058] The preset frame rate is obtained, so that multiple composite frames are dynamically displayed at the preset frame rate, and the final dynamic verification code is obtained; wherein, the preset frame rate can meet the requirement of visual persistence, and is convenient for human eyes to recognize the dynamic verification code.

[0059]As ...

Embodiment 3

[0062] The technical solution provided in this embodiment is a further improvement made on the basis of the technical solution in embodiment 2. The difference between this embodiment and embodiment 2 is:

[0063] In this embodiment, when generating the base layer, the specific steps are as follows:

[0064] Obtain the current dynamic verification code and basic background image;

[0065] Separate the multiple verification characters of the current dynamic verification code, and then combine the separated multiple verification characters with the basic background image to form a basic layer.

[0066] After the final dynamic verification code is generated, visually, the verification characters are still and clearly identifiable, and the random characters in the interference layer are constantly flashing. The random characters in the interference layer can interfere with the computer cracking program and increase the security of the dynamic verification code. At the same time, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of safety verification, and discloses a dynamic verification code generation method. The method comprises the steps that whether a dynamic verification code generation request exists or not is detected in real time, If yes, the current generation request is received and analyzed; judging whether the current generation request comprises a human face image or not, If so, obtaining the current human face image; obtaining a face area in the current face image and extracting a plurality of feature points; obtaining an initial password according to the plurality of feature points; obtaining request time and a first dynamic random code in the current generation request, and then performing encryption calculation on the initial password, the request time and the first dynamic random code to obtain a dynamic verification code. According to the invention, the targeted dynamic verification code is generated according to the different face areas in eachgeneration request, so that the dynamic verification code is prevented from being easily cracked, the information safety problem is further avoided, the safety requirements of the verification process with higher information safety requirements or privacy safety requirements can be met, and the method is suitable for popularization and application.

Description

technical field [0001] The invention belongs to the technical field of security verification, and in particular relates to a method for generating a dynamic verification code. Background technique [0002] Identity verification is one of the basic issues in social life. The identity verification system not only has great application prospects in family life, personal entertainment, and enterprise applications, but also plays an important role in national security, judicial criminal investigation, and personal safety. At present, identity verification adopts traditional technologies based on carrying objects (such as IC cards, keys, etc.) or knowledge (such as passwords, passwords, etc.), and also uses computer automatic identification technology based on dynamic verification codes; among them, dynamic verification codes are currently distinguished. Whether the user is a computer or a public fully automatic program, it can effectively prevent hackers from making continuous lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36G06K9/00
CPCG06F21/36G06V40/168
Inventor 闫荣新
Owner 河北先见软件科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More