Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementation method of security graphic verification code based on semantic transformation

A graphic verification code and security verification code technology, which is applied in the direction of digital data authentication, can solve problems such as verification failure, and achieve the effects of improving security, enhancing reliability, and increasing the difficulty of clicking

Active Publication Date: 2021-02-12
XIAN THERMAL POWER RES INST CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing point-and-click verification codes usually require the user to search for a match in the verification code picture and click in order according to the prompt text. Missing points, wrong points, or wrong order will lead to verification failure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of security graphic verification code based on semantic transformation
  • Implementation method of security graphic verification code based on semantic transformation
  • Implementation method of security graphic verification code based on semantic transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] The invention provides a method for realizing a security graphic verification code based on semantic conversion, mainly including a method for establishing a semantic conversion matrix of a security verification code, a method for using a security verification code based on semantic conversion, and a method for enhancing the security of a verification code platform.

[0043] Such as figure 1 As shown, the method of establishing the security verification code semantic transformation matrix is ​​as follows:

[0044] S11. Establish verification code source table ST ;

[0045] Verification co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method of a security graphic verification code based on semantic transformation. The implementation method comprises a method for establishing a security verification code semantic transformation matrix, a security verification code using method based on semantic transformation and a method for enhancing the security of a verification code platform. According to the method, the reliability of the verification code is enhanced not by increasing the complexity of the verification code, the method is friendly to a user, the difficulty of machine identification and analysis is remarkably improved while the difficulty of manual identification and clicking is not greatly increased, the security of the graphic verification code is improved, and the security of a verification code platform is enhanced; and the possibility of cracking in an exhaustion mode is effectively reduced.

Description

technical field [0001] The invention relates to the technical field of realizing security verification codes, in particular to a method for realizing a security graphic verification code based on semantic conversion. Background technique [0002] The Turing Test (Completely Automated Public Turingtest to tell Computers and Humans Apart, or CAPTCHA for short), commonly known as verification code, is a public fully automatic program that distinguishes whether a user is a computer or a human. 。 By using the verification code to distinguish whether the login operation is a human or a robot, it can effectively reduce the pass rate of malicious behaviors such as cracking passwords, registering users in batches, placing advertisements in batches, and sending spam. [0003] Although there are already many alternative user authentication schemes, such as face authentication, fingerprint authentication, and iris authentication, these authentications have risks such as poor deployabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
CPCG06F21/36
Inventor 王文庆毕玉冰崔逸群刘超飞杨新民杨东邓楠轶高原英董夏昕介银娟朱博迪
Owner XIAN THERMAL POWER RES INST CO LTD