Behavior verification code generation and verification method for random contour random position
A technology of random location and verification method, applied in the field of Internet security, can solve problems such as insufficient security, and achieve the effect of increasing difficulty, increasing difficulty and good experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0022] see figure 1 , the present invention provides a verification code generation and verification method based on random contour recognition and drag behavior recognition, and the specific technical implementation process is as follows:
[0023] Initialization: maintain a pattern library on the verification code server. The patterns in the pattern library vary. The pattern can be a geometric pattern (such as a polygon, a circle, an ellipse, etc.), an animal or plant pattern (such as a dog, a chicken, a flower, etc.), or an item pattern (such as a wine bottle, a lantern, a car, etc.) , can also be other types of patterns or even special-shaped patterns.
[0024] Each pattern has a similar size, and the Euclidean distance from any point on the contour to the geometric center of gravity of the pattern is not greater than r, where r is a preset positive number.
[0025] Preferably, each pattern does not appear hollow or substantially depressed, so as to ensure that its geome...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
