Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior verification code generation and verification method for random contour random position

A technology of random location and verification method, applied in the field of Internet security, can solve problems such as insufficient security, and achieve the effect of increasing difficulty, increasing difficulty and good experience

Pending Publication Date: 2021-03-19
HUATIAN NANJING ENG & TECH CORP MCC +2
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

CN110308846A discloses a jigsaw verification code that can be freely translated and dragged on a two-dimensional plane. However, since the position of the watermark still has the possibility of being judged by image recognition technology, and it is only judged on the server side whether the user input coordinates are close enough to the original Coordinates, did not effectively use the user's behavioral characteristics, security is still insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior verification code generation and verification method for random contour random position

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] see figure 1 , the present invention provides a verification code generation and verification method based on random contour recognition and drag behavior recognition, and the specific technical implementation process is as follows:

[0023] Initialization: maintain a pattern library on the verification code server. The patterns in the pattern library vary. The pattern can be a geometric pattern (such as a polygon, a circle, an ellipse, etc.), an animal or plant pattern (such as a dog, a chicken, a flower, etc.), or an item pattern (such as a wine bottle, a lantern, a car, etc.) , can also be other types of patterns or even special-shaped patterns.

[0024] Each pattern has a similar size, and the Euclidean distance from any point on the contour to the geometric center of gravity of the pattern is not greater than r, where r is a preset positive number.

[0025] Preferably, each pattern does not appear hollow or substantially depressed, so as to ensure that its geome...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a behavior verification code generation and verification method for a random contour random position. The method comprises the following steps: step 1, a verification code server receives a verification code application proposed to the verification code server by a verification code plug-in of a client; 2, the verification code server randomly selects K different patterns from a preset pattern library; 3, the verification code server embeds K watermarks with the K patterns in the step 2 as contours on the background image; 4, the verification code server sends the verification code picture and the foreground picture to the client; 5, the verification code server receives a dragging track to be acquired by the client; and 7, the verification code server analyzes andjudges the mouse or finger dragging behavior of the user, and feeds back a judgment result to the client. The problem that the current verification code is prone to cracking by a machine program is effectively solved.

Description

Technical field: [0001] The invention relates to a behavior verification code generation and verification method, which is applied in the fields of software development and Internet security. Background technique: [0002] The verification code is a public fully automatic program that distinguishes whether the user is a human or a machine. It can prevent machines from maliciously cracking passwords and crashing databases by running script programs to simulate human behavior, and prevent harmful transactions such as ticket swiping, wool extraction, malicious ordering, batch registration, and malicious attacks. Operate and protect the information security and property security of the website and various users. Traditional verification codes include pure letters, pure numbers, alphanumeric combinations, arithmetic calculations, etc., which are easily recognized by machine programs automatically. Since then, there has been a point-and-click verification code for pictures, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36
CPCG06F21/36G06F2221/2133
Inventor 钱小聪吴忠华康望星赵旭黄丽萍
Owner HUATIAN NANJING ENG & TECH CORP MCC