Man-machine identification method based on sliding puzzle verification code

A human-machine identification and verification code technology, which is applied in the fields of digital data authentication, computer security devices, instruments, etc., can solve the problem that the traditional graphic verification code is not enough to provide security guarantee, etc., so as to achieve the difficulty of cracking and increase the cost, and improve the verification efficiency. and experience, the effect of increased difficulty

Pending Publication Date: 2021-03-30
GUANGZHOU FAISCO INFORMATON TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current network environment, there are already many mature coding and cracking tools for traditional graphic verification codes. Facing the increasingly severe network security environment, traditional graphic verification codes are no longer enough to provide security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-machine identification method based on sliding puzzle verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Example 1, such as figure 1 As shown, the present invention provides a kind of human-computer identification method based on sliding puzzle verification code and comprises the following steps:

[0030] Initialization phase:

[0031] (1) The client requests the base map and slider of the server;

[0032] Specifically, the client includes PC and mobile device browsers, WeChat applets, and terminal applications; requests include HTTP requests or TCP requests; the base map is the original image of the coding pattern at a random position; pattern.

[0033] (2) The server generates the base map, slider and unique identification code and returns them to the client;

[0034] Specifically, the original image and the slider are loaded into the memory from the hard disk when the container is initialized; the lower left corner of the original image is taken as the origin of the Cartesian coordinate system, and the width and height are the maximum values ​​of the coordinate axes,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of user identification of computer information security, and relates to a man-machine identification method based on a sliding puzzle verification code. The method comprises the following steps: a client requests a server base map and a sliding block; the server generates a base map, a sliding block and a unique identification code and returns the base map, the sliding block and the unique identification code to the client; the client generates a verification code UI according to the base map and the sliding block; the client collects the displacement of theuser moving sliding block; the client encrypts the collected data and the unique identification code and sends the encrypted data and the unique identification code to the server; the server decryptsthe encrypted data of the client; and the server authenticates the man-machine and returns an authentication result. The method is distinguished from a traditional image-text verification code, so that a code printing recognition black industry tool is out of action, and a certain confrontation protection effect is achieved; meanwhile, the user does not need to identify graphic and text information and related typing operations, and only needs to drag the sliding block to finish picture splicing to finish verification, so that the user operation is simplified, and the user experience is optimized.

Description

technical field [0001] The invention belongs to the field of user identification of computer information security, and relates to a human-machine identification method based on a sliding puzzle verification code. Background technique [0002] In the current network environment, there are many mature tools for coding and cracking black production of traditional graphic and text verification codes. In the face of increasingly severe network security environment, traditional graphic and text verification codes are no longer enough to provide security. As a human-computer authentication technology, the sliding puzzle verification code increases the difficulty of machine brute force cracking in terms of interactive operation; in terms of user experience, it is easy to understand and simplifies user operations, which satisfies the requirements of the current network environment for human-machine authentication. Security requirements, and improve the authentication efficiency and e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/30
CPCG06F21/36G06F21/305G06F2221/2133
Inventor 陈绪强许基翼
Owner GUANGZHOU FAISCO INFORMATON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products