Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior verification code generation and verification method based on random grid and random watermark contour

A verification method and verification code technology, which is applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as unfriendliness and troublesome use, and achieve the effect of good experience, increased difficulty, and simple operation

Active Publication Date: 2021-05-25
HUATIAN NANJING ENG & TECH CORP MCC +2
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of machine vision technology, simple touch-screen verification codes can still be quickly recognized by machine programs. If you blindly increase the number of picture touches or increase the difficulty of semantic recognition, although the possibility of being recognized by machine programs can be reduced sex, but it also brings troubles and unfriendliness to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior verification code generation and verification method based on random grid and random watermark contour
  • Behavior verification code generation and verification method based on random grid and random watermark contour
  • Behavior verification code generation and verification method based on random grid and random watermark contour

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] like figure 1 and figure 2 As shown, the present invention provides a verification code generation and verification method based on random grid position, random watermark outline recognition and drag behavior recognition. The specific technical implementation process is as follows:

[0029] Initialization: maintain a pattern library on the verification code server. The patterns in the pattern library vary. The pattern can be a geometric pattern (such as a polygon, a circle, an ellipse, etc.), an animal or plant pattern (such as a dog, a chicken, a flower, etc.), or an item pattern (such as a wine bottle, a lantern, a car, etc.) , can also be other types of patterns or even special-shaped patterns.

[0030] Preferably, each pattern does not appear hollow or substantially depressed, so as to ensure that its geometric center of gravity falls within the outline of the pattern, which is convenient for users to touch the center of gravity area of ​​the pattern for draggin...

Embodiment 2

[0045] Example 2: See image 3 and Figure 4 , a verification code generation and verification method based on random grid position, random watermark contour recognition and drag behavior recognition provided by the present invention, the specific technical implementation process is as follows:

[0046] Initialization: maintain a pattern library on the verification code server. The patterns in the pattern library vary. The pattern can be a geometric pattern (such as a polygon, a circle, an ellipse, etc.), an animal or plant pattern (such as a dog, a chicken, a flower, etc.), or an item pattern (such as a wine bottle, a lantern, a car, etc.) , can also be other types of patterns or even special-shaped patterns.

[0047] Preferably, each pattern does not appear hollow or substantially depressed, so as to ensure that its geometric center of gravity falls within the outline of the pattern, which is convenient for users to touch the center of gravity area of ​​the pattern for drag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark contour. The method comprises the following steps: step 1, a verification code server receives a verification code application provided by a verification code plug-in of a client to the verification code server; step 2, the verification code server randomly selects K grids from the N grids; step 3, the verification code server randomly selects K different patterns from a preset pattern library; step 4, the verification code server takes the pattern with the serial number of i as the contour of the watermark in sequence; step 5, the verification code server generates a foreground picture by taking the No.1 pattern as a contour; step 6, the verification code server sends the verification code picture and the foreground picture to the client; 7, a dragging track collected by the client is received; and 8, the dragging behavior is analyed and judged, and a judgment result is fed back to the client. According to the method, the problem that the current verification code is easily cracked by a machine program is effectively solved.

Description

Technical field: [0001] The invention relates to a behavior verification code generation and verification method, which is applied in the fields of software development and Internet security. Background technique: [0002] The verification code is a public fully automatic program that distinguishes whether the user is a human or a machine. It can prevent machines from maliciously cracking passwords and crashing databases by running script programs to simulate human behavior, and prevent harmful transactions such as ticket swiping, wool extraction, malicious ordering, batch registration, and malicious attacks. Operate and protect the information security and property security of the website and various users. Traditional verification codes include pure letters, pure numbers, alphanumeric combinations, arithmetic calculations, etc., which are easily recognized by machine programs automatically. Since then, there has been a point-and-click verification code for pictures, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/0838H04L9/0869
Inventor 钱小聪吴忠华姜岚周煜申刘晓程
Owner HUATIAN NANJING ENG & TECH CORP MCC