Verification method and device, terminal equipment and storage medium

A verification method and technology for verifying instructions, applied in the field of information security, can solve problems such as slow retrieval speed, unsafe, unfavorable rapid verification, etc., to achieve the effect of enhancing strength and preventing brute force cracking

Pending Publication Date: 2021-06-18
钟春连
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The verification method used for the content of the above-mentioned graphic verification code is too single. There are already several brute-force cracking methods on the Internet. It is no longer safe to continue to use the above-mentioned verification protection method.
[0008] In addition, the current graphic verification needs to store several background pictures in a folder. When the server authenticates the user's login, it needs to randomly call a background picture from the folder according to the path for graphic verification. First, the memory usage is too large. Secondly, the server retrieves pictures from the folder according to the path at a very slow speed, which is not conducive to quick verification and reduces user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device, terminal equipment and storage medium
  • Verification method and device, terminal equipment and storage medium
  • Verification method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0061] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0062] Refer to attached figure 1 , is a schematic flow chart of the verification method proposed by the present invention;

[0063] Verification methods, including:

[0064] S1, receiving a verification instruction;

[0065] S2, randomly obtain base64 codes from the pre-established materi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verification method and device, terminal equipment and a storage medium, and is applied to the technical field of information security. The method comprises the following steps of through receiving a verification instruction, randomly acquiring a base64 code from a pre-established material library; carrying out system identification on the base64 code to obtain a first material, a second material and a background picture after the system identification; fusing the first material and the second material into the background picture, and respectively marking a first position coordinate point and a second position coordinate point of the first material and the second material in the background picture to obtain a coordinate connection line verification graph; feeding the coordinate connection verification graph back to the front end, achieving making of the server verification graph, enhancing the strength of the server verification function, preventing brute force cracking of the network robot, and finally receiving user input end connection data; judging whether the connection data accords with a preset verification rule, and if so, determining that the verification succeeds; and implementing the process that the server executes the picture fusion-based coordinate connection verification method.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a verification method, device, terminal equipment and storage medium. Background technique [0002] When many APPs or websites perform important interactions with the server (such as login, registration, payment, etc.), in order to increase security and prevent the operation behavior from being sent by a network robot instead of a real user, the user will be required to enter the content of the graphic verification code. verify. Interaction with each other is only possible after passing the graphic verification code verification. [0003] At present, in order to prevent brute force cracking by network robots, the content of graphic verification codes usually appears in the following ways: [0004] (1) Ordinary graphic verification code, the general composition rule is 4 letters or numbers or a mixture of them. In order to prevent it from being easily cracke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F16/51G06F16/58G06T11/60
CPCG06F21/36G06T11/60G06F16/51G06F16/5866
Inventor 钟春连
Owner 钟春连
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products