Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior verification code design method based on semantic recognition and multiple connection lines

A technology for semantic recognition and verification methods, applied in computing, digital data authentication, computer security devices, etc., and can solve problems such as unfriendly and troublesome use.

Pending Publication Date: 2021-07-30
HUATIAN NANJING ENG & TECH CORP MCC +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of machine vision technology, simple touch-screen verification codes can still be quickly recognized by machine programs. If you blindly increase the number of picture touches or increase the difficulty of semantic recognition, although the possibility of being recognized by machine programs can be reduced sex, but it also brings troubles and unfriendliness to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior verification code design method based on semantic recognition and multiple connection lines
  • Behavior verification code design method based on semantic recognition and multiple connection lines
  • Behavior verification code design method based on semantic recognition and multiple connection lines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] The generation and verification process of the verification code in this embodiment are as follows (see image 3 ):

[0024] Step 1. The verification code server receives the verification code application from the client.

[0025] Step 2: The verification code server randomly selects K object groups from the object database, and randomly selects 2 objects in each object group, and selects 2K objects in total.

[0026] Step 3: The verification code server randomly assigns the 2K objects selected in step 2 to the 2K grids in the behavior recognition area, and records the mapping table between the 2K grids and the 2K objects, as shown in Table 1. Then display the content assigned to the object in each grid of the behavior recognition area, and synthesize the verification code picture, such as figure 2 Shown (K=4 in this example).

[0027] grid number object number (1,1) (2,1) (1,2) (99,2) (1,3) (1,1) (1,4) (3,2) (2,1) (99,1) (2,...

Embodiment 2

[0033] The generation and verification process of the verification code in this embodiment are as follows (see image 3 ):

[0034] Step 1. The verification code server receives the verification code application from the client.

[0035] Step 2: The verification code server randomly selects K object groups from the object database, and randomly selects 2 objects in each object group, and selects 2K objects in total.

[0036] Step 3: The verification code server randomly assigns the 2K objects selected in step 2 to the 2K grids in the behavior recognition area, and records the mapping table between the 2K grids and the 2K objects, as shown in Table 1. Then display the content assigned to the object in each grid of the behavior recognition area, and synthesize the verification code picture, such as figure 2 Shown (K=4 in this example).

[0037] grid number object number (1,1) (2,1) (1,2) (99,2) (1,3) (1,1) (1,4) (3,2) (2,1) (99,1) (2,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a behavior verification code generation and verification method based on semantic recognition and multiple connection lines. The method comprises the following steps: step 1, enabling a verification code server to receive a verification code application of a client; step 2, randomly selecting K object groups from the object database by the verification code server, randomly selecting two objects in each object group, and totally selecting 2K objects; step 3, randomly distributing the 2K objects selected in the step 2 to 2K grids of a behavior identification area by the verification code server, and recording a mapping table of the 2K grids and the 2K objects; displaying the content distributed to the object in each grid of the behavior recognition area, and synthesizing the content into a verification code picture; step 4, enabling the verification code server to send the verification code picture to the client; step 5, enabling the verification code server to receive K straight lines drawn by the user in the behavior identification area sent by the client; and step 6, enabling the verification code server to analyze and judge the K connection lines and feeding back a judgment result to the client.

Description

Technical field: [0001] The invention relates to a behavior verification code generation and verification method based on semantic recognition and connection, which is applied to the field of computer and information security. Background technique: [0002] The verification code is a public fully automatic program that distinguishes whether the user is a human or a machine. It can prevent machines from maliciously cracking passwords and crashing databases by running script programs to simulate human behavior, and prevent harmful transactions such as ticket swiping, wool extraction, malicious ordering, batch registration, and malicious attacks. Operate and protect the information security and property security of the website and various users. Traditional verification codes include pure letters, pure numbers, alphanumeric combinations, arithmetic calculations, etc., which are easily recognized by machine programs automatically. Since then, there has been a point-and-click ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/31G06F21/45
CPCG06F21/316G06F21/36G06F21/45G06F2221/2133
Inventor 钱小聪周煜申马寅晨杨璇刘会
Owner HUATIAN NANJING ENG & TECH CORP MCC