Behavior verification code design method based on semantic recognition and multiple connection lines
A technology for semantic recognition and verification methods, applied in computing, digital data authentication, computer security devices, etc., and can solve problems such as unfriendly and troublesome use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] The generation and verification process of the verification code in this embodiment are as follows (see image 3 ):
[0024] Step 1. The verification code server receives the verification code application from the client.
[0025] Step 2: The verification code server randomly selects K object groups from the object database, and randomly selects 2 objects in each object group, and selects 2K objects in total.
[0026] Step 3: The verification code server randomly assigns the 2K objects selected in step 2 to the 2K grids in the behavior recognition area, and records the mapping table between the 2K grids and the 2K objects, as shown in Table 1. Then display the content assigned to the object in each grid of the behavior recognition area, and synthesize the verification code picture, such as figure 2 Shown (K=4 in this example).
[0027] grid number object number (1,1) (2,1) (1,2) (99,2) (1,3) (1,1) (1,4) (3,2) (2,1) (99,1) (2,...
Embodiment 2
[0033] The generation and verification process of the verification code in this embodiment are as follows (see image 3 ):
[0034] Step 1. The verification code server receives the verification code application from the client.
[0035] Step 2: The verification code server randomly selects K object groups from the object database, and randomly selects 2 objects in each object group, and selects 2K objects in total.
[0036] Step 3: The verification code server randomly assigns the 2K objects selected in step 2 to the 2K grids in the behavior recognition area, and records the mapping table between the 2K grids and the 2K objects, as shown in Table 1. Then display the content assigned to the object in each grid of the behavior recognition area, and synthesize the verification code picture, such as figure 2 Shown (K=4 in this example).
[0037] grid number object number (1,1) (2,1) (1,2) (99,2) (1,3) (1,1) (1,4) (3,2) (2,1) (99,1) (2,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


