Behavior verification code generation and verification method based on semantic recognition and connection
A technology for semantic recognition and verification methods, which is applied in the fields of digital data authentication, instruments, and electrical digital data processing, and can solve problems such as troublesome use and unfriendliness.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] The verification code generation and verification process is as follows (see figure 2 ):
[0028] Step 1. The verification code server receives the verification code application from the verification code plug-in of the client.
[0029] Step 2: The verification code server randomly selects an object group from the object database, and randomly selects two object instances in the object group. Then, the server randomly selects (K-2) object groups from other object groups in the object database and randomly selects one object instance in each group. In this way, a total of K object instances are obtained, and only two of them belong to the same type, which are obviously related in semantics.
[0030] Step 3: The verification code server randomly assigns the K objects obtained in Step 2 to the K grids in the behavior recognition area, and records the mapping table between the K grids and the K objects. Then display the content assigned to the object in each grid of the...
Embodiment 2
[0038] The verification code generation and verification process is as follows (see figure 2 ):
[0039] Step 1. The verification code server receives the verification code application from the verification code plug-in of the client.
[0040] Step 2: The verification code server randomly selects an object group from the object database, and randomly selects two object instances in the object group. Then, the server randomly selects (K-2) object groups from other object groups in the object database and randomly selects one object instance in each group. In this way, a total of K object instances are obtained, and only two of them belong to the same type, which are obviously related in semantics.
[0041] Step 3: The verification code server randomly assigns the K objects obtained in Step 2 to the K grids in the behavior recognition area, and records the mapping table between the K grids and the K objects. Then display the content assigned to the object in each grid of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


