Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior verification code generation and verification method based on semantic recognition and connection

A technology for semantic recognition and verification methods, which is applied in the fields of digital data authentication, instruments, and electrical digital data processing, and can solve problems such as troublesome use and unfriendliness.

Pending Publication Date: 2021-07-30
HUATIAN NANJING ENG & TECH CORP MCC +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of machine vision technology, simple touch-screen verification codes can still be quickly recognized by machine programs. If you blindly increase the number of picture touches or increase the difficulty of semantic recognition, although the possibility of being recognized by machine programs can be reduced sex, but it also brings troubles and unfriendliness to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior verification code generation and verification method based on semantic recognition and connection
  • Behavior verification code generation and verification method based on semantic recognition and connection
  • Behavior verification code generation and verification method based on semantic recognition and connection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] The verification code generation and verification process is as follows (see figure 2 ):

[0028] Step 1. The verification code server receives the verification code application from the verification code plug-in of the client.

[0029] Step 2: The verification code server randomly selects an object group from the object database, and randomly selects two object instances in the object group. Then, the server randomly selects (K-2) object groups from other object groups in the object database and randomly selects one object instance in each group. In this way, a total of K object instances are obtained, and only two of them belong to the same type, which are obviously related in semantics.

[0030] Step 3: The verification code server randomly assigns the K objects obtained in Step 2 to the K grids in the behavior recognition area, and records the mapping table between the K grids and the K objects. Then display the content assigned to the object in each grid of the...

Embodiment 2

[0038] The verification code generation and verification process is as follows (see figure 2 ):

[0039] Step 1. The verification code server receives the verification code application from the verification code plug-in of the client.

[0040] Step 2: The verification code server randomly selects an object group from the object database, and randomly selects two object instances in the object group. Then, the server randomly selects (K-2) object groups from other object groups in the object database and randomly selects one object instance in each group. In this way, a total of K object instances are obtained, and only two of them belong to the same type, which are obviously related in semantics.

[0041] Step 3: The verification code server randomly assigns the K objects obtained in Step 2 to the K grids in the behavior recognition area, and records the mapping table between the K grids and the K objects. Then display the content assigned to the object in each grid of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a behavior verification code generation and verification method based on semantic recognition and connection. The method comprises the following steps: step 1, enabling a verification code server to receive a verification code application of a client; step 2, enabling the verification code server to randomly select two object instances from one object group of the object database; enabling the server to randomly pick out (K-2) object groups from other group objects of the object database and randomly select one object instance from each group; step 3, enabling the verification code server to randomly allocate the obtained K objects to K lattices of a predetermined behavior recognition area, and record a mapping table of the K lattices and the K objects; step 4, displaying the content distributed to the object in each grid of the behavior recognition area, and synthesizing the content into a verification code picture; step 5, enabling the verification code server to send the verification code picture to the client; step 6, enabling the verification code server to receive a connection line track collected by the client; and step 7, analyzing and judging the connection track of the verification code server.

Description

Technical field: [0001] The invention relates to a behavior verification code generation and verification method based on semantic recognition and connection, which is applied to the field of computer and information security. Background technique: [0002] The verification code is a public fully automatic program that distinguishes whether the user is a human or a machine. It can prevent machines from maliciously cracking passwords and crashing databases by running script programs to simulate human behavior, and prevent harmful transactions such as ticket swiping, wool extraction, malicious ordering, batch registration, and malicious attacks. Operate and protect the information security and property security of the website and various users. Traditional verification codes include pure letters, pure numbers, alphanumeric combinations, arithmetic calculations, etc., which are easily recognized by machine programs automatically. Since then, there has been a point-and-click ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/31G06F21/45
CPCG06F21/316G06F21/36G06F21/45G06F2221/2133
Inventor 钱小聪吴忠华黄丽萍刘会马寅晨
Owner HUATIAN NANJING ENG & TECH CORP MCC