CN104144052B - A kind of keyword verification method corresponding with picture or video among word - Google Patents
A kind of keyword verification method corresponding with picture or video among word Download PDFInfo
- Publication number
- CN104144052B CN104144052B CN201310168832.XA CN201310168832A CN104144052B CN 104144052 B CN104144052 B CN 104144052B CN 201310168832 A CN201310168832 A CN 201310168832A CN 104144052 B CN104144052 B CN 104144052B
- Authority
- CN
- China
- Prior art keywords
- word
- video
- keyword
- picture
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
A kind of keyword verification method corresponding with picture among word, verification is realized by clicking on picture.It is the list of one group of M picture composition below word for example, showing one group of word in log-in interface, user must correctly select the corresponding picture of the keyword among word could unlocker device.This design can make picture inherently advertisement or logo, while bringing advertising income, this verification method obviously has more preferable user experience, and has more advantage in mobile terminal, on the premise of it will not reduce people to the accuracy rate of image understanding, the ability of human-computer interaction is substantially increased.
Description
Technical field
The invention belongs to information technology and computer realm, more particularly to one kind to be generated based on ad content and logo
The system and method for checking information.
Background technology
In internet interactive system, there are a kind of automatic machine device, which can be automatically performed a certain function.Such as
Automatic register machine, can complete user's registration behavior, so as to register substantial amounts of user with Auto-writing whole log-on message;Compare again
Such as machine of posting automatically, it can post automatically in forum, money order receipt to be signed and returned to the sender, sends a large amount of waste advertisements or increase the integration of user.Therefore
The malicious attack of client computer is encountered in many websites sometimes, and the very common attack means of one of which are exactly identity spoofing.It is logical
Cross and write some codes in client script, then logged in repeatedly in website, forum etc. using its client computer, or attacker's wound
A forms are built, if its forms contains the identical field such as the forms registered with you or the forms posted, transmit data meeting
Corresponding establishment account is performed by server, the operation such as junk data is submitted, if server cannot be verified effectively simultaneously in itself
Refuse this illegal operation, it can seriously expend its system resource very much, and reducing web site performance even makes program crashing.
It is exactly using verification and the judgement of current trend accesses the mode that procedure site is validated user or malicious operation
Code technology.Common verification code technology is to provide a picture for including character string immediately for client, and user must read these
Character string, is then submitted with the forms for logging in forms or the user such as forms of posting creates.Because people can be easy to read
Go out the numeral in picture, but if being one section of client side attack code, it is difficult such a identifying code of identification to be by general means.
May insure current access in such a way is to come from a people rather than machine.Identifying code is usually to prevent someone from utilizing machine
The registration of device people automatic batch, constantly log in specific registered user with specific program Brute Force mode, poured water.Cause
It is a picture for being mixed with numeral or symbol for identifying code, human eye seems all hard, and machine recognition is got up just more difficult.
The content of the invention
With the development and usage for the software that can identify numeral, the security of identifying code is increasingly under suspicion, to find out its cause,
Automatic machine developer has more economic profit incentives, and inverse automata checking system is constantly in passive defence situation.
Existing inverse automata checking system is not only easier to crack, but also cannot bring economic interests to network operator, so for existing
A series of problems, the present invention is based on the keyword verification method corresponding with picture or video among one group of word, with solution
The defects of identifying code is easily identified in the prior art, and to be brought using the network operator of the inverse automata checking system of the present invention
Economic interests.
The present invention is coupled the resource of website and the demand of advertiser, is a branch of Internet advertising, both may be used
For improving brand names popularity, the picture in verification code system such as is made enterprise LOGO, or enterprise is specific
Advertising slogan or slogan platform is provided, the word in verification code system such as is made into hyperlink, clicks on and enters advertiser a surname
Pass the page.For the longer enterprise of those titles or product, identifying code advertisement is unfit to do, can also be contracted to its title
Write, to meet the capacity of identifying code, and provincialism enterprise can select the identifying code of provincialism website to carry out advertising.Enterprise
When identifying code advertisement is done in selection, media audiences and the target of enterprise or product of related web site identifying code are considered
The relation of audient, while can arrange in pairs or groups other media or non-medium, can such as select the environment above and below identifying code window to carry out
Relevant information supplement, to carry out advertising, realizes the optimum organization of resource to receive more preferable advertising results.
Identifying code generation, transmitting procedure 1
Step 1:Establish and realize that keyword among word is embedded or corresponding with information subsidiary outside picture with picture
Verification code system, including following mechanism:Subsystem is managed, receives and stores the word of upload, receives and stores the figure of upload
Piece, receives and stores word to the corresponding matched information of picture;Lower subsystems, embed or outer attached letter according to word and picture
Word and image content combination producing interaction identifying code are randomly selected in the matching requirement of breath, and interactive identifying code is dealt into client
Display;Verify subsystem, record and predetermined correct behavior of the user that contrast client returns with identifying code mutual-action behavior, obtain
To verification result.
Step 2:With the verification corresponding with information subsidiary outside be embedded in picture or picture of the keyword among word
Code system realizes that mouse clicks on picture and completes verification, its flow is as follows:User computer sends web-page requests URL to web server;
Web server concurrently returns user computer from storage unit extraction web data;User computer reads web data and performs embedded
Script in webpage;User computer sends URL request and extracts identifying code data to lower subsystems;Lower subsystems are taken out at random
Take N groups(N≥1)Word comprising set keyword and M picture file(Wherein include the corresponding picture of keyword, M >=4),
Identifying code data are synthesized, concurrently return user computer;User computer performs the identifying code script being illustrated in webpage;User fills in table
Dan Bingyu identifying codes are interactive to complete verification instruction, submission form;User computer remembers form data and user with identifying code interaction
Web server is beamed back in record;User and the interactive record of identifying code are issued verification subsystem by web server;Verify subsystem contrast
User interaction records and predetermined correct answer, is verified result;Verification result is beamed back web server by verification subsystem;web
Server beams back corresponding list to user computer and submits results web page according to verification result.
Identifying code generation, transmitting procedure 2
Step 1:Establish and realize that keyword among word is embedded or corresponding with information subsidiary outside video with video
Verification code system, including following mechanism:Subsystem is managed, the word of upload is received and stored, receives and stores regarding for upload
Frequently, word is received and stored to the corresponding matched information of video;Lower subsystems, embed or outer attached letter according to word and video
Word and video content combination producing interaction identifying code are randomly selected in the matching requirement of breath, and interactive identifying code is dealt into client
Display;Verify subsystem, record and predetermined correct behavior of the user that contrast client returns with identifying code mutual-action behavior, obtain
To verification result.
Step 2:With the verification corresponding with information subsidiary outside be embedded in video or video of the keyword among word
Code system realizes that mouse clicks on video and completes verification, its flow is as follows:User computer sends web-page requests URL to web server;
Web server concurrently returns user computer from storage unit extraction web data;User computer reads web data and performs embedded
Script in webpage;User computer sends URL request and extracts identifying code data to lower subsystems;Lower subsystems are taken out at random
Take N groups(N≥1)Word comprising set keyword and M video file(Wherein include the corresponding video of keyword, M >=4),
Identifying code data are synthesized, concurrently return user computer;User computer performs the identifying code script being illustrated in webpage;User fills in table
Dan Bingyu identifying codes are interactive to complete verification instruction, submission form;User computer remembers form data and user with identifying code interaction
Web server is beamed back in record;User and the interactive record of identifying code are issued verification subsystem by web server;Verify subsystem contrast
User interaction records and predetermined correct answer, is verified result;Verification result is beamed back web server by verification subsystem;web
Server beams back corresponding list to user computer and submits results web page according to verification result.
Embodiment 1
A kind of keyword among word is corresponding with information embedded in picture, clicks on picture verification and knows method for distinguishing.
User obtains N group words, wherein marked with the relevant keyword of picture by emphasis, user need to click in M picture with key
The corresponding picture of word.
Embodiment 2
A kind of keyword among word is corresponding with information embedded in video, clicks on video verification and knows method for distinguishing.
User obtains N group words, wherein marked with the relevant keyword of video by emphasis, user need to click in M video with key
The corresponding video of word.
Embodiment 3
A kind of keyword among word is corresponding with information subsidiary outside picture, and the picture affiliated by click information corresponds to
Know method for distinguishing.User obtains N group words, wherein being marked with the relevant keyword of picture by emphasis, user needs to click on M figure
The picture of subsidiary external information in piece, and this information be with keyword corresponding to it is matched.
Embodiment 4
A kind of keyword among word is corresponding with information subsidiary outside video, and the video affiliated by click information corresponds to
Know method for distinguishing.User obtains N group words, wherein being marked with the relevant keyword of video by emphasis, user needs click M to regard
The video of subsidiary external information in frequency, and this information be with keyword corresponding to it is matched.
This design can make the inherently advertisement or logo of picture, video, this while bringing advertising income
Verification method can make interface only show one group of word every time, and middle keyword is clearly simple, and user need to only click on key every time
Picture, the video of insertion or outer attached checking information corresponding to word, without considering further that sequence, so obviously there is more preferable user's body
Test, and advantage is had more in mobile terminal.
This invention contains multiple authentication mechanism, i.e., must be corresponded to by the keyword repeatedly among correct identification word
, picture, the video of embedded or outer attached checking information are verified, could obtain the access rights of system.
The above is merely to preferably describe and explain the principle of the present invention, and should not be construed as the present invention and only limit to
In the details of foregoing description.It should be pointed out that for those skilled in the art, the principle of the invention is not being departed from
On the premise of, some improvements and modifications can also be made, these improvements and modifications should also be considered as protection scope of the present invention.
Embodiment 1
Step 1:User computer transmit a request to web server, while username and password is inputted, user computer hair
Request is sent to lower subsystems extraction identifying code data.
Step 2:User clicks on " put this and obtain identifying code " after the necessary content filled in such as input username and password,
So as to activate identifying code script.
Step 3:Activation identifying code script, that is, user computer transmit a request to lower subsystems extraction identifying code data, downloads
Subsystem randomly selects N groups(Here N=4)Word comprising set keyword and the M internal picture file for being embedded with information(Its
In include the corresponding picture of set keyword, M=9 here), identifying code data are synthesized, concurrently return user computer.
For example, N group words(N=4)For " wearing gloomy horse, be exactly gloomy horse "(" gloomy horse " two word special-effect such as increases bottom herein
Color highlights, similarly hereinafter);" 58 same cities, a magical website ";" be afraid of that Wang Laoji " is drunk in excessive internal heat;" receive present and only receive melatonin ".
On the right side of word(Or downside)There is M picture(M=9), have been inserted into checking information, such as word respectively in M picture
" KFC ", " masses ", " Baidu ", " gloomy horse ", " association ", " Coca-Cola ", " melatonin ", " 58 same city ", " Wang Laoji ".
It is corresponding with keyword that unique verification information is included per pictures, is made as user's basis for estimation, and with other pictures
For diacritics.
Step 4:In the identifying code script that word and picture form, N group words occur successively, once occur one group, and M
A picture immobilizes, and once all shows.
Such as user chooses right side according to first group of word " wearing gloomy horse, exactly gloomy horse " of appearance(Or downside)One
Picture is corresponding, that is, clicks on the picture of embedded " gloomy horse " two words.Click on no matter correctness, first group of text transform is the
Two groups of words, such as " Wang Laoji " is drunk in fearness excessive internal heat, and user is corresponding again according to word one pictures of selection, that is, clicks on insertion
" Wang Laoji " triliteral picture.And so on, until user is according to the N group words of appearance, all correspondence is selected in M picture
Bi Yihou is taken, identifying code script automatically retracts.
Step 5:User and the interactive record of identifying code are issued verification subsystem by web server, and verification subsystem contrast is used
The interactive record in family and predetermined correct answer, are verified result.
Step 6:Verification result is beamed back web server by verification subsystem, and web server is such as correct according to verification result,
I.e. all correct corresponding selection, web server beam back corresponding results web page to N groups to user computer;Such as mistake,(1)Clicking on
During there is mistake, user is receivable to mutually, it should be mentioned that then clicking on corresponding button, and request is issued download by web server
Subsystem, lower subsystems will extract one group of new identifying code data sending again to user computer;(2)After identifying code is completed
It is prompted mistake so as to which the results web page that web server is beamed back cannot be received, can continues to click on " put this and obtain identifying code ", so that
Reactivate identifying code script.
Embodiment 2
Step 3:Activation identifying code script, that is, user computer transmit a request to lower subsystems extraction identifying code data, downloads
Subsystem randomly selects N groups(Here N=4)Word comprising set keyword and the M internal video file for being embedded with information(Its
In include the corresponding video of set keyword, M=9 here), identifying code data are synthesized, concurrently return user computer.
For example, N group words(N=4)For " wearing gloomy horse, be exactly gloomy horse "(" gloomy horse " two word special-effect such as increases bottom herein
Color highlights, similarly hereinafter);" 58 same cities, a magical website ";" be afraid of that Wang Laoji " is drunk in excessive internal heat;" receive present and only receive melatonin ".
On the right side of word(Or downside)There are the M static videos not being activated(M=9), had been inserted into respectively in M video
Checking information, as word " KFC ", " masses ", " Baidu ", " gloomy horse ", " association ", " Coca-Cola ", " melatonin ", " 58 is same
City ", " Wang Laoji ".
Each video is corresponding with keyword comprising unique verification information, makees as user's basis for estimation, and with other videos
For diacritics.
Step 4:In the identifying code script that word and video form, N group words occur successively, once occur one group.And M
A video immobilizes, automatic every time in M video to play Q with the conversion of every group of word(1≤Q≤M)Video, wherein
The information that one dynamic video is internally embedded be it is corresponding with the word that occurred at that time,(Q-1)A dynamic video is internally embedded
Information be then not associated with the word occurred at that time or the degree of association is extremely small.Remaining video is in not being activated
Inactive state.
Such as user chooses right side according to first group of word " wearing gloomy horse, exactly gloomy horse " of appearance(Or downside)One
Video is corresponding, i.e., should click on the dynamic video of embedded " gloomy horse " two words.Click on no matter correctness, be previously in dynamic
Q video recovery it is static, and(M-1)Occur that quantity is not more than the dynamic video of Q in a video again.First group of text at the same time
Word is transformed to second group of word, such as " Wang Laoji " is drunk in fearness excessive internal heat, and user chooses a dynamic video and its again according to word
It is corresponding, that is, click on embedded " Wang Laoji " triliteral video.And so on, until user is according to the N group words of appearance, at M
All corresponded in video after selection finishes, identifying code script automatically retracts.
Remaining step is the same as embodiment 1.
Embodiment 3
Step 3:Activation identifying code script, that is, user computer transmit a request to lower subsystems extraction identifying code data, downloads
Subsystem randomly selects N groups(Here N=4)The picture file of word and M comprising set keyword a subsidiary external information(Its
In include the corresponding picture of set keyword, M=9 here), identifying code data are synthesized, concurrently return user computer.
For example, N group words(N=4)For " wearing gloomy horse, be exactly gloomy horse "(" gloomy horse " two word special-effect such as increases bottom herein
Color highlights, similarly hereinafter);" 58 same cities, a magical website ";" be afraid of that Wang Laoji " is drunk in excessive internal heat;" receive present and only receive melatonin ".
On the right side of word(Or downside)There is M picture(M=9), it is accompanied with checking information, such as word respectively outside M picture
" KFC ", " masses ", " Baidu ", " gloomy horse ", " association ", " Coca-Cola ", " melatonin ", " 58 same city ", " Wang Laoji ".
It is corresponding with keyword that unique verification information is attached per pictures, is made as user's basis for estimation, and with other pictures
For diacritics.
Step 4:In the identifying code script that word and picture form, N group words occur successively, once occur one group, and M
A picture immobilizes, and once all shows.
Such as user chooses right side according to first group of word " wearing gloomy horse, exactly gloomy horse " of appearance(Or downside)One
Picture is corresponding, that is, clicks on the picture of outer attached " gloomy horse " two words.Click on no matter correctness, first group of text transform is the
Two groups of words, such as " Wang Laoji " is drunk in fearness excessive internal heat, and user is corresponding again according to word one pictures of selection, that is, is clicked on outer attached
" Wang Laoji " triliteral picture.And so on, until user is according to the N group words of appearance, all correspondence is selected in M picture
Bi Yihou is taken, identifying code script automatically retracts.
Remaining step is the same as embodiment 1.
Embodiment 4
Step 3:Activation identifying code script, that is, user computer transmit a request to lower subsystems extraction identifying code data, downloads
Subsystem randomly selects N groups(Here N=4)The video file of word and M comprising set keyword a subsidiary external information(Its
In include the corresponding video of set keyword, M=9 here), identifying code data are synthesized, concurrently return user computer.
For example, N group words(N=4)For " wearing gloomy horse, be exactly gloomy horse "(" gloomy horse " two word special-effect such as increases bottom herein
Color highlights, similarly hereinafter);" 58 same cities, a magical website ";" be afraid of that Wang Laoji " is drunk in excessive internal heat;" receive present and only receive melatonin ".
On the right side of word(Or downside)There are the M static videos not being activated(M=9), it is accompanied with respectively outside M video
Checking information, as word " KFC ", " masses ", " Baidu ", " gloomy horse ", " association ", " Coca-Cola ", " melatonin ", " 58 is same
City ", " Wang Laoji ".
It is corresponding with keyword that each video attach unique verification information, as user's basis for estimation, and with other videos work
For diacritics.
Step 4:In the identifying code script that word and video form, N group words occur successively, once occur one group.And M
A video immobilizes, automatic every time in M video to play Q with the conversion of every group of word(1≤Q≤M)Video, wherein
Subsidiary information is corresponding with the word that occurred at that time outside one dynamic video,(Q-1)It is subsidiary outside a dynamic video
Information be then not associated with the word occurred at that time or the degree of association is extremely small.Remaining video is in not being activated
Inactive state.
Such as user chooses right side according to first group of word " wearing gloomy horse, exactly gloomy horse " of appearance(Or downside)One
Video is corresponding, i.e., should click on the dynamic video of outer attached " gloomy horse " two words.Click on no matter correctness, be previously in dynamic
Q video recovery it is static, and(M-1)Occur that quantity is not more than the dynamic video of Q in a video again.First group of text at the same time
Word is transformed to second group of word, such as " Wang Laoji " is drunk in fearness excessive internal heat, and user chooses a dynamic video and its again according to word
It is corresponding, that is, click on outer attached " Wang Laoji " triliteral video.And so on, until user is according to the N group words of appearance, at M
All corresponded in video after selection finishes, identifying code script automatically retracts.
Remaining step is the same as embodiment 1.
9 pictures or video provided in embodiment, certainly for can be M picture or video for the present invention, M >=
1, one of those or it is several can also be the contents such as landscape, film, as long as ensure a picture or video it is corresponding with keyword
, remaining picture or video content are unlimited.
The N provided in embodiment is 4, this is only to facilitate explanation, and situations of the N not equal to 4 is also containing in the present invention.
Claims (7)
1. the keyword among a kind of word is corresponding with picture, the method for realizing verification by clicking on picture, it is characterised in that bag
Include:
Step 1:The keyword verification code system corresponding with information embedded in picture realized among word is established, including it is as follows
Mechanism:Subsystem is managed, receives and stores the word of upload, receives and stores the picture of upload, receives and stores word to figure
The corresponding matched information of embedded information in piece;Lower subsystems, according to the matching requirement of embedding information in word and picture with
Machine extracts word and image content combination producing interaction identifying code, and interactive identifying code is dealt into client and is shown;Verify subsystem
System, record and predetermined correct behavior of the user that contrast client returns with identifying code mutual-action behavior, is verified result;
Step 2:Realize that mouse is clicked on the verification code system corresponding with information embedded in picture of the keyword among word
Picture completes verification, its flow is as follows:User computer sends a web page request to web server;Web server is carried from storage unit
Web data is taken concurrently to return user computer;User computer reads web data and performs the script being embedded in webpage;User's electricity
Brain transmit a request to lower subsystems extraction identifying code data;Lower subsystems randomly select the text that N groups include set keyword
Word and the M internal picture file for being embedded with information, wherein including the corresponding picture of set keyword, M >=4, N >=1, synthesis verification
Code data, concurrently return user computer;User obtains N group words, wherein being marked with the relevant keyword of picture by emphasis, Yong Huxu
Picture corresponding with keyword in M picture is clicked on, between information and keyword that this " correspondence " is embedded in for picture
With relation;User computer performs the identifying code script being illustrated in webpage;User fills in list and is tested with the interactive completion of identifying code
Card instruction, submission form;Form data and user are beamed back web server by user computer with the interactive record of identifying code;Web services
User and the interactive record of identifying code are issued verification subsystem by device;Verify subsystem contrast user interaction record and make a reservation for correct return
Answer, be verified result;Verification result is beamed back web server by verification subsystem;Web server is according to verification result, Xiang Yong
Family computer beams back corresponding list and submits results web page.
2. the keyword among a kind of word is corresponding with video, the method for realizing verification by clicking on video, it is characterised in that bag
Include:
Step 1:The keyword verification code system corresponding with information embedded in video realized among word is established, including it is as follows
Mechanism:Manage subsystem, receive and store the word of upload, receive and store the video of upload, receive and store word to regarding
The corresponding matched information of embedded information in frequency;Lower subsystems, according to the matching requirement of embedding information in word and video with
Machine extracts word and video content combination producing interaction identifying code, and interactive identifying code is dealt into client and is shown;Verify subsystem
System, record and predetermined correct behavior of the user that contrast client returns with identifying code mutual-action behavior, is verified result;
Step 2:Realize that mouse is clicked on the verification code system corresponding with information embedded in video of the keyword among word
Video completes verification, its flow is as follows:User computer sends a web page request to web server;Web server is carried from storage unit
Web data is taken concurrently to return user computer;User computer reads web data and performs the script being embedded in webpage;User's electricity
Brain transmit a request to lower subsystems extraction identifying code data;Lower subsystems randomly select the text that N groups include set keyword
Word and the M internal video file for being embedded with information, wherein including the corresponding video of set keyword, M >=4, N >=1, synthesis verification
Code data, concurrently return user computer;User obtains N group words, wherein being marked with the relevant keyword of video by emphasis, Yong Huxu
Video corresponding with keyword in M video is clicked on, between information and keyword that this " correspondence " is embedded in for video
With relation;User computer performs the identifying code script being illustrated in webpage;User fills in list and is tested with the interactive completion of identifying code
Card instruction, submission form;Form data and user are beamed back web server by user computer with the interactive record of identifying code;Web services
User and the interactive record of identifying code are issued verification subsystem by device;Verify subsystem contrast user interaction record and make a reservation for correct return
Answer, be verified result;Verification result is beamed back web server by verification subsystem;Web server is according to verification result, Xiang Yong
Family computer beams back corresponding list and submits results web page.
3. the keyword among a kind of word is corresponding with picture, the method for realizing verification by clicking on picture, it is characterised in that bag
Include:
Step 1:The keyword verification code system corresponding with information subsidiary outside picture realized among word is established, including it is as follows
Mechanism:Subsystem is managed, receives and stores the word of upload, receives and stores the picture of upload, receives and stores word to figure
The corresponding matched information of subsidiary information outside piece;Lower subsystems, according to the matching of information subsidiary outside word and picture requirement
Word and image content combination producing interaction identifying code are randomly selected, and interactive identifying code is dealt into client and is shown;Verification
System, record and predetermined correct behavior of the user that contrast client returns with identifying code mutual-action behavior, is verified result;
Step 2:Realize that mouse is clicked on the verification code system corresponding with information subsidiary outside picture of the keyword among word
Picture completes verification, its flow is as follows:User computer sends a web page request to web server;Web server is carried from storage unit
Web data is taken concurrently to return user computer;User computer reads web data and performs the script being embedded in webpage;User's electricity
Brain transmit a request to lower subsystems extraction identifying code data;Lower subsystems randomly select the text that N groups include set keyword
The picture file of word and M exterior incidental information, wherein including the corresponding picture of set keyword, M >=4, N >=1, synthesis verification
Code data, concurrently return user computer;User obtains N group words, wherein being marked with the relevant keyword of picture by emphasis, Yong Huxu
Click on picture corresponding with keyword in M picture, of this " correspondence " between information and keyword subsidiary outside picture
With relation;User computer performs the identifying code script being illustrated in webpage;User fills in list and is tested with the interactive completion of identifying code
Card instruction, submission form;Form data and user are beamed back web server by user computer with the interactive record of identifying code;Web services
User and the interactive record of identifying code are issued verification subsystem by device;Verify subsystem contrast user interaction record and make a reservation for correct return
Answer, be verified result;Verification result is beamed back web server by verification subsystem;Web server is according to verification result, Xiang Yong
Family computer beams back corresponding list and submits results web page.
4. the keyword among a kind of word is corresponding with video, the method for realizing verification by clicking on video, it is characterised in that bag
Include:
Step 1:The keyword verification code system corresponding with information subsidiary outside video realized among word is established, including it is as follows
Mechanism:Manage subsystem, receive and store the word of upload, receive and store the video of upload, receive and store word to regarding
The corresponding matched information of the outer subsidiary information of frequency;Lower subsystems, according to the matching of information subsidiary outside word and video requirement
Word and video content combination producing interaction identifying code are randomly selected, and interactive identifying code is dealt into client and is shown;Verification
System, record and predetermined correct behavior of the user that contrast client returns with identifying code mutual-action behavior, is verified result;
Step 2:Realize that mouse is clicked on the verification code system corresponding with information subsidiary outside video of the keyword among word
Video completes verification, its flow is as follows:User computer sends a web page request to web server;Web server is carried from storage unit
Web data is taken concurrently to return user computer;User computer reads web data and performs the script being embedded in webpage;User's electricity
Brain transmit a request to lower subsystems extraction identifying code data;Lower subsystems randomly select the text that N groups include set keyword
The video file of word and M exterior incidental information, wherein including the corresponding video of set keyword, M >=4, N >=1, synthesis verification
Code data, concurrently return user computer;User obtains N group words, wherein being marked with the relevant keyword of video by emphasis, Yong Huxu
Click on video corresponding with keyword in M video, of this " correspondence " between information and keyword subsidiary outside video
With relation;User computer performs the identifying code script being illustrated in webpage;User fills in list and is tested with the interactive completion of identifying code
Card instruction, submission form;Form data and user are beamed back web server by user computer with the interactive record of identifying code;Web services
User and the interactive record of identifying code are issued verification subsystem by device;Verify subsystem contrast user interaction record and make a reservation for correct return
Answer, be verified result;Verification result is beamed back web server by verification subsystem;Web server is according to verification result, Xiang Yong
Family computer beams back corresponding list and submits results web page.
5. the verification method corresponding with video of the keyword among a kind of word as described in claim 2, one of 4, M therein
" video " in a video includes flash.
6. the verification method corresponding with picture or video of the keyword among a kind of word as described in one of claim 1-4,
Embedded information in keyword and picture wherein among word, information embedded in keyword and video among word include
In have:Word, numeral, poster, figure, enterprise's mark, product picture and flash.
7. the verification method corresponding with picture or video of the keyword among a kind of word as described in one of claim 1-4,
Subsidiary information outside keyword and picture wherein among word, information subsidiary outside keyword and video among word include
In have:Word, numeral, poster, figure, enterprise's mark, product picture and flash.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310168832.XA CN104144052B (en) | 2013-05-10 | 2013-05-10 | A kind of keyword verification method corresponding with picture or video among word |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310168832.XA CN104144052B (en) | 2013-05-10 | 2013-05-10 | A kind of keyword verification method corresponding with picture or video among word |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104144052A CN104144052A (en) | 2014-11-12 |
CN104144052B true CN104144052B (en) | 2018-05-01 |
Family
ID=51853124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310168832.XA Expired - Fee Related CN104144052B (en) | 2013-05-10 | 2013-05-10 | A kind of keyword verification method corresponding with picture or video among word |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104144052B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106156597A (en) * | 2015-04-16 | 2016-11-23 | 深圳市腾讯计算机系统有限公司 | The implementation method of a kind of identifying code, and device |
CN105955649A (en) * | 2016-04-29 | 2016-09-21 | 湖南博广信息科技有限公司 | Slide unlocking-based advertisement display method |
CN105847293B (en) * | 2016-05-20 | 2019-05-14 | 深圳市金立通信设备有限公司 | A kind of method and terminal for realizing system login based on image recognition |
CN106066997A (en) * | 2016-05-27 | 2016-11-02 | 立德高科(昆山)数码科技有限责任公司 | Mark and recognition mark with zoning are with the method logging in specified page |
CN105978905A (en) * | 2016-07-03 | 2016-09-28 | 韦建峰 | Keyword verification method and generation device thereof |
CN108537009B (en) * | 2017-03-03 | 2022-03-04 | 绍兴读图网络科技有限公司 | Method and system for downloading picture and verifying original edition |
CN107181752B (en) * | 2017-06-05 | 2018-12-18 | 咪咕数字传媒有限公司 | A kind of verification method, device and storage medium |
CN107786887B (en) * | 2017-10-10 | 2020-07-31 | 北京奇艺世纪科技有限公司 | Method and device for displaying display information |
US10885176B2 (en) * | 2018-06-11 | 2021-01-05 | International Business Machines Corporation | Image based passphrase for authentication |
CN113543134B (en) * | 2021-09-14 | 2022-01-04 | 广州讯鸿网络技术有限公司 | Video verification code authentication system, method and device based on 5G message |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004998A (en) * | 2010-12-03 | 2011-04-06 | 朱平 | System and method for realizing advertising based on computer identifying code carrier |
CN102737122A (en) * | 2012-06-08 | 2012-10-17 | 浙江大学 | Method for extracting verification code image from webpage |
CN102750892A (en) * | 2012-01-16 | 2012-10-24 | 青岛印象派信息技术有限公司 | Video verification code advertising system |
CN102761611A (en) * | 2012-06-29 | 2012-10-31 | 宋超 | Method for verifying verification code of Cloud platform graph |
CN103095670A (en) * | 2012-02-06 | 2013-05-08 | 青岛印象派信息技术有限公司 | Method and system for achieving advertisement verification code |
-
2013
- 2013-05-10 CN CN201310168832.XA patent/CN104144052B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004998A (en) * | 2010-12-03 | 2011-04-06 | 朱平 | System and method for realizing advertising based on computer identifying code carrier |
CN102750892A (en) * | 2012-01-16 | 2012-10-24 | 青岛印象派信息技术有限公司 | Video verification code advertising system |
CN103095670A (en) * | 2012-02-06 | 2013-05-08 | 青岛印象派信息技术有限公司 | Method and system for achieving advertisement verification code |
CN102737122A (en) * | 2012-06-08 | 2012-10-17 | 浙江大学 | Method for extracting verification code image from webpage |
CN102761611A (en) * | 2012-06-29 | 2012-10-31 | 宋超 | Method for verifying verification code of Cloud platform graph |
Also Published As
Publication number | Publication date |
---|---|
CN104144052A (en) | 2014-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104144052B (en) | A kind of keyword verification method corresponding with picture or video among word | |
US8572756B2 (en) | Captcha method and system | |
CN101977194B (en) | Third-party verification code system and third-party verification code provision method | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
CN102682009B (en) | Method and system for logging in webpage | |
CN103220344B (en) | Microblogging licenses method and system | |
CN101771676B (en) | Setting and authentication method for cross-domain authorization and relevant device and system | |
CN102047281A (en) | CAPTCHA advertising | |
CN104283885B (en) | A kind of implementation method of many SP secure bindings based on intelligent terminal local authentication | |
CN105610810A (en) | Data processing method, client and servers | |
US20150278508A1 (en) | Transmission of an application download via an encoded image | |
CN102843311A (en) | Information fusion method and information fusion server based on social networking services (SNS) | |
US8613059B2 (en) | Methods, systems and computer program products for secure access to information | |
CN102867025A (en) | Method and device for acquiring picture marking data | |
CN106357699A (en) | Network system, service platform and login method and system of service platform | |
CN101251918A (en) | Advertisement content creating verification information system and method | |
CN105743905B (en) | A kind of method that realizing secure log, unit and system | |
US20140020079A1 (en) | Method for providing network service and apparatus thereof | |
US10063659B2 (en) | Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download | |
CN102413074A (en) | Method for detecting login of instant messenger terminal in another place | |
CN103095670A (en) | Method and system for achieving advertisement verification code | |
CN105978994B (en) | A kind of login method of web oriented system | |
US10614417B2 (en) | System and method for electronic lead verification | |
WO2015002899A2 (en) | Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download | |
CN103841154B (en) | Network media information dissemination method, system and client |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180501 Termination date: 20190510 |