CN110443027A - Generation verification method and device, the electronic product of identifying code - Google Patents
Generation verification method and device, the electronic product of identifying code Download PDFInfo
- Publication number
- CN110443027A CN110443027A CN201910751045.5A CN201910751045A CN110443027A CN 110443027 A CN110443027 A CN 110443027A CN 201910751045 A CN201910751045 A CN 201910751045A CN 110443027 A CN110443027 A CN 110443027A
- Authority
- CN
- China
- Prior art keywords
- interference
- code
- coding
- field
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
This application involves verification code technology fields, a kind of generation verification method of identifying code is disclosed, including step 1, show identifying code display area, the identifying code display area includes at least: code to be verified, including corresponding first coding of the first field and first field, first interference, including corresponding second coding of the second field and second field, second coding includes first coding and the first interference code, second interference, including third field and the corresponding third coding of the third field, the third coding includes first coding and the second interference code, wherein, the code to be verified is configured between first interference and second interference, verification command, input the first corresponding field of first coding;Step 2 determines whether first field of user's input is correct.The generation verifying device and electronic equipment of a kind of identifying code is also disclosed in the application.
Description
Technical field
This application involves fields of communication technology, such as are related to the generation verification method and device, electronics production of a kind of identifying code
Product.
Background technique
Identifying code (CAPTCHA) is " Completely Automated Public Turing test to tell
The abbreviation of Computers and Humans Apart " (the full-automatic turing test for distinguishing computer and the mankind), is a kind of area
Point access requestor is computer program or the public full auto-programs of people, is commonly used to prevent the programs such as wooden horse malice from cracking close
Code, brush screen, forum such as pour water at the behaviors, in order to prevent some hacker to certain particular registered user specific program violences
It the modes such as cracks and is constantly logged in trial.Identifying code is usually to be made of some lines and some irregular characters, main
If hacker takes the laggard pirate of code dataization in order to prevent.
During realizing the embodiment of the present disclosure, at least there are the following problems in the related technology: existing verifying for discovery
Code is easy to influence the safety of user information by malicious code Brute Force.
Summary of the invention
In order to which some aspects of the embodiment to disclosure have basic understanding, simple summary is shown below.It is described general
Including is not extensive overview, nor to determine key/critical component or describe the protection scope of these embodiments, but is made
For the preamble of following detailed description.
The embodiment of the present disclosure provides the generation verification method and device, electronic product of a kind of identifying code, existing to solve
Identifying code the technical issues of being easy by malicious code Brute Force, influencing user information safety.
The embodiment of the present disclosure provides a kind of generation verification method of identifying code.
In some embodiments, the generation verification method of the identifying code includes: step 1, shows identifying code viewing area
Domain, the identifying code display area include at least: code to be verified, including the first field and first field corresponding first are compiled
Code, the first interference, including the second field and corresponding second coding of second field, second coding includes described first
Coding and the first interference code, the second interference, including third field and the corresponding third coding of the third field, the third are compiled
Code includes first coding and the second interference code, wherein the code to be verified is configured at first interference and described second
Between interference, verification command inputs the first corresponding field of first coding;Step 2 determines the described of user's input
Whether the first field is correct.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code.
In some embodiments, the generation verifying device of the identifying code includes: display module, for showing that identifying code is aobvious
Show that region, the identifying code display area include at least: code to be verified, including the first field and first field corresponding
One coding, the first interference, including the second field and corresponding second coding of second field, second coding includes described
First coding and the first interference code, the second interference, including third field and the third field corresponding third coding, described the
Three coding include it is described first coding and the second interference code, wherein the code to be verified be configured at it is described first interference with it is described
Between second interference, verification command inputs the first corresponding field of first coding;Correction verification module, for determining user
Whether first field of input is correct.
The embodiment of the present disclosure provides a kind of electronic product, including processor and the memory for being stored with program instruction, also
Device is verified in generation including identifying code.
The generation verification method and device, electronic product for the identifying code that the embodiment of the present disclosure provides, may be implemented following skill
Art effect:
The generation verification method for the identifying code that the embodiment of the present disclosure provides, using the first interference and the second interference as dry
It disturbs, reduces the probability of the malicious code Brute Force identifying code, improve the safety of user information.
Above general description and it is discussed below be only it is exemplary and explanatory, be not used in limitation the application.
Detailed description of the invention
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing
The restriction to embodiment is not constituted, the element with same reference numbers label is shown as similar element in attached drawing, and attached drawing is not
Composition limitation, and wherein:
Fig. 1 is the schematic diagram for generating the identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 2 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 3 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 4 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 5 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 6 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 7 is the structural schematic diagram for the electronic equipment that the embodiment of the present disclosure provides.
Appended drawing reference:
100: processor;101: memory;102: communication interface;103: bus.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, with reference to the accompanying drawing to this public affairs
The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the embodiment of the present disclosure.
In technical description below, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details.
However, one or more embodiments still can be implemented in the case where without these details.It in other cases, is simplification
Attached drawing, well known construction and device can simplify displaying.Multiple embodiments that the embodiment of the present disclosure provides, can be combined with each other.
The embodiment of the present disclosure provides a kind of generation verification method method of identifying code, comprising:
S101 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field
The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, wherein
Second coding includes the first coding and the first interference code, verification command, the first corresponding field of the first coding of input;
Optionally, " code to be verified " may also be referred to as " identifying code to be verified ".The first field in code to be verified can be with
To include Chinese character, English alphabet and/or the field of punctuation mark, the first coding can be include Arabic numerals, English
The coding of letter and/or punctuation mark;It is similar, the first interference code in the first interference can be include Arabic numerals,
The coding of English alphabet and/or punctuation mark, the second field can be include Chinese character, English alphabet and/or punctuation mark
Field;Wherein, the first field is not equal to the second field.
Verification command, the first corresponding field of the first coding of input.It is understood that verification command herein is aobvious
Show the text in identifying code display area, not to the description of user action.It will also be appreciated that verification command herein is only
It is the semanteme in order to describe the order, the verification command specifically generated in the text can be different.
" the first coding " when malicious code attempts to crack identifying code by way of keyword search, in verification command
It can be used as the keyword that malicious code scans for, keyword is referred to as crucial coding, however, due to same in the first interference
Sample includes " the first coding " this keyword in code to be verified, and, the first coding the first field corresponding with the second coding
Different from the second field, what malicious code was possible to obtain is corresponding second field of the second coding, when detecting verification command
In the first field input error when, then regenerate new identifying code.As it can be seen that the generation for the identifying code that the embodiment of the present disclosure provides
Verification method reduces the safety that user information is improved by the probability of malicious code Brute Force.
S102 determines whether the first field of user's input is correct.
When the first field for detecting user's input is correct, then by verifying, when the first word for detecting user's input
When section is incorrect, then new identifying code is regenerated.
The embodiment of the present disclosure to the application scenarios of the identifying code of generation with no restriction, for example, what the embodiment of the present disclosure provided
Identifying code can be applied to the verifying carried out when user carries out online purchase train ticket by 12306.
It optionally, include the first interference field in the second field, the first interference field and the first field constitute consecutive word
Section, continuation field herein can be with field clear and coherent in Chinese, for example, the first interference field may include the Arabic number of capitalization
Word, surname etc..For example, the first field in code to be verified can be " student ", the first coding can be " 10 ", generation it is to be tested
Demonstrate,proving code can be " student 10 ", and the second field in the first interference can be for " one class of student ", " junior middle school student " or " university is learned
It is raw ", the second coding can be " 101 ", " 102 " or " 103 ", and the first interference of generation can be " one class of student 101 ", " junior middle school
Student 102 " or " university student 103 ".For another example the first field in code to be verified can be " teacher ", the first coding can be with
For " 20 ", the code to be verified of generation can be " teacher 20 ", and the second field in the first interference can be " Mr. Zhang ", " Liu is old
Teacher " or " Li Laoshi ", the second coding can be " 201 ", " 202 " or " 203 ", and the first interference of generation can be " Mr. Zhang
201 ", " Liu Laoshi 202 " or " Li Laoshi 203 ".
Optionally, the first field in identifying code display area, code to be verified and the display mode of the first coding can be with
For character string, that is, the first field constitutes one section of continuous first character string with the first coding, e.g., when the first field is located at first
When before coding, the display mode of the first character string is " the first field+the first coding ";After the first field is located at the first coding
When, the display mode of the first character string is " first the+the first field of coding ";It is similar, the second field in the first interference and the
The display mode of two codings may be character string, that is, and the second field constitutes one section of continuous second character string with the second coding,
Such as, when the second field is located at before the second coding, the display mode of the second character string is " the second field+the second coding ";When
When two fields are after the second coding, the display mode of the second character string is " second the+the second field of coding ".
As shown in Figure 1, code to be verified is " student 10 ", the first interference is " one class of student 101 ", and verification command is " to ask defeated
Enter Chinese character corresponding to " 10 " ", in code to be verified, " 10 " corresponding Chinese character is student, the then information that user inputs in input frame
Should be " student ".When malicious code cracks the identifying code, due to equally including " 10 " this key in " 101 "
Word, and " 101 " corresponding Chinese character is " one class of student ", improves the interference to malicious code.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified
The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the
One coding lower part.The display mode of corresponding second coding of the second field and the second field in first interference is to continuously display,
For example, being shown in the form of character string.As shown in Fig. 2, the first field " student " to be verified is shown up and down with the first coding " 10 "
Show, reduce continuity, the correspondence of the first field with the first coding, it is corresponding by malicious code success to reduce the first field
Probability;The second field " one class of student " in first interference is continuously displayed with the second coding " 101 ", is improved in the first interference
Second field improves the jamming performance of the first interference by the corresponding probability of malicious code success.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified
The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the
One coding lower part.The display mode of corresponding second coding of the second field and the second field in first interference is to continuously display,
For example, shown in the form of character string, and, the second coding includes the first coding and one or one after decimal point and decimal point
A above number 0.As shown in figure 3, the first field " student " to be verified is shown up and down with the first coding " 10 ", the is reduced
Continuity, the correspondence of one field and the first coding reduce the first field by the corresponding probability of malicious code success;And first
In interference, if calculated result is equal to " 10 " in verification command after malicious code carries out mathematical computations to " 10.0 " of acquisition, and
The second field and the second coding in first interference continuously display, and it is corresponding general by malicious code success to improve the second field
Rate improves the jamming performance of the first interference.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified
The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the
One coding lower part.Similar, the display mode of the second coding corresponding to the second field and the second field in the first interference is
Display up and down, for example, the second field is located at the top of the second coding, alternatively, the second field is located at the lower part of the second coding.Such as figure
Shown in 4, the first field " student " to be verified is shown up and down with the first coding " 10 ", reduces the first field and the first coding
Continuity, correspondence reduce the first field by the corresponding probability of malicious code success.
Optionally, when the code to be verified that the first field and the first coding are constituted is the first character string, the second field and second
When the first interference that coding is constituted is the second character string, the first character string can be continuously displayed with the second character string, for example, first
Character string is " student 10 ", and when the first interference is " one class of student 101 ", the form of the identifying code of generation can be for " student 10 1
Class student 101 ".Code to be verified is continuously displayed with the first interference, improves the interference to malicious code.Optionally, generation
Identifying code is the first character string rear, and the second character string is preceding, such as " one class of 101 student 10 of student ", when malicious code passes through one
When fixed sequence identifies the keyword in identifying code, there will be interfering first interference setting preceding, and improve evil
The error rate of meaning code, improves the safety of user information.Optionally, it is provided between the first character string and the second character string
The punctuation marks such as " comma ", " pause mark ", e.g., identifying code display area can be for " student 10, one class of student 101 ", improve user
Recognition performance.
As shown in Figure 1, verification command are as follows: " 10 " corresponding Chinese character please be input.User, which inputs correct identifying code, should be
It is raw, if hacker cracks this identifying code as keyword using " 10 " in verification command, both keyword can be obtained
Corresponding Chinese character " student " and " one class of student ", thereby reduces rogue program and cracks probability to identifying code.
Optionally, in the second coding, before the first interference code is configured at the first coding;Alternatively, the first interference code is configured at
After one coding.In second field, the first interference code and the first coding constitute continuous character string, retain first in the second coding
Original sequence of each character in coding, the rogue program for being conducive to raising hacker search the probability of the second coding, improve second
Encode the annoyance level to malicious code.
Optionally, the first interference code includes the first coding.For example, code to be verified be " student 10 ", first interference in, first
Interference code can be " 10 ", and the first interference of generation can be " one class of student 1010 ", occur " 10 " pass twice in the first interference
Key word improves the first interference by the trusting degree of malicious code, improves the error rate that malicious code cracks.
Optionally, identifying code display area further include: figure, code to be verified are configured at the first area of figure, and first is dry
Disturb the second area for being configured at figure.By code to be verified, multi-section display, user can understand, be illustrated in the graphic with the first interference
Tell corresponding to the first field the second coding corresponding to the first coding and the second field, improve user to identifying code
Identity, improve user complete verifying efficiency.As shown in Figures 2 to 4.
Optionally, in the identifying code of generation, code to be verified is shown in the form of images, and the first interference is shown in the form of text
Show.The code to be verified that image format is shown can be recognized by the user, but cannot be identified in the form of keyword by malicious code, if
Malicious code is scanned for by way of " keyword ", then the second field and the second field in only the first interference obtained
Corresponding second coding, further improves malice for the error rate cracked.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, including, display module, for showing
Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding
One coding, the first interference, including the second field and corresponding second coding of the second field, wherein the second coding is compiled including first
Code and the first interference code, verification command, the first corresponding field of the first coding of input;Correction verification module, for determining that user is defeated
Whether the first field entered is correct.
Optionally, in the second coding, before the first interference code is configured at the first coding;Alternatively, the first interference code is configured at
After one coding.
Optionally, in the second coding, the first interference code includes the first coding.
Optionally, the identifying code display area of display module further include: figure, code to be verified are configured at the firstth area of figure
Domain, the first interference configuration is in the second area of figure.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code
In setting, details are not described herein again.
The embodiment of the present disclosure provides the generation verification method of another identifying code simultaneously, comprising:
S201 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field
The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, second compiles
Code includes the first coding and the first interference code, the second interference, including third field and the corresponding third coding of third field, third
Coding includes the first coding and the second interference code, wherein code to be verified is configured between the first interference and the second interference, verifying life
It enables, the first corresponding field of the first coding of input;
The generation verification method for the identifying code that the embodiment of the present disclosure provides further includes the second interference.In second interference
Third field can be the field for including Chinese character, English alphabet and/or punctuation mark, the second interference code can be to include
The coding of Arabic numerals, English alphabet and/or punctuation mark;Wherein, the first field is not equal to third field.It is understood that
It is that the embodiment above-mentioned about the first interference can be applied to the second interference herein, and details are not described herein again.
The generation verification method for the identifying code that the embodiment of the present disclosure provides, while including that the first interference and second interfere,
And code to be verified is set between the first interference and the second interference, the first interference and the second interference form code to be verified certain
Encirclement property improves the probability that malicious code obtains the first interference or the second interference, improves the interference to malicious code, drop
Low probability of the identifying code by Brute Force.
S202 determines whether the first field of user's input is correct.
When the first field for detecting user's input is correct, then by verifying, when the first word for detecting user's input
When section is incorrect, then new identifying code is regenerated.
Optionally, the first interference configuration is in the top of code to be verified, and the second interference configuration is in the lower part of code to be verified;Or
Person, the first interference configuration is in the left side of code to be verified, and the second interference configuration is in the right of code to be verified.
Malicious code generallys use certain sequence and cracks to identifying code, such as from top to bottom, from bottom to up, alternatively,
From left to right, from right to left.In the identifying code that the embodiment of the present disclosure generates, the first interference is respectively arranged to be tested with the second interference
Upper and lower two positions for demonstrate,proving code, when malicious code cracks identifying code using sequence from top to bottom or from bottom to up,
The first interference or the second interference will be first got, and then improves the first interference, the second interference to the interference of malicious code,
Reduce probability of the identifying code by Brute Force of generation.Optionally, the first interference is respectively arranged to be verified with the second interference
It left and right two positions of code will when malicious code cracks identifying code using sequence from left to right or from right to left
The first interference or the second interference can be first obtained, and then improves the first interference, the second interference to the interference of malicious code, is reduced
The identifying code generated is by the probability of Brute Force.
As shown in figure 5, code to be verified " student 10 " is set to the first interference " junior middle school student 102 " and the second " one class of interference
Between student 101 ", and, the first interference configuration in the top of code to be verified, the second interference configuration in the lower part of code to be verified, when
When malicious code cracks identifying code using sequence from top to bottom or from bottom to up, it will first get the first interference
" junior middle school student 102 " or the second interference " one class of student 101 " improves the interference of the first interference, the second interference to malicious code
Property, reduce probability of the identifying code by Brute Force of generation.
Optionally, the generation verification method of identifying code further include: third interference, including the 4th field and the 4th field correspond to
The 4th coding, the 4th coding include first coding and third interference code, wherein code to be verified is configured at the first interference, second
Between interference and third interference.Third interference in the 4th field can be include Chinese character, English alphabet and/or punctuation mark
Field, third interference code can be the coding for including Arabic numerals, English alphabet and/or punctuation mark;Wherein, first
Field is not equal to the 4th field.It is understood that the embodiment above-mentioned about the first interference can be applied to the herein
Three interference, details are not described herein again.
Optionally, the first interference, the second interference and third interference are uniformly distributed in around code to be verified, are further mentioned
The high encirclement to code to be verified, improves the probability that malicious code obtains the first interference, the second interference or third interference, drop
The low identifying code generated is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference and third
Interference is configured as generating in the form of images with code to be verified.Malicious code uses the form of image recognition to identifying code sometimes
It is decoded, and, it usually cuts, image is parsed one by one, if in resolving from an edge of image, it was found that
Target then stops the further parsing to image.In the embodiment of the present disclosure, the first interference, the second interference and third are done respectively
Disturb the edge for being configured at code to be verified, make the first interference, second interference or third interference than code to be verified earlier by malice generation
Code identification, improves the protective value to code to be verified.
Optionally, the generation verification method of identifying code further include: the 4th interference, including the 5th field and the 5th field correspond to
The 5th coding, the 5th coding include first coding and the 4th interference code, wherein code to be verified is configured at the first interference, second
Between interference, third interference and the 4th interference.4th interference in the 5th field can be include Chinese character, English alphabet and/
Or the field of punctuation mark, the 4th interference code can be the volume for including Arabic numerals, English alphabet and/or punctuation mark
Code;Wherein, the first field is not equal to the 5th field.It is understood that the embodiment above-mentioned about the first interference can answer
For the 4th interference herein, details are not described herein again.
It is understood that the embodiment above-mentioned about the first interference can be applied to the 4th interference herein, herein
It repeats no more.
Optionally, the first interference, the second interference, third interference and the 4th interference are uniformly distributed in the week of code to be verified
It encloses, for example, the first interference configuration, in the top of code to be verified, the second interference configuration is matched in the lower part of code to be verified, third interference
It is placed in the left side of code to be verified, the 4th interference configuration is in the right of code to be verified.Further improve the encirclement to code to be verified
Property, the probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, generation is reduced
Identifying code is by the probability of Brute Force.
As shown in fig. 6, code to be verified is " student 10 ", the first interference " one class of student 101 " is configured at the upper of code to be verified
Portion, the second interference " schoolgirl 104 " are configured at the lower part of code to be verified, and third interference " junior middle school student 103 " is configured to be verified
The left side of code, the 4th interference " high school student 102 " are configured at the right of code to be verified, improve the encirclement to code to be verified,
The probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, the verifying of generation is reduced
Code is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference, third
Interference and the 4th interference are configured as generating in the form of images with code to be verified.Malicious code uses the shape of image recognition sometimes
Formula decodes identifying code, and, it is usually cut from an edge of image, image is parsed one by one, if parsed
Cheng Zhong, it was found that target then stops the further parsing to image.In the embodiment of the present disclosure, respectively by the first interference, second dry
Disturb, third interference and the 4th interference configuration are in four edges of code to be verified, make the first interference, the second interference, third interference or
4th interference being identified by malicious code earlier than code to be verified, improves the protective value to code to be verified.
It is understood that in the generation verification method for the identifying code that the embodiment of the present disclosure provides, not to the quantity of interference
It is restricted.For example, can also include the 5th interference, the 6th interference, etc. to improve the encirclement interfered to code to be verified.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, comprising: display module, for showing
Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding
One coding, the first interference, including the second field and corresponding second coding of the second field, the second coding include the first coding and the
One interference code, the second interference, including third field and third field corresponding third coding, third coding include the first coding and
Second interference code, wherein code to be verified is configured between the first interference and the second interference, verification command, the first coding of input institute
Corresponding first field;Whether correction verification module, the first field for determining user's input are correct.
Optionally, in display module, the first interference configuration is in the top of code to be verified, and the second interference configuration is in code to be verified
Lower part;Alternatively, the first interference configuration is in the left side of code to be verified, the second interference configuration is in the right of code to be verified.
Optionally, display module further include: third interference, including the 4th field and corresponding 4th coding of the 4th field,
4th coding includes the first coding and third interference code, wherein it is dry that code to be verified is configured at the first interference, the second interference and third
Between disturbing.
Optionally, display module further include: the 4th interference, including the 5th field and corresponding 5th coding of the 5th field,
5th coding includes the first coding and the 4th interference code, wherein it is dry that code to be verified is configured at the first interference, the second interference, third
It disturbs between the 4th interference.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code
In setting, details are not described herein again.
The embodiment of the present disclosure provides a kind of electronic equipment simultaneously, as shown in fig. 7, comprises processor 100 and being stored with journey
The memory 101 of sequence instruction further includes the generation verifying device of identifying code above-mentioned.
Processor (processor) 100 and memory (memory) 101 can also include communication interface
(Communication Interface) 102 and bus 103.Wherein, processor 100, communication interface 102, memory 101 can
To complete mutual communication by bus 103.Communication interface 102 can be used for information transmission.Processor 100 can be called and be deposited
Logical order in reservoir 101, to execute the generation verification method of the identifying code of above-described embodiment.
Block diagram in attached drawing is shown according to the in the cards of the method and computer program product of the embodiment of the present disclosure
Architecture, function and operation.In this regard, each box in block diagram can represent a module, section or code
A part, a part of the module, section or code include it is one or more it is for implementing the specified logical function can
It executes instruction.In some implementations as replacements, function marked in the box can also be to be different from being marked in attached drawing
Sequence occur.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite
Sequence executes, this can be depended on the functions involved.In description corresponding to block diagram in the accompanying drawings, different box institutes is right
The operation answered or step can also be occurred with being different from sequence disclosed in description, between sometimes different operation or step not
There are specific sequences.For example, two continuous operations or step can actually be basically executed in parallel, they sometimes may be used
To execute in the opposite order, this can be depended on the functions involved.Each box in block diagram and the box in block diagram
Combination, can the dedicated hardware based system of as defined in executing function or movement realize, or can be with dedicated
The combination of hardware and computer instruction is realized.
Claims (9)
1. a kind of generation verification method of identifying code characterized by comprising
Step 1 shows that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second coding includes described the
One coding and the first interference code,
Second interference, including third field and the third field corresponding third coding, the third coding include described the
One coding and the second interference code, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first corresponding field of first coding;
Step 2 determines whether first field of user's input is correct.
2. the method according to claim 1, wherein
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified
Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified
Side.
3. the method according to claim 1, wherein further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th coding includes described the
One coding and third interference code,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
4. according to the method described in claim 3, it is characterized by further comprising:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th coding includes described the
One coding and the 4th interference code,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
5. device is verified in a kind of generation of identifying code characterized by comprising
Display module, for showing that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second coding includes described the
One coding and the first interference code,
Second interference, including third field and the third field corresponding third coding, the third coding include described the
One coding and the second interference code, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first corresponding field of first coding;
Whether correction verification module, first field for determining user's input are correct.
6. device according to claim 5, which is characterized in that in the display module,
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified
Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified
Side.
7. device according to claim 5, which is characterized in that the display module further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th coding includes described the
One coding and third interference code,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
8. device according to claim 7, which is characterized in that the display module further include:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th coding includes described the
One coding and the 4th interference code,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
9. a kind of electronic equipment, including processor and the memory for being stored with program instruction, which is characterized in that further include that right is wanted
Seek the described in any item devices of 5-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910751045.5A CN110443027A (en) | 2019-08-14 | 2019-08-14 | Generation verification method and device, the electronic product of identifying code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910751045.5A CN110443027A (en) | 2019-08-14 | 2019-08-14 | Generation verification method and device, the electronic product of identifying code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110443027A true CN110443027A (en) | 2019-11-12 |
Family
ID=68435575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910751045.5A Pending CN110443027A (en) | 2019-08-14 | 2019-08-14 | Generation verification method and device, the electronic product of identifying code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110443027A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102724191A (en) * | 2012-06-11 | 2012-10-10 | 华南理工大学 | Safe protecting method and device for Web verification code with combined picture and characters |
CN104657654A (en) * | 2014-12-22 | 2015-05-27 | 河海大学 | Image verification code generation method utilizing human eye vision compensation principle |
US20160036821A1 (en) * | 2007-05-25 | 2016-02-04 | Michael J. Vandemar | Method Of Advertising Using An Electronic Processor Authorization Challenge |
CN106878244A (en) * | 2016-07-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of authenticity proves information providing method and device |
-
2019
- 2019-08-14 CN CN201910751045.5A patent/CN110443027A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160036821A1 (en) * | 2007-05-25 | 2016-02-04 | Michael J. Vandemar | Method Of Advertising Using An Electronic Processor Authorization Challenge |
CN102724191A (en) * | 2012-06-11 | 2012-10-10 | 华南理工大学 | Safe protecting method and device for Web verification code with combined picture and characters |
CN104657654A (en) * | 2014-12-22 | 2015-05-27 | 河海大学 | Image verification code generation method utilizing human eye vision compensation principle |
CN106878244A (en) * | 2016-07-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of authenticity proves information providing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Detecting visually similar web pages: Application to phishing detection | |
Bursztein et al. | Easy does it: More usable CAPTCHAs | |
Yan et al. | Breaking visual captchas with naive pattern recognition algorithms | |
Chew et al. | Baffletext: A human interactive proof | |
CN104200150B (en) | Method and device for processing verification codes | |
CN109918892B (en) | Verification code generation method and device, storage medium and computer equipment | |
US20080195940A1 (en) | Method and Apparatus for Automatic Detection of Spelling Errors in One or More Documents | |
WO2018022321A1 (en) | An automated machine learning scheme for software exploit prediction | |
US11775749B1 (en) | Content masking attacks against information-based services and defenses thereto | |
CN108563559A (en) | A kind of test method of identifying code, device, terminal device and storage medium | |
CN102724191A (en) | Safe protecting method and device for Web verification code with combined picture and characters | |
WO2014085816A1 (en) | Observable authentication methods and apparatus | |
Reynolds et al. | Measuring identity confusion with uniform resource locators | |
Pruitt | Stress in harmonic serialism | |
Ullah et al. | Software plagiarism detection in multiprogramming languages using machine learning approach | |
Markwood et al. | Mirage: Content Masking Attack Against {Information-Based} Online Services | |
CN106294317A (en) | The form information method of calibration at a kind of cloud platform interface and system | |
JP5365120B2 (en) | Information processing apparatus, information processing method, and program | |
KR101725301B1 (en) | System for training security weakness | |
CN112422574A (en) | Risk account identification method, device, medium and electronic equipment | |
Furnell | Securing information and communications systems: Principles, technologies, and applications | |
CN110443027A (en) | Generation verification method and device, the electronic product of identifying code | |
CN110445608A (en) | Generation verification method and device, the electronic product of identifying code | |
CN110443028A (en) | Generation verification method and device, the electronic product of identifying code | |
US8310729B2 (en) | Device capable of adjusting two-dimensional code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191112 |
|
RJ01 | Rejection of invention patent application after publication |