CN110443027A - Generation verification method and device, the electronic product of identifying code - Google Patents

Generation verification method and device, the electronic product of identifying code Download PDF

Info

Publication number
CN110443027A
CN110443027A CN201910751045.5A CN201910751045A CN110443027A CN 110443027 A CN110443027 A CN 110443027A CN 201910751045 A CN201910751045 A CN 201910751045A CN 110443027 A CN110443027 A CN 110443027A
Authority
CN
China
Prior art keywords
interference
code
coding
field
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910751045.5A
Other languages
Chinese (zh)
Inventor
陶从丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910751045.5A priority Critical patent/CN110443027A/en
Publication of CN110443027A publication Critical patent/CN110443027A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

This application involves verification code technology fields, a kind of generation verification method of identifying code is disclosed, including step 1, show identifying code display area, the identifying code display area includes at least: code to be verified, including corresponding first coding of the first field and first field, first interference, including corresponding second coding of the second field and second field, second coding includes first coding and the first interference code, second interference, including third field and the corresponding third coding of the third field, the third coding includes first coding and the second interference code, wherein, the code to be verified is configured between first interference and second interference, verification command, input the first corresponding field of first coding;Step 2 determines whether first field of user's input is correct.The generation verifying device and electronic equipment of a kind of identifying code is also disclosed in the application.

Description

Generation verification method and device, the electronic product of identifying code
Technical field
This application involves fields of communication technology, such as are related to the generation verification method and device, electronics production of a kind of identifying code Product.
Background technique
Identifying code (CAPTCHA) is " Completely Automated Public Turing test to tell The abbreviation of Computers and Humans Apart " (the full-automatic turing test for distinguishing computer and the mankind), is a kind of area Point access requestor is computer program or the public full auto-programs of people, is commonly used to prevent the programs such as wooden horse malice from cracking close Code, brush screen, forum such as pour water at the behaviors, in order to prevent some hacker to certain particular registered user specific program violences It the modes such as cracks and is constantly logged in trial.Identifying code is usually to be made of some lines and some irregular characters, main If hacker takes the laggard pirate of code dataization in order to prevent.
During realizing the embodiment of the present disclosure, at least there are the following problems in the related technology: existing verifying for discovery Code is easy to influence the safety of user information by malicious code Brute Force.
Summary of the invention
In order to which some aspects of the embodiment to disclosure have basic understanding, simple summary is shown below.It is described general Including is not extensive overview, nor to determine key/critical component or describe the protection scope of these embodiments, but is made For the preamble of following detailed description.
The embodiment of the present disclosure provides the generation verification method and device, electronic product of a kind of identifying code, existing to solve Identifying code the technical issues of being easy by malicious code Brute Force, influencing user information safety.
The embodiment of the present disclosure provides a kind of generation verification method of identifying code.
In some embodiments, the generation verification method of the identifying code includes: step 1, shows identifying code viewing area Domain, the identifying code display area include at least: code to be verified, including the first field and first field corresponding first are compiled Code, the first interference, including the second field and corresponding second coding of second field, second coding includes described first Coding and the first interference code, the second interference, including third field and the corresponding third coding of the third field, the third are compiled Code includes first coding and the second interference code, wherein the code to be verified is configured at first interference and described second Between interference, verification command inputs the first corresponding field of first coding;Step 2 determines the described of user's input Whether the first field is correct.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code.
In some embodiments, the generation verifying device of the identifying code includes: display module, for showing that identifying code is aobvious Show that region, the identifying code display area include at least: code to be verified, including the first field and first field corresponding One coding, the first interference, including the second field and corresponding second coding of second field, second coding includes described First coding and the first interference code, the second interference, including third field and the third field corresponding third coding, described the Three coding include it is described first coding and the second interference code, wherein the code to be verified be configured at it is described first interference with it is described Between second interference, verification command inputs the first corresponding field of first coding;Correction verification module, for determining user Whether first field of input is correct.
The embodiment of the present disclosure provides a kind of electronic product, including processor and the memory for being stored with program instruction, also Device is verified in generation including identifying code.
The generation verification method and device, electronic product for the identifying code that the embodiment of the present disclosure provides, may be implemented following skill Art effect:
The generation verification method for the identifying code that the embodiment of the present disclosure provides, using the first interference and the second interference as dry It disturbs, reduces the probability of the malicious code Brute Force identifying code, improve the safety of user information.
Above general description and it is discussed below be only it is exemplary and explanatory, be not used in limitation the application.
Detailed description of the invention
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing The restriction to embodiment is not constituted, the element with same reference numbers label is shown as similar element in attached drawing, and attached drawing is not Composition limitation, and wherein:
Fig. 1 is the schematic diagram for generating the identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 2 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 3 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 4 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 5 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 6 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 7 is the structural schematic diagram for the electronic equipment that the embodiment of the present disclosure provides.
Appended drawing reference:
100: processor;101: memory;102: communication interface;103: bus.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, with reference to the accompanying drawing to this public affairs The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the embodiment of the present disclosure. In technical description below, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details. However, one or more embodiments still can be implemented in the case where without these details.It in other cases, is simplification Attached drawing, well known construction and device can simplify displaying.Multiple embodiments that the embodiment of the present disclosure provides, can be combined with each other.
The embodiment of the present disclosure provides a kind of generation verification method method of identifying code, comprising:
S101 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, wherein Second coding includes the first coding and the first interference code, verification command, the first corresponding field of the first coding of input;
Optionally, " code to be verified " may also be referred to as " identifying code to be verified ".The first field in code to be verified can be with To include Chinese character, English alphabet and/or the field of punctuation mark, the first coding can be include Arabic numerals, English The coding of letter and/or punctuation mark;It is similar, the first interference code in the first interference can be include Arabic numerals, The coding of English alphabet and/or punctuation mark, the second field can be include Chinese character, English alphabet and/or punctuation mark Field;Wherein, the first field is not equal to the second field.
Verification command, the first corresponding field of the first coding of input.It is understood that verification command herein is aobvious Show the text in identifying code display area, not to the description of user action.It will also be appreciated that verification command herein is only It is the semanteme in order to describe the order, the verification command specifically generated in the text can be different.
" the first coding " when malicious code attempts to crack identifying code by way of keyword search, in verification command It can be used as the keyword that malicious code scans for, keyword is referred to as crucial coding, however, due to same in the first interference Sample includes " the first coding " this keyword in code to be verified, and, the first coding the first field corresponding with the second coding Different from the second field, what malicious code was possible to obtain is corresponding second field of the second coding, when detecting verification command In the first field input error when, then regenerate new identifying code.As it can be seen that the generation for the identifying code that the embodiment of the present disclosure provides Verification method reduces the safety that user information is improved by the probability of malicious code Brute Force.
S102 determines whether the first field of user's input is correct.
When the first field for detecting user's input is correct, then by verifying, when the first word for detecting user's input When section is incorrect, then new identifying code is regenerated.
The embodiment of the present disclosure to the application scenarios of the identifying code of generation with no restriction, for example, what the embodiment of the present disclosure provided Identifying code can be applied to the verifying carried out when user carries out online purchase train ticket by 12306.
It optionally, include the first interference field in the second field, the first interference field and the first field constitute consecutive word Section, continuation field herein can be with field clear and coherent in Chinese, for example, the first interference field may include the Arabic number of capitalization Word, surname etc..For example, the first field in code to be verified can be " student ", the first coding can be " 10 ", generation it is to be tested Demonstrate,proving code can be " student 10 ", and the second field in the first interference can be for " one class of student ", " junior middle school student " or " university is learned It is raw ", the second coding can be " 101 ", " 102 " or " 103 ", and the first interference of generation can be " one class of student 101 ", " junior middle school Student 102 " or " university student 103 ".For another example the first field in code to be verified can be " teacher ", the first coding can be with For " 20 ", the code to be verified of generation can be " teacher 20 ", and the second field in the first interference can be " Mr. Zhang ", " Liu is old Teacher " or " Li Laoshi ", the second coding can be " 201 ", " 202 " or " 203 ", and the first interference of generation can be " Mr. Zhang 201 ", " Liu Laoshi 202 " or " Li Laoshi 203 ".
Optionally, the first field in identifying code display area, code to be verified and the display mode of the first coding can be with For character string, that is, the first field constitutes one section of continuous first character string with the first coding, e.g., when the first field is located at first When before coding, the display mode of the first character string is " the first field+the first coding ";After the first field is located at the first coding When, the display mode of the first character string is " first the+the first field of coding ";It is similar, the second field in the first interference and the The display mode of two codings may be character string, that is, and the second field constitutes one section of continuous second character string with the second coding, Such as, when the second field is located at before the second coding, the display mode of the second character string is " the second field+the second coding ";When When two fields are after the second coding, the display mode of the second character string is " second the+the second field of coding ".
As shown in Figure 1, code to be verified is " student 10 ", the first interference is " one class of student 101 ", and verification command is " to ask defeated Enter Chinese character corresponding to " 10 " ", in code to be verified, " 10 " corresponding Chinese character is student, the then information that user inputs in input frame Should be " student ".When malicious code cracks the identifying code, due to equally including " 10 " this key in " 101 " Word, and " 101 " corresponding Chinese character is " one class of student ", improves the interference to malicious code.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the One coding lower part.The display mode of corresponding second coding of the second field and the second field in first interference is to continuously display, For example, being shown in the form of character string.As shown in Fig. 2, the first field " student " to be verified is shown up and down with the first coding " 10 " Show, reduce continuity, the correspondence of the first field with the first coding, it is corresponding by malicious code success to reduce the first field Probability;The second field " one class of student " in first interference is continuously displayed with the second coding " 101 ", is improved in the first interference Second field improves the jamming performance of the first interference by the corresponding probability of malicious code success.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the One coding lower part.The display mode of corresponding second coding of the second field and the second field in first interference is to continuously display, For example, shown in the form of character string, and, the second coding includes the first coding and one or one after decimal point and decimal point A above number 0.As shown in figure 3, the first field " student " to be verified is shown up and down with the first coding " 10 ", the is reduced Continuity, the correspondence of one field and the first coding reduce the first field by the corresponding probability of malicious code success;And first In interference, if calculated result is equal to " 10 " in verification command after malicious code carries out mathematical computations to " 10.0 " of acquisition, and The second field and the second coding in first interference continuously display, and it is corresponding general by malicious code success to improve the second field Rate improves the jamming performance of the first interference.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the One coding lower part.Similar, the display mode of the second coding corresponding to the second field and the second field in the first interference is Display up and down, for example, the second field is located at the top of the second coding, alternatively, the second field is located at the lower part of the second coding.Such as figure Shown in 4, the first field " student " to be verified is shown up and down with the first coding " 10 ", reduces the first field and the first coding Continuity, correspondence reduce the first field by the corresponding probability of malicious code success.
Optionally, when the code to be verified that the first field and the first coding are constituted is the first character string, the second field and second When the first interference that coding is constituted is the second character string, the first character string can be continuously displayed with the second character string, for example, first Character string is " student 10 ", and when the first interference is " one class of student 101 ", the form of the identifying code of generation can be for " student 10 1 Class student 101 ".Code to be verified is continuously displayed with the first interference, improves the interference to malicious code.Optionally, generation Identifying code is the first character string rear, and the second character string is preceding, such as " one class of 101 student 10 of student ", when malicious code passes through one When fixed sequence identifies the keyword in identifying code, there will be interfering first interference setting preceding, and improve evil The error rate of meaning code, improves the safety of user information.Optionally, it is provided between the first character string and the second character string The punctuation marks such as " comma ", " pause mark ", e.g., identifying code display area can be for " student 10, one class of student 101 ", improve user Recognition performance.
As shown in Figure 1, verification command are as follows: " 10 " corresponding Chinese character please be input.User, which inputs correct identifying code, should be It is raw, if hacker cracks this identifying code as keyword using " 10 " in verification command, both keyword can be obtained Corresponding Chinese character " student " and " one class of student ", thereby reduces rogue program and cracks probability to identifying code.
Optionally, in the second coding, before the first interference code is configured at the first coding;Alternatively, the first interference code is configured at After one coding.In second field, the first interference code and the first coding constitute continuous character string, retain first in the second coding Original sequence of each character in coding, the rogue program for being conducive to raising hacker search the probability of the second coding, improve second Encode the annoyance level to malicious code.
Optionally, the first interference code includes the first coding.For example, code to be verified be " student 10 ", first interference in, first Interference code can be " 10 ", and the first interference of generation can be " one class of student 1010 ", occur " 10 " pass twice in the first interference Key word improves the first interference by the trusting degree of malicious code, improves the error rate that malicious code cracks.
Optionally, identifying code display area further include: figure, code to be verified are configured at the first area of figure, and first is dry Disturb the second area for being configured at figure.By code to be verified, multi-section display, user can understand, be illustrated in the graphic with the first interference Tell corresponding to the first field the second coding corresponding to the first coding and the second field, improve user to identifying code Identity, improve user complete verifying efficiency.As shown in Figures 2 to 4.
Optionally, in the identifying code of generation, code to be verified is shown in the form of images, and the first interference is shown in the form of text Show.The code to be verified that image format is shown can be recognized by the user, but cannot be identified in the form of keyword by malicious code, if Malicious code is scanned for by way of " keyword ", then the second field and the second field in only the first interference obtained Corresponding second coding, further improves malice for the error rate cracked.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, including, display module, for showing Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding One coding, the first interference, including the second field and corresponding second coding of the second field, wherein the second coding is compiled including first Code and the first interference code, verification command, the first corresponding field of the first coding of input;Correction verification module, for determining that user is defeated Whether the first field entered is correct.
Optionally, in the second coding, before the first interference code is configured at the first coding;Alternatively, the first interference code is configured at After one coding.
Optionally, in the second coding, the first interference code includes the first coding.
Optionally, the identifying code display area of display module further include: figure, code to be verified are configured at the firstth area of figure Domain, the first interference configuration is in the second area of figure.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code In setting, details are not described herein again.
The embodiment of the present disclosure provides the generation verification method of another identifying code simultaneously, comprising:
S201 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, second compiles Code includes the first coding and the first interference code, the second interference, including third field and the corresponding third coding of third field, third Coding includes the first coding and the second interference code, wherein code to be verified is configured between the first interference and the second interference, verifying life It enables, the first corresponding field of the first coding of input;
The generation verification method for the identifying code that the embodiment of the present disclosure provides further includes the second interference.In second interference Third field can be the field for including Chinese character, English alphabet and/or punctuation mark, the second interference code can be to include The coding of Arabic numerals, English alphabet and/or punctuation mark;Wherein, the first field is not equal to third field.It is understood that It is that the embodiment above-mentioned about the first interference can be applied to the second interference herein, and details are not described herein again.
The generation verification method for the identifying code that the embodiment of the present disclosure provides, while including that the first interference and second interfere, And code to be verified is set between the first interference and the second interference, the first interference and the second interference form code to be verified certain Encirclement property improves the probability that malicious code obtains the first interference or the second interference, improves the interference to malicious code, drop Low probability of the identifying code by Brute Force.
S202 determines whether the first field of user's input is correct.
When the first field for detecting user's input is correct, then by verifying, when the first word for detecting user's input When section is incorrect, then new identifying code is regenerated.
Optionally, the first interference configuration is in the top of code to be verified, and the second interference configuration is in the lower part of code to be verified;Or Person, the first interference configuration is in the left side of code to be verified, and the second interference configuration is in the right of code to be verified.
Malicious code generallys use certain sequence and cracks to identifying code, such as from top to bottom, from bottom to up, alternatively, From left to right, from right to left.In the identifying code that the embodiment of the present disclosure generates, the first interference is respectively arranged to be tested with the second interference Upper and lower two positions for demonstrate,proving code, when malicious code cracks identifying code using sequence from top to bottom or from bottom to up, The first interference or the second interference will be first got, and then improves the first interference, the second interference to the interference of malicious code, Reduce probability of the identifying code by Brute Force of generation.Optionally, the first interference is respectively arranged to be verified with the second interference It left and right two positions of code will when malicious code cracks identifying code using sequence from left to right or from right to left The first interference or the second interference can be first obtained, and then improves the first interference, the second interference to the interference of malicious code, is reduced The identifying code generated is by the probability of Brute Force.
As shown in figure 5, code to be verified " student 10 " is set to the first interference " junior middle school student 102 " and the second " one class of interference Between student 101 ", and, the first interference configuration in the top of code to be verified, the second interference configuration in the lower part of code to be verified, when When malicious code cracks identifying code using sequence from top to bottom or from bottom to up, it will first get the first interference " junior middle school student 102 " or the second interference " one class of student 101 " improves the interference of the first interference, the second interference to malicious code Property, reduce probability of the identifying code by Brute Force of generation.
Optionally, the generation verification method of identifying code further include: third interference, including the 4th field and the 4th field correspond to The 4th coding, the 4th coding include first coding and third interference code, wherein code to be verified is configured at the first interference, second Between interference and third interference.Third interference in the 4th field can be include Chinese character, English alphabet and/or punctuation mark Field, third interference code can be the coding for including Arabic numerals, English alphabet and/or punctuation mark;Wherein, first Field is not equal to the 4th field.It is understood that the embodiment above-mentioned about the first interference can be applied to the herein Three interference, details are not described herein again.
Optionally, the first interference, the second interference and third interference are uniformly distributed in around code to be verified, are further mentioned The high encirclement to code to be verified, improves the probability that malicious code obtains the first interference, the second interference or third interference, drop The low identifying code generated is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference and third Interference is configured as generating in the form of images with code to be verified.Malicious code uses the form of image recognition to identifying code sometimes It is decoded, and, it usually cuts, image is parsed one by one, if in resolving from an edge of image, it was found that Target then stops the further parsing to image.In the embodiment of the present disclosure, the first interference, the second interference and third are done respectively Disturb the edge for being configured at code to be verified, make the first interference, second interference or third interference than code to be verified earlier by malice generation Code identification, improves the protective value to code to be verified.
Optionally, the generation verification method of identifying code further include: the 4th interference, including the 5th field and the 5th field correspond to The 5th coding, the 5th coding include first coding and the 4th interference code, wherein code to be verified is configured at the first interference, second Between interference, third interference and the 4th interference.4th interference in the 5th field can be include Chinese character, English alphabet and/ Or the field of punctuation mark, the 4th interference code can be the volume for including Arabic numerals, English alphabet and/or punctuation mark Code;Wherein, the first field is not equal to the 5th field.It is understood that the embodiment above-mentioned about the first interference can answer For the 4th interference herein, details are not described herein again.
It is understood that the embodiment above-mentioned about the first interference can be applied to the 4th interference herein, herein It repeats no more.
Optionally, the first interference, the second interference, third interference and the 4th interference are uniformly distributed in the week of code to be verified It encloses, for example, the first interference configuration, in the top of code to be verified, the second interference configuration is matched in the lower part of code to be verified, third interference It is placed in the left side of code to be verified, the 4th interference configuration is in the right of code to be verified.Further improve the encirclement to code to be verified Property, the probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, generation is reduced Identifying code is by the probability of Brute Force.
As shown in fig. 6, code to be verified is " student 10 ", the first interference " one class of student 101 " is configured at the upper of code to be verified Portion, the second interference " schoolgirl 104 " are configured at the lower part of code to be verified, and third interference " junior middle school student 103 " is configured to be verified The left side of code, the 4th interference " high school student 102 " are configured at the right of code to be verified, improve the encirclement to code to be verified, The probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, the verifying of generation is reduced Code is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference, third Interference and the 4th interference are configured as generating in the form of images with code to be verified.Malicious code uses the shape of image recognition sometimes Formula decodes identifying code, and, it is usually cut from an edge of image, image is parsed one by one, if parsed Cheng Zhong, it was found that target then stops the further parsing to image.In the embodiment of the present disclosure, respectively by the first interference, second dry Disturb, third interference and the 4th interference configuration are in four edges of code to be verified, make the first interference, the second interference, third interference or 4th interference being identified by malicious code earlier than code to be verified, improves the protective value to code to be verified.
It is understood that in the generation verification method for the identifying code that the embodiment of the present disclosure provides, not to the quantity of interference It is restricted.For example, can also include the 5th interference, the 6th interference, etc. to improve the encirclement interfered to code to be verified.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, comprising: display module, for showing Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding One coding, the first interference, including the second field and corresponding second coding of the second field, the second coding include the first coding and the One interference code, the second interference, including third field and third field corresponding third coding, third coding include the first coding and Second interference code, wherein code to be verified is configured between the first interference and the second interference, verification command, the first coding of input institute Corresponding first field;Whether correction verification module, the first field for determining user's input are correct.
Optionally, in display module, the first interference configuration is in the top of code to be verified, and the second interference configuration is in code to be verified Lower part;Alternatively, the first interference configuration is in the left side of code to be verified, the second interference configuration is in the right of code to be verified.
Optionally, display module further include: third interference, including the 4th field and corresponding 4th coding of the 4th field, 4th coding includes the first coding and third interference code, wherein it is dry that code to be verified is configured at the first interference, the second interference and third Between disturbing.
Optionally, display module further include: the 4th interference, including the 5th field and corresponding 5th coding of the 5th field, 5th coding includes the first coding and the 4th interference code, wherein it is dry that code to be verified is configured at the first interference, the second interference, third It disturbs between the 4th interference.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code In setting, details are not described herein again.
The embodiment of the present disclosure provides a kind of electronic equipment simultaneously, as shown in fig. 7, comprises processor 100 and being stored with journey The memory 101 of sequence instruction further includes the generation verifying device of identifying code above-mentioned.
Processor (processor) 100 and memory (memory) 101 can also include communication interface (Communication Interface) 102 and bus 103.Wherein, processor 100, communication interface 102, memory 101 can To complete mutual communication by bus 103.Communication interface 102 can be used for information transmission.Processor 100 can be called and be deposited Logical order in reservoir 101, to execute the generation verification method of the identifying code of above-described embodiment.
Block diagram in attached drawing is shown according to the in the cards of the method and computer program product of the embodiment of the present disclosure Architecture, function and operation.In this regard, each box in block diagram can represent a module, section or code A part, a part of the module, section or code include it is one or more it is for implementing the specified logical function can It executes instruction.In some implementations as replacements, function marked in the box can also be to be different from being marked in attached drawing Sequence occur.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite Sequence executes, this can be depended on the functions involved.In description corresponding to block diagram in the accompanying drawings, different box institutes is right The operation answered or step can also be occurred with being different from sequence disclosed in description, between sometimes different operation or step not There are specific sequences.For example, two continuous operations or step can actually be basically executed in parallel, they sometimes may be used To execute in the opposite order, this can be depended on the functions involved.Each box in block diagram and the box in block diagram Combination, can the dedicated hardware based system of as defined in executing function or movement realize, or can be with dedicated The combination of hardware and computer instruction is realized.

Claims (9)

1. a kind of generation verification method of identifying code characterized by comprising
Step 1 shows that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second coding includes described the One coding and the first interference code,
Second interference, including third field and the third field corresponding third coding, the third coding include described the One coding and the second interference code, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first corresponding field of first coding;
Step 2 determines whether first field of user's input is correct.
2. the method according to claim 1, wherein
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified Side.
3. the method according to claim 1, wherein further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th coding includes described the One coding and third interference code,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
4. according to the method described in claim 3, it is characterized by further comprising:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th coding includes described the One coding and the 4th interference code,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
5. device is verified in a kind of generation of identifying code characterized by comprising
Display module, for showing that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second coding includes described the One coding and the first interference code,
Second interference, including third field and the third field corresponding third coding, the third coding include described the One coding and the second interference code, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first corresponding field of first coding;
Whether correction verification module, first field for determining user's input are correct.
6. device according to claim 5, which is characterized in that in the display module,
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified Side.
7. device according to claim 5, which is characterized in that the display module further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th coding includes described the One coding and third interference code,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
8. device according to claim 7, which is characterized in that the display module further include:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th coding includes described the One coding and the 4th interference code,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
9. a kind of electronic equipment, including processor and the memory for being stored with program instruction, which is characterized in that further include that right is wanted Seek the described in any item devices of 5-8.
CN201910751045.5A 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code Pending CN110443027A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910751045.5A CN110443027A (en) 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910751045.5A CN110443027A (en) 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code

Publications (1)

Publication Number Publication Date
CN110443027A true CN110443027A (en) 2019-11-12

Family

ID=68435575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910751045.5A Pending CN110443027A (en) 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code

Country Status (1)

Country Link
CN (1) CN110443027A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724191A (en) * 2012-06-11 2012-10-10 华南理工大学 Safe protecting method and device for Web verification code with combined picture and characters
CN104657654A (en) * 2014-12-22 2015-05-27 河海大学 Image verification code generation method utilizing human eye vision compensation principle
US20160036821A1 (en) * 2007-05-25 2016-02-04 Michael J. Vandemar Method Of Advertising Using An Electronic Processor Authorization Challenge
CN106878244A (en) * 2016-07-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of authenticity proves information providing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160036821A1 (en) * 2007-05-25 2016-02-04 Michael J. Vandemar Method Of Advertising Using An Electronic Processor Authorization Challenge
CN102724191A (en) * 2012-06-11 2012-10-10 华南理工大学 Safe protecting method and device for Web verification code with combined picture and characters
CN104657654A (en) * 2014-12-22 2015-05-27 河海大学 Image verification code generation method utilizing human eye vision compensation principle
CN106878244A (en) * 2016-07-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of authenticity proves information providing method and device

Similar Documents

Publication Publication Date Title
Chen et al. Detecting visually similar web pages: Application to phishing detection
Bursztein et al. Easy does it: More usable CAPTCHAs
Yan et al. Breaking visual captchas with naive pattern recognition algorithms
Chew et al. Baffletext: A human interactive proof
CN104200150B (en) Method and device for processing verification codes
CN109918892B (en) Verification code generation method and device, storage medium and computer equipment
US20080195940A1 (en) Method and Apparatus for Automatic Detection of Spelling Errors in One or More Documents
WO2018022321A1 (en) An automated machine learning scheme for software exploit prediction
US11775749B1 (en) Content masking attacks against information-based services and defenses thereto
CN108563559A (en) A kind of test method of identifying code, device, terminal device and storage medium
CN102724191A (en) Safe protecting method and device for Web verification code with combined picture and characters
WO2014085816A1 (en) Observable authentication methods and apparatus
Reynolds et al. Measuring identity confusion with uniform resource locators
Pruitt Stress in harmonic serialism
Ullah et al. Software plagiarism detection in multiprogramming languages using machine learning approach
Markwood et al. Mirage: Content Masking Attack Against {Information-Based} Online Services
CN106294317A (en) The form information method of calibration at a kind of cloud platform interface and system
JP5365120B2 (en) Information processing apparatus, information processing method, and program
KR101725301B1 (en) System for training security weakness
CN112422574A (en) Risk account identification method, device, medium and electronic equipment
Furnell Securing information and communications systems: Principles, technologies, and applications
CN110443027A (en) Generation verification method and device, the electronic product of identifying code
CN110445608A (en) Generation verification method and device, the electronic product of identifying code
CN110443028A (en) Generation verification method and device, the electronic product of identifying code
US8310729B2 (en) Device capable of adjusting two-dimensional code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191112

RJ01 Rejection of invention patent application after publication