CN110443028A - Generation verification method and device, the electronic product of identifying code - Google Patents

Generation verification method and device, the electronic product of identifying code Download PDF

Info

Publication number
CN110443028A
CN110443028A CN201910751046.XA CN201910751046A CN110443028A CN 110443028 A CN110443028 A CN 110443028A CN 201910751046 A CN201910751046 A CN 201910751046A CN 110443028 A CN110443028 A CN 110443028A
Authority
CN
China
Prior art keywords
field
interference
code
coding
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910751046.XA
Other languages
Chinese (zh)
Inventor
陶从丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910751046.XA priority Critical patent/CN110443028A/en
Publication of CN110443028A publication Critical patent/CN110443028A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

This application involves verification code technology fields, a kind of generation verification method of identifying code is disclosed, including step 1, show identifying code display area, identifying code display area includes at least: code to be verified, including corresponding first coding of the first field and the first field, first interference, including corresponding second coding of the second field and the second field, second field includes the first field and the first interference field, second interference, including third field and the corresponding third coding of third field, third field includes the first field and the second interference field, wherein, code to be verified is configured between the first interference and the second interference, verification command, input the first coding corresponding to the first field;Step 2 determines whether first coding of user's input is correct.The generation verifying device and electronic equipment of a kind of identifying code is also disclosed in the application.

Description

Generation verification method and device, the electronic product of identifying code
Technical field
This application involves fields of communication technology, such as are related to the generation verification method and device, electronics production of a kind of identifying code Product.
Background technique
Identifying code (CAPTCHA) is " Completely Automated Public Turing test to tell The abbreviation of Computers and Humans Apart " (the full-automatic turing test for distinguishing computer and the mankind), is a kind of area Point access requestor is computer program or the public full auto-programs of people, is commonly used to prevent the programs such as wooden horse malice from cracking close Code, brush screen, forum such as pour water at the behaviors, in order to prevent some hacker to certain particular registered user specific program violences It the modes such as cracks and is constantly logged in trial.Identifying code is usually to be made of some lines and some irregular characters, main If hacker takes the laggard pirate of code dataization in order to prevent.
During realizing the embodiment of the present disclosure, at least there are the following problems in the related technology: existing verifying for discovery Code is easy to influence the safety of user information by malicious code Brute Force.
Summary of the invention
In order to which some aspects of the embodiment to disclosure have basic understanding, simple summary is shown below.It is described general Including is not extensive overview, nor to determine key/critical component or describe the protection scope of these embodiments, but is made For the preamble of following detailed description.
The embodiment of the present disclosure provides the generation verification method and device, electronic product of a kind of identifying code, existing to solve Identifying code the technical issues of being easy by malicious code Brute Force, influencing user information safety.
The embodiment of the present disclosure provides a kind of generation verification method of identifying code.
In some embodiments, the generation verification method of the identifying code includes: step 1, shows identifying code viewing area Domain, the identifying code display area include at least: code to be verified, including the first field and first field corresponding first are compiled Code, the first interference, including the second field and corresponding second coding of second field, second field includes described first Field and the first interference field, the second interference, including third field and the corresponding third coding of the third field, the third Field include first field and second interference field, wherein the code to be verified be configured at it is described first interference with it is described Between second interference, verification command inputs the first coding corresponding to first field;Step 2 determines user's input Whether first coding is correct.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code.
In some embodiments, the generation verifying device of the identifying code includes: display module, for showing that identifying code is aobvious Show that region, the identifying code display area include at least: code to be verified, including the first field and first field corresponding One coding, the first interference, including the second field and corresponding second coding of second field, second field includes described First field and the first interference field, the second interference, including third field and the corresponding third coding of the third field, it is described Third field include first field and second interference field, wherein the code to be verified be configured at it is described first interference with Between second interference, verification command inputs the first coding corresponding to first field;Correction verification module, for determining Whether first coding of user's input is correct.
The embodiment of the present disclosure provides a kind of electronic product, including processor and the memory for being stored with program instruction, also Device is verified in generation including identifying code.
The generation verification method and device, electronic product for the identifying code that the embodiment of the present disclosure provides, may be implemented following skill Art effect:
The generation verification method for the identifying code that the embodiment of the present disclosure provides, using the first interference and the second interference conduct simultaneously Interference, reduces the probability of the malicious code Brute Force identifying code, improves the safety of user information.
Above general description and it is discussed below be only it is exemplary and explanatory, be not used in limitation the application.
Detailed description of the invention
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing The restriction to embodiment is not constituted, the element with same reference numbers label is shown as similar element in attached drawing, and attached drawing is not Composition limitation, and wherein:
Fig. 1 is the schematic diagram for generating the identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 2 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 3 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 4 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 5 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 6 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 7 is the structural schematic diagram for the electronic equipment that the embodiment of the present disclosure provides.
Appended drawing reference:
100: processor;101: memory;102: communication interface;103: bus.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, with reference to the accompanying drawing to this public affairs The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the embodiment of the present disclosure. In technical description below, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details. However, one or more embodiments still can be implemented in the case where without these details.It in other cases, is simplification Attached drawing, well known construction and device can simplify displaying.Multiple embodiments that the embodiment of the present disclosure provides, can be combined with each other.
The embodiment of the present disclosure provides a kind of generation verification method method of identifying code, comprising:
S101 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, wherein Second field includes the first field and the first interference field, and verification command inputs the first coding corresponding to the first field;
Optionally, " code to be verified " may also be referred to as " identifying code to be verified ".The first field in code to be verified can be with To include Chinese character, English alphabet and/or the field of punctuation mark, the first coding can be include Arabic numerals, English The coding of letter and/or punctuation mark;It is similar, the first interference field in the first interference can be include Chinese character, English Letter and/or punctuation mark field, second coding can be include Arabic numerals, English alphabet and/or punctuation mark Coding;Wherein, the first coding is not equal to the second coding.
Verification command inputs the first coding corresponding to the first field.It is understood that verification command herein is aobvious Show the text in identifying code display area, not to the description of user action.It will also be appreciated that verification command herein is only It is the semanteme in order to describe the order, the verification command specifically generated in the text can be different.
" the first field " when malicious code attempts to crack identifying code by way of keyword search, in verification command It can be used as the keyword that malicious code scans for, keyword herein is referred to as keyword, however, due to the first interference In equally include " the first field " this keyword in code to be verified, and, the first field corresponding with the second field first Coding is different from the second coding, and what malicious code was possible to obtain is corresponding second coding of the second field, verifies when detecting In order when the first coding input mistake, then new identifying code is regenerated.As it can be seen that the identifying code that the embodiment of the present disclosure provides Generating verification method reduces the safety that user information is improved by the probability of malicious code Brute Force.
S102 determines whether the first coding of user's input is correct.
When the first coding for detecting that user inputs is correct, then by verifying, when the first volume for detecting user's input When code is incorrect, then new identifying code is regenerated.
The embodiment of the present disclosure to the application scenarios of the identifying code of generation with no restriction, for example, what the embodiment of the present disclosure provided Identifying code can be applied to the verifying carried out when user carries out online purchase train ticket by 12306.
Optionally, the first interference field and the first field constitute continuation field, and continuation field herein can be to lead in Chinese Suitable field, for example, the first interference field may include Arabic numerals, the surname etc. of capitalization.For example, in code to be verified One field can be " student ", and the first coding can be " 10 ", and the code to be verified of generation can be " student 10 ", in the first interference The second field can be " one class of student ", " junior middle school student " or " university student ", second coding can for " 101 ", " 102 " or First interference of " 103 ", generation can be " one class of student 101 ", " junior middle school student 102 " or " university student 103 ".For another example The first field in code to be verified can be " teacher ", and the first coding can be " 20 ", and the code to be verified of generation can be " teacher 20 ", first interference in the second field can be " Mr. Zhang ", " Liu Laoshi " or " Li Laoshi ", second coding can be First interference of " 201 ", " 202 " or " 203 ", generation can be " Mr. Zhang 201 ", " Liu Laoshi 202 " or " Li Laoshi 203 ".
Optionally, the first field in identifying code display area, code to be verified and the display mode of the first coding can be with For character string, that is, the first field constitutes one section of continuous first character string with the first coding, e.g., when the first field is located at first When before coding, the display mode of the first character string is " the first field+the first coding ";After the first field is located at the first coding When, the display mode of the first character string is " first the+the first field of coding ";It is similar, the second field in the first interference and the The display mode of two codings may be character string, that is, and the second field constitutes one section of continuous second character string with the second coding, Such as, when the second field is located at before the second coding, the display mode of the second character string is " the second field+the second coding ";When When two fields are after the second coding, the display mode of the second character string is " second the+the second field of coding ".
As shown in Figure 1, code to be verified is " student 10 ", the first interference is " one class of student 101 ", and verification command is " to ask defeated Enter number corresponding to " student " ", in code to be verified, " student " corresponding number is 10, then the letter that user inputs in input frame Breath should be " 10 ".When malicious code cracks the identifying code, due to equally including " student " in " one class of student " This keyword, and " one class of student " corresponding number is " 101 ", improves the interference to malicious code.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the One coding lower part.The display mode of corresponding second coding of the second field and the second field in first interference is to continuously display, For example, being shown in the form of character string.As shown in Fig. 2, the first field " student " to be verified is shown up and down with the first coding " 10 " Show, reduce continuity, the correspondence of the first field with the first coding, it is corresponding by malicious code success to reduce the first coding Probability;The second field " one class of student " in first interference is continuously displayed with the second coding " 101 ", is improved in the first interference Second coding improves the jamming performance of the first interference by the corresponding probability of malicious code success.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the One coding lower part.Defining the character string that the first field in the first interference is constituted with the second coding is the first interference character string, the In one interference, the display mode of the first interference field and the first interference character string is display up and down, for example, the first interference field bit In the top of the first interference character string, alternatively, the first interference field bit is in the lower part of the first interference character string.As shown in figure 3, to Verifying the first field " student " with first coding " 10 " show up and down, reduce the first field with first encode continuity, Correspondence reduces the first coding by the corresponding probability of malicious code success;And in the first interference, the first field " student " and the Two codings " 101 " continuously display, and, the first interference field " one class " is not continuously displayed with the first field, improves the first interference In the second coding by the corresponding probability of malicious code success, improve the jamming performance of the first interference.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the One coding lower part.Similar, the display mode of the second coding corresponding to the second field and the second field in the first interference is Display up and down, for example, the second field is located at the top of the second coding, alternatively, the second field is located at the lower part of the second coding.Such as figure Shown in 4, the first field " student " to be verified is shown up and down with the first coding " 10 ", reduces the first field and the first coding Continuity, correspondence reduce the first coding by the corresponding probability of malicious code success.
Optionally, when the code to be verified that the first field and the first coding are constituted is the first character string, the second field and second When the first interference that coding is constituted is the second character string, the first character string can be continuously displayed with the second character string, for example, first Character string is " student 10 ", and when the first interference is " one class of student 101 ", the form of the identifying code of generation can be for " student 10 1 Class student 101 ".Code to be verified is continuously displayed with the first interference, improves the interference to malicious code.Optionally, generation Identifying code is the first character string rear, and the second character string is preceding, such as " one class of 101 student 10 of student ", when malicious code passes through one When fixed sequence identifies the keyword in identifying code, there will be interfering first interference setting preceding, and improve evil The error rate of meaning code, improves the safety of user information.Optionally, it is provided between the first character string and the second character string The punctuation marks such as " comma ", " pause mark ", e.g., identifying code display area can be for " student 10, one class of student 101 ", improve user Recognition performance.
As shown in Figure 1, verification command are as follows: " student " corresponding number please be input.User inputs correct identifying code and should be 10, if hacker cracks this identifying code as keyword using " student " in verification command, two keys can be obtained Number 10 and 101 corresponding to word thereby reduces rogue program and cracks probability to identifying code.
Optionally, in the second field, before the first interference field is configured at the first field;Alternatively, the first interference field configuration After the first field.In second field, the first interference field and the first field constitute continuous, clear and coherent character string, retain the Original sequence of each character in the first field in two fields, the rogue program for being conducive to improve hacker search the second field Probability improves the second field to the annoyance level of malicious code.
Optionally, the first interference field includes the first field.For example, code to be verified is " student 10 ", and in the first interference, the One interference field can be " this school student ", and the first interference of generation can be " one class of student 101 of this school student ", the first interference It is middle " student " keyword twice occur, the first interference is improved by the trusting degree of malicious code, is improved malicious code and is cracked Error rate.
Optionally, identifying code display area further include: figure, code to be verified are configured at the first area of figure, and first is dry Disturb the second area for being configured at figure.By code to be verified, multi-section display, user can understand, be illustrated in the graphic with the first interference Tell corresponding to the first field the second coding corresponding to the first coding and the second field, improve user to identifying code Identity, improve user complete verifying efficiency.As shown in Figures 2 to 4.
Optionally, in the identifying code of generation, code to be verified is shown in the form of images, and the first interference is shown in the form of text Show.The code to be verified that image format is shown can be recognized by the user, but cannot be identified in the form of keyword by malicious code, if Malicious code is scanned for by way of " keyword ", then the second field and the second field in only the first interference obtained Corresponding second coding, further improves malice for the error rate cracked.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, including, display module, for showing Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding One coding, the first interference, including the second field and corresponding second coding of the second field, wherein the second field includes the first word Section and the first interference field, verification command input the first coding corresponding to the first field;Correction verification module, for determining user Whether the first coding of input is correct.
Optionally, in the second field, before the first interference field is configured at the first field;Alternatively, the first interference field configuration After the first field.
Optionally, in the second field, the first interference field includes the first field.
Optionally, the identifying code display area of display module further include: figure, code to be verified are configured at the firstth area of figure Domain, the first interference configuration is in the second area of figure.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code In setting, details are not described herein again.
The embodiment of the present disclosure provides the generation verification method of another identifying code simultaneously, comprising:
S201 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, the second word Section includes that the first field and the first interference field, the second interference, including third field and the corresponding third of third field encode, the Three fields include the first field and the second interference field, wherein code to be verified is configured between the first interference and the second interference, is tested Card order inputs the first coding corresponding to the first field;
The generation verification method for the identifying code that the embodiment of the present disclosure provides further includes the second interference.In second interference The second interference field can be the field for including Chinese character, English alphabet and/or punctuation mark, third coding can for comprising There is the coding of Arabic numerals, English alphabet and/or punctuation mark;Wherein, the first coding is encoded not equal to third.It is understood that , it is above-mentioned about first interference embodiment can be applied to herein second interference, details are not described herein again.
The generation verification method for the identifying code that the embodiment of the present disclosure provides, while including that the first interference and second interfere, And code to be verified is set between the first interference and the second interference, the first interference and the second interference form code to be verified certain Encirclement property improves the probability that malicious code obtains the first interference or the second interference, improves the interference to malicious code, drop Low probability of the identifying code by Brute Force.
S202 determines whether the first coding of user's input is correct.
When the first coding for detecting that user inputs is correct, then by verifying, when the first volume for detecting user's input When code is incorrect, then new identifying code is regenerated.
Optionally, the first interference configuration is in the top of code to be verified, and the second interference configuration is in the lower part of code to be verified;Or Person, the first interference configuration is in the left side of code to be verified, and the second interference configuration is in the right of code to be verified.
Malicious code generallys use certain sequence and cracks to identifying code, such as from top to bottom, from bottom to up, alternatively, From left to right, from right to left.In the identifying code that the embodiment of the present disclosure generates, the first interference is respectively arranged to be tested with the second interference Upper and lower two positions for demonstrate,proving code, when malicious code cracks identifying code using sequence from top to bottom or from bottom to up, The first interference or the second interference will be first got, and then improves the first interference, the second interference to the interference of malicious code, Reduce probability of the identifying code by Brute Force of generation.Optionally, the first interference is respectively arranged to be verified with the second interference It left and right two positions of code will when malicious code cracks identifying code using sequence from left to right or from right to left The first interference or the second interference can be first obtained, and then improves the first interference, the second interference to the interference of malicious code, is reduced The identifying code generated is by the probability of Brute Force.
As shown in figure 5, code to be verified " student 10 " is set to the first interference " junior middle school student 102 " and the second " one class of interference Between student 101 ", and, the first interference configuration in the top of code to be verified, the second interference configuration in the lower part of code to be verified, when When malicious code cracks identifying code using sequence from top to bottom or from bottom to up, it will first get the first interference " junior middle school student 102 " or the second interference " one class of student 101 " improves the interference of the first interference, the second interference to malicious code Property, reduce probability of the identifying code by Brute Force of generation.
Optionally, the generation verification method of identifying code further include: third interference, including the 4th field and the 4th field correspond to The 4th coding, the 4th field includes that the first field and third interfere field, wherein code to be verified is configured at the first interference, the Between two interference and third interference.Third interference in third interference field can be include Chinese character, English alphabet and/or mark The field of point symbol, the 4th coding can be the coding for including Arabic numerals, English alphabet and/or punctuation mark;Wherein, First coding is not equal to the 4th coding.It is understood that the embodiment above-mentioned about the first interference can be applied to herein Third interference, details are not described herein again.
Optionally, the first interference, the second interference and third interference are uniformly distributed in around code to be verified, are further mentioned The high encirclement to code to be verified, improves the probability that malicious code obtains the first interference, the second interference or third interference, drop The low identifying code generated is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference and third Interference is configured as generating in the form of images with code to be verified.Malicious code uses the form of image recognition to identifying code sometimes It is decoded, and, it usually cuts, image is parsed one by one, if in resolving from an edge of image, it was found that Target then stops the further parsing to image.In the embodiment of the present disclosure, the first interference, the second interference and third are done respectively Disturb the edge for being configured at code to be verified, make the first interference, second interference or third interference than code to be verified earlier by malice generation Code identification, improves the protective value to code to be verified.
Optionally, the generation verification method of identifying code further include: the 4th interference, including the 5th field and the 5th field correspond to The 5th coding, the 5th field includes the first field and the 4th interference field, wherein code to be verified is configured at the first interference, the Between two interference, third interference and the 4th interference.4th interference in the 4th interference field can be include Chinese character, English words Female and/or punctuation mark field, the 5th coding can be include Arabic numerals, English alphabet and/or punctuation mark Coding;Wherein, the first coding is not equal to the 5th coding.It is understood that the embodiment above-mentioned about the first interference can be with Applied to the 4th interference herein, details are not described herein again.
Optionally, the first interference, the second interference, third interference and the 4th interference are uniformly distributed in the week of code to be verified It encloses, for example, the first interference configuration, in the top of code to be verified, the second interference configuration is matched in the lower part of code to be verified, third interference It is placed in the left side of code to be verified, the 4th interference configuration is in the right of code to be verified.Further improve the encirclement to code to be verified Property, the probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, generation is reduced Identifying code is by the probability of Brute Force.
As shown in fig. 6, code to be verified is " student 10 ", the first interference " one class of student 101 " is configured at the upper of code to be verified Portion, the second interference " schoolgirl 104 " are configured at the lower part of code to be verified, and third interference " junior middle school student 103 " is configured to be verified The left side of code, the 4th interference " high school student 102 " are configured at the right of code to be verified, improve the encirclement to code to be verified, The probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, the verifying of generation is reduced Code is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference, third Interference and the 4th interference are configured as generating in the form of images with code to be verified.Malicious code uses the shape of image recognition sometimes Formula decodes identifying code, and, it is usually cut from an edge of image, image is parsed one by one, if parsed Cheng Zhong, it was found that target then stops the further parsing to image.In the embodiment of the present disclosure, respectively by the first interference, second dry Disturb, third interference and the 4th interference configuration are in four edges of code to be verified, make the first interference, the second interference, third interference or 4th interference being identified by malicious code earlier than code to be verified, improves the protective value to code to be verified.
It is understood that in the generation verification method for the identifying code that the embodiment of the present disclosure provides, not to the quantity of interference It is restricted.For example, can also include the 5th interference, the 6th interference, etc. to improve the encirclement interfered to code to be verified.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, comprising: display module, for showing Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding One coding, the first interference, including the second field and corresponding second coding of the second field, the second field includes the first field and the One interference field, the second interference, including third field and the corresponding third coding of third field, third field includes the first field With the second interference field, wherein code to be verified is configured between the first interference and the second interference, and verification command inputs the first word First coding corresponding to section;Whether correction verification module, the first coding for determining user's input are correct.
Optionally, in display module, the first interference configuration is in the top of code to be verified, and the second interference configuration is in code to be verified Lower part;Alternatively, the first interference configuration is in the left side of code to be verified, the second interference configuration is in the right of code to be verified.
Optionally, display module further include: third interference, including the 4th field and corresponding 4th coding of the 4th field, 4th field includes that the first field and third interfere field, wherein code to be verified is configured at the first interference, the second interference and third Between interference.
Optionally, display module further include: the 4th interference, including the 5th field and corresponding 5th coding of the 5th field, 5th field includes the first field and the 4th interference field, wherein code to be verified is configured at the first interference, the second interference, third Between interference and the 4th interference.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code In setting, details are not described herein again.
The embodiment of the present disclosure provides a kind of electronic equipment simultaneously, as shown in fig. 7, comprises processor 100 and being stored with journey The memory 101 of sequence instruction further includes the generation verifying device of identifying code above-mentioned.
Processor (processor) 100 and memory (memory) 101 can also include communication interface (Communication Interface) 102 and bus 103.Wherein, processor 100, communication interface 102, memory 101 can To complete mutual communication by bus 103.Communication interface 102 can be used for information transmission.Processor 100 can be called and be deposited Logical order in reservoir 101, to execute the generation verification method of the identifying code of above-described embodiment.
Block diagram in attached drawing is shown according to the in the cards of the method and computer program product of the embodiment of the present disclosure Architecture, function and operation.In this regard, each box in block diagram can represent a module, section or code A part, a part of the module, section or code include it is one or more it is for implementing the specified logical function can It executes instruction.In some implementations as replacements, function marked in the box can also be to be different from being marked in attached drawing Sequence occur.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite Sequence executes, this can be depended on the functions involved.In description corresponding to block diagram in the accompanying drawings, different box institutes is right The operation answered or step can also be occurred with being different from sequence disclosed in description, between sometimes different operation or step not There are specific sequences.For example, two continuous operations or step can actually be basically executed in parallel, they sometimes may be used To execute in the opposite order, this can be depended on the functions involved.Each box in block diagram and the box in block diagram Combination, can the dedicated hardware based system of as defined in executing function or movement realize, or can be with dedicated The combination of hardware and computer instruction is realized.

Claims (9)

1. a kind of generation verification method of identifying code characterized by comprising
Step 1 shows that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second field includes described the One field and the first interference field,
Second interference, including third field and the third field corresponding third coding, the third field include described the One field and the second interference field, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first coding corresponding to first field;
Step 2 determines whether first coding of user's input is correct.
2. the method according to claim 1, wherein
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified Side.
3. the method according to claim 1, wherein further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th field includes described the One field and third interfere field,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
4. according to the method described in claim 3, it is characterized by further comprising:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th field includes described the One field and the 4th interference field,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
5. device is verified in a kind of generation of identifying code characterized by comprising
Display module, for showing that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second field includes described the One field and the first interference field,
Second interference, including third field and the third field corresponding third coding, the third field include described the One field and the second interference field, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first coding corresponding to first field;
Whether correction verification module, first coding for determining user's input are correct.
6. device according to claim 5, which is characterized in that in the display module,
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified Side.
7. device according to claim 5, which is characterized in that the display module further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th field includes described the One field and third interfere field,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
8. device according to claim 7, which is characterized in that the display module further include:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th field includes described the One field and the 4th interference field,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
9. a kind of electronic equipment, including processor and the memory for being stored with program instruction, which is characterized in that further include that right is wanted Seek the described in any item devices of 5-8.
CN201910751046.XA 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code Pending CN110443028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910751046.XA CN110443028A (en) 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910751046.XA CN110443028A (en) 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code

Publications (1)

Publication Number Publication Date
CN110443028A true CN110443028A (en) 2019-11-12

Family

ID=68435571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910751046.XA Pending CN110443028A (en) 2019-08-14 2019-08-14 Generation verification method and device, the electronic product of identifying code

Country Status (1)

Country Link
CN (1) CN110443028A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724191A (en) * 2012-06-11 2012-10-10 华南理工大学 Safe protecting method and device for Web verification code with combined picture and characters
CN104657654A (en) * 2014-12-22 2015-05-27 河海大学 Image verification code generation method utilizing human eye vision compensation principle
US20160036821A1 (en) * 2007-05-25 2016-02-04 Michael J. Vandemar Method Of Advertising Using An Electronic Processor Authorization Challenge
CN106878244A (en) * 2016-07-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of authenticity proves information providing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160036821A1 (en) * 2007-05-25 2016-02-04 Michael J. Vandemar Method Of Advertising Using An Electronic Processor Authorization Challenge
CN102724191A (en) * 2012-06-11 2012-10-10 华南理工大学 Safe protecting method and device for Web verification code with combined picture and characters
CN104657654A (en) * 2014-12-22 2015-05-27 河海大学 Image verification code generation method utilizing human eye vision compensation principle
CN106878244A (en) * 2016-07-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of authenticity proves information providing method and device

Similar Documents

Publication Publication Date Title
Yan et al. Breaking visual captchas with naive pattern recognition algorithms
Chew et al. Baffletext: A human interactive proof
Bursztein et al. Easy does it: More usable CAPTCHAs
Chen et al. Detecting visually similar web pages: Application to phishing detection
US9600648B2 (en) Methods and apparatuses for controlling access to computer systems and for annotating media files
CN104200150B (en) Method and device for processing verification codes
US20040250139A1 (en) Apparatus and method for indicating password quality and variety
CN106600717B (en) A kind of method, system and smart machine based on the networking ticket checking of user terminal interface
CN102724191A (en) Safe protecting method and device for Web verification code with combined picture and characters
JP2010067096A (en) Authentication device, authentication method, information processing program, and recording medium
US11775749B1 (en) Content masking attacks against information-based services and defenses thereto
CN108563559A (en) A kind of test method of identifying code, device, terminal device and storage medium
CN104426879B (en) Processing method and the corresponding methods, devices and systems of identifying code generation and verifying
US9075983B2 (en) More secure image-based “CAPTCHA” technique
US8677455B2 (en) Authentication method
CN108510290A (en) Customer information amending method, device, computer equipment and storage medium in call
US20120198530A1 (en) Real time password generation apparatus and method
Furnell Securing information and communications systems: Principles, technologies, and applications
Balagani et al. Pilot: Password and pin information leakage from obfuscated typing videos
Chiasson Usable authentication and click-based graphical passwords
CN111523105B (en) Interactive picture verification method based on semantic understanding
CN113761514A (en) Cloud desktop multi-factor security authentication method and system
CN110443028A (en) Generation verification method and device, the electronic product of identifying code
Kim et al. FakePIN: Dummy key based mobile user authentication scheme
CN110443026A (en) Generation verification method and device, the electronic product of identifying code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191112

RJ01 Rejection of invention patent application after publication