CN110443028A - Generation verification method and device, the electronic product of identifying code - Google Patents
Generation verification method and device, the electronic product of identifying code Download PDFInfo
- Publication number
- CN110443028A CN110443028A CN201910751046.XA CN201910751046A CN110443028A CN 110443028 A CN110443028 A CN 110443028A CN 201910751046 A CN201910751046 A CN 201910751046A CN 110443028 A CN110443028 A CN 110443028A
- Authority
- CN
- China
- Prior art keywords
- field
- interference
- code
- coding
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Abstract
This application involves verification code technology fields, a kind of generation verification method of identifying code is disclosed, including step 1, show identifying code display area, identifying code display area includes at least: code to be verified, including corresponding first coding of the first field and the first field, first interference, including corresponding second coding of the second field and the second field, second field includes the first field and the first interference field, second interference, including third field and the corresponding third coding of third field, third field includes the first field and the second interference field, wherein, code to be verified is configured between the first interference and the second interference, verification command, input the first coding corresponding to the first field;Step 2 determines whether first coding of user's input is correct.The generation verifying device and electronic equipment of a kind of identifying code is also disclosed in the application.
Description
Technical field
This application involves fields of communication technology, such as are related to the generation verification method and device, electronics production of a kind of identifying code
Product.
Background technique
Identifying code (CAPTCHA) is " Completely Automated Public Turing test to tell
The abbreviation of Computers and Humans Apart " (the full-automatic turing test for distinguishing computer and the mankind), is a kind of area
Point access requestor is computer program or the public full auto-programs of people, is commonly used to prevent the programs such as wooden horse malice from cracking close
Code, brush screen, forum such as pour water at the behaviors, in order to prevent some hacker to certain particular registered user specific program violences
It the modes such as cracks and is constantly logged in trial.Identifying code is usually to be made of some lines and some irregular characters, main
If hacker takes the laggard pirate of code dataization in order to prevent.
During realizing the embodiment of the present disclosure, at least there are the following problems in the related technology: existing verifying for discovery
Code is easy to influence the safety of user information by malicious code Brute Force.
Summary of the invention
In order to which some aspects of the embodiment to disclosure have basic understanding, simple summary is shown below.It is described general
Including is not extensive overview, nor to determine key/critical component or describe the protection scope of these embodiments, but is made
For the preamble of following detailed description.
The embodiment of the present disclosure provides the generation verification method and device, electronic product of a kind of identifying code, existing to solve
Identifying code the technical issues of being easy by malicious code Brute Force, influencing user information safety.
The embodiment of the present disclosure provides a kind of generation verification method of identifying code.
In some embodiments, the generation verification method of the identifying code includes: step 1, shows identifying code viewing area
Domain, the identifying code display area include at least: code to be verified, including the first field and first field corresponding first are compiled
Code, the first interference, including the second field and corresponding second coding of second field, second field includes described first
Field and the first interference field, the second interference, including third field and the corresponding third coding of the third field, the third
Field include first field and second interference field, wherein the code to be verified be configured at it is described first interference with it is described
Between second interference, verification command inputs the first coding corresponding to first field;Step 2 determines user's input
Whether first coding is correct.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code.
In some embodiments, the generation verifying device of the identifying code includes: display module, for showing that identifying code is aobvious
Show that region, the identifying code display area include at least: code to be verified, including the first field and first field corresponding
One coding, the first interference, including the second field and corresponding second coding of second field, second field includes described
First field and the first interference field, the second interference, including third field and the corresponding third coding of the third field, it is described
Third field include first field and second interference field, wherein the code to be verified be configured at it is described first interference with
Between second interference, verification command inputs the first coding corresponding to first field;Correction verification module, for determining
Whether first coding of user's input is correct.
The embodiment of the present disclosure provides a kind of electronic product, including processor and the memory for being stored with program instruction, also
Device is verified in generation including identifying code.
The generation verification method and device, electronic product for the identifying code that the embodiment of the present disclosure provides, may be implemented following skill
Art effect:
The generation verification method for the identifying code that the embodiment of the present disclosure provides, using the first interference and the second interference conduct simultaneously
Interference, reduces the probability of the malicious code Brute Force identifying code, improves the safety of user information.
Above general description and it is discussed below be only it is exemplary and explanatory, be not used in limitation the application.
Detailed description of the invention
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing
The restriction to embodiment is not constituted, the element with same reference numbers label is shown as similar element in attached drawing, and attached drawing is not
Composition limitation, and wherein:
Fig. 1 is the schematic diagram for generating the identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 2 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 3 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 4 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 5 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 6 is the schematic diagram for generating another identifying code that verification method generates for the identifying code that the embodiment of the present disclosure provides;
Fig. 7 is the structural schematic diagram for the electronic equipment that the embodiment of the present disclosure provides.
Appended drawing reference:
100: processor;101: memory;102: communication interface;103: bus.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, with reference to the accompanying drawing to this public affairs
The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the embodiment of the present disclosure.
In technical description below, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details.
However, one or more embodiments still can be implemented in the case where without these details.It in other cases, is simplification
Attached drawing, well known construction and device can simplify displaying.Multiple embodiments that the embodiment of the present disclosure provides, can be combined with each other.
The embodiment of the present disclosure provides a kind of generation verification method method of identifying code, comprising:
S101 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field
The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, wherein
Second field includes the first field and the first interference field, and verification command inputs the first coding corresponding to the first field;
Optionally, " code to be verified " may also be referred to as " identifying code to be verified ".The first field in code to be verified can be with
To include Chinese character, English alphabet and/or the field of punctuation mark, the first coding can be include Arabic numerals, English
The coding of letter and/or punctuation mark;It is similar, the first interference field in the first interference can be include Chinese character, English
Letter and/or punctuation mark field, second coding can be include Arabic numerals, English alphabet and/or punctuation mark
Coding;Wherein, the first coding is not equal to the second coding.
Verification command inputs the first coding corresponding to the first field.It is understood that verification command herein is aobvious
Show the text in identifying code display area, not to the description of user action.It will also be appreciated that verification command herein is only
It is the semanteme in order to describe the order, the verification command specifically generated in the text can be different.
" the first field " when malicious code attempts to crack identifying code by way of keyword search, in verification command
It can be used as the keyword that malicious code scans for, keyword herein is referred to as keyword, however, due to the first interference
In equally include " the first field " this keyword in code to be verified, and, the first field corresponding with the second field first
Coding is different from the second coding, and what malicious code was possible to obtain is corresponding second coding of the second field, verifies when detecting
In order when the first coding input mistake, then new identifying code is regenerated.As it can be seen that the identifying code that the embodiment of the present disclosure provides
Generating verification method reduces the safety that user information is improved by the probability of malicious code Brute Force.
S102 determines whether the first coding of user's input is correct.
When the first coding for detecting that user inputs is correct, then by verifying, when the first volume for detecting user's input
When code is incorrect, then new identifying code is regenerated.
The embodiment of the present disclosure to the application scenarios of the identifying code of generation with no restriction, for example, what the embodiment of the present disclosure provided
Identifying code can be applied to the verifying carried out when user carries out online purchase train ticket by 12306.
Optionally, the first interference field and the first field constitute continuation field, and continuation field herein can be to lead in Chinese
Suitable field, for example, the first interference field may include Arabic numerals, the surname etc. of capitalization.For example, in code to be verified
One field can be " student ", and the first coding can be " 10 ", and the code to be verified of generation can be " student 10 ", in the first interference
The second field can be " one class of student ", " junior middle school student " or " university student ", second coding can for " 101 ", " 102 " or
First interference of " 103 ", generation can be " one class of student 101 ", " junior middle school student 102 " or " university student 103 ".For another example
The first field in code to be verified can be " teacher ", and the first coding can be " 20 ", and the code to be verified of generation can be " teacher
20 ", first interference in the second field can be " Mr. Zhang ", " Liu Laoshi " or " Li Laoshi ", second coding can be
First interference of " 201 ", " 202 " or " 203 ", generation can be " Mr. Zhang 201 ", " Liu Laoshi 202 " or " Li Laoshi 203 ".
Optionally, the first field in identifying code display area, code to be verified and the display mode of the first coding can be with
For character string, that is, the first field constitutes one section of continuous first character string with the first coding, e.g., when the first field is located at first
When before coding, the display mode of the first character string is " the first field+the first coding ";After the first field is located at the first coding
When, the display mode of the first character string is " first the+the first field of coding ";It is similar, the second field in the first interference and the
The display mode of two codings may be character string, that is, and the second field constitutes one section of continuous second character string with the second coding,
Such as, when the second field is located at before the second coding, the display mode of the second character string is " the second field+the second coding ";When
When two fields are after the second coding, the display mode of the second character string is " second the+the second field of coding ".
As shown in Figure 1, code to be verified is " student 10 ", the first interference is " one class of student 101 ", and verification command is " to ask defeated
Enter number corresponding to " student " ", in code to be verified, " student " corresponding number is 10, then the letter that user inputs in input frame
Breath should be " 10 ".When malicious code cracks the identifying code, due to equally including " student " in " one class of student "
This keyword, and " one class of student " corresponding number is " 101 ", improves the interference to malicious code.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified
The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the
One coding lower part.The display mode of corresponding second coding of the second field and the second field in first interference is to continuously display,
For example, being shown in the form of character string.As shown in Fig. 2, the first field " student " to be verified is shown up and down with the first coding " 10 "
Show, reduce continuity, the correspondence of the first field with the first coding, it is corresponding by malicious code success to reduce the first coding
Probability;The second field " one class of student " in first interference is continuously displayed with the second coding " 101 ", is improved in the first interference
Second coding improves the jamming performance of the first interference by the corresponding probability of malicious code success.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified
The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the
One coding lower part.Defining the character string that the first field in the first interference is constituted with the second coding is the first interference character string, the
In one interference, the display mode of the first interference field and the first interference character string is display up and down, for example, the first interference field bit
In the top of the first interference character string, alternatively, the first interference field bit is in the lower part of the first interference character string.As shown in figure 3, to
Verifying the first field " student " with first coding " 10 " show up and down, reduce the first field with first encode continuity,
Correspondence reduces the first coding by the corresponding probability of malicious code success;And in the first interference, the first field " student " and the
Two codings " 101 " continuously display, and, the first interference field " one class " is not continuously displayed with the first field, improves the first interference
In the second coding by the corresponding probability of malicious code success, improve the jamming performance of the first interference.
Optionally, the first volume corresponding to the first field and the first field in identifying code display area, code to be verified
The display mode of code can be display up and down, for example, the first field is located at the first coding top, alternatively, the first field is located at the
One coding lower part.Similar, the display mode of the second coding corresponding to the second field and the second field in the first interference is
Display up and down, for example, the second field is located at the top of the second coding, alternatively, the second field is located at the lower part of the second coding.Such as figure
Shown in 4, the first field " student " to be verified is shown up and down with the first coding " 10 ", reduces the first field and the first coding
Continuity, correspondence reduce the first coding by the corresponding probability of malicious code success.
Optionally, when the code to be verified that the first field and the first coding are constituted is the first character string, the second field and second
When the first interference that coding is constituted is the second character string, the first character string can be continuously displayed with the second character string, for example, first
Character string is " student 10 ", and when the first interference is " one class of student 101 ", the form of the identifying code of generation can be for " student 10 1
Class student 101 ".Code to be verified is continuously displayed with the first interference, improves the interference to malicious code.Optionally, generation
Identifying code is the first character string rear, and the second character string is preceding, such as " one class of 101 student 10 of student ", when malicious code passes through one
When fixed sequence identifies the keyword in identifying code, there will be interfering first interference setting preceding, and improve evil
The error rate of meaning code, improves the safety of user information.Optionally, it is provided between the first character string and the second character string
The punctuation marks such as " comma ", " pause mark ", e.g., identifying code display area can be for " student 10, one class of student 101 ", improve user
Recognition performance.
As shown in Figure 1, verification command are as follows: " student " corresponding number please be input.User inputs correct identifying code and should be
10, if hacker cracks this identifying code as keyword using " student " in verification command, two keys can be obtained
Number 10 and 101 corresponding to word thereby reduces rogue program and cracks probability to identifying code.
Optionally, in the second field, before the first interference field is configured at the first field;Alternatively, the first interference field configuration
After the first field.In second field, the first interference field and the first field constitute continuous, clear and coherent character string, retain the
Original sequence of each character in the first field in two fields, the rogue program for being conducive to improve hacker search the second field
Probability improves the second field to the annoyance level of malicious code.
Optionally, the first interference field includes the first field.For example, code to be verified is " student 10 ", and in the first interference, the
One interference field can be " this school student ", and the first interference of generation can be " one class of student 101 of this school student ", the first interference
It is middle " student " keyword twice occur, the first interference is improved by the trusting degree of malicious code, is improved malicious code and is cracked
Error rate.
Optionally, identifying code display area further include: figure, code to be verified are configured at the first area of figure, and first is dry
Disturb the second area for being configured at figure.By code to be verified, multi-section display, user can understand, be illustrated in the graphic with the first interference
Tell corresponding to the first field the second coding corresponding to the first coding and the second field, improve user to identifying code
Identity, improve user complete verifying efficiency.As shown in Figures 2 to 4.
Optionally, in the identifying code of generation, code to be verified is shown in the form of images, and the first interference is shown in the form of text
Show.The code to be verified that image format is shown can be recognized by the user, but cannot be identified in the form of keyword by malicious code, if
Malicious code is scanned for by way of " keyword ", then the second field and the second field in only the first interference obtained
Corresponding second coding, further improves malice for the error rate cracked.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, including, display module, for showing
Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding
One coding, the first interference, including the second field and corresponding second coding of the second field, wherein the second field includes the first word
Section and the first interference field, verification command input the first coding corresponding to the first field;Correction verification module, for determining user
Whether the first coding of input is correct.
Optionally, in the second field, before the first interference field is configured at the first field;Alternatively, the first interference field configuration
After the first field.
Optionally, in the second field, the first interference field includes the first field.
Optionally, the identifying code display area of display module further include: figure, code to be verified are configured at the firstth area of figure
Domain, the first interference configuration is in the second area of figure.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code
In setting, details are not described herein again.
The embodiment of the present disclosure provides the generation verification method of another identifying code simultaneously, comprising:
S201 shows that identifying code display area, identifying code display area include at least: code to be verified, including the first field
The first coding corresponding with the first field, the first interference, including the second field and corresponding second coding of the second field, the second word
Section includes that the first field and the first interference field, the second interference, including third field and the corresponding third of third field encode, the
Three fields include the first field and the second interference field, wherein code to be verified is configured between the first interference and the second interference, is tested
Card order inputs the first coding corresponding to the first field;
The generation verification method for the identifying code that the embodiment of the present disclosure provides further includes the second interference.In second interference
The second interference field can be the field for including Chinese character, English alphabet and/or punctuation mark, third coding can for comprising
There is the coding of Arabic numerals, English alphabet and/or punctuation mark;Wherein, the first coding is encoded not equal to third.It is understood that
, it is above-mentioned about first interference embodiment can be applied to herein second interference, details are not described herein again.
The generation verification method for the identifying code that the embodiment of the present disclosure provides, while including that the first interference and second interfere,
And code to be verified is set between the first interference and the second interference, the first interference and the second interference form code to be verified certain
Encirclement property improves the probability that malicious code obtains the first interference or the second interference, improves the interference to malicious code, drop
Low probability of the identifying code by Brute Force.
S202 determines whether the first coding of user's input is correct.
When the first coding for detecting that user inputs is correct, then by verifying, when the first volume for detecting user's input
When code is incorrect, then new identifying code is regenerated.
Optionally, the first interference configuration is in the top of code to be verified, and the second interference configuration is in the lower part of code to be verified;Or
Person, the first interference configuration is in the left side of code to be verified, and the second interference configuration is in the right of code to be verified.
Malicious code generallys use certain sequence and cracks to identifying code, such as from top to bottom, from bottom to up, alternatively,
From left to right, from right to left.In the identifying code that the embodiment of the present disclosure generates, the first interference is respectively arranged to be tested with the second interference
Upper and lower two positions for demonstrate,proving code, when malicious code cracks identifying code using sequence from top to bottom or from bottom to up,
The first interference or the second interference will be first got, and then improves the first interference, the second interference to the interference of malicious code,
Reduce probability of the identifying code by Brute Force of generation.Optionally, the first interference is respectively arranged to be verified with the second interference
It left and right two positions of code will when malicious code cracks identifying code using sequence from left to right or from right to left
The first interference or the second interference can be first obtained, and then improves the first interference, the second interference to the interference of malicious code, is reduced
The identifying code generated is by the probability of Brute Force.
As shown in figure 5, code to be verified " student 10 " is set to the first interference " junior middle school student 102 " and the second " one class of interference
Between student 101 ", and, the first interference configuration in the top of code to be verified, the second interference configuration in the lower part of code to be verified, when
When malicious code cracks identifying code using sequence from top to bottom or from bottom to up, it will first get the first interference
" junior middle school student 102 " or the second interference " one class of student 101 " improves the interference of the first interference, the second interference to malicious code
Property, reduce probability of the identifying code by Brute Force of generation.
Optionally, the generation verification method of identifying code further include: third interference, including the 4th field and the 4th field correspond to
The 4th coding, the 4th field includes that the first field and third interfere field, wherein code to be verified is configured at the first interference, the
Between two interference and third interference.Third interference in third interference field can be include Chinese character, English alphabet and/or mark
The field of point symbol, the 4th coding can be the coding for including Arabic numerals, English alphabet and/or punctuation mark;Wherein,
First coding is not equal to the 4th coding.It is understood that the embodiment above-mentioned about the first interference can be applied to herein
Third interference, details are not described herein again.
Optionally, the first interference, the second interference and third interference are uniformly distributed in around code to be verified, are further mentioned
The high encirclement to code to be verified, improves the probability that malicious code obtains the first interference, the second interference or third interference, drop
The low identifying code generated is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference and third
Interference is configured as generating in the form of images with code to be verified.Malicious code uses the form of image recognition to identifying code sometimes
It is decoded, and, it usually cuts, image is parsed one by one, if in resolving from an edge of image, it was found that
Target then stops the further parsing to image.In the embodiment of the present disclosure, the first interference, the second interference and third are done respectively
Disturb the edge for being configured at code to be verified, make the first interference, second interference or third interference than code to be verified earlier by malice generation
Code identification, improves the protective value to code to be verified.
Optionally, the generation verification method of identifying code further include: the 4th interference, including the 5th field and the 5th field correspond to
The 5th coding, the 5th field includes the first field and the 4th interference field, wherein code to be verified is configured at the first interference, the
Between two interference, third interference and the 4th interference.4th interference in the 4th interference field can be include Chinese character, English words
Female and/or punctuation mark field, the 5th coding can be include Arabic numerals, English alphabet and/or punctuation mark
Coding;Wherein, the first coding is not equal to the 5th coding.It is understood that the embodiment above-mentioned about the first interference can be with
Applied to the 4th interference herein, details are not described herein again.
Optionally, the first interference, the second interference, third interference and the 4th interference are uniformly distributed in the week of code to be verified
It encloses, for example, the first interference configuration, in the top of code to be verified, the second interference configuration is matched in the lower part of code to be verified, third interference
It is placed in the left side of code to be verified, the 4th interference configuration is in the right of code to be verified.Further improve the encirclement to code to be verified
Property, the probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, generation is reduced
Identifying code is by the probability of Brute Force.
As shown in fig. 6, code to be verified is " student 10 ", the first interference " one class of student 101 " is configured at the upper of code to be verified
Portion, the second interference " schoolgirl 104 " are configured at the lower part of code to be verified, and third interference " junior middle school student 103 " is configured to be verified
The left side of code, the 4th interference " high school student 102 " are configured at the right of code to be verified, improve the encirclement to code to be verified,
The probability that malicious code obtains the first interference, the second interference, third interference or the 4th interference is improved, the verifying of generation is reduced
Code is by the probability of Brute Force.
Optionally, the generation verification method for the identifying code that the embodiment of the present disclosure provides, the first interference, the second interference, third
Interference and the 4th interference are configured as generating in the form of images with code to be verified.Malicious code uses the shape of image recognition sometimes
Formula decodes identifying code, and, it is usually cut from an edge of image, image is parsed one by one, if parsed
Cheng Zhong, it was found that target then stops the further parsing to image.In the embodiment of the present disclosure, respectively by the first interference, second dry
Disturb, third interference and the 4th interference configuration are in four edges of code to be verified, make the first interference, the second interference, third interference or
4th interference being identified by malicious code earlier than code to be verified, improves the protective value to code to be verified.
It is understood that in the generation verification method for the identifying code that the embodiment of the present disclosure provides, not to the quantity of interference
It is restricted.For example, can also include the 5th interference, the 6th interference, etc. to improve the encirclement interfered to code to be verified.
The embodiment of the present disclosure provides a kind of generation verifying device of identifying code simultaneously, comprising: display module, for showing
Identifying code display area, identifying code display area include at least: code to be verified, including the first field and the first field corresponding
One coding, the first interference, including the second field and corresponding second coding of the second field, the second field includes the first field and the
One interference field, the second interference, including third field and the corresponding third coding of third field, third field includes the first field
With the second interference field, wherein code to be verified is configured between the first interference and the second interference, and verification command inputs the first word
First coding corresponding to section;Whether correction verification module, the first coding for determining user's input are correct.
Optionally, in display module, the first interference configuration is in the top of code to be verified, and the second interference configuration is in code to be verified
Lower part;Alternatively, the first interference configuration is in the left side of code to be verified, the second interference configuration is in the right of code to be verified.
Optionally, display module further include: third interference, including the 4th field and corresponding 4th coding of the 4th field,
4th field includes that the first field and third interfere field, wherein code to be verified is configured at the first interference, the second interference and third
Between interference.
Optionally, display module further include: the 4th interference, including the 5th field and corresponding 5th coding of the 5th field,
5th field includes the first field and the 4th interference field, wherein code to be verified is configured at the first interference, the second interference, third
Between interference and the 4th interference.
Embodiment in the generation verification method of identifying code above-mentioned can be applied equally to the generation verifying dress of identifying code
In setting, details are not described herein again.
The embodiment of the present disclosure provides a kind of electronic equipment simultaneously, as shown in fig. 7, comprises processor 100 and being stored with journey
The memory 101 of sequence instruction further includes the generation verifying device of identifying code above-mentioned.
Processor (processor) 100 and memory (memory) 101 can also include communication interface
(Communication Interface) 102 and bus 103.Wherein, processor 100, communication interface 102, memory 101 can
To complete mutual communication by bus 103.Communication interface 102 can be used for information transmission.Processor 100 can be called and be deposited
Logical order in reservoir 101, to execute the generation verification method of the identifying code of above-described embodiment.
Block diagram in attached drawing is shown according to the in the cards of the method and computer program product of the embodiment of the present disclosure
Architecture, function and operation.In this regard, each box in block diagram can represent a module, section or code
A part, a part of the module, section or code include it is one or more it is for implementing the specified logical function can
It executes instruction.In some implementations as replacements, function marked in the box can also be to be different from being marked in attached drawing
Sequence occur.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite
Sequence executes, this can be depended on the functions involved.In description corresponding to block diagram in the accompanying drawings, different box institutes is right
The operation answered or step can also be occurred with being different from sequence disclosed in description, between sometimes different operation or step not
There are specific sequences.For example, two continuous operations or step can actually be basically executed in parallel, they sometimes may be used
To execute in the opposite order, this can be depended on the functions involved.Each box in block diagram and the box in block diagram
Combination, can the dedicated hardware based system of as defined in executing function or movement realize, or can be with dedicated
The combination of hardware and computer instruction is realized.
Claims (9)
1. a kind of generation verification method of identifying code characterized by comprising
Step 1 shows that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second field includes described the
One field and the first interference field,
Second interference, including third field and the third field corresponding third coding, the third field include described the
One field and the second interference field, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first coding corresponding to first field;
Step 2 determines whether first coding of user's input is correct.
2. the method according to claim 1, wherein
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified
Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified
Side.
3. the method according to claim 1, wherein further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th field includes described the
One field and third interfere field,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
4. according to the method described in claim 3, it is characterized by further comprising:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th field includes described the
One field and the 4th interference field,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
5. device is verified in a kind of generation of identifying code characterized by comprising
Display module, for showing that identifying code display area, the identifying code display area include at least:
Code to be verified, including the first field and corresponding first coding of first field,
First interference, including the second field and corresponding second coding of second field, second field includes described the
One field and the first interference field,
Second interference, including third field and the third field corresponding third coding, the third field include described the
One field and the second interference field, wherein the code to be verified is configured between first interference and second interference,
Verification command inputs the first coding corresponding to first field;
Whether correction verification module, first coding for determining user's input are correct.
6. device according to claim 5, which is characterized in that in the display module,
First interference configuration is in the top of the code to be verified, and second interference configuration is under the code to be verified
Portion;Alternatively,
First interference configuration is in the left side of the code to be verified, and second interference configuration is in the right side of the code to be verified
Side.
7. device according to claim 5, which is characterized in that the display module further include:
Third interference, including the 4th field and corresponding 4th coding of the 4th field, the 4th field includes described the
One field and third interfere field,
Wherein, the code to be verified is configured between first interference, the second interference and third interference.
8. device according to claim 7, which is characterized in that the display module further include:
4th interference, including the 5th field and corresponding 5th coding of the 5th field, the 5th field includes described the
One field and the 4th interference field,
Wherein, the code to be verified is configured between first interference, the second interference, third interference and the 4th interference.
9. a kind of electronic equipment, including processor and the memory for being stored with program instruction, which is characterized in that further include that right is wanted
Seek the described in any item devices of 5-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910751046.XA CN110443028A (en) | 2019-08-14 | 2019-08-14 | Generation verification method and device, the electronic product of identifying code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910751046.XA CN110443028A (en) | 2019-08-14 | 2019-08-14 | Generation verification method and device, the electronic product of identifying code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110443028A true CN110443028A (en) | 2019-11-12 |
Family
ID=68435571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910751046.XA Pending CN110443028A (en) | 2019-08-14 | 2019-08-14 | Generation verification method and device, the electronic product of identifying code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110443028A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102724191A (en) * | 2012-06-11 | 2012-10-10 | 华南理工大学 | Safe protecting method and device for Web verification code with combined picture and characters |
CN104657654A (en) * | 2014-12-22 | 2015-05-27 | 河海大学 | Image verification code generation method utilizing human eye vision compensation principle |
US20160036821A1 (en) * | 2007-05-25 | 2016-02-04 | Michael J. Vandemar | Method Of Advertising Using An Electronic Processor Authorization Challenge |
CN106878244A (en) * | 2016-07-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of authenticity proves information providing method and device |
-
2019
- 2019-08-14 CN CN201910751046.XA patent/CN110443028A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160036821A1 (en) * | 2007-05-25 | 2016-02-04 | Michael J. Vandemar | Method Of Advertising Using An Electronic Processor Authorization Challenge |
CN102724191A (en) * | 2012-06-11 | 2012-10-10 | 华南理工大学 | Safe protecting method and device for Web verification code with combined picture and characters |
CN104657654A (en) * | 2014-12-22 | 2015-05-27 | 河海大学 | Image verification code generation method utilizing human eye vision compensation principle |
CN106878244A (en) * | 2016-07-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of authenticity proves information providing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yan et al. | Breaking visual captchas with naive pattern recognition algorithms | |
Chew et al. | Baffletext: A human interactive proof | |
Bursztein et al. | Easy does it: More usable CAPTCHAs | |
Chen et al. | Detecting visually similar web pages: Application to phishing detection | |
US9600648B2 (en) | Methods and apparatuses for controlling access to computer systems and for annotating media files | |
CN104200150B (en) | Method and device for processing verification codes | |
US20040250139A1 (en) | Apparatus and method for indicating password quality and variety | |
CN106600717B (en) | A kind of method, system and smart machine based on the networking ticket checking of user terminal interface | |
CN102724191A (en) | Safe protecting method and device for Web verification code with combined picture and characters | |
JP2010067096A (en) | Authentication device, authentication method, information processing program, and recording medium | |
US11775749B1 (en) | Content masking attacks against information-based services and defenses thereto | |
CN108563559A (en) | A kind of test method of identifying code, device, terminal device and storage medium | |
CN104426879B (en) | Processing method and the corresponding methods, devices and systems of identifying code generation and verifying | |
US9075983B2 (en) | More secure image-based “CAPTCHA” technique | |
US8677455B2 (en) | Authentication method | |
CN108510290A (en) | Customer information amending method, device, computer equipment and storage medium in call | |
US20120198530A1 (en) | Real time password generation apparatus and method | |
Furnell | Securing information and communications systems: Principles, technologies, and applications | |
Balagani et al. | Pilot: Password and pin information leakage from obfuscated typing videos | |
Chiasson | Usable authentication and click-based graphical passwords | |
CN111523105B (en) | Interactive picture verification method based on semantic understanding | |
CN113761514A (en) | Cloud desktop multi-factor security authentication method and system | |
CN110443028A (en) | Generation verification method and device, the electronic product of identifying code | |
Kim et al. | FakePIN: Dummy key based mobile user authentication scheme | |
CN110443026A (en) | Generation verification method and device, the electronic product of identifying code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191112 |
|
RJ01 | Rejection of invention patent application after publication |