CN112839026A - Behavior verification code generation and verification method based on random grid and random watermark outline - Google Patents
Behavior verification code generation and verification method based on random grid and random watermark outline Download PDFInfo
- Publication number
- CN112839026A CN112839026A CN202011384789.7A CN202011384789A CN112839026A CN 112839026 A CN112839026 A CN 112839026A CN 202011384789 A CN202011384789 A CN 202011384789A CN 112839026 A CN112839026 A CN 112839026A
- Authority
- CN
- China
- Prior art keywords
- verification code
- verification
- watermark
- random
- dragging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark outline. The method comprises the following steps: firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server; step two, the verification code server side randomly selects K grids from the N grids; step three, the verification code server side randomly selects K different patterns from a preset pattern library; step four, the verification code server takes the patterns with the serial number i as the watermark outline in sequence; step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline; step six, the verification code server sends the verification code picture and the foreground picture to the client; step seven, receiving a dragging track acquired by a client; and step eight, analyzing and judging the dragging behavior, and feeding back a judgment result to the client. The method effectively solves the problem that the current verification code is easy to be cracked by a machine program.
Description
The technical field is as follows:
the invention relates to a behavior verification code generation and verification method, which is applied to the field of software development and the field of internet security.
Background art:
the verification code is a public full-automatic program for distinguishing whether a user is a human or a machine, can resist malicious password cracking and library collision of the machine through running a script program to simulate human behaviors, prevents harmful operations such as ticket swiping, wool pulling, malicious ordering, batch registration, malicious attack and the like, and protects information security and property security of websites and various users. The traditional identifying code comprises various forms such as pure letters, pure numbers, letter-number combination, arithmetic calculation and the like, and is easily identified automatically by a machine program. Then, the picture point-contact verification code appears, and verification is completed by manually recognizing the picture semantics and then clicking once or several times according to rules. However, with the development of machine vision technology, a simple picture point-touch verification code can still be quickly recognized by a machine program, if the number of picture point-touches is increased at a glance or the semantic recognition difficulty is increased, although the possibility of being recognized by the machine program can be reduced, the user is also troubled and unfriendly to use.
The behavior verification code is a verification code scheme depending on user behaviors, usually adopts dragging, connecting or other modes to replace keyboard input and mouse clicking, increases the difficulty of machine program simulation operation, and has the advantages of simple user operation and suitability for mobile phone screens.
The invention content is as follows:
aiming at the potential safety hazard existing in the existing verification code technology, the invention provides a behavior verification code generation and verification method based on a random grid and a random watermark outline.
In order to achieve the above object, the present invention provides a behavior verification code generation and verification method based on a random grid and a random watermark outline, comprising the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server side randomly selects K grids from the N grids, and numbers the grids to be 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server side randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, fully embeds the watermark into the grid with the number i after being scaled according to a proper proportion, and records the coordinate [ x ] of the geometric gravity center of the watermark with the number ii,yi]Wherein i ═ 1, 2,,, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
and step eight, the verification code server analyzes and judges the dragging behavior and feeds back the judgment result to the client.
Further, the analyzing comprises: the verification code server side judges whether the dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging end point [ x, y ]]Coordinate [ x ] of geometric gravity center of No. 1 watermark1,y1]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThen verify the expertOtherwise, the verification is not passed.
Further, the analysis further comprises that the verification code server further judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed.
Furthermore, when the watermark is embedded into the grid, the geometric gravity center of the watermark is kept to be coincident with that of the grid.
Further, the dragging track comprises coordinates of each point through which the dragging is carried out and coordinates [ x, y ] of an end point of the dragging.
Further, the method for judging the rationality comprises the following steps: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein α is a preset coefficient greater than 1.
The method adopts a dragging type verification code mode of dragging a small foreground picture to a position of an embedded watermark in a background picture, but is different from the traditional dragging type verification code, firstly, the foreground picture is not a fixed outline any more but a random outline; secondly, the background picture is divided into a plurality of grids; thirdly, randomly selecting a plurality of grids from all grids of the background picture, and embedding a watermark into each grid. Except that the outline of one watermark is consistent with the outline of the foreground picture, the outlines of other watermarks are randomly generated, and the outline of each watermark has difference which can be easily distinguished by naked eyes; fourthly, the action of dragging by a mouse or a finger is not single-direction dragging (such as horizontal dragging along the x axis) but can be freely dragged in any direction of the two-dimensional plane; and fifthly, collecting the whole-course track data (not only the end point coordinates) dragged by the user for behavior analysis, and verifying successfully only when the foreground picture is dragged to the watermark position consistent with the outline of the foreground picture on the two-dimensional plane and the dragging behavior is judged to be reasonable by the server.
The verification code generation and verification method provided by the invention effectively solves the problem that the current verification code is easy to be cracked by a machine program. The method inherits the advantages of simple operation and good experience of the dragging type verification code on one hand, increases the difficulty of the machine program for automatically identifying the verification code through the matching of the outline pattern on the other hand, and can further increase the difficulty of the machine program for automatically identifying the verification code through the verification of the rationality of the dragging track.
Drawings
Fig. 1 is a schematic diagram of a method for dividing a rectangular area into rectangular meshes.
Fig. 2 illustrates a step of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a rectangular grid.
Fig. 3 is a schematic diagram of a method for dividing a circular area into a fan-ring grid.
FIG. 4 is a diagram illustrating steps of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a sector-ring grid.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example 1:
as shown in fig. 1 and 2, the present invention provides a verification code generation and verification method based on random grid position, random watermark contour identification and drag behavior identification, and the specific technical implementation process is as follows:
initialization: a pattern library is maintained at the captcha server. The patterns in the pattern library vary. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), or may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric gravity center of each pattern is ensured to fall within the outline of the pattern, and a user can conveniently click and touch the gravity center area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that its distinctiveness from that of each previous pattern is readily detectable by the naked eye.
The verification code server side adopts a rectangular background picture, and uniformly performs grid division by using vertical horizontal lines and vertical lines to equally divide N identical rectangular small grids, as shown in fig. 1.
The generation and verification method of the verification code is as described in fig. 2:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K grids (K is more than or equal to 2 and less than or equal to N) from the N rectangular grids, and numbers the grids are 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern (i is 1, 2, K) with the serial number i as the outline of the watermark in sequence, the pattern is completely embedded into the grid with the serial number i after being scaled according to a proper proportion, and the geometric gravity center of the watermark is kept to be coincident with the center of the rectangular small lattice. Record the center coordinate [ x ] of No. i gridi,yi]. And synthesizing the background image and the K watermark verification code images.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server sends the verification code picture and the foreground picture to the client.
The verification code plug-in of the client displays the received verification code picture and the received foreground picture;
the user needs to drag the foreground picture to the position of the watermark corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
Seventhly, the verification code server receives the dragging track (coordinates of each point dragged by the client, including the terminal coordinates [ x, y ]) collected by the client
And step eight, the verification code server analyzes and judges the mouse or finger dragging behavior of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not by judging the coordinate [ x, y ]]And [ x ]1,y1]Comparing the Euclidean distance with a preset judgment threshold TIf, ifThe authentication is passed and otherwise the authentication is not passed.
Preferably, the determination of the end point position is verified, the actual length L of the track and the linear distance D from the dragging start point to the dragging end point are calculated, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein α is a preset coefficient greater than 1.
Example 2: referring to fig. 3 and 4, the specific technical implementation process of the verification code generation and verification method based on the random grid position, the random watermark contour identification and the drag behavior identification provided by the present invention is as follows:
initialization: a pattern library is maintained at the captcha server. The patterns in the pattern library vary. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), or may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric gravity center of each pattern is ensured to fall within the outline of the pattern, and a user can conveniently click and touch the gravity center area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that its distinctiveness from that of each previous pattern is readily detectable by the naked eye.
The verification code server side adopts a circular background picture, equally divides a plurality of concentric circles along the radius, equally divides a plurality of fan rings in each layer of ring, equally divides N fan ring cells with approximate areas, and is shown in figure 3.
The generation and verification method of the verification code is as described in fig. 4:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K fan ring cells (K is more than or equal to 2 and less than or equal to N) from the N fan ring cells, and numbers the K fan ring cells to 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, the watermark is completely embedded into the fan ring cell with the number i after being scaled according to a proper proportion, and the geometric gravity center of the watermark is kept to be coincident with the geometric gravity center of the fan ring cell. Record the central coordinate [ x ] of the small I number sector ringi,yi]Wherein i ═ 1, 2,, K. And synthesizing the background image and the K watermark verification code images.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server sends the verification code picture and the foreground picture to the client.
And the verification code plug-in of the client displays the received verification code picture and the foreground picture. The user needs to drag the foreground picture to the position of the watermark corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
And seventhly, receiving the dragging track (coordinates of each point dragged by the client, including the terminal point coordinates [ x, y ]) by the verification code server.
And step eight, the verification code server analyzes and judges the mouse or finger dragging behavior of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not by judging the coordinate [ x, y ]]And [ x ]1,y1]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThe authentication is passed and otherwise the authentication is not passed.
Preferably, the determination of the end point position is verified, the actual length L of the track and the linear distance D from the dragging start point to the dragging end point are calculated, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein α is a preset coefficient greater than 1.
It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. Moreover, the schematic diagrams provided in the embodiments are only for illustrating the basic concept of the present invention in a schematic manner, so as to be understood and read by those skilled in the art, and are not used to limit the practical limitations of the present invention. Based on various modifications of the embodiment, for example, other mesh division modes are adopted in the background diagram, and for example, adjustment of the drag trajectory rationality decision rule belongs to the protection scope of the present invention.
Claims (6)
1. A behavior verification code generation and verification method based on a random grid and a random watermark outline is characterized by comprising the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server side randomly selects K grids from the N grids, and numbers the grids to be 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server side randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, fully embeds the watermark into the grid with the number i after being scaled according to a proper proportion, and records the coordinate [ x ] of the geometric gravity center of the watermark with the number ii,yi]Wherein i ═ 1, 2,,, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
and step eight, the verification code server analyzes and judges the dragging behavior and feeds back the judgment result to the client.
2. The method for generating and verifying behavioral verification codes based on random lattice and random watermark profile according to claim 1,
the analysis comprises the following steps: the verification code server side judges whether the dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging end point [ x, y ]]Coordinate [ x ] of geometric gravity center of No. 1 watermark1,y1]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThe authentication is passed and otherwise the authentication is not passed.
3. The behavior verification code generation and verification method based on the random grid and the random watermark outline according to claim 1, characterized in that the analysis further comprises that the verification code server further judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed.
4. The method for generating and verifying the behavioral verification code based on the random grid and the random watermark outline according to claim 1, wherein the watermark is embedded into the grid while keeping the geometric center of gravity of the watermark coincident with the geometric center of gravity of the grid.
5. The method for generating and verifying behavioral verification codes based on random lattice and random watermark profile according to claim 1, wherein the dragging trajectory comprises coordinates of points dragged by and coordinates of an end point [ x, y ] of the dragging.
6. A behavior verification code generation and verification method based on random grids and random watermark contours as claimed in claim 3, characterized in that the method for making a decision on rationality is: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein α is a preset coefficient greater than 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011384789.7A CN112839026B (en) | 2020-11-30 | 2020-11-30 | Behavior verification code generation and verification method based on random grid and random watermark outline |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011384789.7A CN112839026B (en) | 2020-11-30 | 2020-11-30 | Behavior verification code generation and verification method based on random grid and random watermark outline |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112839026A true CN112839026A (en) | 2021-05-25 |
CN112839026B CN112839026B (en) | 2022-07-26 |
Family
ID=75923404
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011384789.7A Active CN112839026B (en) | 2020-11-30 | 2020-11-30 | Behavior verification code generation and verification method based on random grid and random watermark outline |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112839026B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101663672A (en) * | 2007-02-21 | 2010-03-03 | 维杜普有限责任公司 | The method and system that is used for graphical image authentication |
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN102624705A (en) * | 2012-02-21 | 2012-08-01 | 西南石油大学 | Intelligent image verification method and intelligent image verification system |
CN103927465A (en) * | 2014-01-05 | 2014-07-16 | 艾文卫 | Verification code generating and verifying method based on graphs |
CN104298912A (en) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | Methods and devices of implementing and generating crack-resistant identifying code |
CN104852889A (en) * | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Picture identifying code generation method and system, and verify method and client side, and server |
US20160292411A1 (en) * | 2013-11-19 | 2016-10-06 | Tencent Technology (Shenzhen) Company Limited | Verification method, apparatus and system |
US20170323093A1 (en) * | 2016-05-05 | 2017-11-09 | Baidu Online Network Technology (Beijing) Co., Ltd. | Verification method and apparatus for distinguishing man from machine |
CN109299602A (en) * | 2018-08-08 | 2019-02-01 | 厦门大学嘉庚学院 | Verification code generation method based on implicit figure |
CN110246207A (en) * | 2019-06-13 | 2019-09-17 | 四川长虹电器股份有限公司 | Graphical verification code generation method based on multi-layer image |
CN110308846A (en) * | 2019-05-22 | 2019-10-08 | 广西链全科技有限公司 | A kind of generation of two-dimension translational puzzle type identifying code and verification method |
US20200026844A1 (en) * | 2017-10-17 | 2020-01-23 | Tencent Technology (Shenzhen) Company Limited | Verification code generation method and apparatus, computer device, and storage medium |
-
2020
- 2020-11-30 CN CN202011384789.7A patent/CN112839026B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101663672A (en) * | 2007-02-21 | 2010-03-03 | 维杜普有限责任公司 | The method and system that is used for graphical image authentication |
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN102624705A (en) * | 2012-02-21 | 2012-08-01 | 西南石油大学 | Intelligent image verification method and intelligent image verification system |
CN104298912A (en) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | Methods and devices of implementing and generating crack-resistant identifying code |
US20160292411A1 (en) * | 2013-11-19 | 2016-10-06 | Tencent Technology (Shenzhen) Company Limited | Verification method, apparatus and system |
CN103927465A (en) * | 2014-01-05 | 2014-07-16 | 艾文卫 | Verification code generating and verifying method based on graphs |
CN104852889A (en) * | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Picture identifying code generation method and system, and verify method and client side, and server |
US20170323093A1 (en) * | 2016-05-05 | 2017-11-09 | Baidu Online Network Technology (Beijing) Co., Ltd. | Verification method and apparatus for distinguishing man from machine |
US20200026844A1 (en) * | 2017-10-17 | 2020-01-23 | Tencent Technology (Shenzhen) Company Limited | Verification code generation method and apparatus, computer device, and storage medium |
CN109299602A (en) * | 2018-08-08 | 2019-02-01 | 厦门大学嘉庚学院 | Verification code generation method based on implicit figure |
CN110308846A (en) * | 2019-05-22 | 2019-10-08 | 广西链全科技有限公司 | A kind of generation of two-dimension translational puzzle type identifying code and verification method |
CN110246207A (en) * | 2019-06-13 | 2019-09-17 | 四川长虹电器股份有限公司 | Graphical verification code generation method based on multi-layer image |
Non-Patent Citations (1)
Title |
---|
张艳等: "基于行为的安全验证码生成及验证方案研究", 《信息安全研究》 * |
Also Published As
Publication number | Publication date |
---|---|
CN112839026B (en) | 2022-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108229130B (en) | Verification method and device | |
CN112528264A (en) | Behavior verification code generation and verification method for random position of random contour | |
Van Oorschot et al. | Purely automated attacks on passpoints-style graphical passwords | |
Thorpe et al. | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. | |
US8510814B2 (en) | Method and apparatus for network authentication of human interaction and user identity | |
CN104820924B (en) | A kind of online safety payment system based on handwriting verification | |
CN110543822A (en) | finger vein identification method based on convolutional neural network and supervised discrete hash algorithm | |
CN103413078B (en) | Based on two-layer on-line authentication system and the authentication method of user ID and person's handwriting | |
CN1445654A (en) | Hand-write input discriminator, method and medium for storing hand-wirte input discriminating program | |
CN103984920B (en) | Three-dimensional face identification method based on sparse representation and multiple feature points | |
CN108919955B (en) | Virtual sand painting interaction combination method based on multi-body feeling equipment | |
CN109800559B (en) | Method and device for generating slider verification code, computer equipment and storage medium | |
CN105404885B (en) | A kind of two dimension character graphics identifying code complex background noise jamming minimizing technology | |
CN106572097A (en) | Mobile device-based mixed identity authentication method | |
JP5126084B2 (en) | Biometric authentication device, biometric authentication method, and program | |
CN110308846A (en) | A kind of generation of two-dimension translational puzzle type identifying code and verification method | |
JP5316017B2 (en) | Image processing apparatus, biometric authentication apparatus, image processing method, and program | |
CN113190310B (en) | Verification code design method based on random position object semantic recognition | |
CN112839026B (en) | Behavior verification code generation and verification method based on random grid and random watermark outline | |
CN110246207A (en) | Graphical verification code generation method based on multi-layer image | |
Chaudhari et al. | 3D drag-n-drop CAPTCHA enhanced security through CAPTCHA | |
CN114917590B (en) | Virtual reality game system | |
CN115879083A (en) | Intelligent verification code method | |
CN113190826A (en) | Behavior verification code generation and verification method based on semantic recognition and connection | |
CN112257053A (en) | Image verification code generation method and system based on universal anti-disturbance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |