CN112839026A - Behavior verification code generation and verification method based on random grid and random watermark outline - Google Patents

Behavior verification code generation and verification method based on random grid and random watermark outline Download PDF

Info

Publication number
CN112839026A
CN112839026A CN202011384789.7A CN202011384789A CN112839026A CN 112839026 A CN112839026 A CN 112839026A CN 202011384789 A CN202011384789 A CN 202011384789A CN 112839026 A CN112839026 A CN 112839026A
Authority
CN
China
Prior art keywords
verification code
verification
watermark
random
dragging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011384789.7A
Other languages
Chinese (zh)
Other versions
CN112839026B (en
Inventor
钱小聪
吴忠华
姜岚
周煜申
刘晓程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huatian Engineering and Technology Corp MCC
Original Assignee
Huatian Engineering and Technology Corp MCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huatian Engineering and Technology Corp MCC filed Critical Huatian Engineering and Technology Corp MCC
Priority to CN202011384789.7A priority Critical patent/CN112839026B/en
Publication of CN112839026A publication Critical patent/CN112839026A/en
Application granted granted Critical
Publication of CN112839026B publication Critical patent/CN112839026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark outline. The method comprises the following steps: firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server; step two, the verification code server side randomly selects K grids from the N grids; step three, the verification code server side randomly selects K different patterns from a preset pattern library; step four, the verification code server takes the patterns with the serial number i as the watermark outline in sequence; step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline; step six, the verification code server sends the verification code picture and the foreground picture to the client; step seven, receiving a dragging track acquired by a client; and step eight, analyzing and judging the dragging behavior, and feeding back a judgment result to the client. The method effectively solves the problem that the current verification code is easy to be cracked by a machine program.

Description

Behavior verification code generation and verification method based on random grid and random watermark outline
The technical field is as follows:
the invention relates to a behavior verification code generation and verification method, which is applied to the field of software development and the field of internet security.
Background art:
the verification code is a public full-automatic program for distinguishing whether a user is a human or a machine, can resist malicious password cracking and library collision of the machine through running a script program to simulate human behaviors, prevents harmful operations such as ticket swiping, wool pulling, malicious ordering, batch registration, malicious attack and the like, and protects information security and property security of websites and various users. The traditional identifying code comprises various forms such as pure letters, pure numbers, letter-number combination, arithmetic calculation and the like, and is easily identified automatically by a machine program. Then, the picture point-contact verification code appears, and verification is completed by manually recognizing the picture semantics and then clicking once or several times according to rules. However, with the development of machine vision technology, a simple picture point-touch verification code can still be quickly recognized by a machine program, if the number of picture point-touches is increased at a glance or the semantic recognition difficulty is increased, although the possibility of being recognized by the machine program can be reduced, the user is also troubled and unfriendly to use.
The behavior verification code is a verification code scheme depending on user behaviors, usually adopts dragging, connecting or other modes to replace keyboard input and mouse clicking, increases the difficulty of machine program simulation operation, and has the advantages of simple user operation and suitability for mobile phone screens.
The invention content is as follows:
aiming at the potential safety hazard existing in the existing verification code technology, the invention provides a behavior verification code generation and verification method based on a random grid and a random watermark outline.
In order to achieve the above object, the present invention provides a behavior verification code generation and verification method based on a random grid and a random watermark outline, comprising the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server side randomly selects K grids from the N grids, and numbers the grids to be 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server side randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, fully embeds the watermark into the grid with the number i after being scaled according to a proper proportion, and records the coordinate [ x ] of the geometric gravity center of the watermark with the number ii,yi]Wherein i ═ 1, 2,,, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
and step eight, the verification code server analyzes and judges the dragging behavior and feeds back the judgment result to the client.
Further, the analyzing comprises: the verification code server side judges whether the dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging end point [ x, y ]]Coordinate [ x ] of geometric gravity center of No. 1 watermark1,y1]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure BDA0002809349460000021
Then verify the expertOtherwise, the verification is not passed.
Further, the analysis further comprises that the verification code server further judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed.
Furthermore, when the watermark is embedded into the grid, the geometric gravity center of the watermark is kept to be coincident with that of the grid.
Further, the dragging track comprises coordinates of each point through which the dragging is carried out and coordinates [ x, y ] of an end point of the dragging.
Further, the method for judging the rationality comprises the following steps: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein α is a preset coefficient greater than 1.
The method adopts a dragging type verification code mode of dragging a small foreground picture to a position of an embedded watermark in a background picture, but is different from the traditional dragging type verification code, firstly, the foreground picture is not a fixed outline any more but a random outline; secondly, the background picture is divided into a plurality of grids; thirdly, randomly selecting a plurality of grids from all grids of the background picture, and embedding a watermark into each grid. Except that the outline of one watermark is consistent with the outline of the foreground picture, the outlines of other watermarks are randomly generated, and the outline of each watermark has difference which can be easily distinguished by naked eyes; fourthly, the action of dragging by a mouse or a finger is not single-direction dragging (such as horizontal dragging along the x axis) but can be freely dragged in any direction of the two-dimensional plane; and fifthly, collecting the whole-course track data (not only the end point coordinates) dragged by the user for behavior analysis, and verifying successfully only when the foreground picture is dragged to the watermark position consistent with the outline of the foreground picture on the two-dimensional plane and the dragging behavior is judged to be reasonable by the server.
The verification code generation and verification method provided by the invention effectively solves the problem that the current verification code is easy to be cracked by a machine program. The method inherits the advantages of simple operation and good experience of the dragging type verification code on one hand, increases the difficulty of the machine program for automatically identifying the verification code through the matching of the outline pattern on the other hand, and can further increase the difficulty of the machine program for automatically identifying the verification code through the verification of the rationality of the dragging track.
Drawings
Fig. 1 is a schematic diagram of a method for dividing a rectangular area into rectangular meshes.
Fig. 2 illustrates a step of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a rectangular grid.
Fig. 3 is a schematic diagram of a method for dividing a circular area into a fan-ring grid.
FIG. 4 is a diagram illustrating steps of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a sector-ring grid.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example 1:
as shown in fig. 1 and 2, the present invention provides a verification code generation and verification method based on random grid position, random watermark contour identification and drag behavior identification, and the specific technical implementation process is as follows:
initialization: a pattern library is maintained at the captcha server. The patterns in the pattern library vary. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), or may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric gravity center of each pattern is ensured to fall within the outline of the pattern, and a user can conveniently click and touch the gravity center area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that its distinctiveness from that of each previous pattern is readily detectable by the naked eye.
The verification code server side adopts a rectangular background picture, and uniformly performs grid division by using vertical horizontal lines and vertical lines to equally divide N identical rectangular small grids, as shown in fig. 1.
The generation and verification method of the verification code is as described in fig. 2:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K grids (K is more than or equal to 2 and less than or equal to N) from the N rectangular grids, and numbers the grids are 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern (i is 1, 2, K) with the serial number i as the outline of the watermark in sequence, the pattern is completely embedded into the grid with the serial number i after being scaled according to a proper proportion, and the geometric gravity center of the watermark is kept to be coincident with the center of the rectangular small lattice. Record the center coordinate [ x ] of No. i gridi,yi]. And synthesizing the background image and the K watermark verification code images.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server sends the verification code picture and the foreground picture to the client.
The verification code plug-in of the client displays the received verification code picture and the received foreground picture;
the user needs to drag the foreground picture to the position of the watermark corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
Seventhly, the verification code server receives the dragging track (coordinates of each point dragged by the client, including the terminal coordinates [ x, y ]) collected by the client
And step eight, the verification code server analyzes and judges the mouse or finger dragging behavior of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not by judging the coordinate [ x, y ]]And [ x ]1,y1]Comparing the Euclidean distance with a preset judgment threshold TIf, if
Figure BDA0002809349460000041
The authentication is passed and otherwise the authentication is not passed.
Preferably, the determination of the end point position is verified, the actual length L of the track and the linear distance D from the dragging start point to the dragging end point are calculated, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein α is a preset coefficient greater than 1.
Example 2: referring to fig. 3 and 4, the specific technical implementation process of the verification code generation and verification method based on the random grid position, the random watermark contour identification and the drag behavior identification provided by the present invention is as follows:
initialization: a pattern library is maintained at the captcha server. The patterns in the pattern library vary. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), or may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric gravity center of each pattern is ensured to fall within the outline of the pattern, and a user can conveniently click and touch the gravity center area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that its distinctiveness from that of each previous pattern is readily detectable by the naked eye.
The verification code server side adopts a circular background picture, equally divides a plurality of concentric circles along the radius, equally divides a plurality of fan rings in each layer of ring, equally divides N fan ring cells with approximate areas, and is shown in figure 3.
The generation and verification method of the verification code is as described in fig. 4:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K fan ring cells (K is more than or equal to 2 and less than or equal to N) from the N fan ring cells, and numbers the K fan ring cells to 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, the watermark is completely embedded into the fan ring cell with the number i after being scaled according to a proper proportion, and the geometric gravity center of the watermark is kept to be coincident with the geometric gravity center of the fan ring cell. Record the central coordinate [ x ] of the small I number sector ringi,yi]Wherein i ═ 1, 2,, K. And synthesizing the background image and the K watermark verification code images.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server sends the verification code picture and the foreground picture to the client.
And the verification code plug-in of the client displays the received verification code picture and the foreground picture. The user needs to drag the foreground picture to the position of the watermark corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
And seventhly, receiving the dragging track (coordinates of each point dragged by the client, including the terminal point coordinates [ x, y ]) by the verification code server.
And step eight, the verification code server analyzes and judges the mouse or finger dragging behavior of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not by judging the coordinate [ x, y ]]And [ x ]1,y1]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure BDA0002809349460000051
The authentication is passed and otherwise the authentication is not passed.
Preferably, the determination of the end point position is verified, the actual length L of the track and the linear distance D from the dragging start point to the dragging end point are calculated, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein α is a preset coefficient greater than 1.
It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. Moreover, the schematic diagrams provided in the embodiments are only for illustrating the basic concept of the present invention in a schematic manner, so as to be understood and read by those skilled in the art, and are not used to limit the practical limitations of the present invention. Based on various modifications of the embodiment, for example, other mesh division modes are adopted in the background diagram, and for example, adjustment of the drag trajectory rationality decision rule belongs to the protection scope of the present invention.

Claims (6)

1. A behavior verification code generation and verification method based on a random grid and a random watermark outline is characterized by comprising the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server side randomly selects K grids from the N grids, and numbers the grids to be 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server side randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, fully embeds the watermark into the grid with the number i after being scaled according to a proper proportion, and records the coordinate [ x ] of the geometric gravity center of the watermark with the number ii,yi]Wherein i ═ 1, 2,,, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
and step eight, the verification code server analyzes and judges the dragging behavior and feeds back the judgment result to the client.
2. The method for generating and verifying behavioral verification codes based on random lattice and random watermark profile according to claim 1,
the analysis comprises the following steps: the verification code server side judges whether the dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging end point [ x, y ]]Coordinate [ x ] of geometric gravity center of No. 1 watermark1,y1]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure FDA0002809349450000011
The authentication is passed and otherwise the authentication is not passed.
3. The behavior verification code generation and verification method based on the random grid and the random watermark outline according to claim 1, characterized in that the analysis further comprises that the verification code server further judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed.
4. The method for generating and verifying the behavioral verification code based on the random grid and the random watermark outline according to claim 1, wherein the watermark is embedded into the grid while keeping the geometric center of gravity of the watermark coincident with the geometric center of gravity of the grid.
5. The method for generating and verifying behavioral verification codes based on random lattice and random watermark profile according to claim 1, wherein the dragging trajectory comprises coordinates of points dragged by and coordinates of an end point [ x, y ] of the dragging.
6. A behavior verification code generation and verification method based on random grids and random watermark contours as claimed in claim 3, characterized in that the method for making a decision on rationality is: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein α is a preset coefficient greater than 1.
CN202011384789.7A 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline Active CN112839026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011384789.7A CN112839026B (en) 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011384789.7A CN112839026B (en) 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline

Publications (2)

Publication Number Publication Date
CN112839026A true CN112839026A (en) 2021-05-25
CN112839026B CN112839026B (en) 2022-07-26

Family

ID=75923404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011384789.7A Active CN112839026B (en) 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline

Country Status (1)

Country Link
CN (1) CN112839026B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101663672A (en) * 2007-02-21 2010-03-03 维杜普有限责任公司 The method and system that is used for graphical image authentication
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
CN102624705A (en) * 2012-02-21 2012-08-01 西南石油大学 Intelligent image verification method and intelligent image verification system
CN103927465A (en) * 2014-01-05 2014-07-16 艾文卫 Verification code generating and verifying method based on graphs
CN104298912A (en) * 2013-07-15 2015-01-21 深圳市腾讯计算机系统有限公司 Methods and devices of implementing and generating crack-resistant identifying code
CN104852889A (en) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 Picture identifying code generation method and system, and verify method and client side, and server
US20160292411A1 (en) * 2013-11-19 2016-10-06 Tencent Technology (Shenzhen) Company Limited Verification method, apparatus and system
US20170323093A1 (en) * 2016-05-05 2017-11-09 Baidu Online Network Technology (Beijing) Co., Ltd. Verification method and apparatus for distinguishing man from machine
CN109299602A (en) * 2018-08-08 2019-02-01 厦门大学嘉庚学院 Verification code generation method based on implicit figure
CN110246207A (en) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 Graphical verification code generation method based on multi-layer image
CN110308846A (en) * 2019-05-22 2019-10-08 广西链全科技有限公司 A kind of generation of two-dimension translational puzzle type identifying code and verification method
US20200026844A1 (en) * 2017-10-17 2020-01-23 Tencent Technology (Shenzhen) Company Limited Verification code generation method and apparatus, computer device, and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101663672A (en) * 2007-02-21 2010-03-03 维杜普有限责任公司 The method and system that is used for graphical image authentication
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
CN102624705A (en) * 2012-02-21 2012-08-01 西南石油大学 Intelligent image verification method and intelligent image verification system
CN104298912A (en) * 2013-07-15 2015-01-21 深圳市腾讯计算机系统有限公司 Methods and devices of implementing and generating crack-resistant identifying code
US20160292411A1 (en) * 2013-11-19 2016-10-06 Tencent Technology (Shenzhen) Company Limited Verification method, apparatus and system
CN103927465A (en) * 2014-01-05 2014-07-16 艾文卫 Verification code generating and verifying method based on graphs
CN104852889A (en) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 Picture identifying code generation method and system, and verify method and client side, and server
US20170323093A1 (en) * 2016-05-05 2017-11-09 Baidu Online Network Technology (Beijing) Co., Ltd. Verification method and apparatus for distinguishing man from machine
US20200026844A1 (en) * 2017-10-17 2020-01-23 Tencent Technology (Shenzhen) Company Limited Verification code generation method and apparatus, computer device, and storage medium
CN109299602A (en) * 2018-08-08 2019-02-01 厦门大学嘉庚学院 Verification code generation method based on implicit figure
CN110308846A (en) * 2019-05-22 2019-10-08 广西链全科技有限公司 A kind of generation of two-dimension translational puzzle type identifying code and verification method
CN110246207A (en) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 Graphical verification code generation method based on multi-layer image

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张艳等: "基于行为的安全验证码生成及验证方案研究", 《信息安全研究》 *

Also Published As

Publication number Publication date
CN112839026B (en) 2022-07-26

Similar Documents

Publication Publication Date Title
CN108229130B (en) Verification method and device
CN112528264A (en) Behavior verification code generation and verification method for random position of random contour
Van Oorschot et al. Purely automated attacks on passpoints-style graphical passwords
Thorpe et al. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.
US8510814B2 (en) Method and apparatus for network authentication of human interaction and user identity
CN104820924B (en) A kind of online safety payment system based on handwriting verification
CN110543822A (en) finger vein identification method based on convolutional neural network and supervised discrete hash algorithm
CN103413078B (en) Based on two-layer on-line authentication system and the authentication method of user ID and person's handwriting
CN1445654A (en) Hand-write input discriminator, method and medium for storing hand-wirte input discriminating program
CN103984920B (en) Three-dimensional face identification method based on sparse representation and multiple feature points
CN108919955B (en) Virtual sand painting interaction combination method based on multi-body feeling equipment
CN109800559B (en) Method and device for generating slider verification code, computer equipment and storage medium
CN105404885B (en) A kind of two dimension character graphics identifying code complex background noise jamming minimizing technology
CN106572097A (en) Mobile device-based mixed identity authentication method
JP5126084B2 (en) Biometric authentication device, biometric authentication method, and program
CN110308846A (en) A kind of generation of two-dimension translational puzzle type identifying code and verification method
JP5316017B2 (en) Image processing apparatus, biometric authentication apparatus, image processing method, and program
CN113190310B (en) Verification code design method based on random position object semantic recognition
CN112839026B (en) Behavior verification code generation and verification method based on random grid and random watermark outline
CN110246207A (en) Graphical verification code generation method based on multi-layer image
Chaudhari et al. 3D drag-n-drop CAPTCHA enhanced security through CAPTCHA
CN114917590B (en) Virtual reality game system
CN115879083A (en) Intelligent verification code method
CN113190826A (en) Behavior verification code generation and verification method based on semantic recognition and connection
CN112257053A (en) Image verification code generation method and system based on universal anti-disturbance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant