CN112839026B - Behavior verification code generation and verification method based on random grid and random watermark outline - Google Patents
Behavior verification code generation and verification method based on random grid and random watermark outline Download PDFInfo
- Publication number
- CN112839026B CN112839026B CN202011384789.7A CN202011384789A CN112839026B CN 112839026 B CN112839026 B CN 112839026B CN 202011384789 A CN202011384789 A CN 202011384789A CN 112839026 B CN112839026 B CN 112839026B
- Authority
- CN
- China
- Prior art keywords
- verification code
- verification
- code server
- watermark
- dragging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark outline. The method comprises the following steps: firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server; step two, the verification code server side randomly selects K grids from the N grids; step three, the verification code server randomly selects K different patterns from a preset pattern library; step four, the verification code server takes the patterns with the serial number i as the watermark outline in sequence; step five, the verification code server side generates a foreground picture by taking the No. 1 pattern as an outline; step six, the verification code server side sends the verification code picture and the foreground picture to the client side; step seven, receiving a dragging track acquired by a client; and step eight, analyzing and judging the dragging behavior, and feeding back a judgment result to the client. The method effectively solves the problem that the current verification code is easy to be cracked by a machine program.
Description
The technical field is as follows:
the invention relates to a behavior verification code generation and verification method, which is applied to the field of software development and the field of Internet security.
The background art comprises the following steps:
the verification code is a public full-automatic program for distinguishing whether a user is a human or a machine, can resist malicious password breaking and library collision of the machine through simulation of human behavior by running a script program, prevents harmful operations such as ticket swiping, wool pulling, malicious ordering, batch registration, malicious attack and the like, and protects information safety and property safety of websites and various users. The traditional identifying code comprises various forms such as pure letters, pure numbers, letter-number combination, arithmetic calculation and the like, and is easily identified automatically by a machine program. Then, the picture point-contact verification code appears, and verification is completed by manually recognizing the picture semantics and then clicking once or several times according to rules. However, with the development of machine vision technology, a simple picture point-touch verification code can still be quickly recognized by a machine program, if the number of picture point-touches is increased at a glance or the semantic recognition difficulty is increased, although the possibility of being recognized by the machine program can be reduced, the user is also troubled and unfriendly to use.
The behavior verification code is a verification code scheme depending on user behaviors, and usually, dragging, connecting or other modes are adopted to replace keyboard input and mouse clicking, so that the difficulty of simulation operation of a machine program is increased, and the behavior verification code has the advantages of simple user operation and suitability for a mobile phone screen.
The invention content is as follows:
aiming at the potential safety hazard existing in the existing verification code technology, the invention provides a behavior verification code generation and verification method based on a random grid and a random watermark outline.
In order to achieve the purpose, the invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark outline, which comprises the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server randomly selects K grids from the N grids, and numbers the grids are 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server side randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, fully embeds the watermark into the grid with the number i after being scaled according to a proper proportion, and records the coordinate [ x ] of the geometric gravity center of the watermark with the number i i ,y i ]Wherein i is 1, 2, …, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
and step eight, the verification code server analyzes and judges the dragging behavior and feeds back the judgment result to the client.
Further, the analyzing comprises: the verification code server side judges whether a dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging terminal point [ x, y ]]Coordinate [ x ] of geometric barycenter of watermark No. 1 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThe verification is passed, otherwise the verification is not passed.
Further, the analysis further comprises that the verification code server further judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed.
Furthermore, when the watermark is embedded into the grid, the geometric gravity center of the watermark is kept to be coincident with that of the grid.
Further, the dragging track comprises coordinates of each point through which the dragging passes and coordinates [ x, y ] of an end point of the dragging.
Further, the method for judging the rationality comprises the following steps: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein alpha is a preset coefficient which is larger than 1.
The method adopts a dragging type verification code mode of dragging a small foreground picture to a position of an embedded watermark in a background picture, but is different from the traditional dragging type verification code in that firstly, the foreground picture is not a fixed outline any more but a random outline; secondly, the background picture is divided into a plurality of grids; thirdly, randomly selecting a plurality of grids from all grids of the background picture, and embedding a watermark into each grid. Except that the outline of one watermark is consistent with the outline of the foreground picture, the outlines of other watermarks are randomly generated, and the outline of each watermark has difference which can be easily distinguished by naked eyes; fourthly, the action of dragging by a mouse or a finger is not single-direction dragging (such as horizontal dragging along the x axis) but can be freely dragged in any direction of the two-dimensional plane; and fifthly, collecting the whole-course track data (not only the end point coordinates) dragged by the user for behavior analysis, and verifying successfully only when the foreground picture is dragged to the watermark position consistent with the outline of the foreground picture on the two-dimensional plane and the dragging behavior is judged to be reasonable by the server.
The verification code generation and verification method provided by the invention effectively solves the problem that the current verification code is easy to be cracked by a machine program. The method inherits the advantages of simple operation and good experience of the dragging type verification code on one hand, and increases the difficulty of the machine program for automatically identifying the verification code through the matching of the outline pattern on the other hand, and can further increase the difficulty of the machine program for automatically identifying the verification code through the verification of the dragging track reasonability.
Drawings
Fig. 1 is a schematic diagram of a method for dividing a rectangular area into rectangular meshes.
Fig. 2 illustrates a step of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a rectangular grid.
Fig. 3 is a schematic diagram of a method for dividing a circular area into a fan-ring grid.
FIG. 4 is a diagram illustrating steps of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a sector-ring grid.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example 1:
as shown in fig. 1 and fig. 2, the present invention provides a verification code generation and verification method based on random grid position, random watermark contour identification and drag behavior identification, and the specific technical implementation process is as follows:
initialization: a pattern library is maintained at the verification code server. The patterns in the pattern library vary from one pattern to another. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), and may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric center of gravity of the pattern is ensured to fall within the outline of the pattern, and a user can conveniently touch the center of gravity area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that the difference between the pattern and each of the previous patterns is readily detectable by the naked eye.
The verification code server side adopts a rectangular background picture, and uniformly performs grid division by using vertical horizontal lines and vertical lines to equally divide N identical rectangular small grids, as shown in fig. 1.
The generation and verification method of the verification code is as described in fig. 2:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K grids (K is more than or equal to 2 and less than or equal to N) from the N rectangular grids, and numbers the grids are 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern (i is 1, 2, …, K) with the number i as the outline of the watermark, and the pattern is fully embedded into the grid with the number i after being scaled according to a proper proportion, and the geometric gravity center of the watermark is kept to be superposed with the center of the rectangular lattice. Record the center coordinate [ x ] of No. i grid i ,y i ]. And synthesizing the background image and the K watermarks into the verification code image.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server side sends the verification code picture and the foreground picture to the client side.
The verification code plug-in of the client displays the received verification code picture and the foreground picture;
the user needs to drag the foreground picture to the position of the watermark corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
And seventhly, receiving the dragging track (coordinates of each point dragged by the client, including the terminal point coordinates [ x, y ]) by the verification code server.
And step eight, the verification code server analyzes and judges the dragging behavior of the mouse or the finger of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not, and the judgment method is to judge the coordinate [ x, y ]]And [ x ] 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThe verification is passed, otherwise the verification is not passed.
Preferably, the determination of the end point position is verified, the actual length L of the track and the linear distance D from the dragging start point to the dragging end point are calculated, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein alpha is a preset coefficient which is larger than 1.
Example 2: referring to fig. 3 and 4, a verification code generation and verification method based on random grid position, random watermark contour identification and dragging behavior identification provided by the present invention specifically includes the following technical implementation processes:
initialization: a pattern library is maintained at the verification code server. The patterns in the pattern library vary from one pattern to another. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), or may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric gravity center of each pattern is ensured to fall within the outline of the pattern, and a user can conveniently click and touch the gravity center area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that its distinctiveness from that of each previous pattern is readily detectable by the naked eye.
The verification code server side adopts a circular background picture, equally divides a plurality of concentric circles along the radius, equally divides a plurality of fan rings in each layer of ring, equally divides N fan ring cells with approximate areas, and is shown in figure 3.
The generation and verification method of the verification code is as described in fig. 4:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K fan ring cells (K is more than or equal to 2 and less than or equal to N) from the N fan ring cells, and numbers the K fan ring cells to 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, and the pattern with the number i is completely embedded into the sector ring cell with the number i after being scaled according to a proper proportion, and the geometric gravity center and the sector ring cell of the watermark are keptCoincide with each other. Record the central coordinate [ x ] of the small I number sector ring i ,y i ]Where i is 1, 2, …, K. And synthesizing the background image and the K watermarks into the verification code image.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server side sends the verification code picture and the foreground picture to the client side.
And the verification code plug-in of the client displays the received verification code picture and the foreground picture. The user needs to drag the foreground picture to the watermark position corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
And seventhly, receiving the dragging track (coordinates of each point dragged by the client, including the terminal point coordinate [ x, y ]) by the verification code server.
And step eight, the verification code server analyzes and judges the mouse or finger dragging behavior of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not by judging the coordinate [ x, y ]]And [ x ] 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThe verification is passed, otherwise the verification is not passed.
Preferably, the end point position is judged to be verified, the actual length L of the track and the linear distance D from the dragging starting point to the dragging end point are calculated, if L is smaller than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein alpha is a preset coefficient which is larger than 1.
It should be apparent that the described embodiments are only some embodiments of the present invention, and not all embodiments. Furthermore, the schematic diagrams provided in the embodiments are only for illustrating the basic concepts of the present invention in a schematic manner, so as to enable those skilled in the art to understand and read the basic concepts, and are not used to limit the practical limitations of the present invention. Based on various modifications of the embodiment, for example, other mesh division modes are adopted in the background diagram, and for example, adjustment of the drag trajectory rationality decision rule belongs to the protection scope of the present invention.
Claims (3)
1. A behavior verification code generation and verification method based on a random grid and a random watermark outline is characterized by comprising the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server side randomly selects K grids from the N grids of the background image, and numbers the grids to be 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
and step four, the verification code server takes the patterns with the number i as the watermark outline in sequence, the patterns are completely embedded into the grids with the number i after being scaled according to the proportion, and the coordinates [ x ] of the geometric gravity center of the watermark with the number i are recorded i ,y i ]Wherein i ═ 1, 2, …, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
step eight, the verification code server side analyzes and judges the dragging behavior and feeds back the judgment result to the client side;
the analysis comprises the following steps: the verification code server side judges whether the dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging end point [ x, y ]]Coordinate [ x ] of geometric gravity center of No. 1 watermark 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold TThe verification is passed, otherwise, the verification is not passed;
the analysis also comprises that the verification code server judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed;
the method for judging the rationality comprises the following steps: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein α is a preset coefficient greater than 1.
2. The method for generating and verifying the behavioral verification code based on the random grid and the random watermark outline according to claim 1, wherein the watermark is embedded into the grid while keeping the geometric barycenter of the watermark coincident with the geometric barycenter of the grid.
3. The method for generating and verifying the behavioral verification code according to claim 1, wherein the drag trajectory comprises coordinates of points through which the drag passes and coordinates of an end point [ x, y ] of the drag.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011384789.7A CN112839026B (en) | 2020-11-30 | 2020-11-30 | Behavior verification code generation and verification method based on random grid and random watermark outline |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011384789.7A CN112839026B (en) | 2020-11-30 | 2020-11-30 | Behavior verification code generation and verification method based on random grid and random watermark outline |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112839026A CN112839026A (en) | 2021-05-25 |
CN112839026B true CN112839026B (en) | 2022-07-26 |
Family
ID=75923404
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011384789.7A Active CN112839026B (en) | 2020-11-30 | 2020-11-30 | Behavior verification code generation and verification method based on random grid and random watermark outline |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112839026B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101663672A (en) * | 2007-02-21 | 2010-03-03 | 维杜普有限责任公司 | The method and system that is used for graphical image authentication |
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN102624705A (en) * | 2012-02-21 | 2012-08-01 | 西南石油大学 | Intelligent image verification method and intelligent image verification system |
CN103927465A (en) * | 2014-01-05 | 2014-07-16 | 艾文卫 | Verification code generating and verifying method based on graphs |
CN104298912A (en) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | Methods and devices of implementing and generating crack-resistant identifying code |
CN104852889A (en) * | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Picture identifying code generation method and system, and verify method and client side, and server |
CN109299602A (en) * | 2018-08-08 | 2019-02-01 | 厦门大学嘉庚学院 | Verification code generation method based on implicit figure |
CN110246207A (en) * | 2019-06-13 | 2019-09-17 | 四川长虹电器股份有限公司 | Graphical verification code generation method based on multi-layer image |
CN110308846A (en) * | 2019-05-22 | 2019-10-08 | 广西链全科技有限公司 | A kind of generation of two-dimension translational puzzle type identifying code and verification method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660402B (en) * | 2013-11-19 | 2018-05-25 | 深圳市腾讯计算机系统有限公司 | A kind of method, apparatus and system verified to terminal |
CN105975823A (en) * | 2016-05-05 | 2016-09-28 | 百度在线网络技术(北京)有限公司 | Verification method and apparatus used for distinguishing man and machine |
CN109670291B (en) * | 2017-10-17 | 2022-08-09 | 腾讯科技(深圳)有限公司 | Verification code implementation method and device and storage medium |
-
2020
- 2020-11-30 CN CN202011384789.7A patent/CN112839026B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101663672A (en) * | 2007-02-21 | 2010-03-03 | 维杜普有限责任公司 | The method and system that is used for graphical image authentication |
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN102624705A (en) * | 2012-02-21 | 2012-08-01 | 西南石油大学 | Intelligent image verification method and intelligent image verification system |
CN104298912A (en) * | 2013-07-15 | 2015-01-21 | 深圳市腾讯计算机系统有限公司 | Methods and devices of implementing and generating crack-resistant identifying code |
CN103927465A (en) * | 2014-01-05 | 2014-07-16 | 艾文卫 | Verification code generating and verifying method based on graphs |
CN104852889A (en) * | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Picture identifying code generation method and system, and verify method and client side, and server |
CN109299602A (en) * | 2018-08-08 | 2019-02-01 | 厦门大学嘉庚学院 | Verification code generation method based on implicit figure |
CN110308846A (en) * | 2019-05-22 | 2019-10-08 | 广西链全科技有限公司 | A kind of generation of two-dimension translational puzzle type identifying code and verification method |
CN110246207A (en) * | 2019-06-13 | 2019-09-17 | 四川长虹电器股份有限公司 | Graphical verification code generation method based on multi-layer image |
Non-Patent Citations (1)
Title |
---|
基于行为的安全验证码生成及验证方案研究;张艳等;《信息安全研究》;20200205(第02期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112839026A (en) | 2021-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112528264A (en) | Behavior verification code generation and verification method for random position of random contour | |
WO2019153604A1 (en) | Device and method for creating human/machine identification model, and computer readable storage medium | |
CN108229130B (en) | Verification method and device | |
TWI222032B (en) | Hand-written input authentication apparatus, hand-written input authentication method and storage medium storing hand-written input authentication program | |
CN105893827B (en) | A kind of applicative notifications message inspection method and terminal | |
Van Oorschot et al. | Purely automated attacks on passpoints-style graphical passwords | |
US8607331B2 (en) | Captcha image authentication method and system | |
CN108227912A (en) | Apparatus control method and device, electronic equipment, computer storage media | |
US20110292031A1 (en) | Manipulable human interactive proofs | |
CN103413078B (en) | Based on two-layer on-line authentication system and the authentication method of user ID and person's handwriting | |
JPH08510854A (en) | Method and apparatus for grouping and manipulating electronic representations of handwriting, printing and drawing | |
EP3230920B1 (en) | Method for recognizing if a user of an electronic terminal is a human or a robot | |
WO2018072028A1 (en) | Face authentication to mitigate spoofing | |
CN109800559B (en) | Method and device for generating slider verification code, computer equipment and storage medium | |
CN100371945C (en) | Computer assisted calligraphic works distinguishing method between true and false | |
Dinh et al. | Recent advances of Captcha security analysis: a short literature review | |
CN112839026B (en) | Behavior verification code generation and verification method based on random grid and random watermark outline | |
CN113190310B (en) | Verification code design method based on random position object semantic recognition | |
JP5316017B2 (en) | Image processing apparatus, biometric authentication apparatus, image processing method, and program | |
US10372890B2 (en) | Apparatus and method for verifying an identity of a user | |
US6332040B1 (en) | Method and apparatus for sorting and comparing linear configurations | |
CN104077268B (en) | Apparatus for shaping | |
CN114917590B (en) | Virtual reality game system | |
CN110347928A (en) | A kind of recommendation method for personalized information and system | |
JP6168645B2 (en) | Reverse Turing test method and access authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |