CN112839026B - Behavior verification code generation and verification method based on random grid and random watermark outline - Google Patents

Behavior verification code generation and verification method based on random grid and random watermark outline Download PDF

Info

Publication number
CN112839026B
CN112839026B CN202011384789.7A CN202011384789A CN112839026B CN 112839026 B CN112839026 B CN 112839026B CN 202011384789 A CN202011384789 A CN 202011384789A CN 112839026 B CN112839026 B CN 112839026B
Authority
CN
China
Prior art keywords
verification code
verification
code server
watermark
dragging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011384789.7A
Other languages
Chinese (zh)
Other versions
CN112839026A (en
Inventor
钱小聪
吴忠华
姜岚
周煜申
刘晓程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huatian Engineering and Technology Corp MCC
Original Assignee
Huatian Engineering and Technology Corp MCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huatian Engineering and Technology Corp MCC filed Critical Huatian Engineering and Technology Corp MCC
Priority to CN202011384789.7A priority Critical patent/CN112839026B/en
Publication of CN112839026A publication Critical patent/CN112839026A/en
Application granted granted Critical
Publication of CN112839026B publication Critical patent/CN112839026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark outline. The method comprises the following steps: firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server; step two, the verification code server side randomly selects K grids from the N grids; step three, the verification code server randomly selects K different patterns from a preset pattern library; step four, the verification code server takes the patterns with the serial number i as the watermark outline in sequence; step five, the verification code server side generates a foreground picture by taking the No. 1 pattern as an outline; step six, the verification code server side sends the verification code picture and the foreground picture to the client side; step seven, receiving a dragging track acquired by a client; and step eight, analyzing and judging the dragging behavior, and feeding back a judgment result to the client. The method effectively solves the problem that the current verification code is easy to be cracked by a machine program.

Description

Behavior verification code generation and verification method based on random grid and random watermark outline
The technical field is as follows:
the invention relates to a behavior verification code generation and verification method, which is applied to the field of software development and the field of Internet security.
The background art comprises the following steps:
the verification code is a public full-automatic program for distinguishing whether a user is a human or a machine, can resist malicious password breaking and library collision of the machine through simulation of human behavior by running a script program, prevents harmful operations such as ticket swiping, wool pulling, malicious ordering, batch registration, malicious attack and the like, and protects information safety and property safety of websites and various users. The traditional identifying code comprises various forms such as pure letters, pure numbers, letter-number combination, arithmetic calculation and the like, and is easily identified automatically by a machine program. Then, the picture point-contact verification code appears, and verification is completed by manually recognizing the picture semantics and then clicking once or several times according to rules. However, with the development of machine vision technology, a simple picture point-touch verification code can still be quickly recognized by a machine program, if the number of picture point-touches is increased at a glance or the semantic recognition difficulty is increased, although the possibility of being recognized by the machine program can be reduced, the user is also troubled and unfriendly to use.
The behavior verification code is a verification code scheme depending on user behaviors, and usually, dragging, connecting or other modes are adopted to replace keyboard input and mouse clicking, so that the difficulty of simulation operation of a machine program is increased, and the behavior verification code has the advantages of simple user operation and suitability for a mobile phone screen.
The invention content is as follows:
aiming at the potential safety hazard existing in the existing verification code technology, the invention provides a behavior verification code generation and verification method based on a random grid and a random watermark outline.
In order to achieve the purpose, the invention discloses a behavior verification code generation and verification method based on a random grid and a random watermark outline, which comprises the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server randomly selects K grids from the N grids, and numbers the grids are 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server side randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, fully embeds the watermark into the grid with the number i after being scaled according to a proper proportion, and records the coordinate [ x ] of the geometric gravity center of the watermark with the number i i ,y i ]Wherein i is 1, 2, …, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
and step eight, the verification code server analyzes and judges the dragging behavior and feeds back the judgment result to the client.
Further, the analyzing comprises: the verification code server side judges whether a dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging terminal point [ x, y ]]Coordinate [ x ] of geometric barycenter of watermark No. 1 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure GDA0003629975130000021
The verification is passed, otherwise the verification is not passed.
Further, the analysis further comprises that the verification code server further judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed.
Furthermore, when the watermark is embedded into the grid, the geometric gravity center of the watermark is kept to be coincident with that of the grid.
Further, the dragging track comprises coordinates of each point through which the dragging passes and coordinates [ x, y ] of an end point of the dragging.
Further, the method for judging the rationality comprises the following steps: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein alpha is a preset coefficient which is larger than 1.
The method adopts a dragging type verification code mode of dragging a small foreground picture to a position of an embedded watermark in a background picture, but is different from the traditional dragging type verification code in that firstly, the foreground picture is not a fixed outline any more but a random outline; secondly, the background picture is divided into a plurality of grids; thirdly, randomly selecting a plurality of grids from all grids of the background picture, and embedding a watermark into each grid. Except that the outline of one watermark is consistent with the outline of the foreground picture, the outlines of other watermarks are randomly generated, and the outline of each watermark has difference which can be easily distinguished by naked eyes; fourthly, the action of dragging by a mouse or a finger is not single-direction dragging (such as horizontal dragging along the x axis) but can be freely dragged in any direction of the two-dimensional plane; and fifthly, collecting the whole-course track data (not only the end point coordinates) dragged by the user for behavior analysis, and verifying successfully only when the foreground picture is dragged to the watermark position consistent with the outline of the foreground picture on the two-dimensional plane and the dragging behavior is judged to be reasonable by the server.
The verification code generation and verification method provided by the invention effectively solves the problem that the current verification code is easy to be cracked by a machine program. The method inherits the advantages of simple operation and good experience of the dragging type verification code on one hand, and increases the difficulty of the machine program for automatically identifying the verification code through the matching of the outline pattern on the other hand, and can further increase the difficulty of the machine program for automatically identifying the verification code through the verification of the dragging track reasonability.
Drawings
Fig. 1 is a schematic diagram of a method for dividing a rectangular area into rectangular meshes.
Fig. 2 illustrates a step of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a rectangular grid.
Fig. 3 is a schematic diagram of a method for dividing a circular area into a fan-ring grid.
FIG. 4 is a diagram illustrating steps of generating and verifying a behavior verification code having a random watermark profile and randomly distributed in a sector-ring grid.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example 1:
as shown in fig. 1 and fig. 2, the present invention provides a verification code generation and verification method based on random grid position, random watermark contour identification and drag behavior identification, and the specific technical implementation process is as follows:
initialization: a pattern library is maintained at the verification code server. The patterns in the pattern library vary from one pattern to another. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), and may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric center of gravity of the pattern is ensured to fall within the outline of the pattern, and a user can conveniently touch the center of gravity area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that the difference between the pattern and each of the previous patterns is readily detectable by the naked eye.
The verification code server side adopts a rectangular background picture, and uniformly performs grid division by using vertical horizontal lines and vertical lines to equally divide N identical rectangular small grids, as shown in fig. 1.
The generation and verification method of the verification code is as described in fig. 2:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K grids (K is more than or equal to 2 and less than or equal to N) from the N rectangular grids, and numbers the grids are 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern (i is 1, 2, …, K) with the number i as the outline of the watermark, and the pattern is fully embedded into the grid with the number i after being scaled according to a proper proportion, and the geometric gravity center of the watermark is kept to be superposed with the center of the rectangular lattice. Record the center coordinate [ x ] of No. i grid i ,y i ]. And synthesizing the background image and the K watermarks into the verification code image.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server side sends the verification code picture and the foreground picture to the client side.
The verification code plug-in of the client displays the received verification code picture and the foreground picture;
the user needs to drag the foreground picture to the position of the watermark corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
And seventhly, receiving the dragging track (coordinates of each point dragged by the client, including the terminal point coordinates [ x, y ]) by the verification code server.
And step eight, the verification code server analyzes and judges the dragging behavior of the mouse or the finger of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not, and the judgment method is to judge the coordinate [ x, y ]]And [ x ] 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure GDA0003629975130000041
The verification is passed, otherwise the verification is not passed.
Preferably, the determination of the end point position is verified, the actual length L of the track and the linear distance D from the dragging start point to the dragging end point are calculated, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein alpha is a preset coefficient which is larger than 1.
Example 2: referring to fig. 3 and 4, a verification code generation and verification method based on random grid position, random watermark contour identification and dragging behavior identification provided by the present invention specifically includes the following technical implementation processes:
initialization: a pattern library is maintained at the verification code server. The patterns in the pattern library vary from one pattern to another. The pattern may be a geometric pattern (e.g., polygon, circle, ellipse, etc.), may be an animal or plant pattern (e.g., dog, chicken, flower, etc.), may be an article pattern (e.g., wine bottle, lantern, car, etc.), or may be other types of patterns or even shaped patterns.
Preferably, each pattern does not have hollow or large-amplitude depression, so that the geometric gravity center of each pattern is ensured to fall within the outline of the pattern, and a user can conveniently click and touch the gravity center area of the pattern for dragging.
Preferably, each pattern is manually screened prior to being added to the library to ensure that its distinctiveness from that of each previous pattern is readily detectable by the naked eye.
The verification code server side adopts a circular background picture, equally divides a plurality of concentric circles along the radius, equally divides a plurality of fan rings in each layer of ring, equally divides N fan ring cells with approximate areas, and is shown in figure 3.
The generation and verification method of the verification code is as described in fig. 4:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
and step two, the verification code server side randomly selects K fan ring cells (K is more than or equal to 2 and less than or equal to N) from the N fan ring cells, and numbers the K fan ring cells to 1, 2, … and K.
And step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K.
And step four, the verification code server takes the pattern with the number i as the outline of the watermark in sequence, and the pattern with the number i is completely embedded into the sector ring cell with the number i after being scaled according to a proper proportion, and the geometric gravity center and the sector ring cell of the watermark are keptCoincide with each other. Record the central coordinate [ x ] of the small I number sector ring i ,y i ]Where i is 1, 2, …, K. And synthesizing the background image and the K watermarks into the verification code image.
And step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline.
And step six, the verification code server side sends the verification code picture and the foreground picture to the client side.
And the verification code plug-in of the client displays the received verification code picture and the foreground picture. The user needs to drag the foreground picture to the watermark position corresponding to the outline of the foreground picture freely by dragging the foreground picture with a mouse or sliding a finger.
And seventhly, receiving the dragging track (coordinates of each point dragged by the client, including the terminal point coordinate [ x, y ]) by the verification code server.
And step eight, the verification code server analyzes and judges the mouse or finger dragging behavior of the user, and feeds back the judgment result to the client. In the judgment process, the verification code server judges whether the dragging end point is positioned at the No. 1 watermark or not by judging the coordinate [ x, y ]]And [ x ] 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure GDA0003629975130000051
The verification is passed, otherwise the verification is not passed.
Preferably, the end point position is judged to be verified, the actual length L of the track and the linear distance D from the dragging starting point to the dragging end point are calculated, if L is smaller than or equal to alpha D, the verification is passed, otherwise, the verification is not passed. Wherein alpha is a preset coefficient which is larger than 1.
It should be apparent that the described embodiments are only some embodiments of the present invention, and not all embodiments. Furthermore, the schematic diagrams provided in the embodiments are only for illustrating the basic concepts of the present invention in a schematic manner, so as to enable those skilled in the art to understand and read the basic concepts, and are not used to limit the practical limitations of the present invention. Based on various modifications of the embodiment, for example, other mesh division modes are adopted in the background diagram, and for example, adjustment of the drag trajectory rationality decision rule belongs to the protection scope of the present invention.

Claims (3)

1. A behavior verification code generation and verification method based on a random grid and a random watermark outline is characterized by comprising the following steps:
firstly, a verification code server receives a verification code application which is provided by a verification code plug-in of a client to the verification code server;
step two, the verification code server side randomly selects K grids from the N grids of the background image, and numbers the grids to be 1, 2, … and K; wherein K is more than or equal to 2 and less than or equal to N;
step three, the verification code server randomly selects K different patterns from a preset pattern library, and numbers the K different patterns to be 1, 2, … and K;
and step four, the verification code server takes the patterns with the number i as the watermark outline in sequence, the patterns are completely embedded into the grids with the number i after being scaled according to the proportion, and the coordinates [ x ] of the geometric gravity center of the watermark with the number i are recorded i ,y i ]Wherein i ═ 1, 2, …, K; synthesizing the background image and the K watermarks into a verification code image;
step five, the verification code server generates a foreground picture by taking the No. 1 pattern as an outline;
step six, the verification code server sends the verification code picture and the foreground picture to the client;
step seven, the verification code server receives the dragging track acquired by the client;
step eight, the verification code server side analyzes and judges the dragging behavior and feeds back the judgment result to the client side;
the analysis comprises the following steps: the verification code server side judges whether the dragging terminal point is located at the No. 1 watermark or not;
the judgment method is to coordinate the dragging end point [ x, y ]]Coordinate [ x ] of geometric gravity center of No. 1 watermark 1 ,y 1 ]Comparing the Euclidean distance with a preset judgment threshold T, if so, judging whether the Euclidean distance is larger than the preset judgment threshold T
Figure FDA0003629975120000011
The verification is passed, otherwise, the verification is not passed;
the analysis also comprises that the verification code server judges the reasonability of the dragging track, if the track is reasonable, the verification is passed, otherwise, the verification is not passed;
the method for judging the rationality comprises the following steps: calculating the actual length L of the track and the linear distance D from the dragging starting point to the dragging terminal point, if L is less than or equal to alpha D, the verification is passed, otherwise, the verification is not passed; wherein α is a preset coefficient greater than 1.
2. The method for generating and verifying the behavioral verification code based on the random grid and the random watermark outline according to claim 1, wherein the watermark is embedded into the grid while keeping the geometric barycenter of the watermark coincident with the geometric barycenter of the grid.
3. The method for generating and verifying the behavioral verification code according to claim 1, wherein the drag trajectory comprises coordinates of points through which the drag passes and coordinates of an end point [ x, y ] of the drag.
CN202011384789.7A 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline Active CN112839026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011384789.7A CN112839026B (en) 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011384789.7A CN112839026B (en) 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline

Publications (2)

Publication Number Publication Date
CN112839026A CN112839026A (en) 2021-05-25
CN112839026B true CN112839026B (en) 2022-07-26

Family

ID=75923404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011384789.7A Active CN112839026B (en) 2020-11-30 2020-11-30 Behavior verification code generation and verification method based on random grid and random watermark outline

Country Status (1)

Country Link
CN (1) CN112839026B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101663672A (en) * 2007-02-21 2010-03-03 维杜普有限责任公司 The method and system that is used for graphical image authentication
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
CN102624705A (en) * 2012-02-21 2012-08-01 西南石油大学 Intelligent image verification method and intelligent image verification system
CN103927465A (en) * 2014-01-05 2014-07-16 艾文卫 Verification code generating and verifying method based on graphs
CN104298912A (en) * 2013-07-15 2015-01-21 深圳市腾讯计算机系统有限公司 Methods and devices of implementing and generating crack-resistant identifying code
CN104852889A (en) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 Picture identifying code generation method and system, and verify method and client side, and server
CN109299602A (en) * 2018-08-08 2019-02-01 厦门大学嘉庚学院 Verification code generation method based on implicit figure
CN110246207A (en) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 Graphical verification code generation method based on multi-layer image
CN110308846A (en) * 2019-05-22 2019-10-08 广西链全科技有限公司 A kind of generation of two-dimension translational puzzle type identifying code and verification method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660402B (en) * 2013-11-19 2018-05-25 深圳市腾讯计算机系统有限公司 A kind of method, apparatus and system verified to terminal
CN105975823A (en) * 2016-05-05 2016-09-28 百度在线网络技术(北京)有限公司 Verification method and apparatus used for distinguishing man and machine
CN109670291B (en) * 2017-10-17 2022-08-09 腾讯科技(深圳)有限公司 Verification code implementation method and device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101663672A (en) * 2007-02-21 2010-03-03 维杜普有限责任公司 The method and system that is used for graphical image authentication
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
CN102624705A (en) * 2012-02-21 2012-08-01 西南石油大学 Intelligent image verification method and intelligent image verification system
CN104298912A (en) * 2013-07-15 2015-01-21 深圳市腾讯计算机系统有限公司 Methods and devices of implementing and generating crack-resistant identifying code
CN103927465A (en) * 2014-01-05 2014-07-16 艾文卫 Verification code generating and verifying method based on graphs
CN104852889A (en) * 2014-02-18 2015-08-19 腾讯科技(深圳)有限公司 Picture identifying code generation method and system, and verify method and client side, and server
CN109299602A (en) * 2018-08-08 2019-02-01 厦门大学嘉庚学院 Verification code generation method based on implicit figure
CN110308846A (en) * 2019-05-22 2019-10-08 广西链全科技有限公司 A kind of generation of two-dimension translational puzzle type identifying code and verification method
CN110246207A (en) * 2019-06-13 2019-09-17 四川长虹电器股份有限公司 Graphical verification code generation method based on multi-layer image

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于行为的安全验证码生成及验证方案研究;张艳等;《信息安全研究》;20200205(第02期);全文 *

Also Published As

Publication number Publication date
CN112839026A (en) 2021-05-25

Similar Documents

Publication Publication Date Title
CN112528264A (en) Behavior verification code generation and verification method for random position of random contour
WO2019153604A1 (en) Device and method for creating human/machine identification model, and computer readable storage medium
CN108229130B (en) Verification method and device
TWI222032B (en) Hand-written input authentication apparatus, hand-written input authentication method and storage medium storing hand-written input authentication program
CN105893827B (en) A kind of applicative notifications message inspection method and terminal
Van Oorschot et al. Purely automated attacks on passpoints-style graphical passwords
US8607331B2 (en) Captcha image authentication method and system
CN108227912A (en) Apparatus control method and device, electronic equipment, computer storage media
US20110292031A1 (en) Manipulable human interactive proofs
CN103413078B (en) Based on two-layer on-line authentication system and the authentication method of user ID and person's handwriting
JPH08510854A (en) Method and apparatus for grouping and manipulating electronic representations of handwriting, printing and drawing
EP3230920B1 (en) Method for recognizing if a user of an electronic terminal is a human or a robot
WO2018072028A1 (en) Face authentication to mitigate spoofing
CN109800559B (en) Method and device for generating slider verification code, computer equipment and storage medium
CN100371945C (en) Computer assisted calligraphic works distinguishing method between true and false
Dinh et al. Recent advances of Captcha security analysis: a short literature review
CN112839026B (en) Behavior verification code generation and verification method based on random grid and random watermark outline
CN113190310B (en) Verification code design method based on random position object semantic recognition
JP5316017B2 (en) Image processing apparatus, biometric authentication apparatus, image processing method, and program
US10372890B2 (en) Apparatus and method for verifying an identity of a user
US6332040B1 (en) Method and apparatus for sorting and comparing linear configurations
CN104077268B (en) Apparatus for shaping
CN114917590B (en) Virtual reality game system
CN110347928A (en) A kind of recommendation method for personalized information and system
JP6168645B2 (en) Reverse Turing test method and access authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant