CN102710607A - Security verification method based on graphic marker - Google Patents

Security verification method based on graphic marker Download PDF

Info

Publication number
CN102710607A
CN102710607A CN2012101443332A CN201210144333A CN102710607A CN 102710607 A CN102710607 A CN 102710607A CN 2012101443332 A CN2012101443332 A CN 2012101443332A CN 201210144333 A CN201210144333 A CN 201210144333A CN 102710607 A CN102710607 A CN 102710607A
Authority
CN
China
Prior art keywords
chinese character
graph data
client
server
player
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101443332A
Other languages
Chinese (zh)
Inventor
陈鑫
刘龙飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Pixel Software Technology Co Ltd
Original Assignee
Beijing Pixel Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Pixel Software Technology Co Ltd filed Critical Beijing Pixel Software Technology Co Ltd
Priority to CN2012101443332A priority Critical patent/CN102710607A/en
Publication of CN102710607A publication Critical patent/CN102710607A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a security verification method based on a graphic marker. The method comprises the following steps that: A, a server randomly selects m Chinese characters from a preset Chinese character set, then randomly selects one of the m selected Chinese characters, copies the finally selected Chinese character to obtain m+1 Chinese characters and stores the position coordinates of the same Chinese characters, wherein the m is a natural number; B, the server generates graphic data of characters according to the m+1 Chinese characters and sends the graphic data to a client; C, the client generates pictures according to the received graphic data, renders the pictures into a game, indicates a player to select the same Chinese characters and sends a selection result to the server; and D, the server judges whether a pair of Chinese characters selected by the player is same according to the stored position coordinates of the same Chinese characters, if so, the player get through the verification, otherwise, the player does not get through the verification.

Description

A kind of safe verification method based on pictorial symbolization
Technical field
The present invention relates to field of computer technology, relate in particular to a kind of safe verification method based on pictorial symbolization.
Background technology
Along with the expansion in network game market, also increase gradually to the plug-in of network game.Plug-inly be meant that computer technology that some people utilizes oneself is specially to one or more online games, through changing the subprogram of online game software, the cheating program that is made.Plug-in meeting causes the extreme of online game unfair, causes the junk data of server end to increase simultaneously, and owing to control before using plug-in person scarcely to be used in computer; And making the player be in the on-hook state for a long time, it is not the role by people's control that server need use more resources to handle these, makes the workload of server end increase sharply; Online game operator need open more multiserver and handle this batch role; And cost is increased, the economic system to recreation causes very big destruction in addition, therefore; Online game need be taked certain method, stops plug-in existence.
At present, the modal in the industry anti-plug-in mode of online game is to adopt the figure identifying code.The figure identifying code is widely used in the login and the registration of website; Can prevent the malice decryption; Brush ticket, forum pour water, and prevent that effectively certain hacker from carrying out continuous login attempt to a certain particular registered user with specific program Brute Force mode, are the modes of a lot of websites pass authentication.Online game figure proof procedure comprises: server sends the figure identifying code to client; The user imports corresponding character string according to the figure identifying code in client, and client is sent to server end with said character string and discerns, and server returns recognition result to client then.
The method that figure identifying code of the prior art generates is as shown in Figure 1, mainly may further comprise the steps:
Step 101: the generation background image, and the color of this background image is the gradual change of a kind of color to another kind of color in this background image;
Step 102: picked at random 4-6 character generates character string picture from character set, and then, the color of the character string picture of generation makes the close but human eye of the color of color and background image of character string picture to distinguish;
Step 103: utilize character string deformation method that character string picture is out of shape based on the Bezier curved surface;
Step 104: generate noise according to each character color in the transformed character string image and size, and this noise is added to around the corresponding character with corresponding color and size;
Step 105: background image and character picture are merged, thereby obtain the figure identifying code.
The generative process more complicated of the figure identifying code of prior art; And proof procedure needs the user that identifying code is imported fully, and what perhaps the player was fierce plays, and the interface of ejecting the figure identifying code suddenly lets the user import the character of being seen; Then game process is interrupted; And online game is real-time, in the time of user's input validation sign indicating number, plays and is still carrying out, and this is a kind of game experiencing of misery to the user; And some identifying code possibly let the user be difficult to identification, has then further prolonged the required time of verifying.Therefore existing figure identifying code method can be brought negative experience to the player, even can cause player's loss to a certain extent, and recreation is had negative effect.
Summary of the invention
The invention provides a kind of safe verification method, under the prerequisite that does not influence player experience, realize the plug-in strike of playing based on pictorial symbolization.
The embodiment of the invention provides a kind of safe verification method based on pictorial symbolization, and this method comprises the steps:
A, server are concentrated a picked at random m Chinese character from pre-configured Chinese character, from m the Chinese character of having chosen, randomly draw 1 then and duplicate, and obtain m+1 Chinese character altogether, preserve the position coordinates of identical Chinese character; M is a natural number;
B, server generate the graph data of character according to said m+1 Chinese character, and the graph data that obtains is sent to client;
C, client generate picture according to the graph data that receives, and are rendered in the recreation, and point out the player to select identical Chinese character, and selection result is sent to server;
D, server judge according to the position coordinates of the identical Chinese character of being preserved whether a pair of Chinese character that the player selects is identical Chinese character, if then through checking, otherwise not through checking.
Preferably, the span of said m is 3 to 10.
Preferably, step B is said to be sent to the graph data that obtains before the client, further comprises: take rotation and dilatation to operate to said graph data graph of a correspondence.
Preferably, step B is said is sent to client with the graph data that obtains and comprises: said graph data is compressed, and the graph data after will compressing is sent to client;
The said client of step C generates picture according to the graph data that receives and comprises: client receives the graph data after the compression, decompresses earlier, generates picture according to the graph data after decompressing again.
Can find out from above technical scheme; Employing is chosen identical Chinese character as verification mode from several Chinese characters; Corresponding figure identifying code generative process is comparatively simple, and for the player, changes existing input of character string into choosing mode; Simple to operate and be convenient to identification, can promote user experience.
Description of drawings
Fig. 1 is the method flow sketch map that figure identifying code of the prior art generates;
The safe verification method schematic flow sheet that Fig. 2 provides for the embodiment of the invention based on pictorial symbolization;
Fig. 3 is the example of the figure identifying code in the embodiment of the invention.
Embodiment
Clearer for the know-why, characteristics and the technique effect that make technical scheme of the present invention, below in conjunction with specific embodiment the present invention program is set forth in detail.
The safe verification method based on pictorial symbolization that the embodiment of the invention provides is as shown in Figure 2, comprises the steps:
Step 201: server is concentrated a picked at random m Chinese character from pre-configured Chinese character, from m the Chinese character of having chosen, randomly draws 1 then and duplicates, and obtains m+1 Chinese character altogether, preserves the position coordinates of identical Chinese character.Said m is a natural number, span 3-10.
Step 202: the graph data that generates character according to said m+1 Chinese character.Preferably, this step further comprises: said graph data graph of a correspondence is taked rotation and dilatation operation.
Step 203: said graph data is compressed, and the graph data after will compressing is sent to client.Wherein, the purpose of compression is to reduce the data traffic of Network Transmission, but is selection operation.
Step 304: client receives the graph data after the compression, decompresses earlier, generate picture according to the graph data after decompressing again and be rendered in the recreation, and the prompting player selects identical Chinese character, and selection result is sent to server.
Step 205: server judges according to the position coordinates of the identical Chinese character of being preserved whether a pair of Chinese character that the player selects is identical Chinese character, if then through checking, otherwise not through checking.
Fig. 3 shows the example of the figure identifying code in the embodiment of the invention.The player only need adopt mouse or keyboard to select two " all " words wherein, can accomplish checking.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being made, is equal to replacement, improvement etc., all should be included within the scope that the present invention protects.

Claims (4)

1. the safe verification method based on pictorial symbolization is characterized in that, this method comprises the steps:
A, server are concentrated a picked at random m Chinese character from pre-configured Chinese character, from m the Chinese character of having chosen, randomly draw 1 then and duplicate, and obtain m+1 Chinese character altogether, preserve the position coordinates of identical Chinese character; M is a natural number;
B, server generate the graph data of character according to said m+1 Chinese character, and the graph data that obtains is sent to client;
C, client generate picture according to the graph data that receives, and are rendered in the recreation, and point out the player to select identical Chinese character, and selection result is sent to server;
D, server judge according to the position coordinates of the identical Chinese character of being preserved whether a pair of Chinese character that the player selects is identical Chinese character, if then through checking, otherwise not through checking.
2. method according to claim 1 is characterized in that, the span of said m is 3 to 10.
3. method according to claim 1 is characterized in that, step B is said to be sent to the graph data that obtains before the client, further comprises: take rotation and dilatation to operate to said graph data graph of a correspondence.
4. method according to claim 1 is characterized in that, step B is said to be sent to client with the graph data that obtains and to comprise: said graph data is compressed, and the graph data after will compressing is sent to client;
The said client of step C generates picture according to the graph data that receives and comprises: client receives the graph data after the compression, decompresses earlier, generates picture according to the graph data after decompressing again.
CN2012101443332A 2012-05-10 2012-05-10 Security verification method based on graphic marker Pending CN102710607A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101443332A CN102710607A (en) 2012-05-10 2012-05-10 Security verification method based on graphic marker

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101443332A CN102710607A (en) 2012-05-10 2012-05-10 Security verification method based on graphic marker

Publications (1)

Publication Number Publication Date
CN102710607A true CN102710607A (en) 2012-10-03

Family

ID=46903163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101443332A Pending CN102710607A (en) 2012-05-10 2012-05-10 Security verification method based on graphic marker

Country Status (1)

Country Link
CN (1) CN102710607A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104283682A (en) * 2013-07-08 2015-01-14 深圳市腾讯计算机系统有限公司 Method, device and system conducting verification through verification codes
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN110351094A (en) * 2019-07-03 2019-10-18 平安科技(深圳)有限公司 Character verification method, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114324A (en) * 2006-07-25 2008-01-30 珠海市西山居软件有限公司 Network gaming system capable of preventing externally hung and method thereof
CN101197678A (en) * 2007-12-27 2008-06-11 腾讯科技(深圳)有限公司 Picture identifying code generation method and generation device
CN102143161A (en) * 2011-01-21 2011-08-03 杭州乐港科技有限公司 Web game cheating program recognition method based on handwritten character pictures

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114324A (en) * 2006-07-25 2008-01-30 珠海市西山居软件有限公司 Network gaming system capable of preventing externally hung and method thereof
CN101197678A (en) * 2007-12-27 2008-06-11 腾讯科技(深圳)有限公司 Picture identifying code generation method and generation device
CN102143161A (en) * 2011-01-21 2011-08-03 杭州乐港科技有限公司 Web game cheating program recognition method based on handwritten character pictures

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104283682A (en) * 2013-07-08 2015-01-14 深圳市腾讯计算机系统有限公司 Method, device and system conducting verification through verification codes
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN110351094A (en) * 2019-07-03 2019-10-18 平安科技(深圳)有限公司 Character verification method, device, computer equipment and storage medium
CN110351094B (en) * 2019-07-03 2024-03-15 平安科技(深圳)有限公司 Character verification method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104468531B (en) The authorization method of sensitive data, device and system
CN103795731B (en) A kind of user account login method
CN101178813B (en) Method and apparatus for generating photograph identifying code
CN103530490B (en) A kind of plug-in recognition methods of simulator class internet game and system
US20060021024A1 (en) User certification apparatus and user certification method
CN105024967B (en) A kind of system and method plug-in using picture recognition game is verified
TW201407403A (en) Identity authentication and management device and identity authentication and management method
WO2010011067A3 (en) Apparatus and method for inter-operation between virtual reality services
US9264417B2 (en) Method and apparatus for generating a security token carrier
JP2009510567A5 (en)
Tao Pass-Go, a new graphical password scheme
CN106936790A (en) The method that client and server end carries out two-way authentication is realized based on digital certificate
CN107079031A (en) The approval based on user authentication via the communication with the second equipment to the first equipment
CN104606884B (en) Matching process and device in a kind of game fighting
CN105162773B (en) A kind of convenient login method of Web system based on mobile terminal
CN103514393A (en) Method for achieving three-dimensional verification code
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN102710607A (en) Security verification method based on graphic marker
CN107070935A (en) A kind of game interaction experience system based on virtual reality technology
CN101309260A (en) Network authentication method on the basis of cryptoguard
CN103731543A (en) Login system for two-dimension code mobile games
CN106807089A (en) Game data processing method and device
WO2016062200A1 (en) Fingerprint authentication method and apparatus, and server
CN107622194A (en) A kind of dynamic barriers ocra font ocr string graphic verification code verification method
CN103312695A (en) Picture verification code realization method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121003