CN103139204A - Network identifying code method and system - Google Patents

Network identifying code method and system Download PDF

Info

Publication number
CN103139204A
CN103139204A CN 201310031659 CN201310031659A CN103139204A CN 103139204 A CN103139204 A CN 103139204A CN 201310031659 CN201310031659 CN 201310031659 CN 201310031659 A CN201310031659 A CN 201310031659A CN 103139204 A CN103139204 A CN 103139204A
Authority
CN
China
Prior art keywords
picture
code
button
coordinate
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201310031659
Other languages
Chinese (zh)
Inventor
姚爱军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 201310031659 priority Critical patent/CN103139204A/en
Publication of CN103139204A publication Critical patent/CN103139204A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a network identifying code method and a system and relates to a method and a system based on directly clicking on or dragging to complete authentication of an identifying code in the Internet field. The network identifying code method comprises the following steps: creating a plurality of hot zones and buttons on images, imparting a coordinate code for each hot zone and each button, extracting key words from each hot zone and each button, generating marked works based on the key words, producing coordinate code gathering authentication information by clicking on or dragging the images of the hot zones and the buttons by the users based on the request of the marked words, and transmitting the coordinate code gathering authentication information back to an identification server system to analyze and compare, thereby completing the identifying process of the identifying code. The authentication server system comprises an image storage tank, a recognition module, an encrypted module, an identification module and an image compositing module.

Description

A kind of method and system of network verification code
Technical field
The present invention relates to a kind of identifying code method and system of internet arena, especially based on directly on picture, clicking or dragged the method and system of identifying code checking.
Background technology
Development and improving constantly of hacking technique that the birth of identifying code is accompanied by computer technology occur, for a kind of network verification technology that prevents that the hacker from utilizing auto registration instrument batch registration website account to produce with pouring water, the picture character symbol of identifying code from pure numeral to distortion, experienced the process of distinguishing from simple to complicated difficult, although improved the difficulty of auto registration tool identification, but also reduced user's experience effect simultaneously, the word of distortion allows the people often not see, and often input error, after often will refreshing, re-enter, allow the people be pestered beyond endurance, but process is again necessary, the user experiences extremely bad, but also have no way out, also have no alternative in website, but this is can only strange hacker too rampant.
So just someone has seen business opportunity, since always want identifying code, since the identifying code of distortion always is carried in picture, why not just identifying code is carried in advertising pictures, this necessary proof procedure is better by advertising results, like this, to verify that the picture variable body is advertising pictures, require the user to input answer according to the prompting in picture to complete the registration checking in the identifying code input frame, such as identifying code advertising platform DoubleRecall, this mode had both been propagated advertising appeal effectively, completed again the checking registration, should kill two birds with one stone at last, but this mode can only say and make moderate progress on the user experiences, but thorough not enough, because still needing the user to input just, these methods can complete proof procedure, especially present more and more flourishing more and more universal the small screen mobile intelligent terminal, input process does not have keyboard convenient certainly, so complete aspect proof procedure and also should make moderate progress and increase at identifying code.
Summary of the invention
Obviously, the identifying code verification mode that does not need input of directly clicking on picture will be a good selection, exempting from keyboard entry method is to improve the good method that this user experiences, especially for the intelligent mobile terminal user that uses the small screen soft keyboard, it will be a good improvement, exempting from input mode is exactly directly to click to produce authorization information on picture by mouse or finger, thereby complete a kind of method of identifying code proof procedure, based on this theory of exempting from keyboard entry method, below have a talk thinkings more of the present invention and method.
Existing picture validation code technology is all to generate authorization information on picture, then the user more as requested at identifying code input frame input results to complete proof procedure, general is all the word that the requirement user inputs certain color in picture, the present invention only needs the user directly on picture, by mouse or finger, to click or drag the proof procedure that just can complete identifying code, do not need various keyboard inputs just, by checking, but existing Web page picture does not possess directly, on picture, not click and just can produce the condition of these complex verification information fully.
General web page interlinkage picture is all by giving a URL( uRL(uniform resource locator)universal Resource Locator) hyperlink is to open a webpage or other orders, basically be exactly that a hyperlink button one click correspondence completes an independent task, the dispersion of doing things in his own way like this action is obviously that the checking of not competent identifying code needs.
Want to realize on the picture in webpage possessing and click and produce the function of corresponding more complex authorization information, just should carry out corresponding technical finesse to picture, to be able to by directly on picture, clicking function and the effect that produces corresponding complex verification information.
Method of the present invention allows a plurality of hyperlink buttons jointly only complete same function exactly, be the authentication function of identifying code, certainly, want jointly to complete a function by a plurality of hyperlink buttons, obviously also need a system to support, the present invention is referred to as verification system or authentication server.
The Hacker Program computing capability is strong, but the fuzzy diagnosis disposal ability of picture is affirmed to nobody is high, suppress hacker's illegal act by the method that adopts very simple constantly variation picture for the people, really be a kind of method of learning from other's strong points to offset one's weaknesses, so identifying code has more trended towards picture, this is because the information on picture is abundanter than word, and Hacker Program more is difficult to identification and cracks.
Therefore the technical finesse for picture is a more crucial job, because identifying code verification method of the present invention is only on picture, to click or drag relational graph, so the present invention divides some information elements on picture for main key message point, less important key message point and non-critical information point, the keyword extraction of the information element that these key message points are showed is out as the keyword of verification tip language.
Because need to click or drag relational graph, the present invention need to mark by depicting, scratch figure, interpolation figure layer or other methods to set up some key message points by it, give link as button, hot-zone, object or perhaps navigation etc., because the function of these sayings is basic identical, the object that in full these is had to link for convenience of narration is referred to as " button " or " hot-zone ".
Identifying code picture of the present invention still take possess advertising appeal advertising pictures as main, below take the water-saving public service ads picture shown in Fig. 1 as example illustrates basic skills of the present invention.
Illustration 1 is inserted in web page editing instrument or polar plot instrument, at the key message point position of picture such as word, figure, several hot-zone graph outlines identical or close with these information points are drawn by the method for depicting hot-zone map or stingy figure by the places such as personage, " tap as shown in Figure 2, water droplet, the piggy money pot, little shell, sea-gull, cocoanut tree, cloud and font ' joint, approximately, from, one, drip, water, open, begin ' " profile, perhaps at these key message point places, directly use circle, rectangle or other simple geometry figures replace depicting figure, like this can be simpler when a large amount of the making, as shown in Figure 3.
All to take the simplest circular hot-zone be example for simple and convenient, be illustrated in figure 4 the hot-zone map of this figure, directly circular hot-zone is placed on to the key message point " tap in figure, water droplet, the piggy money pot, little shell, sea-gull, cocoanut tree, cloud and font ' joint, approximately, from, one, drip, water, open, begin ' " position, these words are the part keyword of this key message point, a key message point can have a plurality of keywords, importance according to these keywords, these key message points are divided into to main key message point and less important key message point, for example main key message point is " water droplet, piggy money pot and font ' joint, approximately, one, drip, water ' ", in Fig. 4, in circle, have as shown in A, be expressed as the main key message point button of category-A, less important key message point " tap, little shell, sea-gull, cocoanut tree, cloud and font ' from, open, begin ' ", in Fig. 4, in circle, have as shown in B, be expressed as category-B key message point button.
The safety requirements of some website registration checking is higher possibly, use the difficulty of registration tool to picture recognition in order to increase the hacker, at advertising pictures non-critical information point, place arranges some fascinating buttons, the size shape of button is identical or similar with the shape size of the button at key message point place, as shown in Figure 4, the button that these are fascinating is also given the URL hyperlink, as the circle of C is arranged in circle in Fig. 4, mean that this hyperlink is only similar to effective hyperlink, but not necessarily authentic and valid link, whether there is actual link to only have the authentication server on backstage, website to know, hacker's registration tool is None-identified.The hot-zone at these non-critical information point places is set to C class button as fascinating button, in Fig. 4, in circle, has as shown in C.
Above-mentioned depicting is generated as the hot-zone map type advertisement identifying code picture that possesses push button function shown in Fig. 5, button in Fig. 5 is defaulted as the not pellucidity of display bezel when mouse does not hover on picture, only show the advertising pictures background, in figure, alphabetical A, B, C originally do not have, and increase for convenience of description here.
By above-mentioned A, B, C class button is all given a code, this code can be take certain rule button in picture by computer program and automatically be generated the unique code of this button in this picture, this code can be any title that can show this button, it can be any word, symbol, code and combination thereof, or other can indicate any form of the identity of this button, comprise two-dimensional coordinate code of its pixel or parasang in picture or screen etc., coordinate code is not limited to any form, just be used for indicating the name of this button or hot-zone, or perhaps its ID in this picture, the present invention unites and is referred to as coordinate code, coordinate code can generate or generate by rule at random, also can specify generation, all clicks of each identifying code checking will produce a coordinate code set jointly, this set is the equal of just also the set of identifying code, the set that both can be described as these Image hotspots or button is clicked in each checking, also can be described as the set of their names or perhaps ID, the title of coordinate code described here and coordinate code set and characteristics thereof are equally applicable to all embodiment of this paper.
Want to allow the client user know and click which button, also will be equipped with several verification tip languages for each pictures arranges, the user clicks according to the requirement of verification tip language or drags associated button or figure produces verification code information.The verification tip language can be arranged by the people, take Fig. 5 as example, the signal language for example arranged for " we need _ _ every _ _ _, please click and fill a vacancy ", verification system can extract in these corresponding verification tip languages at random, also can be by verification system random verification tip language that generates from keyword, the keyword that each button is corresponding once only extracts one, the random verification tip language generated is that in the requirement signal language, main key message point category-A button must have one or several, the category-B button generates at random, can have also and can not have, C class button does not generally have, the i.e. random combination that generates the verification tip language can be AA or AB combination, cannot be AC, BB, the BC combination, advertisement identifying code picture can be all the category-A button, so both advertising appeals of reinforcement advertising picture more, the identification that can increase Hacker Program again cracks difficulty, for example generate at random signal language and " please click successively ' joint ' ' approximately ' ' water ' ' sea-gull ' ' shell ' " etc.
When the identifying code checking need to be used in website, at the random picture group sheet that generates of customer terminal webpage, Fig. 1 for example, require the user to click corresponding button according to prompting, for example require the user to click respectively in order " joint, approximately, water droplet, piggy money pot ", because the key message point of each width figure is not identical, requiring the button of clicking is also random the generation, hacker's registration tool will be difficult to identification, size shape such as water droplet, the cartoon character difference of money pot, shape of shell etc. has a plurality of replacements, allow like this hacker's registration tool more be difficult to discriminance analysis out.
Like this, the proof procedure of identifying code can not need input just can easily complete fully, especially more convenient for the small-screen mobile terminal user, several lower checkings that just can complete gently, even only need once sliding and just can complete the checking of identifying code of finger sometimes.
The accompanying drawing explanation
Fig. 1. using water wisely public service ads figure.
Fig. 2. by depicting or stingy figure depicts out the schematic diagram of wheel profile hot-zone by the key message point of using water wisely public service ads figure.
Fig. 3. the schematic diagram by simple geometric figure circle as hot-zone.
Fig. 4. be divided into the schematic diagram of A, B, C tri-class buttons or hot-zone.
Fig. 5. the using water wisely public service ads schematic diagram of A, B, C class three class buttons or hot-zone is arranged.
Fig. 6. the identifying code checking schematic flow sheet of part embodiment authentication server.
Fig. 7. in advertising wall, each advertisement logo picture coordinate code is arranged exemplary plot.
Fig. 8. the advertising wall exemplary plot that advertisement logo picture forms.
Fig. 9. clothing matching game identifying code checking exemplary plot.
Figure 10. element figure figure layer profile and icon schematic diagram in clothing matching identifying code picture.
Figure 11. increase the schematic diagram of digital frame button at non-critical information point place.
Figure 12. complete the design sketch be combined into according to these element figures after collocation game checking.
Figure 13. each elemental map shaped position of using water wisely public service ads figure of drawing type checking.
Figure 14. the pixel two-dimensional coordinate of each elemental map shaped position of using water wisely public service ads figure.
Figure 15. clothing matching picture mosaic identifying code picture model Background.
Figure 16. transparent picture button dashed-line outer box on each element figure of the assorted identifying code picture of dress ornament.
Figure 17. each element figure coordinate code example of the assorted identifying code picture of dress ornament.
Figure 18. the assorted identifying code picture of dress ornament completes the correct rear design sketch shown of checking.
Figure 19. rob parking stall game identifying code advertising pictures automobile element figure and position, parking stall.
Figure 20. association's integrated computer advertisement picture arrangement game identifying code picture.
Figure 21. advertisement be will associate and four pieces and blank picture mosaic frame example will be divided into.
Figure 22. will associate advertisement and be divided into the four later half transparence gray scale of picture mosaic frame picture mosaic frames.
Figure 23. piece picture, picture mosaic frame and verification tip sonagram sheet are arranged example.
embodiment
Embodiment mono-, and on picture, directly click can complete the method and system that identifying code is verified.
The present embodiment described on the identifying code picture directly click can complete the method for identifying code checking, this method needs the support of an identifying code authentication server system, verification system is comprised of picture storage vault, authentication module, identification module, encrypting module, picture synthesis module, is referred to as authentication server.
The advertisement identifying code picture that the advertiser is provided, or the advertiser is by the advertising pictures of picture making requirement oneself making, require time, zone, object and the promotion item of issue or the key elements such as commodity and service classification of service according to the advertiser, write unique key element ID of each identifying code picture, this key element ID of take is kept in the picture storage vault as the figure title.
The identification module of verification system is kept at the session data text of client by IP and the cookie(website of extracting the user for differentiating user identity) in characteristic information, call the identifying code picture of applicable key element ID from the picture-storage storehouse according to these characteristic informations.
Below or take the water-saving public service ads picture shown in Fig. 1 is illustrated the present embodiment as example, Fig. 1 is write to its key element ID according to the relevant factor of public service ads picture, it be take to key element ID is kept in the picture storage vault as picture name, for example: gy000001.jpg, according to described above, by Fig. 1 insert the web page editing instrument such as dreamweaver CS5in, depict out the circular heat chorography shown in Fig. 5, give a hyperlink using each circular hot-zone as a button, each button is given a coordinate code, because only have tens buttons, for convenient narration, specify a continuous double figures coordinate code to each key message point button here, as " 01 joint, 02 approximately, 03 from, 04 1, 05, 06 water, 07 opens, 08 begins, 09 tap, 10 water droplets, 11 piggy money pots, 12 little shells, 13 sea-gulls, 14 cocoanut trees, 15 clouds ", and C class button is 16 later natural number coordinate codes, can be by A in practical operation, B, C class button is given its coordinate code at random.
By the key message point keyword of the coordinate code of these hot-zone buttons and the hot-zone corresponding with it, according to A, B, C class button classification editor, for example be kept at, in verification tip language coordinate code key words text: A[01] (joint), A[02] (approximately), A[04] (one), A[05] (dripping), A[06] (water), A[10] (water droplet, the globule), A[11] (piggy money pot, penny bank), B[03] (from), B[07] (opening), B[08] (beginning), B[09] (tap), B[12] (little shell, fan-shaped shell), B[13] (sea-gull, seabird), B[14] (cocoanut tree), B[15] (cloud, cloud), C[16] (), C[17] (), C[18] (), ..., to also be kept in the text for the special a plurality of exclusive verification tip language arranged of this picture simultaneously, for example: Y01[03,07,08,01,02,06] (please click successively the word in quotation marks, " from " " open " now " beginning " and will ' save ' ' approximately ' with ' water '), Y02[01,02,04,05,06] (we need _ _ every _ _ _, please click and fill a vacancy), ..., the corresponding coordinate code set of verification tip language keyword is programmed in the bracket of its front, with the artificial exclusive verification tip language arranged of " Y " prefix representative, here bracket outer ", " number when the Edit Text document, can be used as line feed and process, the keyword that each coordinate code is corresponding can have a plurality of, as A[10] (water droplet, the globule), C class button also has coordinate code, keyword can be sky, above-mentioned coordinate code key words text is kept in the picture storage vault with " .txt " form with the ID " gy000001 " identical with this public service ads picture, encrypting module passes through the laggard line correlation function encrypting of coding to text and the ID of " .txt " form in the picture storage vault automatically, save as 100000yg.txt after encrypting, ID after all picture name ID of this paper and encryption thereof only arranges for convenience of description, do not represent practical significance.
Depict out the circular HTML(HTML shown in Fig. 5 according to aforementioned manner) the hot-zone map, in the quotation marks of Ultra link attribute href=" url " in the map code of hot-zone, each button of input returns to the URL path of authentication server authentication module, and the identifying code coordinate code of this button of carrying of this URL, as " joint " word button is " code=01 ", " approximately " the word button is " code=02 " etc., insert a verification tip sonagram picture placeholder below the identifying code picture, the figure title of this image placeholder source file temporarily replaces as the variogram title of a replacement with " yztsy.jpg ", hot-zone map HTML for example:
<p ><img src=" http: // .../gy000001.jpg " alt=" public service ads picture placeholder " name=" gyggtp " width=" " height=" " border=" " usemap=" #gyggtpMap " ><map name=" gyggtpMap " >
<area?shape="circle"?coords="?"?href="http://......&code=01">
<area?shape="circle"?coords="?"?href="http://......&code=02">......
<area?shape="circle"?coords="?"?href="http://......&code=08">......
<area?shape="circle"?coords="?"?href="http://......&code=29"></map></p>
<p ><img name=" yztsytp " src=" http: // .../yztsy.jpg " width=" " height=" " alt=" verification tip sonagram picture placeholder " ></p >
The html text of above-mentioned hot-zone map is saved as to HTML hot-zone map with the title ID identical with this picture, as: gy000001.html, maybe change figure title yztsy.jpg into filename variable<%=filename% > after save as the dynamic web page code snippet such as: gy000001.asp is kept at it in picture storage vault.URL path in above-mentioned text and other a plurality of button label are here omitted and are replaced with ellipsis, input the coordinate code of real address path and all buttons when real work.
Insert an identifying code picture placeholder that meets identifying code picture specification in the HTML code of registration web page, below identifying code picture placeholder, insert the verification tip sonagram picture placeholder of an equal width, the image placeholder can be around the registration box list, best is on the right or below, when client has the checking request, similar above-mentioned hot-zone map HTML of random call, the HTML code that is the hot-zone map by two image placeholder Code Substitutions in the HTML code of registration web page gets final product, the code of registration web page also can be with dynamic web page such as the .asp form is kept in authentication server.
The workflow of authentication server as shown in Figure 6, step 601, as the user, when client debarkation net website hits registration button and opens enrollment page, the hyperlink URL of registration button carries the Session(session of extracting in user's IP and Cookie) information sends to the identification module of verification system server.
Step 602, identification module extracts the characteristic informations such as zone, time and object from these related datas.
Step 603, authentication server is by these characteristic informations, in the picture storage vault, the hot-zone map HTML of the key element ID of satisfactory advertising pictures is extracted in retrieval, if a plurality of applicable key element ID are arranged, random call is one, such as random call be the water-saving public service ads image hot area map HTML:gy000001.html shown in Fig. 1, the key element ID of this picture is imported in encrypting module.
Step 604, encrypting module uses ID and the text document of the coordinate code key words text encryption function algorithm for inversion deciphering text, enter in the coordinate code key words text that this ID is corresponding, according to accidental validation signal language create-rule, extracted the coordinate code keyword combination of 3 category-A buttons, for example: A[01] (joint), A[02] (approximately), A[06] (water), the coordinate code keyword combination of 2 category-B buttons: B[13] (sea-gull, seabird), B[12] (little shell, fan-shaped shell), a keyword during the random coordinate code keyword that extracts each button combines, generate an accidental validation signal language, for example: " please clicking successively ' joint ' ' approximately ' ' water ' ' sea-gull ' ' little shell ' ", this verification tip language is imported in the picture synthesis module.
Step 605, extract the coordinate code in these coordinate code keyword combination front brackets simultaneously, generate successively coordinate code set [01,02,06,13,12], this coordinate code set is imported in authentication module, if random call has arrived the exclusive verification tip language of " Y " prefix, directly the coordinate code set in its front bracket is imported in authentication module.
Step 606, by the accidental validation signal language: " please clicking successively ' joint ' ' approximately ' ' water ' ' sea-gull ' ' shell ' " imports the picture synthesis module, the picture synthesis module generates the noise background picture of a corresponding appropriate pixels according to above-mentioned identifying code picture specification, the verification tip language is carried out being carried in the noise background picture after suitable font color variation and distortion at random, with the easy degree of being distinguished as of people, this verification tip sonagram sheet is kept in the picture storage vault, the figure title is random after with this identifying code picture element ID preserves after increasing by one section code, gy000001123.jpg for example, to in the verification tip sonagram picture placeholder source file URL of this figure title insertion hot-zone map HTML code, filename " yztsy.jpg " be replaced.
By having replaced the above-mentioned hot-zone map HTML code of verification tip sonagram sheet source file URL and two image placeholder codes in the registration web page HTML code, all replace, according to Session, by this dynamic web page or by it, the form with static Web page sends to client and is presented in browser.
These accidental validation signal language pictures are set to automatically delete after certain hour, for the less demanding registration web page of checking, the verification tip language also can directly be inserted into the form of writing text in the HTML code of registration web page, adopt the above-mentioned verification tip language be carried in background picture, can increase the difficulty of Hacker Program identification, but the identification difference for the people is little, so preferably adopt pictorial verification tip language.
Step 607, the user requires to click successively buttons such as " ' joint ' ' approximately ' ' water ' ' sea-gull ' ' shell ' " according to the verification tip language, the operating process of clicking successively these buttons turns back in the authentication module of verification system by the URL of each button, and the URL returned carries the general unique identifier of UUID(of client simultaneously).
Step 608, coordinate code in the URL that authentication module returns by intercepting after code=, in conjunction with UUID, with the coordinate code set [01,02,06,13,12] of formerly preserving, compare successively, to judge that whether this checking be correct, if what require is to click successively, comparison successively in order, if can click arbitrarily, whole set is compared, if comparison is correct, in client, show and be proved to be successful, the user can carry out next step operation, if the comparison mistake, will show authentication error in client.
Step 609, if authentication error is called the satisfactory identifying code picture element of another one ID in the picture storage vault, perform step 603 to 609 operation.
Verification system is to being proved to be successful each time or wrong and each picture record statistics, to facilitate website and advertiser to inquire about and analysis.
Embodiment bis-, advertising wall formula identifying code verification method and system, system be client and website be provided at client carry out the identifying code checking the third-party authentication server, here also be called for short authentication server, authentication server comprises picture storage vault, authentication module, identification module, encrypting module, picture synthesis module.
Key message point keyword in the advertisement logo picture that the advertiser is provided or other billboard pictures extract, for example the keyword of No. 01 logo picture in the advertising wall formula identifying code picture shown in Fig. 7 is: automobile, Cherry, the keyword of No. 02 picture is: food, have some well, No. 03 picture keyword: net purchase, Suning, Suning easily purchases, No. 04 picture keyword: clothes, Li Ning, No. 05 keyword: automobile, China, Huachen, ... No. 24 picture keywords: mobile phone, Huawei etc., the product class keywords that one of front keyword is it, can there be the keyword of a plurality of pictorial informations back, if be that non-logo picture can also arrange more keyword, by these coordinate codes and keyword thereof, by embodiment mono-, same method is kept in the picture storage vault.
Require the classification of dimensions, promotion item or service of time, zone, object, picture of issue and the key elements such as keyword of picture key message point according to the advertiser, write unique key element ID of each advertising pictures, these pictures be take to key element ID to be kept in the picture storage vault as picture name classification, for example No. 01 picture saves as: gg00000201(automobile, Cherry) .jpg, No. 02 picture saves as: gg00000202(food, have some well) .jpg, No. 16 picture saves as: gg00000216(automobile, Pentium, a vapour) .jpg etc.
The present embodiment is for logging in the service for checking credentials by the third-party authentication server for website and client provide, the contract agreement of the service for checking credentials is provided according to both sides, need website to insert a form for insertion of advertising wall picture in the HTML code of login page, form can be placed on the following or the right that logs in the checking list, the present embodiment be take six row five list lattice of respective pixel and is explained as example, and for example the form HTML code is:
<table?width=""height=""?border=""><tr><td>
<a?href="http://......&code=uuid_01"><img?src="http://....../uuid_01.jpg"?width=""?height=""?border=""></a></td><td>
<a?href="http://......&code=uuid_02"><img?src="http://....../uuid_02.jpg"?width=""?height=""?border=""></a></td>......</tr>
<tr>......</tr><tr>......</tr><tr>......</tr><tr>......<td>
<a?href="http://......&code=uuid_25"><img?src="http://....../uuid_25.jpg"?width=""?height=""?border=""></a></td></tr><tr><td?height=""?colspan="">
<img?src="http://....../uuid_26.jpg"?width=""?height=""/></td></tr></table>
Insert an advertising pictures in each cell, in each cell, the picture storage vault of third-party authentication server is all pointed in the hyperlink path of the source file label src of picture, and the link path of the hyperlink label href given for each picture in form points to the authentication module of third-party authentication server.
Need to add one section JS script (Javascript client in the HTML code of login page script), the login page that enters website as the user, the JS script extracts user's UUID, if client does not have UUID, in client, generate UUID, such as UUID is 8888, in its back, add from 01 to 25 double figures code, as 8888_01 to 8888_25, these codes are inserted to link attribute href in above table and the URL back of picture source file attribute src successively, identifying code coordinate code ID and source file picture name as picture, as shown in the form HTML code of front, the coordinate code from 1 to 25 of code parameter that is to say the Ultra link attribute href of the picture name code of picture source file attribute src of each cell and picture is arranged in order, this 1 to 25 numeral coordinate code that namely these pictures are corresponding as button, be the equal of that a graphic template formula form can be fixed correspondence, because UUID difference, the proof procedure that logs in so all users of this page just not there will be identical link.
The authentication server workflow of the present embodiment is: when the user clicks the login page that enters website, JS in login page extracts user's UUID, UUID is inserted to the UUID label place in the above table HTML code, the relevant information that the URL of while website Button Login carries the user comprises that UUID information sends to the identification module of authentication server, identification module is retrieved satisfactory picture by the relevant information of extracting in the picture storage vault, 25 pictures of random call in these pictures, can call arbitrarily at random 25 pictures, also can on average call several groups by certain several classification, about calling rule, can in practical operation, by function, set a variety of, this paper does not here describe in detail, the present embodiment be take the logo picture of 5 different category commodity of random call and is explained as example, as shown in Figure 7, the difference automobile, food, net purchase, each 5 pictures of clothes and mobile phone logo, according to the verification tip language random call rule arranged, a keyword of random extraction from the keyword of these figure titles, generate a verification tip language, as " please clicked successively: Cherry, Li Ning, Pentium, have some well, 361 ° are waited trade mark ".
Verification tip language and 25 pictures are imported in the picture synthesis module, according to the UUID extracted from identification module, the coordinate code that the UUID of at random these pictures being take adds 1 to 25 numeral renames as the figure title, they are kept in the interim picture file folder of picture storage vault, that is to say with log-on webpage in the figure title of each picture source file URL in form identical, for example: No. 01 picture gg00000201(automobile, Cherry) .jpg saves as: 8888_01.jpg, No. 02 picture gg00000202(food, having some well) .jpg saves as: 8888_02.jpg, ..., No. 04 Li Ning logo picture saves as: 8888_04.jpg, ..., No. 16 picture gg00000216(automobiles, Pentium, one vapour) .jpg saves as: 8888_16.jpg, ..., No. 25 361 ° of pictures save as: 8888_25.jpg etc., these interim pictures will automatically be deleted after checking completes, certainly this step also can directly be mapped to the picture source file URL that has inserted UUID in form on corresponding picture path by authentication server, as map directly to/gg00000201(of general/8888_01.jpg automobile, Cherry) .jpg.
According to the order of the verification tip language keyword generated, the coordinate code in the newly-generated figure title of the picture that the picture synthesis module is corresponding by these keywords is combined into coordinate code set [01,04,16,02,25], and it is imported in authentication module.
The picture synthesis module is by the accidental validation signal language: " please click successively: Cherry, Li Ning, Pentium, have some well, the trade marks such as 361 ° " import in the random background picture of a respective pixel, after the verification tip language is carried out to suitable font color variation and distortion at random, this verification tip sonagram sheet also is kept in the interim picture file folder of picture storage vault, the figure title saves as in the same manner described above: 8888_26.jpg
Like this, client will demonstrate identifying code display advertising wall as shown in Figure 8, the user requires to click successively according to the verification tip language: Cherry, Li Ning, Pentium, have some well, 361 ° are waited the logo picture buttons, the UUID that button carries by its URL hyperlink adds the authentication module that coordinate code transfers back to authentication server, the last double figures coordinate code of authentication module after by the checking ID label code=that extracts URL, such as the last double figures 01 of code=8888_01, form the coordinate code set, with the coordinate code set of formerly preserving, compare successively, if all correct, inform that the website checking is correct, the user can carry out next step operation, if comparison result is wrong, again in the picture storage vault, call other qualified pictures, repeat the one-time authentication process according to above-mentioned steps.
Record the key element ID of all verification tip language keywords that offer this IP and UUID user and corresponding picture thereof, arrange while again providing verification tip language keyword for this user within a certain period of time, the element ID that has a picture at least is new the generation.
The queueing discipline of advertising wall picture is not limited in above-mentioned example 5x5, and this is a kind of, dimensions can be arranged arbitrarily by website according to advertising pictures and page layout, website only need to be carried picture number and form size and user UUID by login button and be sent to the third-party authentication server and get final product, be used for self adaptation screen size of mobile intelligent terminal, advertising wall also can not adopt the form of above table, directly with a plurality of regularly arranged image placeholders, replaces the form effect also identical.This advertising wall picture verification system is not restricted to website and logs in proof procedure, the checking of other requirements is equally applicable, the for example anti-checking of pouring water of forum, website log checking, inquiring and authenticating etc., especially intelligent mobile phone terminal is very convenient, the identifying code display advertising wall generated is arranged specification can the few array format of 3X3,4X3 etc., advertising wall and verification tip language even can be in full screen on screen in this step of checking, just complete and verified under the finger point is several, remove the worry of mobile phone small keyboard input from.
Embodiment tri-, click assorted formula identifying code verification method and system, by clicking the relevant range on the identifying code picture, complete the game of similar picture mosaic collocation, complete the proof procedure of identifying code simultaneously.
It is the propagation of the advertisement of having played and the proof procedure of identifying code that the present embodiment be take the collocation of dress ornament, the identifying code proof procedure is played and completed joyously verification step and advertisement promotion by advertising, achieving many things at one stroke and realize win-win situation, is another innovation of the present invention.
In the middle of identifying code advertising pictures as shown in Figure 9, be a model, showed the collocation of a wardrobe, enumerated the main points information point with it at it, be cap from top to bottom, glasses, upper garment, trousers, bag, shoes, periphery the model has been showed cap, glasses, upper garment, trousers, each three samples of bag and shoes are totally 18 element figures, the element figure of each identical category has different features, for example be surrounded by single shoulder bag, both shoulders bag and bag, shoes have the leather shoes of high heel, the cloth shoes of steamed sponge cake and wedge heel of chamois leather etc., a same leopard line cap, can explain mode with different keywords: leopard line cap, peaked cap, the descriptions such as naval's cap.
Same, the arranging scheme of the picture provided according to the advertiser and dress ornament elemental map sheet and these dress ornament elements, for all identifying code advertising pictures are write its key element ID, or preserve by certain register rule classification, for each picture is formulated a plurality of exclusive verification tip languages, such as setting the mixed verification tip language of taking scheme of multiple dress ornament, for each element in picture distributes a coordinate code, here for convenience of description, from left to right set from top to bottom successively coordinate code: in suit collar, long coat 01, large square frame sunglasses 02, black surround sunglasses 03, circle frame light-sensitive glasses 04, leopard line cap 05, hair roller hat 06, knitting wool gorros 07, loose wool T-shirt 08, V neck weight reducing T-shirt 09, the edging young pants 10 of missing old times or old friends, the jeans 11 of cultivating one's moral character, the single shoulder bag 12 of trend, pseudo-classic handbag 13, PU skin both shoulders bag 14, chamois leather wedge heel 15, high side steamed sponge cake cloth shoes 16, corium side's high heel leather shoes 17, fashion is breathed out human relations trousers 18.
The arranging scheme that the verification tip language can provide according to the advertiser is set, such as " the cultivate one's moral character light cowboy's trousers of missing old times or old friends of the red T-shirt of loose fashion collocation add high side high heel leather shoes; join single shoulder bag that a classics are black; wear a top black soft hat and aughty black surround sunglasses; show your youth glamour fully under the sunlight in late autumn; please click successively ", also can more directly " please click successively loose T-shirt, cowboy's trousers, high-heeled shoes, single shoulder bag, soft hat and black surround sunglasses, look at that such collocation is aughty? "
Each advertising pictures has its unique key element ID, and each picture has the verification tip language of a plurality of different arranging schemes, and each verification tip language is provided the effect picture of the arranging scheme of this verification tip language by the advertiser.Certainly these verification tip languages and the corresponding effect picture of verification tip language also can be preserved and extract by the form of their ID of establishment, such as take Fig. 9 as example, for convenience of description, the key element ID that supposes this advertising pictures is gg000003, this picture can be kept in the picture storage vault by the form with gg000003.jpg, for each element in this advertising pictures has been formulated such as 12 cover arranging schemes, each verification tip language can be code with 01 to 12, after directly being added in the key element ID of advertising pictures, as the ID of this verification tip language, such as above-mentioned two verification tip languages are compiled, be 01, 02, " please click successively loose T-shirt, cowboy's trousers, high-heeled shoes, single shoulder bag, soft hat and black surround sunglasses, look at that such collocation is aughty? " ID be exactly gg00000302, by the coordinate code set [08 of the element figure that in this verification tip language, keyword is corresponding, 11, 17, 12, 06, 03] be added in the ID back, as the figure title of this verification tip sonagram sheet, be carried in the background picture of 540X50 pixel, with gg00000302(08 after verification tip Chinese language word is done to suitable distorting, 11, 17, 12, 06, 03) form of .jpg is kept in the picture storage vault.
Because the color with a dress ornament also has multiple, the design sketch photo of these identical style different colours collocation also can be worked out to an one digit number or double-digit code, take Figure 12 as example by its volume, be 01, Figure 12 just can save as the gg0000030201.jpg form like this, by that analogy all verification tip languages and corresponding effect picture thereof all are kept in the picture storage vault, if the picture of this arranging scheme is greater than one, by authentication server, extracted at random.
The present embodiment is usingd transparent picture and is covered on above-mentioned element figure as the hyperlink transparent button, when moving on the element figure, mouse demonstrates the dotted outline of transparent picture to show the position of this element, as shown in the dashed-line outer box of each element figure in Figure 10, the housing that dashed-line outer box is transparent button, in Figure 10, the dotted line frame has two kinds: the right and left is the 86x130 pixel, upper and lower little frame is the 58x68 pixel, draw the transparence picture of plurality of specifications by drawing instrument to adapt to the needs of multiple identifying code picture, such as available Illustrator (vector plotting instrument) draws the histogram of 58x68 and 86x130 pixel, after its 100% transparence is processed, save as respectively for example form of 5868.png and 86130.png, be kept in the picture storage vault.
Draw the figure layer of 540X 400 pixels under the enrollment form of enrollment page HTML code, insert the identifying code picture placeholder of a 540X 400px in layer, for example this image placeholder source file URL being linked to the gg000003.jpg picture is Fig. 9, using the template type hot-zone of Fig. 9 as the identifying code picture of identical topology, draw respectively a layer on each element figure around Fig. 9, as shown in Figure 10 dotted line frame, the transparent picture 86130.png of 86X130 pixel specification will all be inserted respectively in 6 layers of the right and left, each 6 figure layers are up and down inserted respectively to the transparent picture of 5868.png, by above-mentioned element figure coordinate code, a coordinate code is set to each corresponding transparent picture, such as upper row from left to right is followed successively by 1 to 8, the middle left side is 9, the right is 10, below be followed successively by 11 to 18, for each transparent picture is given a URL who carries the sensing authentication server authentication module of its coordinate code.
Insert again the verification tip sonagram picture placeholder of a 540X50 pixel below identifying code picture placeholder, its source file chained address is pointed to the picture storage vault of authentication server.
Several information points position the model, with the different icons diagrammatic representation icon of this information point, mean that with semicircle the position of cap, two roundlets mean the position of glasses, the position that square means upper garment, the position that rectangle means trousers, the circular position of bag, the position that triangle means shoes of meaning here.Draw out the icon graphic of these corresponding sizes in Illustrator, such as frame is the red frame about 4px, the graphic icons of background transparent processing, such as saving as respectively by the name of figure life: byx.png, syx.png, zfx.png, cfx.png, yx.png, sjx.png are kept at it in picture storage vault.As shown in figure 10,6 newly-built layers of key message point places difference the model, insert respectively an icon image placeholder in these layers, the link path of transparent background icon picture corresponding to input in above-mentioned icon image placeholder source file address properties src, these figure mark on a map under layer default conditions and do not show.
Need to add a JS script in the enrollment page HTML code, be set to when the user clicks element figure corresponding to these icons, JS changes the figure that this icon is corresponding and marks layer on a map for visible, for example work as the user and click each element figure by above-mentioned verification tip language requirement, the corresponding icon that shows this classification figure on the model, as clicked successively " loose T-shirt, cowboy's trousers, high-heeled shoes, single shoulder bag, soft hat, black surround sunglasses ", on the model, demonstrate successively " square, rectangle, triangle, circular, semicircle, two small circular " the figure layer of marking on a map, with the click of telling this classification figure of user, complete, being traditionally arranged to be the click mistake also can show.
The above-mentioned icon shown with it the model is only to set for convenience of description, can arbitrarily change icon in practical operation, and icon can also insert with regard to the figure with coherent element in corresponding figure layer directly in corresponding key message point position display.
Above-mentioned like this image placeholder and transparent button layout thereof just can form the code snippet template of the identifying code picture of all Fig. 9 of being similar to, the mark code of being punished for being related to can be fixed the above-mentioned mode be arranged in order that adopts, identifying code picture that just can a same size of random call when the checking demand is arranged, only need the source file URL of change identifying code picture and verification tip sonagram sheet to can be used for client and click and verified.
Same, the implementing procedure of the present embodiment and embodiment bis-have similar part, JS script in the HTML code of enrollment page is when the user enters the enrollment page of website, JS extracts user's UUID, if client does not have UUID, in client, generate UUID, such as UUID is 8888, in its back, add that from 01 to 18 for coordinate code, be for example 8888_01 to 8888_18, these coordinate codes are inserted successively to the URL back of the link attribute href in above-mentioned transparent button, identifying code coordinate code as each transparent button carried, after the same figure title using 8888_aa.jpg and 8888_bb.jpg as identifying code picture and verification tip sonagram sheet is inserted into the hyperlink of source file attribute src of corresponding image placeholder.
The relevant informations such as UUID that comprise that the URL of user's checking request by registration button carries send to the identification module of authentication server, the relevant information that authentication server extracts according to identification module is retrieved suitable picture element ID in the picture storage vault, one of them picture of random call, the assorted identifying code picture of clothes as shown in Figure 9 gg000003.jpg, the assorted verification tip sonagram sheet by this dress ornament of key element ID random call, gg00000302(08 for example, 11, 17, 12, 06, 03) .jpg, extract coordinate code set [08 corresponding to this verification tip language from the figure title ID of this verification tip sonagram sheet, 11, 17, 12, 06, 03] import in authentication module, authentication server is directly separately deposited identifying code picture and verification tip sonagram sheet in the interim picture file folder in the picture storage vault with the form of 8888_aa.jpg and 8888_bb.jpg respectively, the enrollment page that two pictures just may be displayed on client has suffered.
The user requires to click successively transparent picture button on corresponding element figure according to the verification tip language, the JS script is visible by the icon layer change that under this button, the element figure is corresponding successively, to show that the user has clicked such other element figure, the URL of while button carries UUID and adds the authentication module that coordinate code sends to authentication server, whether authentication module extracts the coordinate code part in URL, correct to determine this checking by contrast.
If contrast is correct, authentication server is according to the ID:gg00000302(08 of verification tip sonagram sheet, 11, 17, 12, 06, 03), the design sketch picture that to recall at random ID be gg0000030201.jpg from the picture-storage storehouse is Figure 12, interim ID by it with the identifying code picture is that 8888_aa.jpg runs after fame, separately deposit in interim picture file folder to replace the identifying code picture, the JS that simultaneously returns to a session triggering enrollment page is invisible by the icon layer change and refreshes the identifying code picture, in client, being shown as this is proved to be successful, as shown in figure 12, be shown as model's design sketch of the arranging scheme of user's click on picture, the demonstration of picture character is exited such as being set as having clicked checking, double-click enters official website and gets the coupons that surpass 10 yuan.
Require high any website for some registration checking rank, in order to increase the identification difficulty of hacker's registration tool, can also be as shown in figure 11, non-critical information point position at picture, some digital buttons are set, as the digital frame in figure, these digital frames also are set to button, can locate the less important key message point button of category-B to these digital frame buttons, each digital frame button is set a coordinate code, can be random, and the numeral of just take in digital frame for convenient narration here is its coordinate code, these numerals generally can just replace by the price of each element in picture, as " 129 yuan of loose wool T-shirts, cultivate one's moral character 119 yuan of jeans, 225 yuan of side's high heel leather shoes, 265 yuan of the single shoulder bags of trend, 49 yuan of hair roller hats, 36 yuan, black surround sunglasses ", the verification tip language that the ID code can be set is gg00000303 " is please clicked picture and price thereof: loose T-shirt successively, 129, cowboy's trousers, 119, high-heeled shoes, 225, single shoulder bag, 265, soft hat, 49, the black surround sunglasses, 36, look at that such collocation value-for-money is aughty? ", the coordinate code set be kept at so in verification tip sonagram title is exactly [08, 129, 11, 119, 17, 225, 12, 265, 06, 49, 03, 36], other operating procedures are substantially all identical.
Above-mentioned legend, just for implementation process of the present invention and method are described, can increase or reduce the quantity of classification number and element of all categories in concrete operations according to the requirement of proof strength, number of clicks can be dropped to three or four times.Certainly the ways and means that picture layout and word show also has a variety of, different classes of advertisement Case Design scheme also can be very different, carry out the happy case of advertising for Mrs such as do certain dish by the religion people, as first added the happy chickens' extract of a few gram Mrs to add again how many gram oil consumptions of how many gram light soy sauce etc., the DIY game of various products can, here can not all list, here just take the Han Douyi house as an example so that part implementation method of the present invention to be described, should not be construed as limiting the invention.
Following several embodiment will increase more interactive on the basis of above-described embodiment, to on picture, click to complete the process of identifying code checking, upgrade to and drag the coherent element figure to complete the proof procedure of identifying code on picture, the game of proof procedure is recreational stronger like this, interactive also stronger with the user.
Embodiment tetra-, and using the water-saving public service ads identical with embodiment mono-is example, and the present embodiment is illustrated, and the present embodiment is the embodiment verified to complete identifying code to a plurality of key message points by mouse drag with an element figure from picture.
Increased the figure of several aquamaniles in the lower right corner of Fig. 1, as shown in figure 13: each, glass, tub, water vat, blue and white china bowl and galvanized iron metal bucket, these figures are placed on as the limit, bottom right of the background picture of father's layer as a sublayer, each rectangular graph has been prepared convenient random replacement of a plurality of patterns, the water droplet on the picture left side is depicted out as a transportable element Image hotspot, certainly for requiring the simply checking of a bit, the utensil be filled with water can be depicted out and be secured in certain position in picture.
When needs are verified as identifying code, the identifying code server is issued verification tip language of user, the user can require to have operated proof procedure according to the verification tip language, for example require the user water droplet to be put in " bowl ", so just can complete very simply proof procedure, this process is very simple for the people, but these figures for hacker's auto registration instrument in identification figure are very difficult, because same a bowl or other figure, can prepare the figure of much different bowls replaces at random, can also be all with regard to the bowl with different or the different vessel figures of other classification, and misplaced position when water droplet, system can be changed one group of other picture automatically, very simply identify for Hacker Program and may be difficult to for the people, just can judge that when reaching certain limited number of times it is that Hacker Program is done, it is limited.Suitably increase difficulty, can require twice or three times water droplet to be put in different utensils, for example water droplet is put in order into to " bowl, basin, bowl ", a water is dripped and puts once, covering right probability is 1/5, if putting the probability of secondary success, order according to the rules just only has 1/25, if three times, Hacker Program at will covers right possibility under the prerequisite that can not correctly identify figure almost not to have been had, but just very simple for the people, because computer program affirms that to the Fuzzy Processing ability of the word on picture or pattern nobody is high.
By mouse or point the element figure in mobile picture, these element figures are set can only be moved in the picture frame region, the shape of picture frame can be the figure of various shapes, but all can only in the picture frame, move regardless of the element figure picture that is what frame shape, can only move in this picture territory.For convenient, no matter be the figure of what frame shape, can calculate by the JS script two-dimensional coordinate of each point of this figure, the pixel of picture Far Left of can take is X=0, a bottom pixel is that to build a lower left corner be initial point (0 to Y=0, 0) two-dimensional coordinate, also can directly take the habitual upper left corner of most software and browser is the origin of coordinates, like this, no matter at screen where picture, can calculate by the JS script origin of coordinates of this picture, can or scheme layer to each the key message point hot-zone of depicting out in picture and element Image hotspot and calculate a coordinate frame, although by convention directly by picture, the figure layer, the upper left corner of hot-zone and element figure is as data collection point, do not need to calculate and just can directly extract in the location tags of HTML code, more simpler like this, but it is initial point that the present embodiment still not take the upper left corner of habitually practising, but take the central point two-dimensional pixel coordinate of the lower left corner and hot-zone, it is the coordinate data collecting sample, calculate the central point two-dimensional pixel coordinate of hot-zone or element figure figure layer by JS, using these central point two-dimensional pixel coordinates directly as this hot-zone or the coordinate code of element figure.
The present embodiment is usingd the identifying code of posting as forum and is verified as example, under posting the text box of page HTML code, forum inserts an identifying code picture placeholder figure layer, here the Figure 13 of take is inserted in this image placeholder as example, insert the layer of a 400x60 pixel on limit, picture bottom right, insert successively the picture of five aquamaniles shown in the figure of 80x60 in this layer, the picture of aquamanile just can have been replaced at random like this, depict out the hot-zone of water droplet, or the hot-zone of water droplet directly just is set with rectangle as shown in the figure, JS script in HTML is set, and to give tacit consent to the picture lower left corner by calculating be the origin of coordinates (0, 0), the JS script is (X=70 according to the water droplet hot-zone coordinate frame of edge, water droplet hot-zone frame calculative determination, Y=120, X=100, Y=160), as shown in figure 14, the center point coordinate of water droplet is (85, 140), picture several key message points hot-zone coordinate frame be respectively: the cup (X=200, Y=0, X=280, Y=60), basin (X=280, Y=0, X=360, Y=60), cylinder (X=360, Y=0, X=440, Y=60), bowl (X=440, Y=0, X=520, Y=60), bucket (X=520, Y=0, X=600, Y=60), its center point coordinate is respectively: cup (240, 30), basin (320, 30), cylinder (400, 30), bowl (480, 30), bucket (560, 30).
The present embodiment completes the identifying code checking by the mouse event of JS script in the HTML that webpage is set.Same, the user " please puts water droplet into ' bowl in order according to the verification tip language, basin, the bowl ' inner " requirement, clicking " water droplet " hot-zone on the identifying code picture pins left button and does not put, drag it in the graphical boxes of " bowl " in picture, when the central point of " water droplet " element figure moved the coordinate line of the graphical boxes of " bowl ", release left button " water droplet " element figure automatic absorbing completes the first step and drags on the central point of the graphical boxes of " bowl ", the center point coordinate (85 that the mouse event that the JS script is set is record " water droplet " while pressing left button, 140), and " water droplet " hot-zone interior element figure real-time depiction is copied to portion, and by translucentization of element figure copied, pin " water droplet " element figure that left mouse button dragging copy in the object box of " bowl ", the event that flicks of left mouse button is set for discharging picture, and excite JS to record the center point coordinate (480 of " bowl ", 30), and by the center point coordinate collection (85 of two key message points, 140, 480, 30) be recorded in cookie, repeat above-mentioned action and complete other twice drag operation, record successively coordinate set code (85,140,320,30) and (85,140,480,30), after the user completes number of clicks, the JS script will be recorded in three the coordinate set coordinate codes set (85,140 in cookie, 480,30+85,140,320,30+85,140,480,30) propose, be added in the hyperlink of the element figure that last placement enters, in the disposable authentication module that sends to authentication server, carry out contrast verification, or authentication module directly extracts the coordinate code set and compares in the session of cookie.
Between coordinate set, with a symbol, be separated, for example+number or other sign fields every, or directly will between coordinate, with a space bar or comma, separate, as (85 140 480 30 85 140 320 30 85 140 480 30), the method for expressing of coordinate set can be additive method, as long as can separate just passablely, authentication module only need sequentially be compared and can verify whether its operation is correct it.
If that mobile element figure has is a plurality of, be also that the repetition aforesaid operations gets final product, other clients of the present embodiment and the operation between authentication server and the described operating process of above-mentioned other embodiment are basic identical.
If operate, finger is set identical by the action of pressing with mouse with the action frameed out and upspring on screen on touch screen.
If increase some difficulty of checking, part key message point in picture can be depicted out, for example, by font " joint, approximately, from, one, drip, water, open, begin " depict out one by one for clicking, JS script mouse event is set, and in order to press event, to add the event of flicking be one click, and record its center point coordinate, for example the verification tip language is for " clicking ' joint, approximately ' two words, and water droplet is put in order ' bowl, basin, bowl ' inner ", the identifying code plug-in unit calculates " joint, center point coordinate approximately " is respectively (110, 330) and (180, 320), the coordinate code set that completes this checking language verification operation is (110, 330+180, 320+85, 140, 480, 30+85, 140, 320, 30+85, 140, 480, 30), five operation normal speeds so also only need just can complete in 3 to 5 seconds, like this can be easily.
Embodiment five, drag assorted formula identifying code verification method and system, by dragging the coherent element figure on picture, complete the game that similar picture mosaic changes the outfit and arranges in pairs or groups, and complete the proof procedure of identifying code simultaneously.
The present embodiment will adopt the third-party authentication server to provide the identifying code service for checking credentials for website and client, the present embodiment need to be at the nested framework of the enrollment page of website<frame src=" url " > (nesting frame html tag), or under the enrollment form of enrollment page the direct embedded framework of a nested identifying code picture analogies size<iframe src=" url " (embedded framework html tag), only need the picture storage vault that the URL in this frame source file label src attribute quotation marks is pointed to third-party authentication code server to get final product, perhaps in the HTML code of enrollment page, add one and play window label window.open (' url'), link path that this played to window the same as said frame points to third-party authentication server picture storage vault and gets final product, play window, nesting frame and embedded framework in client browser, show the method for identifying code picture and effect basic identical, all only the source file URL of the framework of appointment in webpage or bullet window need to be pointed to the third-party authentication server gets final product, the present embodiment be take temporarily embedded framework here and is explained as example.
Shown in Figure 16, be that illustration is implemented in the picture mosaic collocation game type identifying code checking that changes the outfit, the present embodiment can be according to the described mode of embodiment tetra-, all key message points in figure are depicted out, by the JS mouse event is set, by a plurality of element figures for moving in figure, the mode that copies and drag by mouse completes the game type checking that drags the picture mosaic collocation, can complete checking by the two-dimensional coordinate in calculating recorded key information point central point or the upper left corner, also can be by setting the coordinate code of key message point, the method that records successively the coordinate code set of proof procedure completes checking, the method is relatively simple, can be more convenient directly for the verification system of website, in the webpage that has checking to need in website, certain position directly shows the identifying code picture by embedded framework.
The present embodiment also can complete according to following mode and drag the identifying code proof procedure of relevant mobile element figure to assigned address picture mosaic collocation.
Same, all identifying code pictures are classified and preserved or write relevant factor ID and preserved according to relevant factor information, take Figure 15 as example, being assumed to for convenience of description its key element ID write is gg000005, it is saved as to gg000005.jpg, the dress ornament element figure for collocation that it is supporting distributes a coordinate code, after this coordinate code is added in identifying code picture element ID as the ID of this element figure, here take temporarily natural number as coordinate code, for example, shown in Figure 17, top is from left to right successively: in the deer head, length and width pine woollen sweater is 01, the space bag is 02, Little Bear lint bag is 03, corium handbag 04, the real leather shoulder bag is 05, V neck row button short sleeved shirt 06, in the middle of the left side, the loose cotton jersey of wide horizontal stripe is 07, the knitting cardigan 08 of the right ripple glaze, below from left to right successively: the weight reducing iced jeans of missing old times or old friends is 09, grid elastic casual pants 10, put on a line skirt 11, the stay cord human relations trousers 12 of breathing out with a tight waist, these dress ornament element figures can be take ID and saved as respectively as the picture name: gg00000501.jpg, gg00000502.jpg, gg00000503.jpg, ... gg00000512.jpg, if also have the element figure of other collocation, continue to write by this rule, above-mentioned picture is kept in the picture storage vault.
A newly-built page in web page editing software, insert illustration 15, using the Background of two models in figure as father's layer, model's key message point position is depicted out as hot-zone, as shown in figure 16, the quadrate hot-zone is depicted at model's upper garment position, the rectangularity hot-zone is depicted at the trousers position, Bao Bao depicts at position circular hot-zone, a bit can all directly use circular or the square hot-zone as this key message point as wanted simple, as shown in figure 17, by the square hot-zone specified coordinate code at the model's that in figure, left side bundle pigtail is stood with one foot to the knee upper garment position, be " a ", the rectangle hot-zone at trousers position is " b ", the circle of bag bag is " c ", by the stand model's that pull head sends out upper garment position square of the fork leg of the right bob, be " d ", trousers position rectangle is " e ", Bao Bao position circle is " f ", in concrete real operation, also can directly with concrete graphic or the graph outline close with concrete graphic, replace, checking requires high any preferably all icons are indicated with the simple geometric figure of same, to increase the identification difficulty of Hacker Program, by the authentication module of the hyperlink path point authentication server of each hot-zone and carry its coordinate code, the present embodiment just adopts the simplest method here, key in its coordinate code in the direct link frame corresponding in this hot-zone, for example " #a ", null links such as " #b ", directly from No. # of its link label, extract its coordinate code by the JS script in proof procedure.
Newly-built 12 sublayers independently around Figure 15, be in Figure 16 shown in the dotted line frame, insert an element graph image placeholder in each sublayer, the picture storage vault of authentication server is pointed in the source file link of element graph image placeholder, the position of sublayer and size have certain systematicness, as only had two kinds of dimensionss in the sublayer in Figure 16, around being arranged in regularly, can be used as so a kind of template type figure layer of similar identifying code picture, to facilitate a large amount of enforcement.
A newly-built figure layer identical with Figure 15 size on the figure layer, insert a design sketch image placeholder, the source file of design sketch image placeholder is linked as src=" http//: ... .../uuid.jpg; this link path points to the picture storage vault of authentication server; picture UUID by name or the random RandomId (random number) produced; the Z axis of this design sketch image placeholder figure layer is set to 1; be z-index:1; in the bottom of figure layer, identifying code picture figure layer is z-index:2, and all elements figure figure layer is that z-index:3 is topmost.
Insert a verification tip sonagram picture placeholder under the identifying code picture, add one section JS mouse event code snippet in web page code, the web page code of above-mentioned identifying code picture is kept in the picture storage vault with the ID name identical with identifying code picture element ID, such as saving as dynamic web page file gg000005.jsp.
The verification tip language that each is write according to arranging scheme is numbered, after also being added in identifying code picture element ID, the coordinate code set of the element picture that in the verification tip language, keyword is corresponding is saved as to verification tip language ID together, for example according to the multiple arranging scheme of these dress ornament elements, set a plurality of verification tip languages of this picture, such as: " classics of girl that please give prick pigtail jeans of missing old times or old friends; grey knit vest in collocation, then add the black real leather shoulder bag of a classics; Join again a line skirt of an elegance for the Miss of bob, the V neck row button shirt of a lucid and lively fashion of Joker, an additional small and exquisite corium handbag, you see whether show gentlewoman's model fully "; its corresponding coordinate code set is (09b, 08a, 05c, 11e, 06d, 04f); also can be more directly " being pigtail model arrange in pairs or groups deer head breadth pine woollen sweater, jeans and space bag, is bob model arrange in pairs or groups jeans, the loose cotton jersey of horizontal stripe and single shoulder bag, and perhaps you also can like! "; such as the numbering of the verification tip language of writing them is respectively aa, ab; verification tip Chinese language word is carried in the Background of certain noise after suitable distortion mutilation body is processed; generate verification tip sonagram sheet, it be take this ID and saves as respectively gg000005aa(09b, 08a, 05c, 11e, 06d, 04f as the picture name) .jpg, gg000005ab(01a, 09b, 02c, 09e, 07d, 05f) .jpg.Each verification tip language has its corresponding supporting one or more design sketch pictures, and can after verification tip language ID, increase by one to two is the digital ID as its design sketch picture, such as Figure 18 being take to this ID, saves as gg000005aa01.jpg as the figure title.
To above-mentioned identifying code picture, the ID of corresponding collocation element figure and verification tip sonagram sheet is encrypted by different function algorithms respectively after being encoded, ID after encrypting is kept in the picture storage vault as its figure title, for convenience of description, this paper still is explained with unencrypted ID.
The present embodiment authentication server system is comprised of identification module, picture storage vault, picture synthesis module, encrypting module and authentication module.
When clicking registration button, the user enters enrollment page, JS script in the enrollment page HTML code extracts user's UUID, if not generate a UUID, such as UUID is 8888, perhaps directly generate the RandomId such as a tens, using the direct webpage name in URL of UUID or RandomId, be inserted in the URL in the sensing third-party authentication server picture storage vault path in the source file label src of embedded framework of the page, the present embodiment here or take UUID is set forth as example, for example:<iframe src=" http//: ... .../8888.html " >.
The URL of registration button carries the identification module that relevant informations such as comprising UUID sends to authentication server simultaneously, the relevant information that authentication server extracts according to identification module is retrieved the key element ID of suitable picture in the picture storage vault, randomly draw the key element ID of a picture, such as gg000005, according to this key element ID, move the inverse operation verification tip language Image ID corresponding to this identifying code picture and element figure ID is decrypted decoding by encrypting module, the verification tip sonagram sheet that this identifying code picture of random call is corresponding, as the verification tip language: " please give classics of model of pricking pigtail grey knit vest in the jeans collocation of missing old times or old friends, add again the black real leather shoulder bag of a classics, join again the V neck row button shirt of a lucid and lively fashion of a line skirt Joker of an elegance for the model of bob, an additional small and exquisite corium handbag, you see whether show gentlewoman's model fully " ID:gg000005aa(09b, 08a, 05c, 11e, 06d, 04f), by this verification tip language, corresponding coordinate code set (09b, 08a, 05c, 11e, 06d, 04f) imports in authentication module after extracting simultaneously.
Call by the coordinate code set in verification tip language ID 6 element figures that its coordinate code is corresponding, other 6 element figures of random call again, figure title after their figure title is encrypted, radom insertion is in the code with identifying code picture jsp webpage of the same name, be in the URL of source file label src of the sublayer element graph image placeholder in the code of gg000005.jsp, coordinate code corresponding to this element figure will directly be inserted in the link label href of each sublayer simultaneously, for example " #01 ", " #02 " ... wait null link, can certainly adopt the method in the URL that points to the authentication server authentication module of inserting.
The link path of the encryption ID of this verification tip sonagram sheet is inserted in the source file link label src of verification tip sonagram as placeholder simultaneously, then the UUID of this dynamic web page being take saves as in the interim picture file folder of picture storage vault after the webpage name is converted to static Web page, be present web page files 8888.html by name, the same with the URL of the embedded framework of enrollment page of website, identifying code picture as shown in figure 16 and verification tip language have just been demonstrated like this in client terminal web page, can certainly be presented in client browser with dynamic web page, also can save as but directly by URL, be redirected 8888.html is mapped to gg000005.jsp.
The user is according to the requirement of verification tip language, mouse pointer is moved on on the jeans element figure in the lower left corner, press left mouse button, mouse event is set to press the event mouse and catches this element figure, excite the JS script to extract the coordinate code " 9 " in " #9 " in this element figure link label simultaneously, pin left mouse button and drag this element figure, the rectangle hot-zone " b " that drags it to left side pigtail model's trousers position is located, discharge left mouse button, JS is set to the central spot that this element figure central point is adsorbed on " b ", mouse event is set to left button and upsprings and discharge this element figure, and excite JS to extract the coordinate code " b " in " #b " in this rectangle hot-zone link label, the synthetic coordinate code " 9b " of JS script using two coordinate code additions as this operation, it is recorded in cookie, or be recorded in the coordinate code text of other establishment.
The user completes other operating process of verification tip language requirement successively, the operation of mouse is identical with the aforesaid operations process, set (09b, 05a, 08c, 11e, 06d, 04f) and the UUID of the coordinate code combination that the JS script produces all operations or send to together with the session in cookie in the identification module of authentication server, the coordinate code set that identification module is formerly preserved by contrast judges the correctness of this checking.If the identifying code checking requires rank higher, the coordinate code combination of this set is sequentially compared successively, if checking requires rank lower, whether identical the getting final product of set element that only relatively the interior coordinate code of set combines.Certainly the JS script can not carry out addition by two coordinate codes yet, only need record successively whether also can realize identifying proof procedure correct, as the coordinate code set expression of above-mentioned generation is (09, b, 05, a, 08, c, 11, e, 06, d, 04, f), authentication module only needs to compare successively in order or retrieve to complete checking, above-mentioned coordinate code set also can be expressed as ((09, b), (05, a), (08, c), (11, e), (06, d), (04, f)), so also can realize that contrast identifies.Certainly the expression mode of coordinate code and set thereof also has other a variety of, and above-mentioned is only several examples, should not form the restriction to the present invention's protection.
Authentication module to the contrast of coordinate code set if correct, from the picture storage vault, recall the design sketch picture that this verification tip language is corresponding, Figure 18 for example, this figure title gg000005aa01.jpg is saved as to figure title 8888.jpg to be kept in the interim picture file folder of picture storage vault, by session, excite the JS script to change design sketch figure layer Z axis number into z-index:4 simultaneously, be presented at the figure layer topmost, JS is refreshed embedded Framework Net Page simultaneously, client is shown as shown in figure 18 and is proved to be successful to show, if contrast mistake, again from the picture storage vault the suitable picture of the other opening and closing of random call and verification tip language thereof send to client and require the user again to verify once.
The present embodiment is the assorted game type identifying code example of the collocation that changes the outfit, similarly the replaced jigsaw game has in some trivial games websites, basically be all the little animated gaming of flash formula, do not there is the identifying code authentication function, and this kind of game is somewhat bigger than normal, long in the client load time, generally at least need more than tens seconds, not too be applicable to the identifying code checking and require rapidly demand efficiently, certainly as long as it is carried out to appropriate reconstruction, just these game can be become to identifying code authentication function of the present invention, the flash picture mosaic can be oversimplified, only use the hierarchical picture of the several figures in above-described embodiment, can arrive client by rapid loading.
Importantly by the key message point in picture and the given coordinate code of element figure, briefly, whether the process that will allow exactly authentication server know that the user operates is correct, only need mouse event be set by above-described embodiment method, by the JS script operation, can complete in the same way with the identifying code of the same effect of above-described embodiment and verify.
Above-mentioned picture mosaic collocation game type identifying code verification mode, obviously be not only the replaced jigsaw for clothes, can also design a lot of other the game of collocation formula or the assorted formula game of some DIY types identifying code verification methods, for example the parking stall game type identifying code of robbing shown in Figure 19 is verified picture, dress ornament element figure is dragged to the model relevant position is the same with it with above-mentioned, by the requirement of checking signal language, the parking stall that several automobile element figures on the right in figure are dragged to left side appointment just can complete proof procedure, can also in the middle of picture, increase several route objects, as shown in figure 20, such as requiring user's " M2 of Great Wall Harvard that is opening you arrives Zhang San's garage through Beijing ", only needing to increase the mouse that the JS script is set is that the coordinate code that records this object while dragging the element figure through " Beijing " this object gets final product through event, robbing parking stall is a popular game, identifying code picture of the present invention not only can be advertised, can also play advertisement by the form of game and do checking, the proof procedure of in the past having no alternative is completed joyously in the amusement of game advertisement, thoroughly to improve user's experience.Be not only to rob parking stall, a lot of advertisements can be developed recreational identifying code advertisement by this theory, have not only refused hacker but also propagating advertisement, and can the amusement user, realize user, website, advertiser's win-win situation.
Model in figure or key message point can be one or more, the present embodiment is just in order to set forth a kind of mode of the present invention, in practical operation, can require will click or drag to be reduced to three or four times and above number of times according to proof strength, if increase difficulty, the digital focus of similar price can be set at picture non-critical information point place as embodiment tri-, concrete case study on implementation flexible Application in practical operation.
Embodiment six, puzzle type identifying code verification system.
The picture arrangement game that several little pieces is combined into to a full picture is very general, on network, existing picture arrangement game is all flash picture mosaic trivial games basically, basically be all that a complete picture is divided into to several pieces, then after these pieces being broken up, again be spliced into original picture, also have as seven-piece puzzle, that various difform figure pieces are spliced into to certain figure, the picture arrangement game of these several pieces may be a little to the people difficulty, but just too simple to computer program, the picture mosaic of the splicing shape of picture seven-piece puzzle type, computer program can be scanned by the shape of the fritter to different, compare and can complete soon splicing by calculating.
For the picture mosaic that is spliced into a width pattern, computer program can be by the shape of each fritter of scanning, and the pattern characteristics of each little block edge or the identical point of pigment characteristics are scanned, can splice very soon this picture by these feature calculation retrievals, so this picture arrangement game can not so directly be used as the picture mosaic identifying code certainly, game is a kind of recreation, identifying code is a kind of authentication function, not a conception of species fully, but the present invention can use for reference multiple happy trivial games mode, simple recreational trivial games is changed over to the identifying code of function formula, complete the transformation of this character, only need to be according to method of the present invention and theory, some trivial games are made to certain change and can complete the transformation from game to identifying code.
As shown in figure 21, it is the advertising pictures of a Legend computer, it simply is divided into to four little pieces of equal rectangle so that the present embodiment is illustrated, in order to be picture arrangement game formula identifying code by picture mosaic trivial games variable body, be necessary for each little piece and specify respectively or set at random a coordinate code, the present embodiment is just specified one to facilitate explanation with simple numeral or letter.
Four little pieces that picture is divided into are from upper left, upper right, bottom left, bottom right is called after 1 successively, 2, 3, 4, four rectangles spelling frames of picture mosaic frame are divided into hot-zone spelling frame or section is four independently rectangle spelling frames, by their coordinate code from upper left, upper right, bottom left, bottom right is called after a successively, b, c, d, that is to say picture mosaic complete after accurately result should be 1 corresponding a, 2 corresponding b, 3 corresponding c, 4 corresponding d, be that correct coordinate code combinations of pairs should be 1a, 2b, 3c, 4d, as shown in figure 23, four pieces are random or be completely fixed the both sides that are placed on respectively the picture mosaic frame, the method of placing can be other spread patterns, the present embodiment only is illustrated with this figure, numeral in figure and letter are to add for convenience of description, in practical operation, generally need not indicate.
Keyword " association is arranged in piece 1, integrated computer, 3999 yuan ", keyword " girl is arranged in piece 2, lenovo ", keyword " computer is arranged in piece 3, the dog dog, newly think happy, bulb ", keyword " keyboard is arranged in piece 4, good Li Laile " etc. key message point characteristic key words, keyword set using these characteristic key words as the verification tip language is kept in the classification of verification tip Chinese language shelves, such as the form with such: 1(association, integrated computer, 3999 yuan), girl 2(, lenovo), the 3(computer, the dog dog, newly think happy, bulb), the 4(keyboard, good Li Laile) be kept in notepad, preserving form can be .txt, the coordinate code of each piece and the separator of keyword can be also other symbols, as long as can facilitate in the keyword set that the coordinate code of each piece of authentication server from notepad is corresponding and randomly draw one.The also direct combination title using these keyword set as this piece, this piece picture is kept in the picture storage vault, such as saving as: the 1(association, integrated computer, 3999 yuan) .jpg, the 3(computer, the dog dog, newly think happy, bulb) form of .jpg etc., like this authentication server can be in this picture position of random alignment from its picture name keyword of random call, with this advertising pictures title or the ID folder of creating a file, all piece pictures of this advertising pictures all can be kept under the file of this advertising pictures title in the picture storage vault or ID.
The present embodiment be take four independent four picture mosaics of spelling frames and is explained as example, as shown in figure 22, the identifying code picture requires to work out classified information key element ID according to the advertiser as shown in figure 21, such as called after " pt400006 ", take this ID as the title folder of creating a file, this identifying code picture is kept under this document folder, the title of this advertisement identifying code picture can be that its ID can be also other title forms, here for convenient and simple explanation, this association's identifying code picture is saved as: 001.jpg, four little piece pictures are saved as to 1.jpg, 2.jpg, 3.jpg, 4.jpg, just the independent picture mosaic frame of four shown in Figure 23 saves as a.jpg, b.jpg, c.jpg, d.jpg, the coordinate code of this figure and corresponding keyword document thereof are carried out saving as coordinate code key words text 001.txt after coding encrypting.
If according to general picture arrangement game playing method, picture is dragged in the picture mosaic frame and is combined into a width figure, only having four pieces is fairly simple for common people, can be simpler for computer program, computer program only need to just contrast and can complete easily by the same characteristic features to the image edge part, will be much more difficult but identify for each the more abstract key message point in picture, because these information characteristics do not have fixing feature, but just very simple for the people, only need to be by the characteristic key words of above-mentioned key message point when calling the verification tip language, call at random one and form a verification tip language from each piece picture, such as " please successively ' lenovo being arranged, newly think happy, 3999 yuan, the picture of good Li Laile ' is dragged in the picture mosaic frame and forms a complete picture ", require the user to be dragged into successively picture mosaic, just more difficult for Hacker Program like this, but just there is no any difficulty for the people.More simply any can be according to directly the picture mosaic frame being loaded as shown in figure 23 to former figure background, by former figure gray scale processing, translucentization processing, more convenient common people's picture mosaic, the picture mosaic trivial games of this way routine early has example, do like this and do not affect the identifying code authentication function, because simple like this four width picture mosaics, only have 1/24 if will cover right probability in the situation that does not repeat to complete successively, so simply generally can 100% for the people correct, so if basically can judge more than wrong secondary that Hacker Program does.
The present embodiment only is illustrated the present invention with four fritter picture mosaics, these pictures can be divided into more than four and carry out picture mosaic, such as 6,8, can strengthen Hacker Program identification difficulty, in fact as long as the verification tip language is carried out, generally four picture mosaics have enough been dealt with Hacker Program basically, and the simple like this proof procedure dragged for four times also can be faster.
The present embodiment just be take the third-party authentication server and is logged in the service for checking credentials and be explained as website and user provide, at first insert the form of 2 row 4 row in the logon web page of website, to in the cell of four of centres, insert respectively a picture mosaic block diagram as placeholder, to in four cells of the right and left, insert respectively a piece figure as placeholder, add the single-row form of a line under form, insert a verification tip sonagram as placeholder, the source file link path of these image placeholders is pointed to the picture storage vault of third-party authentication server, folder name in path replaces with UUID or other RandomId, the present embodiment still with UUID to show explanation, the picture position of inserting is stationary arrangement as shown in Figure 23 successively, can be used as so the more heterogeneous template type form like four picture mosaics, form code for example:
<table?width=""?height=""?border=""?cellpadding=""?cellspacing=""><tr><td?width=""?height="">
<a?href="#1"><img?src="http//:....../uuid/1.jpg"?width=""?height=""?border=""></a></td><td?width="">
<a?href="#a"><img?src="http//:....../uuid/a.jpg"?width=""?height=""?border=""></a></td><td?width="">
<a?href="#b"><img?src="http//:....../uuid/b.jpg"?width=""?height=""?border=""></a></td><td?width="">
<a?href="#2"><img?src="http//:....../uuid/2.jpg"?width=""?height=""?border=""></a></td></tr>?<tr><td?height="">
<a?href="#3"><img?src="http//:....../uuid/3.jpg"?width=""?height=""?border=""></a></td><td>
<a?href="#c"><img?src="http//:....../uuid/c.jpg"?width=""?height=""?border=""></a></td><td>
<a?href="#d"><img?src="http//:....../uuid/d.jpg"?width=""?height=""?border=""></a></td><td>
<a?href="#4"><img?src="http//:....../uuid/4.jpg"?width=""?height=""?border=""></a></td></tr>?<tr><td?height=""?colspan="4">
<img?src="http//:....../uuid/uuid.jpg"?width=""?height=""></td></tr></table>
As above form, link href=" # " in form is null link, add the coordinate code of this cell after No. #, coordinate code is fixed as the coordinate code of this cell, source file label src=in form " http//: .../uuid/1.jpg " in URL except the figure title, other are all identical, each cell inserts fixing figure title, verification tip sonagram sheet is called variable filename uuid.jpg, this form can be used as the checking of a template type form for a lot of four lattice picture mosaic identifying code pictures, the figure title is all identical with its corresponding coordinate code, only have UUID can change at any time as the variable folder name, the size of above table is omitted, can free setting, same, need to insert the JS script to complete proof procedure in this logon web page HTML code.
The described puzzle type identifying code of the present embodiment authentication server system is comprised of identification module, picture storage vault, picture synthesis module, encrypting module and authentication module, and the implementation method that is below the picture mosaic identifying code by picture mosaic trivial games variable body, process and the related system that needs thereof be brief description in addition.
The user clicks login button and enters login page, JS in logon web page extracts user's UUID, such as UUID is 8888, UUID letter in the URL of all image placeholder source file labels in the identifying code form is replaced with to 8888, such as the URL of image in the first lattice change to now http//: .../8888/1.jpg.
The UUID that the URL of login button carries the user simultaneously sends to the identification module of authentication server, identification module extracts relevant user information from the hyperlink of logging request, retrieve suitable advertisement identifying code picture element ID in the picture storage vault by these information, key element ID of random call suitable picture from these, ID " pt400006 " such as Figure 21, in coordinate code keyword document 001.txt from the file of this element ID, extract at random one group of keyword after deciphering decoding by encrypting module, generate a verification tip language such as " please successively ' lenovo being arranged, newly think happy, 3999 yuan, the picture of good Li Laile ' is dragged in the picture mosaic frame and forms a complete picture ", the coordinate code that keyword is corresponding forms coordinate code set (2 in order, 3, 1, 4) import in authentication module.
This verification tip language is imported in the picture synthesis module simultaneously, the word of verification tip language, after the mutilation body that suitably distorts, is carried in to the noise Background and exists, it is kept under the pt400006 file with 8888.jpg.
By all source files path http/ in form/: .../8888/ be mapped to http//: .../pt400006/, identifying code picture mosaic picture that client browser shows as shown in figure 23, by URL redirection map mode, can allow a plurality of client users simultaneously with using this identifying code picture mosaic to be verified.
Equally, complete and drag the operating process that picture carries out the checking of picture arrangement game identifying code by the mouse event that logon web page JS script is set, requirement according to the verification tip language, the user moves on to mouse pointer on the piece 2 of " lenovo ", press left button, mouse is set, and to press event be to catch this figure layer and excite JS that the coordinate code of this piece " 2 " is recorded in cookie, drag piece 2 to picture mosaic frame b spelling frame place, discharge left button, mouse is set and upsprings event for discharging picture and exciting JS that the coordinate code of this spelling frame " b " is recorded in cookie, piece 2 automatic absorbings are spelled in frame at b.
Same, the user completes the picture mosaic operation of other three piece pictures successively, the JS script records the result (3 of each operation successively, c), (1, a), (4, d), after completing four operations, JS is by the coordinate code set (2 of the operating result of four times, b, 3, c, 1, a, 4, d) from cookie, propose, the authentication module that sends to authentication server together with UUID is compared, the combination of comparison coordinate code and order thereof, if compare wrong call the applicable key element ID file of another one in the picture storage vault, carry out operation same as described above, if checking correctly show and to be proved to be successful in client, the user can enter next step.
Aforesaid operations also can be at the newly-built text that records the set of identifying code coordinate code of client, the recording method of coordinate code set is not limit, as long as can express the operating process of record successively, can allow authentication module know that whether this operating process is correct, be not limited to the statement form of coordinate code.
That is to say, these flash picture mosaics collocation game or other be played simple recreational functional needs that become the identifying code checking some:
The first, give the coordinate code of the random or appointment of, each relevant key message point as button or hot-zone or element figure;
The second, extract the characteristic key words of the key message point of each identifying code picture or element figure and set several verification tip languages or generate at random the verification tip language according to these keywords;
The 3rd, the coordinate code that the mouse event record sends the verification operation process is set;
The 4th, identify that by authentication server reduced coordinates code collection whether this operation is correct;
The 5th, hot-zone or these objects of button such as all key message points or element figure, be all jointly to complete an identifying code authentication function in an object cluster.
The described software for editing of above-described embodiment instrument, the expression mode of coordinate code, the separation edit methods of coordinate code keyword combination and preservation form, the ID of picture and text and preservation form, the multiple editor of dynamic web page and preservation form, the Multiple Code of hot-zone map in static Web page and dynamic web page means mode, the preservation form of verification tip language, image placeholder html tag and form thereof, each picture and text are kept at method in the picture storage vault and path etc., every sample has method and the selection much played the same tune on different musical instruments, be difficult to whole exclusive lists, this paper has only listed a kind of to show explanation, should not form limitation of the invention.
Here the fact illustrated that requires emphasis is, current all buttons that linking functions comprises null link that has, hot-zone, navigation bar etc., here still be referred to as button, a lot of parameter or ID of all really having carried in their link URL, but, the parameter that these are all or ID are not the ID of button oneself, but parameter or the ID of the object that will carry out that this button links, that is to say that these buttons are only the effects of playing a transferring command, button itself is without any ID, similar even if " registration ", " log in ", " homepage " etc. these button names, these appear to the name of button, be actually the description title that these buttons will exectorial object, such as click " homepage " this button, be actually by this button and open and be " homepage " this webpage, it is not the pure title of button itself, let alone is specially for the proprietary ID of the button oneself of button settings, namely this has illustrated coordinate code that said button is proprietary, if must say that " homepage " is exactly the title of this button, the title of button so of the present invention just should be unified just to be " identifying code " button, like this, on network, all buttons just only have button of the present invention just can be called " identifying code " button, these " identifying code " buttons have proprietary coordinate code ID separately, and similar " homepage " such button is obviously there is no to one's name proprietary ID's, spoken parts in an opera a bit, that the URL of general button carries is others' ID, and the URL that only has button of the present invention carries, be the ID of oneself, this is only essential difference, said so many very awkward-soundingly, to confuse because really be easy to mix up in fact, and this identifying code coordinate code ID is that the present invention is exclusive really, that button before this is unexistent, and the most easily mix up.
Above-mentioned verification system and authentication server communicate substantially, this verification system needs server to support, authentication server needs corresponding system to complete, can be referred to as verification system server authentication server in other words, this authentication server can be used as a system of website, website also can independently be enabled a virtual server and complete, the website that can also be the needs checking as advertising service business's third-party server certainly provides the service for checking credentials, difference is just pointed to the link of the URL of certain linking button of the page that the checking demand is arranged of website, by the verification system or the authentication server that point to website oneself, changing to the sensing third-party server gets final product, other not too large change and impacts, this method that is to say, as long as the URL hyperlink of the open registration checking in website button, the link of hyperlink is directed to third-party server, both can realize proof procedure, can participate in again during advertisement is divided into, can alleviate the operating pressure of Website server self, and networking is not had to aggravate the burden yet, realize all-win.
Above-mentioned all embodiment are only indivedual cases, this explanation can not be by all limit descriptions of all embodiment, and above-described embodiment method can be exchanged general basically, development and renewal along with software engineering, a lot of operating process may have different instead of software or program coding, same operating process can reach with different program languages the result played the same tune on different musical instruments, same hyperlink URL also may reach with additive method, such as URI, URC, same case study on implementation can save as different dynamic web page forms, along with also having more program language in the future, the renewal of technology occurs, but should not form the restriction to the present invention's protection, although the technology of a lot of methods in the present invention is very ripe, but in the identifying code field, be that the present invention creates by directly on picture, clicking the method that just completes proof procedure, such as this advertising wall form of Fig. 7 has had for a long time, but the process that its hyperlink set is completed to the identifying code checking to authentication server is exactly pioneering, hot-zone is cut apart picture and hyperlink is inserted in each hot-zone also early have been had to open corresponding web page, but complete the identifying code proof procedure by the hyperlink set to authentication server, is that the present invention is pioneering, picture arrangement game has had for a long time, but be similar to giving of picture arrangement game by Figure 23, play in advertisement, gives that to play in the process of checking be that the present invention is pioneering.So, in the verification technique field, be exactly a kind of innovation by these prior aries and method set application, should not or not other aspects have been existing and limit protection of the present invention with technology and method.
Eventually the above, the present invention frankly speaking, exactly by each picture with hyperlink function independently disperseed in present webpage, button, Text Link etc. is function independently, concentrate and mix a picture set the inside, a picture links cluster, button link cluster or perhaps Text Link cluster, aforesaid these independently linking functions be all independently to open separately a webpage or carry out an operation, also just be equivalent to the thing that some stragglers and disbanded soldiers do things in his own way and are Myself, and the present invention is by these stragglers and disbanded soldiers' centralized integration, training becomes an army that can carry out more multitask, authentication server just is equivalent to a commandant that can issue order, by giving the activity characters that each hyperlink is different, concentrate the more difficult specific task that taken concerted action, this mode can also complete more other tasks, be not limited only to the proof procedure of identifying code, concentrated strength that Here it is, the difference of Here it is stragglers and disbanded soldiers and the army that does some training very often, this is also meaning of the present invention.
  

Claims (12)

1. the present invention relates to a kind of identifying code method and system of internet arena, especially based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: create a plurality of hot-zones or button on picture, give a coordinate code by each hot-zone or button, extract the keyword of each hot-zone or button, generate the verification tip language according to keyword, the user is according to the requirement of verification tip language, by clicking or drag hot-zone on picture or button to produce coordinate code set authorization information, and pass coordinate code set authorization information back the authentication server network analysis and contrasted the identifying code proof procedure, the authentication server system comprises the picture storage vault, identification module, encrypting module, authentication module and picture synthesis module.
2. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: all hot-zones that create on picture or button are to do as a whole hot-zone or button link cluster completes same task jointly.
3. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: each hot-zone in picture or button Random assignment or appointment arrange a coordinate code, coordinate code is any letter, numeral, symbol, word or the pixel coordinate in screen or range coordinate that can indicate this hot-zone or button, all clicks of each proof procedure or to drag produced result be jointly to produce a coordinate code set with server authentication module to be verified comparative analysis.
4. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: the one or more keywords that extract each key message point as hot-zone or button or element figure figure layer, by these keywords and the coordinate code corresponding with it form the coordinate code keyword combine be kept in text document or picture name ID in, once by authentication server, extract at random or manually a keyword in every group of coordinate code keyword combination, a plurality of keyword roots are formed to a verification tip language or the exclusive verification tip language of this identifying code picture of human-edited according to verification tip language create-rule at random by authentication server, extract successively the coordinate code that keyword is corresponding and form the coordinate code set simultaneously.
5. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: main key message point or element figure figure layer are set to category-A hot-zone or button, less important key message point or element figure figure layer are set to category-B button or hot-zone, at the non-critical information point, place arranges button or the hot-zone that shape is close at random, be set as C class button, system is when generating at random or independently editing the verification tip language, only in category-A and category-B button and keyword corresponding to button, produce, must relate to the keyword of and main key message point element figure corresponding to above category-A button, be that the verification tip language can be the combination of AA class or the combination of AB class.
6. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: create a plurality of hot-zones as button or hot-zone map or element graphical sub-picture layer on picture, insert element figure picture or image placeholder in each subgraph layer, form whole identifying code picture, hyperlink or the null link of carrying hot-zone or the own coordinate code of button given in each button or hot-zone.
7. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: create on picture and a plurality ofly as button or hot-zone, cut apart picture or independence advertisement picture, these are cut apart to picture or independence advertisement picture inserts in form or regularly arranged image placeholder, form whole identifying code picture, hyperlink or the null link of carrying hot-zone or the own coordinate code of button given in each button or hot-zone.
8. according to claim 6,7 described based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: the hot-zone map of identifying code picture or element graphical sub-picture layer can adopt template type hot-zone, figure layer or form, the figure title of the coordinate code that the link of its button is carried and the link of the source file of button can be by the unalterable rules setting, only variable need be substituted with UUID or RandomId, the JS script by webpage when the checking demand is arranged is replaced.
9. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: in authentication server
Identification module extracts the characteristic informations such as zone, time and object from the session of the IP from the client user, UUID and cookie;
Web page code or code snippet, interim webpage and the interim picture of identifying code picture, verification tip sonagram sheet, coordinate code key words text, element figure picture, identifying code image hot area map or element graphical sub-picture layer and link and associative operation script preserved or preserved by key element ID to the picture storage vault by classification;
The picture synthesis module is carried in the verification tip language after by the variable color of variant font deformable body in the noise Background and generates verification tip sonagram sheet, and the correlated variables filename is inserted in web page code or code snippet;
Figure title ID, element figure picture name that encrypting module reaches coordinate code keyword combine text with the combination of coordinate code keyword are encrypted or decipher decoding after encoding;
Whether authentication module is by extracting from client coordinates code or coordinate code set authorization information, and formerly be kept at coordinate code set in authentication module and contrast judgement and verify correct.
10. according to claim 1 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that:
The identification module of authentication server extracts the characteristic informations such as zone, time, object from the information such as the IP from client user URL, UUID and cookie session;
By the characteristic information identifying code picture element ID that random call is suitable in the picture storage vault; According to this key element, ID deciphers by encrypting module, extracts coordinate code and corresponding keyword thereof in coordinate code key words text or figure title, extracts at random the exclusive verification tip language of identifying code picture or generates at random the verification tip language;
Extract coordinate code or coordinate code set that in this verification tip language, keyword is corresponding, the coordinate code set is imported in authentication module;
The verification tip language is imported in the picture synthesis module, and the picture synthesis module carries out verification tip Chinese language word to be carried in the noise Background after the variable color of suitable torsional deformation variant, generates verification tip sonagram sheet and is kept in the picture storage vault;
Variable name in identifying code picture web page code or code snippet is replaced or carried out URL and be redirected, identifying code picture and verification tip sonagram sheet are presented to client;
The user requires to click or drag associated button according to the verification tip language, click or drag and excite the authentication module that sends to authentication server with the authorization information of button self coordinate code link, authentication module is by whether success of reduced coordinates code collection judgement checking.
11. according to claim 10 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: the set of authentication server comparative analysis coordinate code, the correct design sketch that to client, sends corresponding these element figure combinations of verification tip language of this checking of checking contrast, be proved to be successful to show this time.
12. according to claim 10 based on directly on picture, clicking or dragged the method and system of identifying code checking, it is characterized in that: in the web page code that the checking demand is arranged, add client script, the mouse event that client script is set is: the event of pressing is to record the coordinate code of object and catch or copy object, the event of upspringing stops the coordinate code of object and discharges the object dragged for record, through event, be the coordinate code of record through object, script forms successively by the coordinate code of all records the authentication module that the coordinate code set sends to authentication server and carries out contrast verification.
CN 201310031659 2012-12-19 2013-01-28 Network identifying code method and system Pending CN103139204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201310031659 CN103139204A (en) 2012-12-19 2013-01-28 Network identifying code method and system

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201210555819.5 2012-12-19
CN201210555819 2012-12-19
CN 201310031659 CN103139204A (en) 2012-12-19 2013-01-28 Network identifying code method and system

Publications (1)

Publication Number Publication Date
CN103139204A true CN103139204A (en) 2013-06-05

Family

ID=48498510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201310031659 Pending CN103139204A (en) 2012-12-19 2013-01-28 Network identifying code method and system

Country Status (1)

Country Link
CN (1) CN103139204A (en)

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297244A (en) * 2013-07-05 2013-09-11 百度在线网络技术(北京)有限公司 Verification method and verification server
CN103400107A (en) * 2013-07-05 2013-11-20 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device
WO2015055095A1 (en) * 2013-10-15 2015-04-23 Tencent Technology (Shenzhen) Company Limited Identity authentication method and device and storage medium
CN104573437A (en) * 2013-10-23 2015-04-29 深圳市腾讯计算机系统有限公司 Information authentication method, device and terminal
CN104618316A (en) * 2014-03-17 2015-05-13 腾讯科技(深圳)有限公司 Method, device and system of safety verification
CN104702406A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Identity verification method and identity verification device
CN104732135A (en) * 2015-02-17 2015-06-24 网易有道信息技术(北京)有限公司 Sliding verification method and device
CN104794385A (en) * 2015-03-03 2015-07-22 新浪网技术(中国)有限公司 Information verification method and device
CN104796428A (en) * 2015-04-30 2015-07-22 中国联合网络通信集团有限公司 Dynamic verification method, client side, server and system
CN104811304A (en) * 2014-01-27 2015-07-29 腾讯科技(深圳)有限公司 Identity authentication method and device
CN104899217A (en) * 2014-03-06 2015-09-09 阿里巴巴集团控股有限公司 Method and apparatus for implementing customized function
CN104917724A (en) * 2014-03-11 2015-09-16 腾讯科技(深圳)有限公司 Identity verification method and apparatus
WO2016011744A1 (en) * 2014-07-25 2016-01-28 小米科技有限责任公司 Method and apparatus for performing verification by using verification code
CN105323224A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Verification interaction method and device and communication system
CN105323065A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Safety verification method and device
CN105335645A (en) * 2015-09-23 2016-02-17 北京奇虎科技有限公司 Verification method and apparatus for picture verification code
CN105389333A (en) * 2015-10-13 2016-03-09 林炮勤 Retrieval system construction method and server framework
CN105450641A (en) * 2015-11-13 2016-03-30 中国建设银行股份有限公司 Verification method, verification device and verification system
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN105847293A (en) * 2016-05-20 2016-08-10 深圳市金立通信设备有限公司 System login realization method based on image identification and terminal
CN105912923A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Mobile terminal verification method and device
CN106156595A (en) * 2015-04-02 2016-11-23 深圳市腾讯计算机系统有限公司 A kind of method, Apparatus and system being carried out by identifying code picture verifying
CN106209810A (en) * 2016-07-03 2016-12-07 韦建峰 A kind of verification method and generating means
CN106485261A (en) * 2016-09-08 2017-03-08 北京小米移动软件有限公司 A kind of method and apparatus of image recognition
CN106612277A (en) * 2016-12-09 2017-05-03 武汉斗鱼网络科技有限公司 Method and system for realizing CAPTCHA verification using cipher disk
CN107040538A (en) * 2017-04-14 2017-08-11 东莞中国科学院云计算产业技术创新与育成中心 Website authentication method, apparatus and system
CN107566422A (en) * 2017-10-30 2018-01-09 江西博瑞彤芸科技有限公司 A kind of verification method of third party user
WO2018006765A1 (en) * 2016-07-03 2018-01-11 韦建峰 Keyword verification method and generation apparatus
WO2018059033A1 (en) * 2016-09-30 2018-04-05 华为技术有限公司 Verification method, server and system
CN107908946A (en) * 2017-10-27 2018-04-13 链家网(北京)科技有限公司 Method for generating picture verification codes, picture validation code, verification method and device
CN107959660A (en) * 2016-10-17 2018-04-24 中兴通讯股份有限公司 A kind of static file access method and device based on Nginx
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN108881126A (en) * 2017-05-15 2018-11-23 阿里巴巴集团控股有限公司 The methods, devices and systems of authentication code
CN108959900A (en) * 2018-07-10 2018-12-07 浪潮软件股份有限公司 A method of generating sliding identifying code picture
US10172001B1 (en) 2017-10-30 2019-01-01 International Business Machines Corporation Authentication mechanism
CN109241724A (en) * 2018-08-10 2019-01-18 北京金山云网络技术有限公司 A kind of method of calibration and device
CN104243399B (en) * 2013-06-07 2019-02-12 腾讯科技(深圳)有限公司 User authentication method and client, server and the system for realizing this method
WO2019123479A1 (en) * 2017-12-18 2019-06-27 Sekhar Rao Balaga Method and system to use click event to securely authenticate online user's input and prevent frauds
WO2019179028A1 (en) * 2018-03-21 2019-09-26 平安科技(深圳)有限公司 Electronic device, user authentication method based on dynamic pictures, and storage medium
CN110308846A (en) * 2019-05-22 2019-10-08 广西链全科技有限公司 A kind of generation of two-dimension translational puzzle type identifying code and verification method
CN110730152A (en) * 2018-07-16 2020-01-24 杭州海康威视数字技术股份有限公司 Login verification method and device and electronic equipment
CN111199060A (en) * 2018-11-16 2020-05-26 青岛海尔多媒体有限公司 Verification method and device based on direction key and computer storage medium
CN111382412A (en) * 2018-12-28 2020-07-07 武汉极意网络科技有限公司 Memory, verification code implementation method, device and equipment
CN111416817A (en) * 2020-03-17 2020-07-14 郑州轻工业大学 Mode identification method based on network verification code
CN111639316A (en) * 2020-05-19 2020-09-08 北京芯盾时代科技有限公司 Information processing method and device for WEB page
CN113038399A (en) * 2021-04-14 2021-06-25 广州讯鸿网络技术有限公司 Method, electronic device and storage medium for quickly verifying user identity through 5G message
CN114036495A (en) * 2022-01-11 2022-02-11 北京顶象技术有限公司 Method and device for updating privatized deployment verification code system
CN114124432A (en) * 2021-09-22 2022-03-01 的卢技术有限公司 Html5 technology-based interest verification method and system for verification codes
US11586724B1 (en) * 2019-10-10 2023-02-21 Authidote LLC System and methods for authenticating content

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243399B (en) * 2013-06-07 2019-02-12 腾讯科技(深圳)有限公司 User authentication method and client, server and the system for realizing this method
CN103297244A (en) * 2013-07-05 2013-09-11 百度在线网络技术(北京)有限公司 Verification method and verification server
CN103400107A (en) * 2013-07-05 2013-11-20 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device
CN103400107B (en) * 2013-07-05 2017-04-19 百度在线网络技术(北京)有限公司 Method and device for generating dynamic verification code picture, and verification method and device
CN103297244B (en) * 2013-07-05 2016-07-27 百度在线网络技术(北京)有限公司 A kind of verification method and authentication server
WO2015055095A1 (en) * 2013-10-15 2015-04-23 Tencent Technology (Shenzhen) Company Limited Identity authentication method and device and storage medium
CN104579658A (en) * 2013-10-15 2015-04-29 深圳市腾讯计算机系统有限公司 Identity authentication method and device
CN104579658B (en) * 2013-10-15 2019-07-05 深圳市腾讯计算机系统有限公司 A kind of auth method and device
CN104573437A (en) * 2013-10-23 2015-04-29 深圳市腾讯计算机系统有限公司 Information authentication method, device and terminal
CN104573437B (en) * 2013-10-23 2018-12-28 深圳市腾讯计算机系统有限公司 Information authentication method, device and terminal
CN104702406A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Identity verification method and identity verification device
CN104811304A (en) * 2014-01-27 2015-07-29 腾讯科技(深圳)有限公司 Identity authentication method and device
CN104811304B (en) * 2014-01-27 2020-02-14 腾讯科技(深圳)有限公司 Identity verification method and device
CN104899217B (en) * 2014-03-06 2018-09-25 阿里巴巴集团控股有限公司 A kind of implementation method and device of custom feature
CN104899217A (en) * 2014-03-06 2015-09-09 阿里巴巴集团控股有限公司 Method and apparatus for implementing customized function
CN104917724A (en) * 2014-03-11 2015-09-16 腾讯科技(深圳)有限公司 Identity verification method and apparatus
US9985965B2 (en) 2014-03-17 2018-05-29 Tencent Technology (Shenzhen) Company Limited Security verification method, apparatus, and system
WO2015139594A1 (en) * 2014-03-17 2015-09-24 Tencent Technology (Shenzhen) Company Limited Security verification method, apparatus, and system
CN104618316A (en) * 2014-03-17 2015-05-13 腾讯科技(深圳)有限公司 Method, device and system of safety verification
CN104618316B (en) * 2014-03-17 2018-07-06 腾讯科技(深圳)有限公司 Safe verification method, device and system
US10469488B2 (en) 2014-03-17 2019-11-05 Tencent Technology (Shenzhen) Company Limited Security verification method, apparatus, and system
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN105471808B (en) * 2014-05-28 2019-08-20 北京搜狗科技发展有限公司 Generate the method for identifying code and the method, apparatus and system of safety verification
CN105323065A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Safety verification method and device
CN105323224A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Verification interaction method and device and communication system
CN105323224B (en) * 2014-07-21 2019-09-17 腾讯科技(深圳)有限公司 Verify exchange method and relevant apparatus and communication system
WO2016011744A1 (en) * 2014-07-25 2016-01-28 小米科技有限责任公司 Method and apparatus for performing verification by using verification code
CN104732135A (en) * 2015-02-17 2015-06-24 网易有道信息技术(北京)有限公司 Sliding verification method and device
CN104794385A (en) * 2015-03-03 2015-07-22 新浪网技术(中国)有限公司 Information verification method and device
CN106156595A (en) * 2015-04-02 2016-11-23 深圳市腾讯计算机系统有限公司 A kind of method, Apparatus and system being carried out by identifying code picture verifying
CN106156595B (en) * 2015-04-02 2020-04-07 深圳市腾讯计算机系统有限公司 Method, device and system for verifying through verification code picture
CN104796428A (en) * 2015-04-30 2015-07-22 中国联合网络通信集团有限公司 Dynamic verification method, client side, server and system
CN105335645B (en) * 2015-09-23 2019-02-22 北京奇虎科技有限公司 Picture validation code verification method and device
CN105335645A (en) * 2015-09-23 2016-02-17 北京奇虎科技有限公司 Verification method and apparatus for picture verification code
CN105389333B (en) * 2015-10-13 2019-04-09 深圳市红坚果科技有限公司 A kind of searching system construction method and server architecture
CN105389333A (en) * 2015-10-13 2016-03-09 林炮勤 Retrieval system construction method and server framework
CN105450641A (en) * 2015-11-13 2016-03-30 中国建设银行股份有限公司 Verification method, verification device and verification system
CN105847293A (en) * 2016-05-20 2016-08-10 深圳市金立通信设备有限公司 System login realization method based on image identification and terminal
CN105847293B (en) * 2016-05-20 2019-05-14 深圳市金立通信设备有限公司 A kind of method and terminal for realizing system login based on image recognition
CN105912923A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Mobile terminal verification method and device
CN107577932A (en) * 2016-07-03 2018-01-12 韦建峰 A kind of keyword verification method and generating means
WO2018006765A1 (en) * 2016-07-03 2018-01-11 韦建峰 Keyword verification method and generation apparatus
US10606999B2 (en) 2016-07-03 2020-03-31 Jianfeng WEI Keyword verification method and device for implementing same
CN106209810A (en) * 2016-07-03 2016-12-07 韦建峰 A kind of verification method and generating means
CN106485261B (en) * 2016-09-08 2020-06-02 北京小米移动软件有限公司 Image recognition method and device
CN106485261A (en) * 2016-09-08 2017-03-08 北京小米移动软件有限公司 A kind of method and apparatus of image recognition
WO2018059033A1 (en) * 2016-09-30 2018-04-05 华为技术有限公司 Verification method, server and system
CN107959660A (en) * 2016-10-17 2018-04-24 中兴通讯股份有限公司 A kind of static file access method and device based on Nginx
CN106612277A (en) * 2016-12-09 2017-05-03 武汉斗鱼网络科技有限公司 Method and system for realizing CAPTCHA verification using cipher disk
CN106612277B (en) * 2016-12-09 2020-05-12 武汉斗鱼网络科技有限公司 Method and system for realizing verification of verification code by using password disk
CN107040538A (en) * 2017-04-14 2017-08-11 东莞中国科学院云计算产业技术创新与育成中心 Website authentication method, apparatus and system
CN108881126A (en) * 2017-05-15 2018-11-23 阿里巴巴集团控股有限公司 The methods, devices and systems of authentication code
CN107908946A (en) * 2017-10-27 2018-04-13 链家网(北京)科技有限公司 Method for generating picture verification codes, picture validation code, verification method and device
US10172001B1 (en) 2017-10-30 2019-01-01 International Business Machines Corporation Authentication mechanism
CN107566422B (en) * 2017-10-30 2020-10-27 江西博瑞彤芸科技有限公司 Third-party user verification method
CN107566422A (en) * 2017-10-30 2018-01-09 江西博瑞彤芸科技有限公司 A kind of verification method of third party user
CN108008898B (en) * 2017-12-13 2020-04-28 东软集团股份有限公司 Page information acquisition method and device, computer equipment and storage medium
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
WO2019123479A1 (en) * 2017-12-18 2019-06-27 Sekhar Rao Balaga Method and system to use click event to securely authenticate online user's input and prevent frauds
WO2019179028A1 (en) * 2018-03-21 2019-09-26 平安科技(深圳)有限公司 Electronic device, user authentication method based on dynamic pictures, and storage medium
CN108959900A (en) * 2018-07-10 2018-12-07 浪潮软件股份有限公司 A method of generating sliding identifying code picture
CN110730152A (en) * 2018-07-16 2020-01-24 杭州海康威视数字技术股份有限公司 Login verification method and device and electronic equipment
CN110730152B (en) * 2018-07-16 2021-11-26 杭州海康威视数字技术股份有限公司 Login verification method and device and electronic equipment
CN109241724A (en) * 2018-08-10 2019-01-18 北京金山云网络技术有限公司 A kind of method of calibration and device
CN111199060A (en) * 2018-11-16 2020-05-26 青岛海尔多媒体有限公司 Verification method and device based on direction key and computer storage medium
CN111199060B (en) * 2018-11-16 2024-04-02 青岛海尔多媒体有限公司 Verification method and device based on direction key and computer storage medium
CN111382412A (en) * 2018-12-28 2020-07-07 武汉极意网络科技有限公司 Memory, verification code implementation method, device and equipment
CN110308846A (en) * 2019-05-22 2019-10-08 广西链全科技有限公司 A kind of generation of two-dimension translational puzzle type identifying code and verification method
US11586724B1 (en) * 2019-10-10 2023-02-21 Authidote LLC System and methods for authenticating content
CN111416817A (en) * 2020-03-17 2020-07-14 郑州轻工业大学 Mode identification method based on network verification code
CN111639316A (en) * 2020-05-19 2020-09-08 北京芯盾时代科技有限公司 Information processing method and device for WEB page
CN113038399A (en) * 2021-04-14 2021-06-25 广州讯鸿网络技术有限公司 Method, electronic device and storage medium for quickly verifying user identity through 5G message
CN114124432A (en) * 2021-09-22 2022-03-01 的卢技术有限公司 Html5 technology-based interest verification method and system for verification codes
CN114036495A (en) * 2022-01-11 2022-02-11 北京顶象技术有限公司 Method and device for updating privatized deployment verification code system

Similar Documents

Publication Publication Date Title
CN103139204A (en) Network identifying code method and system
Jackson Commercial cultures: transcending the cultural and the economic
US11205023B2 (en) Computer aided systems and methods for creating custom products
Tu The beautiful generation: Asian Americans and the cultural economy of fashion
Maynard Dress and globalisation
Maira Desis in the house: Indian American youth culture in NYC
Lynch et al. Changing fashion: a critical introduction to trend analysis and cultural meaning
Sterlacci et al. Historical dictionary of the fashion industry
Payne Designing Fashion's Future: Present practice and tactics for sustainable change
CN109597907A (en) Dress ornament management method and device, electronic equipment, storage medium
CN109416693A (en) Server unit, terminal installation and information processing method
KR20190128143A (en) Apparatus and method for generating designs based on image and text
Moore Street style in America: an exploration
Rizzo Class acts: Young men and the rise of lifestyle
Smith The Gent-rification of English masculinities: class, race and nation in contemporary consumption
Ross Refashioning London's bespoke and demi-bespoke tailors: new textiles, technology and design in contemporary menswear
Hancock Fashion Brand Stories
Kwon et al. Traditional aesthetic characteristics traced in South Korean contemporary fashion practice
Akhil Fashion forecasting
Rajendran The development of streetwear and the role of New York City, London, and Supreme NY
Machin et al. Ethical food packaging and designed encounters with distant and exotic others
Wheeler Constructing the ‘Muslim woman’in advertising
CN105320781A (en) Image matching method and system and computer program product thereof
Atkinson Fashion as Identity in Steampunk Communities
KR20200122179A (en) apparatus and method for generating interior designs based on images and text

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130605