CN104573469A - Method for identifying graph verification codes - Google Patents
Method for identifying graph verification codes Download PDFInfo
- Publication number
- CN104573469A CN104573469A CN201310489802.9A CN201310489802A CN104573469A CN 104573469 A CN104573469 A CN 104573469A CN 201310489802 A CN201310489802 A CN 201310489802A CN 104573469 A CN104573469 A CN 104573469A
- Authority
- CN
- China
- Prior art keywords
- segmentation
- identifying code
- code
- type matrix
- identifies
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Character Discrimination (AREA)
Abstract
Disclosed is a method for identifying graph verification codes. A dual speeding mechanism effectively increases identifying speed of verification codes, and balance between the identification speed and the accuracy is realized.
Description
Technical field
Along with the high speed development of internet, network is while bringing great convenience to the life of people, and its safety problem also becomes increasingly conspicuous.Network verification code, as widely used checking means, plays an important role to network security.
Background technology
Identifying code concept is along with the fast development of Internet technology and application, and network is while providing affluent resources and great convenience to people, and incident is exactly the safety issue of internet system.The product of web system safety is strengthened in the appearance of identifying code just.Based on character picture validation code this be identifying code the most frequently used in network.It easily produces, and has model answer, is not subject to the impact of background knowledge and cultural difference, and Brute Force complexity is very large, and nearly all website in the country and most external website are all adopt this kind of identifying code.
Summary of the invention
Do not have to find the application materials about this system aspects by national patent retrieval.
Exclusive overall recognition mode, image, without the need to segmentation, does not even need noise reduction and identifiable design, and for noise spot, that interfering line cannot remove clean image is effective especially.
1, three large Fractionation regimen: auto Segmentation, average segmentation, vertical segmentation, Iamge Segmentation is lighter.
2, ten process filter greatly: the graphics process filter more than 33 kinds, all write bottom code voluntarily, more complicated identifying code also effectively can process, and obtains rapidly salubrious binary image, process identifying code figure is easier.
3, powerful type matrix makes and administration interface: greatly save and make the type matrix time, after the character that input type matrix is corresponding, disposablely can obtain tens even hundreds of type matrixes.
4, advanced identification speed technology: dual acceleration mechanism, effectively promotes identifying code recognition speed, reach recognition speed and accuracy balance.
Claims (4)
1. a graphical verification code knows method for distinguishing: segmentation identifies, mixing identifies, overallly identify, identify fast, can effectively identification character distortion, adhesion or overlap identifying code.
2. method according to claim 1, figure identification can be divided into three large Fractionation regimen: auto Segmentation, average segmentation, vertical segmentation, Iamge Segmentation is lighter.
3. ten process filter greatly: the graphics process filter more than 33 kinds, all write bottom code voluntarily, more complicated identifying code also effectively can process, and obtains rapidly salubrious binary image, process identifying code figure is easier.
4. powerful type matrix makes and administration interface: greatly save and make the type matrix time, after the character that input type matrix is corresponding, disposablely can obtain tens even hundreds of type matrixes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310489802.9A CN104573469A (en) | 2013-10-18 | 2013-10-18 | Method for identifying graph verification codes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310489802.9A CN104573469A (en) | 2013-10-18 | 2013-10-18 | Method for identifying graph verification codes |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104573469A true CN104573469A (en) | 2015-04-29 |
Family
ID=53089510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310489802.9A Pending CN104573469A (en) | 2013-10-18 | 2013-10-18 | Method for identifying graph verification codes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104573469A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080127302A1 (en) * | 2006-08-22 | 2008-05-29 | Fuji Xerox Co., Ltd. | Motion and interaction based captchas |
CN101388078A (en) * | 2008-09-27 | 2009-03-18 | 腾讯科技(深圳)有限公司 | Text identification method and device based on verification |
CN101944177A (en) * | 2010-08-30 | 2011-01-12 | 深圳市多赢软件技术有限公司 | Method for recognizing verification code |
CN103731397A (en) * | 2012-10-12 | 2014-04-16 | 镇江华扬信息科技有限公司 | Algorithm of verification code recognition |
-
2013
- 2013-10-18 CN CN201310489802.9A patent/CN104573469A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080127302A1 (en) * | 2006-08-22 | 2008-05-29 | Fuji Xerox Co., Ltd. | Motion and interaction based captchas |
CN101388078A (en) * | 2008-09-27 | 2009-03-18 | 腾讯科技(深圳)有限公司 | Text identification method and device based on verification |
CN101944177A (en) * | 2010-08-30 | 2011-01-12 | 深圳市多赢软件技术有限公司 | Method for recognizing verification code |
CN103731397A (en) * | 2012-10-12 | 2014-04-16 | 镇江华扬信息科技有限公司 | Algorithm of verification code recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3065335B1 (en) | System and method for real-time verification of clock synchronisation-based dynamic password anti-counterfeiting tag validity | |
WO2014210548A3 (en) | Extracting card data using card art | |
JP2013525916A5 (en) | ||
WO2010062862A3 (en) | Open entity extraction system | |
GB201210533D0 (en) | A method of processing geological log data | |
CN103294953B (en) | A kind of mobile phone malicious code detecting method and system | |
CN102819723A (en) | Method and system for detecting malicious two-dimension codes | |
CN105574398A (en) | Verification code verification method and device | |
MY191557A (en) | Management server and management method employing same | |
WO2014011131A3 (en) | A method enabling verification of the user id by means of an interactive voice response system | |
CN106340049A (en) | Verification code generating method based on animation semantics | |
CN105095415A (en) | Method and apparatus for confirming network emotion | |
CN102930193A (en) | Face identification-based method for logging in community | |
CN104123608A (en) | Method and device for creating accounting records | |
CN103731397A (en) | Algorithm of verification code recognition | |
CN102662962B (en) | Dynamic display method based on webpage elements | |
CN105718462B (en) | Cheating detection method and device for application operation | |
JP2015225473A5 (en) | ||
CN103986979B (en) | A kind of copy-right protection method and system | |
TWI649674B (en) | How to enter verification information | |
CN104573469A (en) | Method for identifying graph verification codes | |
CN109145909A (en) | A method of based on cloud computing identifying code | |
CN102521594A (en) | Method for accurately extracting object and system thereof | |
CN104050403B (en) | Mobile terminal user identity Verification System based on matrix and relative time and method | |
WO2015186965A3 (en) | Pos system using input of multiple sequential fingerprint sets and driving method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150429 |
|
WD01 | Invention patent application deemed withdrawn after publication |