CN104573469A - Method for identifying graph verification codes - Google Patents

Method for identifying graph verification codes Download PDF

Info

Publication number
CN104573469A
CN104573469A CN201310489802.9A CN201310489802A CN104573469A CN 104573469 A CN104573469 A CN 104573469A CN 201310489802 A CN201310489802 A CN 201310489802A CN 104573469 A CN104573469 A CN 104573469A
Authority
CN
China
Prior art keywords
segmentation
identifying code
code
type matrix
identifies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310489802.9A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHENJIANG DINGTUO TECHNOLOGY INFORMATION Co Ltd
Original Assignee
ZHENJIANG DINGTUO TECHNOLOGY INFORMATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHENJIANG DINGTUO TECHNOLOGY INFORMATION Co Ltd filed Critical ZHENJIANG DINGTUO TECHNOLOGY INFORMATION Co Ltd
Priority to CN201310489802.9A priority Critical patent/CN104573469A/en
Publication of CN104573469A publication Critical patent/CN104573469A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Character Discrimination (AREA)

Abstract

Disclosed is a method for identifying graph verification codes. A dual speeding mechanism effectively increases identifying speed of verification codes, and balance between the identification speed and the accuracy is realized.

Description

A kind of graphical verification code knows method for distinguishing
Technical field
Along with the high speed development of internet, network is while bringing great convenience to the life of people, and its safety problem also becomes increasingly conspicuous.Network verification code, as widely used checking means, plays an important role to network security.
Background technology
Identifying code concept is along with the fast development of Internet technology and application, and network is while providing affluent resources and great convenience to people, and incident is exactly the safety issue of internet system.The product of web system safety is strengthened in the appearance of identifying code just.Based on character picture validation code this be identifying code the most frequently used in network.It easily produces, and has model answer, is not subject to the impact of background knowledge and cultural difference, and Brute Force complexity is very large, and nearly all website in the country and most external website are all adopt this kind of identifying code.
Summary of the invention
Do not have to find the application materials about this system aspects by national patent retrieval.
Exclusive overall recognition mode, image, without the need to segmentation, does not even need noise reduction and identifiable design, and for noise spot, that interfering line cannot remove clean image is effective especially.
1, three large Fractionation regimen: auto Segmentation, average segmentation, vertical segmentation, Iamge Segmentation is lighter.
2, ten process filter greatly: the graphics process filter more than 33 kinds, all write bottom code voluntarily, more complicated identifying code also effectively can process, and obtains rapidly salubrious binary image, process identifying code figure is easier.
3, powerful type matrix makes and administration interface: greatly save and make the type matrix time, after the character that input type matrix is corresponding, disposablely can obtain tens even hundreds of type matrixes.
4, advanced identification speed technology: dual acceleration mechanism, effectively promotes identifying code recognition speed, reach recognition speed and accuracy balance.

Claims (4)

1. a graphical verification code knows method for distinguishing: segmentation identifies, mixing identifies, overallly identify, identify fast, can effectively identification character distortion, adhesion or overlap identifying code.
2. method according to claim 1, figure identification can be divided into three large Fractionation regimen: auto Segmentation, average segmentation, vertical segmentation, Iamge Segmentation is lighter.
3. ten process filter greatly: the graphics process filter more than 33 kinds, all write bottom code voluntarily, more complicated identifying code also effectively can process, and obtains rapidly salubrious binary image, process identifying code figure is easier.
4. powerful type matrix makes and administration interface: greatly save and make the type matrix time, after the character that input type matrix is corresponding, disposablely can obtain tens even hundreds of type matrixes.
CN201310489802.9A 2013-10-18 2013-10-18 Method for identifying graph verification codes Pending CN104573469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310489802.9A CN104573469A (en) 2013-10-18 2013-10-18 Method for identifying graph verification codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310489802.9A CN104573469A (en) 2013-10-18 2013-10-18 Method for identifying graph verification codes

Publications (1)

Publication Number Publication Date
CN104573469A true CN104573469A (en) 2015-04-29

Family

ID=53089510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310489802.9A Pending CN104573469A (en) 2013-10-18 2013-10-18 Method for identifying graph verification codes

Country Status (1)

Country Link
CN (1) CN104573469A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080127302A1 (en) * 2006-08-22 2008-05-29 Fuji Xerox Co., Ltd. Motion and interaction based captchas
CN101388078A (en) * 2008-09-27 2009-03-18 腾讯科技(深圳)有限公司 Text identification method and device based on verification
CN101944177A (en) * 2010-08-30 2011-01-12 深圳市多赢软件技术有限公司 Method for recognizing verification code
CN103731397A (en) * 2012-10-12 2014-04-16 镇江华扬信息科技有限公司 Algorithm of verification code recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080127302A1 (en) * 2006-08-22 2008-05-29 Fuji Xerox Co., Ltd. Motion and interaction based captchas
CN101388078A (en) * 2008-09-27 2009-03-18 腾讯科技(深圳)有限公司 Text identification method and device based on verification
CN101944177A (en) * 2010-08-30 2011-01-12 深圳市多赢软件技术有限公司 Method for recognizing verification code
CN103731397A (en) * 2012-10-12 2014-04-16 镇江华扬信息科技有限公司 Algorithm of verification code recognition

Similar Documents

Publication Publication Date Title
EP3065335B1 (en) System and method for real-time verification of clock synchronisation-based dynamic password anti-counterfeiting tag validity
WO2014210548A3 (en) Extracting card data using card art
JP2013525916A5 (en)
WO2010062862A3 (en) Open entity extraction system
GB201210533D0 (en) A method of processing geological log data
CN103294953B (en) A kind of mobile phone malicious code detecting method and system
CN102819723A (en) Method and system for detecting malicious two-dimension codes
CN105574398A (en) Verification code verification method and device
MY191557A (en) Management server and management method employing same
WO2014011131A3 (en) A method enabling verification of the user id by means of an interactive voice response system
CN106340049A (en) Verification code generating method based on animation semantics
CN105095415A (en) Method and apparatus for confirming network emotion
CN102930193A (en) Face identification-based method for logging in community
CN104123608A (en) Method and device for creating accounting records
CN103731397A (en) Algorithm of verification code recognition
CN102662962B (en) Dynamic display method based on webpage elements
CN105718462B (en) Cheating detection method and device for application operation
JP2015225473A5 (en)
CN103986979B (en) A kind of copy-right protection method and system
TWI649674B (en) How to enter verification information
CN104573469A (en) Method for identifying graph verification codes
CN109145909A (en) A method of based on cloud computing identifying code
CN102521594A (en) Method for accurately extracting object and system thereof
CN104050403B (en) Mobile terminal user identity Verification System based on matrix and relative time and method
WO2015186965A3 (en) Pos system using input of multiple sequential fingerprint sets and driving method therefor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150429

WD01 Invention patent application deemed withdrawn after publication