CN113489729B - Webpage verification generation method and system based on preset video - Google Patents

Webpage verification generation method and system based on preset video Download PDF

Info

Publication number
CN113489729B
CN113489729B CN202110776112.6A CN202110776112A CN113489729B CN 113489729 B CN113489729 B CN 113489729B CN 202110776112 A CN202110776112 A CN 202110776112A CN 113489729 B CN113489729 B CN 113489729B
Authority
CN
China
Prior art keywords
video
preset
verification code
verification
description file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110776112.6A
Other languages
Chinese (zh)
Other versions
CN113489729A (en
Inventor
徐术欢
李�昊
田有隆
陈献宇
谢招楷
余永先
陈骏
孔令豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Institute Of Data Technology Co ltd
Original Assignee
Fuzhou Institute Of Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Institute Of Data Technology Co ltd filed Critical Fuzhou Institute Of Data Technology Co ltd
Priority to CN202110776112.6A priority Critical patent/CN113489729B/en
Publication of CN113489729A publication Critical patent/CN113489729A/en
Application granted granted Critical
Publication of CN113489729B publication Critical patent/CN113489729B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application relates to the technical field of computers, in particular to a webpage verification generation method and system based on preset video. The webpage verification generation method based on the preset video comprises the following steps: responding to a verification code request instruction, and returning a preset verification code to a front-end page, wherein the preset verification code comprises: a short video and question module; responding to the video playing instruction, and judging whether the user answers the questions of the question module correctly within the preset time after the video is played; the questions of the question module are related to the content of the short video. The content of the verification code is displayed in a video mode, a user needs to click and watch the verification code and then obtain a correct answer by combining the content, pick the correct answer and submit the verification, and actions such as capturing the content of the verification code by a malicious program, realizing automatic login, malicious watering, malicious access and the like can be avoided to a large extent.

Description

Webpage verification generation method and system based on preset video
Technical Field
The application relates to the technical field of computers, in particular to a webpage verification generation method and system based on preset video.
Background
The verification code is also called a full-automatic Turing test for distinguishing computers from humans, and is mainly a full-automatic program for distinguishing computers from humans. The computer acting as the server side automatically generates a question to be answered by the user. This problem can be generated and evaluated by a computer, but must only be solved by a human. Since the computer cannot answer the automatically generated questions, the user who answers the questions can be considered a human. In the present information network era, information security is becoming more and more important, in order to prevent some users with great significance from automatically registering, automatically logging in, maliciously watering and maliciously increasing database access by using robots (malicious programs), and violently cracking passwords by using specific programs, verification code technology such as random digital input verification can be adopted, and the principle is that: requesting to a server side, generating random characters, writing a session request, generating corresponding pictures from the random characters, and responding to the front end; the front end inputs the verification code of the corresponding character and initiates verification to the background.
Disadvantage 1:
the random character verification code is generated by the back end, and the web page returned to the front end is in a picture format, so that the malicious program can grasp and detect the content in the random character verification code, and therefore the content is automatically written into a session request and is transmitted to the background for verification, a security mechanism is bypassed, and the actions of automatic login, malicious watering, malicious access increase and the like are realized.
Disadvantage 2:
the verification code content is not encrypted and the like, so that the possibility of being broken by a program maliciously is high, and the security is not high enough.
Disadvantage 3:
after the webpage verification code randomly generated by the back end returns to the front end, an effective time equivalent time limiting mechanism does not exist, and the possibility that the verification code is analyzed by a malicious program is increased.
Disclosure of Invention
Therefore, a webpage verification generation method based on a preset video is needed to solve the technical problem that the background security is affected because the existing verification code mode is easily broken maliciously. The specific technical scheme is as follows:
a webpage verification generation method based on a preset video comprises the following steps:
responding to a verification code request instruction, and returning a preset verification code to a front-end page, wherein the preset verification code comprises: a short video and question module;
responding to the video playing instruction, and judging whether the user answers the questions of the question module correctly within the preset time after the video is played;
the questions of the question module are related to the content of the short video.
Further, the short video is an encrypted short video;
the method for responding to the video playing instruction specifically further comprises the following steps:
and generating a downloading link address of a video webpage playing plug-in and a description file compression packet, wherein the description file is used for key verification when the plug-in is installed, and the plug-in is used for playing the returned encrypted short video.
Further, after the "generating the video web page playing plug-in and the download link address of the description file compression package", the method specifically further includes the steps of:
and linking and downloading the webpage playing plug-in according to the downloading address, installing, filling information in the description file according to the rule requirement in the description file during installation, performing key verification, and if the verification passes, successfully installing.
Further, a key is preset in the play plug-in, and the key format is as follows: the first three bits of the current timestamp + the base64 coding format of the first frame picture of the video removes the random integer of the first three bits and the last three bits after the head information + the third bits after the current timestamp + ten to one hundred intervals;
the description file comprises the following components: information constituting the key field.
Further, the "return preset verification code to front page", the preset verification code includes: short video and question module ", comprising the steps of:
randomly selecting short video files preset in a database, and a problem module, wherein the problem module comprises: question descriptions, option lists, and whether to multi-select modes related to the content of the short video.
Further, the method further comprises the steps of: if the user does not answer the questions of the question module correctly in the preset time, destroying the returned preset verification code;
and responding to the verification code request instruction again, and returning a preset verification code to the front-end page.
In order to solve the technical problems, the application also provides a webpage verification generation system based on preset video, which comprises the following specific technical scheme:
a webpage verification generation system based on preset video comprises: a client and a server;
the client sends a verification code request instruction to the server, the server responds to the verification code request instruction and returns a preset verification code to the client page, and the preset verification code comprises: a short video and question module;
the client responds to the video playing instruction and plays the video, and the server judges whether the user answers the questions of the question module correctly within the preset time after the video is played; the questions of the question module are related to the content of the short video.
Further, the short video is an encrypted short video;
the server is further configured to: and generating a downloading link address of a video webpage playing plug-in and a description file compression packet, wherein the description file is used for key verification when the plug-in is installed, and the plug-in is used for playing the returned encrypted short video.
Further, the client receives a video webpage playing plug-in and a downloading link address of a description file compression packet returned by the server, links the downloading webpage playing plug-in according to the downloading address and installs the downloading webpage playing plug-in, fills in information in the description file according to the rule requirement in the description file to carry out key verification when the installation is carried out, and the installation is successful when the verification is passed;
the key is preset in the play plug-in, and the key format is as follows: the first three bits of the current timestamp + the base64 coding format of the first frame picture of the video removes the random integer of the first three bits and the last three bits after the head information + the third bits after the current timestamp + ten to one hundred intervals;
the description file comprises the following components: information constituting the key field.
Further, the server is further configured to: randomly selecting short video files preset in a database, and a problem module, wherein the problem module comprises: question descriptions, option lists, and whether to multi-select modes related to the content of the short video.
The beneficial effects of the application are as follows: a webpage verification generation method based on a preset video comprises the following steps: responding to a verification code request instruction, and returning a preset verification code to a front-end page, wherein the preset verification code comprises: a short video and question module; responding to the video playing instruction, and judging whether the user answers the questions of the question module correctly within the preset time after the video is played; the questions of the question module are related to the content of the short video. The content of the verification code is displayed in a video mode, a user needs to click and watch the verification code and then obtain a correct answer by combining the content, pick the correct answer and submit the verification, and actions such as capturing the content of the verification code by a malicious program, realizing automatic login, malicious watering, malicious access and the like can be avoided to a large extent.
Furthermore, the returned short video is encrypted, a specific webpage video playing plug-in is required to be downloaded according to the returned link, information in the description file is filled in, and the video can be clicked to be played after the installation is successful, so that the possibility that the video content is broken maliciously by a program is greatly reduced.
Furthermore, the method for generating the verification code is further added with a countdown function, namely a time limiting mechanism is added, verification must be completed within a preset time, timeliness of the verification code is further guaranteed, and actions such as automatic login of malicious programs can be further avoided.
Drawings
FIG. 1 is a flowchart of a webpage verification generation method based on preset video according to an embodiment;
FIG. 2 is an interface schematic diagram of a webpage verification generation method based on preset video according to an embodiment;
fig. 3 is a schematic block diagram of a webpage verification generation system based on preset video according to an embodiment.
Reference numerals illustrate:
300. a webpage verification generation system based on preset video,
301. the client-side will have a function of,
302. and the server side.
Detailed Description
In order to describe the technical content, constructional features, achieved objects and effects of the technical solution in detail, the following description is made in connection with the specific embodiments in conjunction with the accompanying drawings.
Referring to fig. 1 to 2, in this embodiment, a method for generating webpage verification based on preset video may be applied to a system for generating webpage verification based on preset video, where the system for generating webpage verification based on preset video includes: the client may be embodied as any mobile terminal or computer, etc., and the server may be embodied as a computer, server, etc.
The core technical idea of the application is as follows: the time limit is added to the validity of the verification code, and the verification code is a short video, namely, the user must watch the short video, answer the content related to the short video, and the verification is calculated after the answer is correct. The malicious program can be effectively prevented from capturing the content of the verification code, realizing automatic login, malicious watering, malicious access increasing and other actions.
The following expansion description:
step S101: responding to a verification code request instruction, and returning a preset verification code to a front-end page, wherein the preset verification code comprises: short video and problem module.
Step S102: responding to the video playing instruction, and judging whether the user answers the questions of the question module correctly within the preset time after the video is played; the questions of the question module are related to the content of the short video.
A webpage verification generation method based on a preset video comprises the following steps: responding to a verification code request instruction, and returning a preset verification code to a front-end page, wherein the preset verification code comprises: a short video and question module; responding to the video playing instruction, and judging whether the user answers the questions of the question module correctly within the preset time after the video is played; the questions of the question module are related to the content of the short video. The content of the verification code is displayed in a video mode, a user needs to click and watch the verification code and then obtain a correct answer by combining the content, pick the correct answer and submit the verification, and actions such as capturing the content of the verification code by a malicious program, realizing automatic login, malicious watering, malicious access and the like can be avoided to a large extent.
In this embodiment, the front-end page is presented in a visual interface form, the user clicks a verification code acquisition button, and sends a session request for generating a verification code to the background, and the background responds to a verification code request instruction, where "return a preset verification code to the front-end page, and the preset verification code includes: short video and question module ", comprising the steps of: randomly selecting short video files (preferably 5-10s in time length) preset in a database, and a question module, wherein the question module comprises: question descriptions, option lists, and whether to multi-select modes related to the content of the short video.
And after the front-end page receives the preset verification code returned by the background, displaying the problem description, the short video and the option list on the front-end page. The front-end page renders different option list styles according to whether a multi-selection mode is adopted, the multi-selection mode displays a multi-selection frame, and a non-multi-selection mode displays a single-selection frame.
At this point the countdown of the preset time begins, such as 60 seconds. After the video is played, if the user answers the questions before the countdown is finished, the verification is passed.
Further, in order to prevent the video content from being broken by the program maliciously. The short video is an encrypted short video; the method for responding to the video playing instruction specifically further comprises the following steps:
and generating a downloading link address of a video webpage playing plug-in and a description file compression packet, wherein the description file is used for key verification when the plug-in is installed, and the plug-in is used for playing the returned encrypted short video.
After the 'generating the download link address of the video webpage playing plug-in and the description file compression package', the method specifically further comprises the following steps:
and linking and downloading the webpage playing plug-in according to the downloading address, installing, filling information in the description file according to the rule requirement in the description file during installation, and carrying out key verification, wherein if the verification is passed, the installation is successful, otherwise, the installation is failed.
The encryption check rule is explained as follows:
the key is preset in the play plug-in, and the key format is as follows: the first three bits of the current timestamp + the base64 coding format of the first frame picture of the video removes the random integer of the first three bits and the last three bits after the head information + the third bits after the current timestamp + ten to one hundred intervals;
the description file comprises the following components: information constituting the key field.
The data is assumed to be as follows:
timestamp: 1624862576357,
base64 coding: data: image/png; base64, iVBORw0XXXXXErkJgg,
random number: 92,
the preset key is: 162 ibbgg 35792,
the description file contains data information of the three fields,
when the playing plug-in is installed, a form input box is popped up and information is filled in according to the sequence and the corresponding rule.
After the user fills in the corresponding information according to the rule, the playing plug-in units splice the information and match with the preset secret key, if the information is the same, the video can be installed successfully and played, otherwise, the video cannot be played due to the fact that the installation is not performed, after each new verification code is generated, the new playing plug-in units are required to be downloaded again and installed, and the correctness of the secret key is checked according to the new description file input information.
The returned short video is encrypted, a specific webpage video playing plug-in is downloaded according to the returned link, information in the description file is filled in, and the video can be clicked to be played after the installation is successful, so that the possibility that the video content is broken maliciously by a program is greatly reduced.
The above operation interface may be as shown in fig. 2.
Further, the method further comprises the steps of: if the user does not answer the questions of the question module correctly in the preset time, destroying the returned preset verification code; and responding to the verification code request instruction again, and returning a preset verification code to the front-end page. I.e. a re-request is required.
The method for generating the verification code is further added with a countdown function, namely a time limiting mechanism is added, verification must be completed within preset time, timeliness of the verification code is further guaranteed, and actions such as automatic login of malicious programs can be further avoided.
Referring to fig. 2 to 3, in this embodiment, a specific embodiment of a webpage verification generating system 300 based on preset video is as follows:
a preset video-based web page verification generation system 300, comprising: a client 301 and a server 302; the client 301 sends a verification code request instruction to the server 302, and the server 302 responds to the verification code request instruction and returns a preset verification code to the page of the client 301, where the preset verification code includes: a short video and question module; the client 301 responds to the video playing instruction and plays the video, and the server 302 determines whether the user answers the questions of the question module correctly within a preset time after the video is played; the questions of the question module are related to the content of the short video.
According to the system, the content of the verification code is displayed in a video mode, a user needs to click and watch the verification code and then acquire a correct answer in combination with the content, pick the correct answer and submit the verification, and actions such as capturing the content of the verification code by a malicious program, realizing automatic login, malicious watering, malicious access and the like can be avoided to a large extent.
In this embodiment, a page of the client 301 is presented in a visual interface form, a user clicks a verification code acquisition button, sends a session request for generating a verification code to the background, the server 302 responds to a verification code request instruction, randomly selects a short video file (preferably for 5-10 s) preset in a database, and a problem module, where the problem module includes: question descriptions, option lists, and whether to multi-select modes related to the content of the short video.
After the client 301 page receives the preset verification code returned by the server 302, the problem description, the short video and the option list are displayed on the client 301 page. The client 301 page may render different option list styles according to whether a multi-option mode is displayed, wherein the multi-option mode displays a multi-option frame, and a non-multi-option mode displays a single option frame.
At this point the countdown of the preset time begins, such as 60 seconds. After the video is played, if the user answers the questions before the countdown is finished, the verification is passed.
Further, the short video is an encrypted short video; the server 302 is further configured to: and generating a downloading link address of a video webpage playing plug-in and a description file compression packet, wherein the description file is used for key verification when the plug-in is installed, and the plug-in is used for playing the returned encrypted short video.
Further, the client 301 receives a video web page playing plug-in and a download link address of the description file compression packet returned by the server 302, links the download web page playing plug-in according to the download address and installs, fills in information in the description file according to rule requirements in the description file to perform key verification when the installation is performed, and the installation is successful if the verification is passed; the key is preset in the play plug-in, and the key format is as follows: the first three bits of the current timestamp + the base64 coding format of the first frame picture of the video removes the random integer of the first three bits and the last three bits after the head information + the third bits after the current timestamp + ten to one hundred intervals; the description file comprises the following components: information constituting the key field. The data is assumed to be as follows:
timestamp: 1624862576357,
base64 coding: data: image/png; base64, iVBORw0XXXXXErkJgg,
random number: 92,
the preset key is: 162 ibbgg 35792,
the description file contains data information of the three fields,
when the playing plug-in is installed, a form input box is popped up and information is filled in according to the sequence and the corresponding rule.
After the user fills in the corresponding information according to the rule, the playing plug-in units splice the information and match with the preset secret key, if the information is the same, the video can be installed successfully and played, otherwise, the video cannot be played due to the fact that the installation is not performed, after each new verification code is generated, the new playing plug-in units are required to be downloaded again and installed, and the correctness of the secret key is checked according to the new description file input information.
The returned short video is encrypted, a specific webpage video playing plug-in is downloaded according to the returned link, information in the description file is filled in, and the video can be clicked to be played after the installation is successful, so that the possibility that the video content is broken maliciously by a program is greatly reduced.
The above operation interface may be as shown in fig. 2.
Further, the server 302 is further configured to: if the user does not answer the questions of the question module correctly in the preset time, destroying the returned preset verification code; and responding to the verification code request instruction again, and returning a preset verification code to the front-end page. I.e. a re-request is required.
The method for generating the verification code is further added with a countdown function, namely a time limiting mechanism is added, verification must be completed within preset time, timeliness of the verification code is further guaranteed, and actions such as automatic login of malicious programs can be further avoided.
It should be noted that, although the foregoing embodiments have been described herein, the scope of the present application is not limited thereby. Therefore, based on the innovative concepts of the present application, alterations and modifications to the embodiments described herein, or equivalent structures or equivalent flow transformations made by the present description and drawings, apply the above technical solution, directly or indirectly, to other relevant technical fields, all of which are included in the scope of the application.

Claims (4)

1. A webpage verification generation method based on a preset video is characterized by comprising the following steps:
responding to a verification code request instruction, and returning a preset verification code to a front-end page, wherein the preset verification code comprises: a short video and question module;
responding to the video playing instruction, and judging whether the user answers the questions of the question module correctly within the preset time after the video is played;
the questions of the question module are related to the content of the short video; the short video is an encrypted short video;
the method for responding to the video playing instruction specifically further comprises the following steps:
generating a downloading link address of a video webpage playing plug-in and a description file compression packet, wherein the description file is used for key verification when the plug-in is installed, and the plug-in is used for playing a returned encrypted short video; after the 'generating the download link address of the video webpage playing plug-in and the description file compression package', the method specifically further comprises the following steps:
downloading the webpage playing plug-in according to the downloading link address and installing, filling in information in the description file according to the rule requirement in the description file for key verification during installation, and successfully installing if verification passes; the key is preset in the play plug-in, and the key format is as follows: the first three bits of the current timestamp + the base64 coding format of the first frame picture of the video removes the random integer of the first three bits and the last three bits after the head information + the third bits after the current timestamp + ten to one hundred intervals;
the description file comprises the following components: information constituting a key field;
the method also comprises the steps of: if the user does not answer the questions of the question module correctly in the preset time, destroying the returned preset verification code;
and responding to the verification code request instruction again, and returning a preset verification code to the front-end page.
2. The method for generating web page verification based on preset video according to claim 1, wherein the step of returning a preset verification code to the front page includes: short video and question module ", comprising the steps of:
randomly selecting short video files preset in a database, and a problem module, wherein the problem module comprises: question descriptions, option lists, and whether to multi-select modes related to the content of the short video.
3. A web page verification generation system based on a preset video, comprising: a client and a server;
the client sends a verification code request instruction to the server, the server responds to the verification code request instruction and returns a preset verification code to the client page, and the preset verification code comprises: a short video and question module;
the client responds to the video playing instruction and plays the video, and the server judges whether the user answers the questions of the question module correctly within the preset time after the video is played; if the user does not answer the questions of the question module correctly in the preset time, destroying the returned preset verification code; responding to the verification code request instruction again, returning a preset verification code to a front-end page, wherein the problem of the problem module is related to the content of the short video; the short video is an encrypted short video;
the server is further configured to: generating a downloading link address of a video webpage playing plug-in and a description file compression packet, wherein the description file is used for key verification when the plug-in is installed, and the plug-in is used for playing a returned encrypted short video;
responding to a video playing instruction, receiving a video webpage playing plug-in returned by the server and a downloading link address of a description file compression packet by the client, downloading the webpage playing plug-in according to the downloading link address and installing, filling information in the description file according to the rule requirement in the description file for key verification when the installation is carried out, and if the verification is passed, successfully installing;
the key is preset in the play plug-in, and the key format is as follows: the first three bits of the current timestamp + the base64 coding format of the first frame picture of the video removes the random integer of the first three bits and the last three bits after the head information + the third bits after the current timestamp + ten to one hundred intervals;
the description file comprises the following components: information constituting the key field.
4. A web page verification generation system based on preset video according to claim 3,
the server is further configured to: randomly selecting short video files preset in a database, and a problem module, wherein the problem module comprises: question descriptions, option lists, and whether to multi-select modes related to the content of the short video.
CN202110776112.6A 2021-07-09 2021-07-09 Webpage verification generation method and system based on preset video Active CN113489729B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110776112.6A CN113489729B (en) 2021-07-09 2021-07-09 Webpage verification generation method and system based on preset video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110776112.6A CN113489729B (en) 2021-07-09 2021-07-09 Webpage verification generation method and system based on preset video

Publications (2)

Publication Number Publication Date
CN113489729A CN113489729A (en) 2021-10-08
CN113489729B true CN113489729B (en) 2023-08-29

Family

ID=77938257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110776112.6A Active CN113489729B (en) 2021-07-09 2021-07-09 Webpage verification generation method and system based on preset video

Country Status (1)

Country Link
CN (1) CN113489729B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592253A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Verification code system based on videos
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN106781762A (en) * 2015-11-24 2017-05-31 华为数字技术(苏州)有限公司 A kind of methods, devices and systems of display problem information
CN107395647A (en) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 Checking system, method and apparatus
CN107483435A (en) * 2017-08-11 2017-12-15 青岛海尔多媒体有限公司 Verify the method and device of code check
CN109144525A (en) * 2017-06-26 2019-01-04 研祥智能科技股份有限公司 A kind of software installation method and system of network self-adapting
CN109547198A (en) * 2018-11-16 2019-03-29 南京钟山虚拟现实技术研究院有限公司 The method and system of network transmission video file

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130298155A1 (en) * 2012-05-03 2013-11-07 Rawllin International Inc. Video personal identification code for video on demand services
CN110138716B (en) * 2018-02-09 2020-11-27 网宿科技股份有限公司 Key providing method, video playing method, server and client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592253A (en) * 2011-10-25 2012-07-18 上海博路信息技术有限公司 Verification code system based on videos
CN106781762A (en) * 2015-11-24 2017-05-31 华为数字技术(苏州)有限公司 A kind of methods, devices and systems of display problem information
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN109144525A (en) * 2017-06-26 2019-01-04 研祥智能科技股份有限公司 A kind of software installation method and system of network self-adapting
CN107483435A (en) * 2017-08-11 2017-12-15 青岛海尔多媒体有限公司 Verify the method and device of code check
CN107395647A (en) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 Checking system, method and apparatus
CN109547198A (en) * 2018-11-16 2019-03-29 南京钟山虚拟现实技术研究院有限公司 The method and system of network transmission video file

Also Published As

Publication number Publication date
CN113489729A (en) 2021-10-08

Similar Documents

Publication Publication Date Title
US20180241734A1 (en) Synchronizing authentication sessions between applications
US7533419B2 (en) Human interactive proof service
CN105847988B (en) Video sharing method and apparatus
US7636783B2 (en) Trial-before-purchase subscription game infrastructure for peer-peer networks
CN105592065B (en) A kind of Website logging method and its login system based on SMS
CN105025041B (en) The methods, devices and systems that file uploads
US8176538B2 (en) Information processing system, recording medium storing control program, and computer data signal embodied in a carrier wave
US20100082747A1 (en) Real-time collaborative browsing
CN103198130B (en) The method and apparatus realizing the login unified with webpage at client
US20100071056A1 (en) Method and system for multi-protocol single logout
US11610182B2 (en) System and method for electronic lead verification
CN101251918A (en) Advertisement content creating verification information system and method
EP2558973A2 (en) Streaming insertion of tokens into content to protect against csrf
CN108322416B (en) Security authentication implementation method, device and system
CN107203576A (en) Information synchronization method and device
CN107196909A (en) Invitation registration method and device
CN110519280A (en) A kind of crawler recognition methods, device, computer equipment and storage medium
CN110213303A (en) A kind of mobile terminal single-point logging method and system based on 5G network
CN110022350A (en) The treating method and apparatus of client registers and registration information
CN113489729B (en) Webpage verification generation method and system based on preset video
CN110717128A (en) Method, device, terminal and storage medium for processing in-application webpage
CN107979577A (en) A kind of method and apparatus of terminal authentication
US20040267946A1 (en) Server access control
CN113742702B (en) Method, system, equipment and storage medium for secure access based on enterprise WeChat
CN114095483A (en) Password substitution filling method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant