CN113918898A - Safety verification code generation method, system and medium based on track drawing interaction - Google Patents

Safety verification code generation method, system and medium based on track drawing interaction Download PDF

Info

Publication number
CN113918898A
CN113918898A CN202111011241.2A CN202111011241A CN113918898A CN 113918898 A CN113918898 A CN 113918898A CN 202111011241 A CN202111011241 A CN 202111011241A CN 113918898 A CN113918898 A CN 113918898A
Authority
CN
China
Prior art keywords
verification code
picture
track
verification
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111011241.2A
Other languages
Chinese (zh)
Inventor
高博宇
李宸
刘鑫
卿雨平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
University of Jinan
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN202111011241.2A priority Critical patent/CN113918898A/en
Publication of CN113918898A publication Critical patent/CN113918898A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method, a system and a medium for generating a safety verification code based on trajectory drawing interaction. The method comprises the steps of formulating a safety rule; the client requests the server for identity authentication; the server generates a data token, a verification code question and a picture, and stores related information into a database; adding interference to the generated picture, and transmitting the picture to the client; the client recovers and displays the scrambled verification code image; recording track information drawn by a user, encrypting track information data and a data token and transmitting the encrypted track information data and the encrypted data token to a server; and the server judges the track information and returns the result to the client. The invention encrypts the transmitted data by using an RC4 encryption algorithm; refusing to verify when detecting a headless browser in JavaScript; the machine behavior is judged by using the algorithm designed by extracting the human drawing track characteristics, the technical means improve the safety and the correctness, and the cracking of the OCR picture recognition technology and the behavior of generating the track by machine simulation can be effectively prevented.

Description

Safety verification code generation method, system and medium based on track drawing interaction
Technical Field
The invention belongs to the technical field of verification code safety, and particularly relates to a safe verification code generation method, a safe verification code generation system and a safe verification code generation medium based on track drawing interaction.
Background
In the user authentication process, there are a number of security verification operations in which a verification code is the primary form. Most verification codes on the market at present have an easy cracking mode, and the safety performance is low. And a small part of verification codes with high safety increase the identification difficulty, so that the machine is difficult to identify, the human is difficult to identify, and the user experience is very poor.
Although the two types of verification codes are simple to operate, with the development of OCR technology, it is also simple to effectively recognize characters on a picture and complete corresponding simulation behaviors. The slider type verification code is placed at a correct position by a user simply dragging the slider, and data analysis is carried out according to the track of the mouse to judge whether the mouse is a human or a machine. However, there are various methods for identifying the nick of the verification code picture, such as: and comparing the brightness of each pixel of the complete picture and the picture with the missing slide block by using artificial intelligent machine learning and an edge detection algorithm, and obtaining the end point position of the simulated dragging after the notch identification is finished. In order to increase the cracking difficulty, some verification codes blindly add noise to the background picture, and although the picture identification difficulty is increased, the difficulty is also increased for human identification.
Disclosure of Invention
The invention mainly aims to overcome the defects of the prior art and provide a method, a system and a medium for generating a safety verification code based on track drawing interaction.
In order to achieve the purpose, the invention adopts the following technical scheme:
one aspect of the present invention provides a method for generating a security verification code based on trajectory drawing interaction, comprising the following steps:
s1, making a security rule for resisting the attack of the verification code;
s2, the client loads a JavaScript code initialization verification code component and requests the server for identity authentication;
s3, the server generates a data token, a verification code question and a picture, and stores related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
s4, restoring and displaying the scrambled verification code image by the client by using a restoration algorithm;
s5, the client records the track information drawn by the user, encrypts the track information data and the data token together and transmits the encrypted track information data and the encrypted data token to the server;
and S6, after decrypting the received data, the server reads the related information of the verification code according to the data token, accordingly, judges the track information submitted by the user, and returns the result to the user.
As a preferred technical solution, the security rule is specifically:
s11, detecting whether the user is trying to load the verification code component by using the headless browser by using JavaScript, if so, stopping the loading and not allowing the verification;
s12, rewriting part of logic in the JavaScript by using the C language, compiling the logic to the WebAssembly byte code by using the Emscript, and providing a related function for calling the JavaScript code.
As a preferred technical solution, the generation and processing processes of the data token, the authentication code theme and the picture are as follows:
s31, randomly generating a character string consisting of letters and numbers as a data token Challengetoken;
s32, randomly acquiring a word with the word number of two to four from the collected word stock as the subject of the verification code;
s33, randomly obtaining a picture as a background picture, and randomly generating parameters of each character in the verification code question, wherein the parameters comprise position coordinates, word size, angle and color of the character; the color of the character is different from the value of a YUV color mode Y channel of the color of the character position on the background picture; drawing characters on a background picture according to the parameters, and finally adding noise interference on the picture to obtain a verification code picture to be displayed to a user;
s34, storing the data token Challengetoken and the title information of the verification code into a redis database;
and S35, using a shuffling algorithm to shuffle the pictures in units of small blocks of 16x16, adding interference, and transmitting the pictures to the client.
As a preferred technical solution, the recording of the track information drawn by the user specifically includes:
s51, when the desktop end user presses a left mouse button on the verification code picture or the mobile end user touches the verification code picture, starting to record a track drawn by the user;
s52, recording the time from the drawing start to the moment in milliseconds at intervals of 25 milliseconds, and recording the position of the mouse or the touch point on the verification code picture at the moment;
s53, when the position of the mouse or the touch point moves out of the display area of the verification code picture, or the user releases the left button of the mouse and stops touching, or the number of the recorded track points reaches a preset maximum number, stopping recording the track drawn by the user;
and S54, the client encrypts the track information data and the data token by using the RC4 and transmits the encrypted track information data and the encrypted data token to the server.
As a preferred technical solution, the process of the server side determining the track information in step S6 is as follows:
s61, after the server side obtains track information data and a data token, the server side decrypts the data to obtain a Challengetoken, and question information is called in a redis database according to the Challengetoken;
s62, judging whether the machine is operated by using a judgment track algorithm;
s63, if the verification passes, generating a verification token Verifytoken, setting a validity period, storing the validity period in a database, encrypting and transmitting the validity period to the client; if not, stopping working;
s64, the client transmits the received verification token Verifytoken and other service data to the server side to wait for verification;
s65, the server side inquires whether Verifytoken exists in a redis database, if yes, the verification is successful, the Verifytoken in the database is destroyed, and a verification success message is returned to the client side; and if not, returning a verification failure message to the client.
As a preferred technical solution, the trajectory determination algorithm specifically includes:
(1) the starting point and the end point are judged specifically as follows: judging whether the starting point and the end point of the track of the points are within the position range of the title characters given on the picture;
(2) the method for judging the connection time specifically comprises the following steps: if the connection time exceeds 0.8s, the verification is failed, and the machine operation is judged;
(3) determining the slope specifically as follows: if the probability of 95% of the slope from the subsequent point to the first point is the same, judging the straight line of the machine operation;
(4) and judging the distance from the discrete point to the standard straight line, specifically: and if the distance from the discrete point to the standard track straight line is too large, judging that the machine is operated.
In another aspect of the present invention, a system for generating a security verification code based on trajectory drawing interaction is provided, which is applied to the method for generating a security verification code based on trajectory drawing interaction, and includes a security rule formulation module, an initialization module, a data token and verification code generation module, a verification code recovery module, a trajectory information recording module, and an identity verification module;
the security rule making module is used for making a security rule for resisting verification code attack;
the initialization module is used for loading a JavaScript code initialization verification code component and requesting the server side to perform identity authentication;
the data token and verification code generation module is used for generating a data token, a verification code question and a picture and storing related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
the verification code recovery module recovers and displays the disturbed verification code picture by applying a recovery algorithm;
the track information recording module is used for recording track information drawn by a user, encrypting track information data and a data token together and transmitting the encrypted track information data and the encrypted data token to the server;
and the identity authentication module is used for reading related information of the authentication code according to the data token after the server decrypts the received data, judging the track information submitted by the user according to the related information, and returning the result to the user.
In another aspect of the present invention, a storage medium is provided, which stores a program, and when the program is executed by a processor, the program implements the above-mentioned security verification code generation method based on trajectory drawing interaction.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) the scheme of the invention carries out a series of processing from the generation of the verification code to the completion of the verification, including that the shuffling algorithm disturbs the pictures given by the server; encrypting the transmitted data by using an RC4 encryption algorithm; refusing to verify when detecting a headless browser in JavaScript; rewriting part of logic in the JavaScript by using C language and providing the part of logic to the JavaScript for calling in a mode of compiling to WebAssembly byte codes; and (4) judging the machine behavior by using an algorithm for extracting human drawn track characteristic design. The technical means greatly improve the safety and the correctness of the verification scheme of the invention, and can effectively prevent the cracking of the OCR picture recognition technology and the behavior of generating the track by machine simulation.
Drawings
FIG. 1 is a schematic diagram of an actual application of a security verification code generation method based on trace drawing interaction according to an embodiment of the present invention;
FIG. 2 is a business flow diagram of a security verification code generation method based on trace drawing interaction according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating specific steps of a method for generating a security verification code based on trace-drawing interaction according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a security verification code generation system based on trace drawing interaction according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Examples
The scheme of the embodiment provides a safe verification code generation method based on track drawing interaction. The title of the verification code is a word with a word number of two to four, and a user needs to draw a sliding track on a picture written with a plurality of characters (which may include characters not appearing in the words of the verification code title) by sequentially dragging a mouse or a touch screen, so as to connect the given words in sequence, as shown in fig. 1.
The scheme described in this embodiment mainly includes four roles: the system comprises a user, a client, a server and a database. The client, the server and the database are communicated through an HTTP (hyper text transport protocol), wherein a user is the main body of the verification of the invention; the client is mainly responsible for monitoring and recording user behaviors and resisting various attacks aiming at the verification code; the server side is mainly responsible for generating verification code information and verifying user behaviors; the database is mainly responsible for storing the verification code topic data and the related verification data.
Assume that, taking user M, client, server, and database as examples, user track information is denoted as track ═ id, (x)1,y1,t1),(x2,y2,t2)…(xn,yn,tn) And the question information stored in the database is recorded as query { (a)1,b1),(a2,b2) R, changetoken }, and the verification information stored in the database is recorded as verify ═ verify, time }.
As shown in fig. 1, the present embodiment provides a method for generating a security verification code based on trajectory drawing interaction, including the following steps:
s1, making a security rule for resisting the attack of the verification code;
further, the security rule is specifically:
s11, detecting whether the user is trying to load the verification code component by using a headless browser such as Selenium by using JavaScript, if so, stopping the loading, and not allowing the verification;
s12, rewriting part of logic in the JavaScript by using the C language, compiling the logic to the WebAssembly byte code by using the Emscript, and providing a related function for the JavaScript code to call.
S2, the client loads a JavaScript code initialization verification code component and requests the server for identity authentication;
s3, the server generates a data token, a verification code question and a picture, and stores related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
further, the data token, the authentication code topic and the picture are generated and processed as follows:
s31, randomly generating a character string consisting of letters and numbers as a data token Challengetoken;
s32, randomly acquiring a word with the word number of two to four from the collected word stock as the subject of the verification code;
s33, randomly obtaining a picture as a background picture, and randomly generating parameters of each character in the verification code question, wherein the parameters comprise position coordinates, word size, angle and color of the character; the color of the character is different from the value of a YUV color mode Y channel of the color of the character position on the background picture; drawing characters on a background picture according to the parameters, and finally adding noise interference on the picture to obtain a verification code picture to be displayed to a user;
s34, topic information
question={{(a1,b1),(a2,b2),…,(an,bn) Store it in a redis database, where { (a)1,b1),(a2,b2),…,(an,bn) The coordinates of each character in the question are, r is the radius of the area occupied by the character, and Challengetoken is a verification token;
and S35, using a shuffling algorithm to shuffle the pictures in units of small blocks of 16x16, adding interference, and transmitting the pictures to the client.
S4, restoring and displaying the scrambled verification code image by the client by using a restoration algorithm;
and S5, recording the track information drawn by the user, wherein the track information drawn by the user is recorded as track, { Challengetoken, (x)1,y1,t1),(x2,y2,t2)…(xn,yn,tn) Encrypting the data and transmitting the encrypted data to a server; wherein (x)1,y1,t1),(x2,y2,t2)…(xn,yn,tn) Is the coordinates and sample time information for each point in the trace.
Further, the recording of the track information drawn by the user specifically includes:
s51, when the desktop end user presses a left mouse button on the verification code picture or the mobile end user touches the verification code picture, starting to record a track drawn by the user;
s52, recording the time from the drawing start to the moment in milliseconds at intervals of 25 milliseconds, and recording the position of the mouse or the touch point on the verification code picture at the moment;
s53, when the position of the mouse or the touch point moves out of the display area of the verification code picture, or the user releases the left button of the mouse and stops touching, or the number of the recorded track points reaches a preset maximum number, stopping recording the track drawn by the user;
and S54, the client encrypts the track information data and the data token by using the RC4 and transmits the encrypted track information data and the encrypted data token to the server.
And S6, the server judges the track information and returns the result to the client.
Further, the process of the server determining the track information in step S6 is as follows:
s61, after the server side obtains track information data and a data token, the data are decrypted to obtain a Challengetoken, and question information queston is called in a redis database according to the Challengetoken;
s62, the used judgment track algorithm is as follows:
(1) the starting point and the end point are judged specifically as follows: judging whether the starting point and the end point of the track of the points are within the position range of the title characters given on the picture;
(2) the method for judging the connection time specifically comprises the following steps: if the connection time exceeds 0.8s, the verification is failed, and the machine operation is judged;
(3) determining the slope specifically as follows: if the probability of 95% of the slope from the subsequent point to the first point is the same, judging the straight line of the machine operation;
(4) and judging the distance from the discrete point to the standard straight line, specifically: if the distance from the discrete point to the standard track straight line is too large, the machine operation is judged;
s63, if the verification passes, generating a verification token Verifytoken, setting validity time, storing information verify into a database, and encrypting and transmitting the Verifytoken to the client; if not, stopping working;
s64, after the client decrypts the acquired information, packaging user authentication information including an authentication token Verifytoken, a user name username and a user password into user information for { Verifytoken, username and password } and transmitting the user information to the server side for authentication through data encryption; the Verifytoken obtained by the client through decryption may be NULL, which indicates that the verification is not passed, and the user needs to return to step S2 to perform the verification again.
S65, after the server side decrypts the data, whether the Verifytoken exists or not is inquired in the redis library, and if not, a verification failure message is returned to the client side; if yes, continuously verifying whether the user name is matched with the user password, if not, returning verification code failure information, and if so, successfully verifying and returning verification success information to the client. And under the condition that the Verifytoken exists, after the service side continuously verifies the user name and the user password, whether the user name and the user password are matched or not, the Verifytoken in the database is destroyed.
As shown in fig. 4, in another embodiment of the present application, a security verification code generation system based on trace drawing interaction is provided, and the system includes a security rule making module, an initialization module, a data token and verification code generation module, a verification code recovery module, a trace information recording module, and an identity verification module;
the security rule making module is used for making a security rule for resisting verification code attack;
the initialization module is used for loading a JavaScript code initialization verification code component and requesting the server side to perform identity authentication;
the data token and verification code generation module is used for generating a data token, a verification code question and a picture and storing related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
the verification code recovery module recovers and displays the disturbed verification code picture by applying a recovery algorithm;
the track information recording module is used for recording track information drawn by a user, encrypting track information data and a data token together and transmitting the encrypted track information data and the encrypted data token to the server;
and the identity authentication module is used for reading related information of the authentication code according to the data token after the server decrypts the received data, judging the track information submitted by the user according to the related information, and returning the result to the user.
It should be noted that the system provided in the above embodiment is only illustrated by the division of the functional modules, and in practical applications, the function allocation may be completed by different functional modules according to needs, that is, the internal structure is divided into different functional modules to complete all or part of the functions described above.
As shown in fig. 5, in another embodiment of the present application, a storage medium is further provided, where the storage medium stores a program, and when the program is executed by a processor, the method for generating a security verification code based on trajectory-based drawing interaction is implemented, specifically:
s1, making a security rule for resisting the attack of the verification code;
s2, the client loads a JavaScript code initialization verification code component and requests the server for identity authentication;
s3, the server generates a data token, a verification code question and a picture, and stores related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
s4, restoring and displaying the scrambled verification code image by the client by using a restoration algorithm;
s5, the client records the track information drawn by the user, encrypts the track information data and the data token together and transmits the encrypted track information data and the encrypted data token to the server;
and S6, after decrypting the received data, the server reads the related information of the verification code according to the data token, accordingly, judges the track information submitted by the user, and returns the result to the user.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (8)

1. The safe verification code generation method based on track drawing interaction is characterized by comprising the following steps of:
formulating a security rule for resisting the verification code attack;
the client loads a JavaScript code initialization verification code component and requests the server for identity authentication;
the server generates a data token, a verification code question and a picture, and stores related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
the client recovers and displays the scrambled verification code image by using a recovery algorithm;
the client records track information drawn by a user, encrypts track information data and a data token together and transmits the encrypted track information data and the encrypted data token to the server;
and after decrypting the received data, the server reads the related information of the verification code according to the data token, accordingly, judges the track information submitted by the user, and returns the result to the user.
2. The trajectory-rendering-interaction-based security verification code generation method according to claim 1, wherein the security rules specifically include:
detecting whether a user attempts to load a verification code component by using a headless browser by using JavaScript, if so, stopping loading, and not allowing verification;
and rewriting part of logic in the JavaScript by using C language, compiling the logic to the WebAssembly byte code by using Emscript, and providing a related function for calling the JavaScript code.
3. The trajectory-rendering-interaction-based security verification code generation method according to claim 1, wherein the data token, the verification code topic and the picture are generated and processed as follows:
randomly generating a character string consisting of letters and numbers as a data token Challengetoken;
randomly acquiring a word with the number of two to four words from the collected word stock as a question of the verification code;
randomly acquiring a picture as a background picture, and randomly generating parameters of each character in the verification code question, wherein the parameters comprise position coordinates, word size, angle and color of the character; the color of the character is different from the value of a YUV color mode Y channel of the color of the character position on the background picture; drawing characters on a background picture according to the parameters, and finally adding noise interference on the picture to obtain a verification code picture to be displayed to a user;
storing the data token challenge and the title information of the verification code into a redis database;
the pictures are shuffled in units of small blocks of 16x16 using a shuffling algorithm and added with interference and transmitted to the client.
4. The method for generating a security verification code based on trajectory-rendering interaction as claimed in claim 1, wherein the recording of the trajectory information drawn by the user specifically comprises:
when a desktop end user presses a left mouse button on the verification code picture or a mobile end user touches the verification code picture, starting to record a track drawn by the user;
recording the time from the beginning of drawing to the moment in milliseconds every 25 milliseconds, and recording the position of the mouse or the touch point on the verification code picture at the moment;
when the position of the mouse or the touch point moves out of the display area of the verification code picture, or the user releases the left button of the mouse and stops touching, or the number of the recorded track points reaches a preset maximum number, stopping recording the track drawn by the user;
the client encrypts the track information data and the data token by using the RC4 and transmits the encrypted data and data token to the server.
5. The method for generating the security verification code based on the track drawing interaction as claimed in claim 1, wherein the process of the server side determining the track information in step S6 is as follows:
after the server side obtains the track information data and the data token, the server side decrypts the data to obtain a Challengetoken, and question information is called in a redis database according to the Challengetoken;
judging whether the machine is operated by using a judgment track algorithm;
if the verification passes, generating a verification token Verifytoken, setting a validity period, storing the validity period in a database, encrypting and transmitting the validity period to the client; if not, stopping working;
the client transmits the received verification token Verifytoken and other service data to the server side to wait for verification;
the server side inquires whether Verifytoken exists in a redis database, if so, the verification is successful, the Verifytoken in the database is destroyed, and a verification success message is returned to the client side; and if not, returning a verification failure message to the client.
6. The method for generating the security verification code based on the trajectory drawing interaction as claimed in claim 5, wherein the trajectory determination algorithm is specifically:
the starting point and the end point are judged specifically as follows: judging whether the starting point and the end point of the track of the points are within the position range of the title characters given on the picture;
the method for judging the connection time specifically comprises the following steps: if the connection time exceeds 0.8s, the verification is failed, and the machine operation is judged;
determining the slope specifically as follows: if the probability of 95% of the slope from the subsequent point to the first point is the same, judging the straight line of the machine operation;
and judging the distance from the discrete point to the standard straight line, specifically: and if the distance from the discrete point to the standard track straight line is too large, judging that the machine is operated.
7. The track drawing interaction-based security verification code generation system is applied to the track drawing interaction-based security verification code generation method in any one of claims 1 to 6, and comprises a security rule formulation module, an initialization module, a data token and verification code generation module, a verification code recovery module, a track information recording module and an identity verification module;
the security rule making module is used for making a security rule for resisting verification code attack;
the initialization module is used for loading a JavaScript code initialization verification code component and requesting the server side to perform identity authentication;
the data token and verification code generation module is used for generating a data token, a verification code question and a picture and storing related information into a database; adding interference to the generated picture, and transmitting the picture to the client;
the verification code recovery module recovers and displays the disturbed verification code picture by applying a recovery algorithm;
the track information recording module is used for recording track information drawn by a user, encrypting track information data and a data token together and transmitting the encrypted track information data and the encrypted data token to the server;
and the identity authentication module is used for reading related information of the authentication code according to the data token after the server decrypts the received data, judging the track information submitted by the user according to the related information, and returning the result to the user.
8. A storage medium storing a program, characterized in that: the program, when executed by a processor, implements the method for generating security verification codes based on trace-drawing interaction of any one of claims 1 to 6.
CN202111011241.2A 2021-08-31 2021-08-31 Safety verification code generation method, system and medium based on track drawing interaction Pending CN113918898A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111011241.2A CN113918898A (en) 2021-08-31 2021-08-31 Safety verification code generation method, system and medium based on track drawing interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111011241.2A CN113918898A (en) 2021-08-31 2021-08-31 Safety verification code generation method, system and medium based on track drawing interaction

Publications (1)

Publication Number Publication Date
CN113918898A true CN113918898A (en) 2022-01-11

Family

ID=79233615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111011241.2A Pending CN113918898A (en) 2021-08-31 2021-08-31 Safety verification code generation method, system and medium based on track drawing interaction

Country Status (1)

Country Link
CN (1) CN113918898A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465724A (en) * 2022-02-24 2022-05-10 深圳软牛科技有限公司 Verification code generation and verification method, client, server and system
CN114584327A (en) * 2022-05-09 2022-06-03 山东捷瑞数字科技股份有限公司 Verification method and system for graphic verification code generated by client
CN114726595A (en) * 2022-03-24 2022-07-08 中科吉芯(昆山)信息科技有限公司 Method for authenticating man-machine identity by using space-time information

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465724A (en) * 2022-02-24 2022-05-10 深圳软牛科技有限公司 Verification code generation and verification method, client, server and system
CN114465724B (en) * 2022-02-24 2023-11-03 深圳软牛科技有限公司 Verification code generation and verification method, client, server and system
CN114726595A (en) * 2022-03-24 2022-07-08 中科吉芯(昆山)信息科技有限公司 Method for authenticating man-machine identity by using space-time information
CN114726595B (en) * 2022-03-24 2023-09-29 中科吉芯(昆山)信息科技有限公司 Method for authenticating identity of man-machine by using space-time information
CN114584327A (en) * 2022-05-09 2022-06-03 山东捷瑞数字科技股份有限公司 Verification method and system for graphic verification code generated by client
CN114584327B (en) * 2022-05-09 2022-08-12 山东捷瑞数字科技股份有限公司 Verification method and system for graphic verification code generated by client

Similar Documents

Publication Publication Date Title
CN113918898A (en) Safety verification code generation method, system and medium based on track drawing interaction
US9674218B2 (en) Detection of click-fraud
US11068576B2 (en) Hardening security images
CA2753694C (en) System and methods for automatically accessing a web site on behalf of a client
CN104426879B (en) Processing method and the corresponding methods, devices and systems of identifying code generation and verifying
US10387645B2 (en) Method for recognizing if a user of an electronic terminal is a human or a robot
EP3819830B1 (en) Systems and methods for distorting captcha images with generative adversarial networks
JP2010067096A (en) Authentication device, authentication method, information processing program, and recording medium
KR20070026789A (en) Method and system to generate an image for monitoring user interaction with a computer
US20160180073A1 (en) Captcha processing method and device, terminal and server
CN111143812B (en) Login authentication method based on graphics
Dinh et al. Recent advances of Captcha security analysis: a short literature review
Khan et al. Mimicry attacks on smartphone keystroke authentication
CN111353140B (en) Verification code generation and display method, device and system
Dinh et al. Human-artificial intelligence approaches for secure analysis in CAPTCHA codes
Powell et al. A multibiometrics-based CAPTCHA for improved online security
KR20140011010A (en) Apparatus and method for authentication user using captcha
CN111860482A (en) Dynamic graphic code verification method and device, electronic equipment and storage medium
CN110795706B (en) Hash-based verification method, equipment, storage medium and device
Kolekar et al. Click and session based—Captcha as graphical password authentication schemes for smart phone and web
JP7227444B2 (en) Access authentication method using random dot pattern CAPTCHA
CN108959901B (en) Verification code prompting method based on picture carousel
CN110740112B (en) Authentication method, apparatus and computer readable storage medium
Adesina et al. An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time.
CN113965369B (en) Verification graph acquisition method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination