201228326 六、發明說明: 【發明所屬之技術領域】 本發明係關於一種利用字符排列方式產生動態圖形驗證碼之 方法,主要是一驗證飼服器能隨機產生由N個字符所構成的一驗 證密碼,並依序擷取該驗證密碼的部分字符,以分別產生一字符 圖後,再將該等字符圖製作成一動態圖形驗證碼,並傳送至終端 裝置,以進行驗證。 【先前技術】 按’隨著資訊技術的進步,計算機(或稱電腦)已經能模擬 人類的部分動作’因此,區分計算機與人類的技術,也變得日漸 重要,全自動區分計算機和人類的測試(CApTCHA, Aut〇mated Public Turing Test to tell Computers and Humans201228326 VI. Description of the Invention: [Technical Field] The present invention relates to a method for generating a dynamic graphic verification code by using a character arrangement method, mainly for verifying that a feeding device can randomly generate a verification password composed of N characters. And sequentially extracting some characters of the verification password to respectively generate a character map, and then making the character map into a dynamic graphic verification code, and transmitting the character pattern to the terminal device for verification. [Prior Art] According to the advancement of information technology, computers (or computers) have been able to simulate some of human actions. Therefore, it is becoming increasingly important to distinguish between computer and human technologies, and to fully distinguish between computer and human testing. (CApTCHA, Aut〇mated Public Turing Test to tell Computers and Humans
Apart)便是一種區分計算機和人類的自動程序,在⑽观測会 中’驗證伺服器會自動產生一問題,並將該問題提供予用戶,r ,據用戶咖答來觸顧戶树算機或人類。目前最常見且弟 間便的CAPTCHA測試方法即為利用目形驗證碼的驗證方法。 a承上’目前圖形驗證碼技術較常被應用在網頁服務領域上, =用者(人麵戶)_—終端裝置賴找,欲存取特 ::::::::^^ 級證伺服器會先隨機選取複數個字符,例如:文字、數 201228326 字及符號等,並將該等字符排舰一驗證密碼,並根據該驗證密 碼,產生一圖形驗證碼,請參閱第1圖所示,該驗證伺服器所產 生的驗4碼為「90429628」,而第1圖所示之圖形即驗證伺服器 所產生_形驗證碼卜該驗證舰器在產生出該_驗證碼! 後,便會將該圖形驗證碼丨傳送至一終端装置,並要求使用者根 據該圖形驗證碼卜輸入該驗證密碼「9〇429628」,使該終端裝置 能在向該驗證飼服器回傳該驗證密碼「9〇429628」後,通過該驗 翻服15的驗證程序’而存取特定資料。在過去,由於影像辨識 的技術尚未成熟’故計算機(即前述終端裝置)並無法自動辨識 出該圖形驗證碼1的内容’而無法自動通過該驗證伺服器的驗證 程序。 然而’隨著影像辨識技術的進展,各種附帶有影像辨識功能 的惡意程式(如:機ϋ人程式(RQbQts)、螺蟲程式⑽頂)等) 的功能越來越強大,其影像辨識的正確性遠高於從前,也因此開 始有部分不肖人士企圖利用上述惡意程式,欲使終端裝置自動通 #過騎翻㈣的驗證程序。#驗證舰財製作出該圖形驗證 碼1,並職_驗證碼丨傳送至該終端裝置後,該終端裝置即藉 由該惡意程式,自動録該圖形驗證碼丨,並分析出該_驗證^ 1的内容’嗣’該終端裝置便能藉由該惡意程式,自動輸入該圖形 驗證碼1 _容’而棚通職驗證錬n雜f⑽,並存取 特定資料’使得圖形驗證碼!的驗證機制無法有效分辨計算機盥 人類,而賴虛設,非f不理想。再者,目前大 _ 2會大量胁存取動作,如大量下载檔案等,更對驗證二= 其他與驗4服器相連接的舰H造成負荷。 201228326 有鑑於上述_,為防止惡意程式自動完成驗證程序, 業者改變驗證伺服器產生_驗證碼的方式,以便將圖形驗 複雜化,例如:驗證舰器在產生_驗證韻過財,會 形驗證翻增加大量噪點、噪線或#景則,甚至是進行影像扭 j等處理’以提升圖形驗證碼的複雜度。在第j圖中,驗證舰 β在產生卿驗證碼1的過財,係將麵職碼的各個字符作 部分重疊,使惡意程式的影像賴舰無法正麵·該驗證密 碼的内容,據以降低,€、意程式的辨識成功率^而,此舉雖能抵 制部分惡意程式,使惡意程式無法正常運作,_免前述問題的 發生’但此-作法卻又會大幅降低_驗證碼丨的可讀性,使得 使用者(人類用戶)無法輕易辨識出圖形驗證碼丨的内容,嚴重 降低使用者的辨識正確率,Α幅增加使用者辨認錯可能性。 如此,當錢麵認錯誤麟人錯誤的驗證料後,該驗證舰 器又必須重聽行紐程序’再錢生—__彡驗證碼,並將 其傳送終魏置’此不僅徒增使用者的_,更加重驗證舰器 的負擔’十分不理想。 因此’如何改善習知圖形驗證碼的諸多_,以在不降低使 用者辨識正確率的前提下,防堵惡意程式棚影像辨識技術自動 登入等情事,即為本發明在此雌討的—重要課題。 【發明内容】 有鑑於前揭諸多問題,發明人經過長久努力研究與實驗’終 於開發設計出本發明之利用字符排列方式產生動態圖形驗證碼之 方法’期防止不肖人士姻惡意程式自動完成驗 證程序,並降低 201228326 =者的顺難度,聽重複魏鑛,崎慨糊服器的負 雜目的,係提供—種姻字符糊方式產生動態圖 ’該方法係應用在一驗證伺服器上,當該驗證伺 服雜收-終端裝置傳來的—存取請求(如:網頁讀取請求、樓 2下載請求)後,該驗證飼服器能隨機產生由N個字符(如:文 號等)所構成的—驗證密碼,且該驗證錬器能操 取=㈣、碼的第—個字符至第γ個字符,卿成—触始樣式 =符圖,其中Υ係小於Ν ;嗣,該驗證飼服器能操取該驗證密碼 ^第ΗΧ個字符至第Υ+Χ個字符,以形成一連續樣式之字符圖, 其t X的初始值不大於γ ;其後,該驗證祠服器將χ的值累加一, 並重覆前述步驟,⑽成下—鏡續樣式之字符圖;直至丫例 時^驗證伺服器即能娜該驗證㈣的第⑽個字符至第柯 =字符’以形成—齢束樣式之字制,最後,該驗證舰器將 别边複數齡符_作成—__驗證碼,且將魏態圖形驗 證碼傳送至雜端裝置,使㈣㈣_驗證碼能在—預定時間 内以動L的方式依序顯示各該字符圖的内容。如此,由於該動 態圖=驗證碼在同—時間僅會顯示㈣分字符,因此,惡意程式 ^法完整分析出整條證密碼_容,故無法自動完成驗證程 ’不僅有效解決習知關題,更能減少使用者辨認錯誤的可能 性。 本毛月之另目的,乃該驗證伺服器在擷取該驗證密碼的 :個=符至第γ個字符,以職該初始樣式之字制時該驗 5 ’器6在該初始樣式之字符圖中,鄰近該第—個字符的位置 201228326 添一起點標記’以便使用者能辨識出該動態圖形驗證碼的起點, 提升該動態圖形驗證碼的可讀性。 本發明之又一目的,乃該驗證伺服器在擷取該驗證密碼的第 -個字符至第γ個将’以形成該初始樣式之字符_,會在該 初始樣式之字符圖中,鄰近該第—個字符的位置增添—起點空白 區域’以便使用者能辨識出該動態圖形驗證碼的起點,避免使用 者辨識錯誤。 本發明之又另_目的’乃該驗證舰器產生該結束樣式之字 符圖時,會在該結束樣式之字符财,鄰近最後—卿符的位置 增添-終點標記,讀使用者能辨識㈣動_形驗證碼的終 點,據以提升該動態圖形驗證碼的可讀性。 本發明之又再-目的,乃該驗證伺㈣產生該結束樣式之字 符圖時,會在該結束樣式之字符圖中,鄰近最後—卿符的位置 增添-終點“區域,如此,使用者即能輕易辨識出該動態圖形 驗證碼的終點,防止使用者辨識錯誤等情事發生。 為便貴審查委員能對本發明之目的、結構及其功效,做更 進一步之認識與瞭解,兹舉實施例配合圖式,詳細說明如下: 【實施方式】 發明人在長期投入驗證系統等相關領域的研發過程中,發現 目前複雜雜低的圖形驗證碼,並無法防範大多數 識功能的,€、意財,*鮮驗衫肖人士彻影細^ 析圖形驗證碼_容’防止惡意程式自動完成驗證程序^ 驗證碼複雜化,如··增加大量噪點、噪線、扭曲圖形等,又會= 201228326 成圖形驗證碼的可讀性大幅下降,嚴重影響使用者的辨識正確 率。目前大多數的業者雖欲對圖形驗證碼進行改良,以化解上述 諸多問題,然而至今仍未得到妥善的解決方案。有鑑於此,發明 人乃思及利用字符排列的方式產生動態圖形驗證碼,以在不減損 圖形驗證碼可讀㈣前提下’達到崎惡意程式的效果。 本發明係-種利用字符排列方式產生動態圖形驗證碼之方 法,请參閱帛2圖所示’在本發明之第一較佳實施例中,該方法 係應用在-驗證伺服器20上,另,一終端裝置21係透過網路22 (網際網路或區_路)與該驗證錬^ 2Q相連接,該驗證祠服 器20並不限定為僅具備有驗證功㊣,該驗證爿服器2〇亦可同時 兼具網頁飼服器或槽案伺服器等的功能,或者,該驗證舰器2〇 可與-網頁伺服H或-檔翻服器相連接,當終端裝置21通過該 驗證伺服II 2G _論及之驗證程賴,魏湖㈣2G即允許 該終端裝置21存取細頁舰器或該檔案伺服器上的資料(如: 網頁、樓案等),凡本技術領域之人士所輕易思及的變化,均不脫 φ 離本發明所欲保護之技術範圍。 承上,在本較佳實施例中,使用者係透過該終端裝置21的瀏 覽Is連接至網路22 ’並欲在通過該驗證伺服器2〇的驗證後,以該 終城裝置21下載-稽案(或讀取網頁),在此情況下,該終端裝 置21會向該驗證^司服器20傳送一存取請求,該存取請求係一槽 案下載明求(或網頁讀取請求)’用以表示該終端裝置Μ欲在通 過該驗證伺服器20的驗證後,下載或讀取—網頁)。在 此情況下,當該驗證伺服器20接收到該終端裝置21傳來存取請 求後’請參閱第2〜4圖所示,該驗證飼服器2〇即根據下列步驟, 201228326 產生一動態圖形驗證碼,以便該驗證伺服器20能於後續進行驗證 程序: (300) 該驗證伺服器20隨機產生由N個字符(如:文字、數字 及符號等)所構成的一驗證密碼’在本較佳實施例中,N =6,故該驗證密碼4包括6個字符’請參閱第4圖所示, 該驗證密碼4的内容為「A2B4C9」; (301) 該驗證伺服器20擷取該驗證密碼4的第一個字符至第γ 個字符,以形成一幀初始樣式之字符圖41,其中γ小於N, 且在本較佳貫施例中’ Y=3 ’因此該驗證飼服器2〇會榻 取該驗證密碼4的第1個字符至第3個字符,即「Α2β」, 以形成初始樣式之字符圖41 ; (302) 該驗證伺服器20擷取該驗證密碼4的第 則字符,以形成,續樣式之字二42= 初始值不大於Υ,在本較佳實施例中,χ的初始值為i,故 該驗證伺服器20會擷取該贿密碼4的第2個字符至第4 個字符’即「2B4」,以形成連續樣式之字符圖42 ; (網)該驗證饲服器20將X的值累加一,使X的值成為2,且該 舰飼服器_取該驗證密碼4的第1+χ個字符至第γ+χ 個子付’即第3個字符至第5個字符:「」,以形成另 一幀連續樣式之字符圖43 ; (3〇4)該驗證飼服器20將X的值累加一,使X的值成為3,此時, Η ’ X=3 ’而Χ+γ=6,亦即χ+γ=Ν,在此狀況下,該驗證 ^ 20會操取該驗證密碼4的第m個字符至第Υ+Χ 固子付’即第4個字符至第6個字符:「4(:9」,以形成一 201228326 幀結束樣式之字符圖44 ;及 (305)該驗證伺服器2〇將前述複數幀字符圖41、犯、43、製 作成一動態圖形驗證碼,在本較佳實施例中,該動態圖形 驗證碼為-GIF (Graphics lnterchange ,圖形交 換格式)檐案’ gif播案的體積小而成像相對清晰,在實 際上是-種壓縮錢,採用LZW壓縮演算法進行編碼,能 有效地減少標案在網路上傳輸的時間,故目前阳樓案^ 廣泛應用於網路傳輸的影像格式之一。 、‘''' 當該驗證舰n 2G完祕述祕圖形驗證碼的製作程序後, 便將該動_形驗證碼傳送至該_裝置21,使得該動態圖形驗 證碼能在-默時_,以賴的方式依序顯示各辭符圖Μ、 42、43、44 _容提的是,在本較佳實施例中該驗 證舰器20在製作動態圖形驗證碼,係依照字符圖41、字 42、字符圖43、字符圖44、字符圖43、字符圖42 _序製作動 顏形驗證碼,如此,#該動_形驗證碼在依序循環顯示各該 字符圖41、42、43、44的内容,會呈現出如左右移動跑馬燈的效 果。惟’本發明並不以此為限,該驗證舰謂在製作動綠圖形 驗證碼,亦可僅依照字符圖4卜字符圖42、字符圖43、字符圖 44的順序製作動態圖形驗證碼,使該動態圖形驗證賴環顯示各 該字符圖4卜42、43、44,亦能達成相#的效果。 藉由本發明之技術雛,當使財透過該終端裝置Μ接收該 動態圖形驗證碼後,便能在該預定時間内,觀看_驗證密碼4 的所有字符’並輯⑽識出顧證密碼4的魄,而將該驗證 密碼4輸入該終端裝置21,如此,該終端裝置21即可將使用者輸 201228326 入的驗證密碼4轉至該驗證舰㈣,騎該終職置21順利 通過該驗證贿ϋ 2G _雜序。林發财,由於該驗證词服 益20製作出的動態圖形驗證碼*會在同一時間完全顯示出該驗證 f碼4,而僅會顯示出部分字符,因此,縱令有不肖人士欲利用惡 意,式的影像顺舰,透賴取並分彡像的方式,解析出驗 證密碼4的内容,由於影細識所娜的影像只包含部分字符, ,無法完整分糾整個驗_ 4 _容,故财效防止惡意程 問題。再者’正由於本發明能有效防制前 "解手法’因此,當該驗證舰器2〇在製作各該字符圖 4|、42、43、44時’即無須添加過多的嗓點或噪線,亦無須對圖 形進行扭曲等處理’如此,不餅低侧者的_賊,減少使 =者辨認錯誤的可紐’更能減少賴者輸端誤後,驗證祠服 Γ^Ο必須重新執行驗證程序的情形’大幅降低驗證服器的 負荷。 此外’在本發明t,該驗證錬器20在產生初始樣式及結束 財之字符圖時,亦可增添部分特徵,以提高__驗證碼的 可讀!·生在本發明之第二較佳實施例中,請參閱第2、5圖所示, 該驗證傭器2G係在該初始樣式之字符圖仙的左端,亦即鄰近 :第二個字符「A」的位置增添-起點標記5G,如:-字體較小的 」字符准’本發明並不以此為限,業者在根據本發明設計該 -飼服E 20的程柄,亦可改魏触標記%的樣式 ,例如: 字起點標記50的樣式變更為其他_,凡本技術領域之人士所能 ^。及之父化’均應涵蓋在本發明之專利細内。不僅如此, 设清參閱第5騎示’該驗㈣2〇亦可在產生該絲樣式之 12 201228326 ,,圖44a時,在該結束樣式之字符圖拖中,鄰近最後一個字 符9」的位置增添一終點標記5丨,該終點標記μ亦為「*」字符。 藉此,使用者在觀看該動態圖形驗證媽時,便能更清楚掌握該動 態圖形驗證碼的起點與終點,而能順利判斷出該動態圖形驗證 的内容。 再者’請參閱第2、6圖所示,在本發明之第三較佳實施例中, 該驗證舰器20在擷取該驗證密碼4的第!個字符至第3個字 符’以形成該初始樣式之字符圖41b時,可在該初始樣式之字符 圖41b巾’鄰近該第一個字符「A」的位置增添一預定寬度的起點 空白區域60,並將該起點空白區域6〇的寬度設定為一個字符的寬 度,且該驗證伺服器2〇在擷取該驗證密碼4的第4個字符至第6 個字符’以形成結束樣式之字符圖44b時,在該結束樣式之字符 圖44b中’鄰近最後-個字符「9」的位置增添一終點空白區域 且亦將該終點空白區域61的寬度設定為一個字符的寬度,如此, 使用者便能藉由該起點空白區域60及該終點空白區域61,分別辨 # 識出該動態圖形驗證碼的起點與終點,有效避免使用者辨識錯誤 4問題發生。 按,以上所述,僅為本發明之若干較佳實施例,惟本發明之 技術特徵並不侷限於此,凡任何熟悉該項技藝者,在本發明之技 術領域内,可輕易思及的變化或修飾,皆應涵蓋在以下本發明的 申請專利範圍中。 【圖式簡單說明】 第1圖係一習知之圖形驗證碼之示意圖; 13 201228326 第2圖係本發崎翻之驗·㈣與_終端裝置之關係示 第3圖係本發明之第—較佳實關之流程圖; 第4圖係本發明之第—較佳實_之驗難碼與各字 土 圖; 思 第5圖係本發%之帛二較佳實施彳狀驗證密碼與各轉圖 土 圖;及 不思 第6圖係本㈣之帛三較佳實施彳狀驗證密碼與各字符圖之 圖。 吓Γ思 【主要元件符號說明】 驗證伺服器 終端裝置 網路 驗證密碼 初始樣式之字符圖 連續樣式之字符圖 結束樣式之字符圖 起點標記 終點標記 起點空白區域 終點空白區域 20 2122 4 4 卜 41a、41b 42、43 44、44a、44b 50 51 60 61Apart) is an automatic program that distinguishes between computers and humans. In the (10) observation meeting, 'the verification server will automatically generate a problem and provide the problem to the user, r. According to the user's answer, the user will answer the computer. Or human. At present, the most common and convenient CAPTCHA test method is the verification method using the eye shape verification code. a undertakes 'current graphics verification code technology is more commonly used in the field of web services, = users (personal households) _ - terminal devices rely on, want to access special::::::::^^ The server will randomly select a plurality of characters, such as: text, number 201228326 words and symbols, and arrange the characters to verify the password, and generate a graphic verification code according to the verification password, please refer to Figure 1. It is shown that the verification code generated by the verification server is "90429628", and the figure shown in Fig. 1 is the verification code generated by the verification server, and the verification ship is generating the verification code! After that, the graphic verification code is transmitted to a terminal device, and the user is required to input the verification password "9〇429628" according to the graphic verification code, so that the terminal device can return to the verification feeding device. After the verification password "9〇429628", the specific data is accessed by the verification program of the inspection service 15. In the past, since the technique of image recognition has not yet matured, the computer (i.e., the aforementioned terminal device) cannot automatically recognize the content of the graphic verification code 1 and cannot automatically pass the verification program of the verification server. However, with the advancement of image recognition technology, various kinds of malicious programs with image recognition functions (such as: RQbQts, Spiral (10) top) are more and more powerful, and their image recognition is correct. The sex is much higher than before, and therefore some people who are unscrupulous are trying to use the above-mentioned malicious programs, and want the terminal device to automatically pass the verification procedure of the ride. #验证船财 produces the graphic verification code 1, and after the concurrent _ verification code is transmitted to the terminal device, the terminal device automatically records the graphic verification code 藉 by the malicious program, and analyzes the _ verification^ The content of 1 '嗣' can be used by the terminal device to automatically input the graphic verification code 1 _ 容 ', and the shed clerk verifies the 杂 n misf(10), and accesses the specific data 'to make the graphic verification code! The verification mechanism cannot effectively distinguish the computer from human beings, but it is not ideal. In addition, at present, the big _ 2 will have a large number of threat access actions, such as downloading files in large quantities, and it will also load the ship II connected to the test server. 201228326 In view of the above _, in order to prevent malicious programs from automatically completing the verification process, the industry changes the way the verification server generates the _ verification code, so as to complicate the graphics verification, for example, the verification of the ship is generating _ verification rhyme, the verification Adding a lot of noise, noise lines or #景, even processing such as image twisting to improve the complexity of the graphics verification code. In the figure j, the verification ship β generates the verification code 1 and the partial characters of the face code are partially overlapped, so that the image of the malicious program cannot be positive. The content of the verification password is Reduce, the success rate of the program, and the ability to resist some of the malicious programs, so that malicious programs can not function properly, _ to avoid the occurrence of the above problems 'but this - the practice will be greatly reduced _ verification code 丨The readability makes it impossible for the user (human user) to easily recognize the content of the graphic verification code, which seriously reduces the recognition accuracy rate of the user, and increases the possibility of the user recognizing the error. In this way, when the money recognizes the wrong material of the wrong person, the verification ship must re-listen to the line program 're-selling the money-__彡 verification code, and send it to the final Wei'. The _, the burden of more serious verification of the ship 'is very unsatisfactory. Therefore, 'how to improve the number of conventional graphics verification codes _, in order to prevent the automatic identification of the image recognition technology of the malicious studio without reducing the user identification accuracy rate, is the case for the present invention. Question. SUMMARY OF THE INVENTION In view of the many problems mentioned above, the inventors have made long-term efforts and experiments to "finally develop and design a method for generating dynamic graphic verification codes by using the character arrangement method of the present invention" to prevent unscrupulous malicious programs from automatically completing the verification program. And reduce the difficulty of 201228326 = the listener, listen to the repeated Wei mine, the negative purpose of the singularity, the system provides a dynamic picture of the kind of marriage character paste method - the method is applied to a verification server, when After verifying the client-access request (such as the web page read request and the floor 2 download request), the verification feeder can randomly generate N characters (such as: number, etc.). - verify the password, and the verification device can fetch = (four), the first character of the code to the gamma character, the Qing Cheng - touch style = map, where the system is less than Ν; 嗣, the verification clothing The device can operate the verification password ^ the second character to the third character + the first character to form a continuous pattern of character maps, the initial value of t X is not greater than γ; thereafter, the verification server will be defective The value is one, And repeat the above steps, (10) into the character pattern of the next-mirror pattern; until the example ^ verification server can verify the (10) character of the (4) to the ke = character 'to form - the style of the 齢 bundle style Finally, the verification ship will generate the __ verification code on the other side, and transmit the Wei state graphic verification code to the miscellaneous device so that the (4) (4) _ verification code can be moved in the predetermined time. The contents of each character map are displayed in sequence. In this way, since the dynamic graph=verification code only displays (four) sub-characters in the same time, the malicious program method completely analyzes the entire password _ volume, so the verification process cannot be completed automatically' not only effectively solves the problem. It can reduce the possibility of users identifying errors. The other purpose of this month is that the verification server retrieves the verification password from the == to the γth character. When the initial pattern is used, the character of the initial style is checked. In the figure, the position 201228326 adjacent to the first character is added with a dot mark 'so that the user can recognize the starting point of the dynamic graphic verification code, and improve the readability of the dynamic graphic verification code. A further object of the present invention is that the verification server captures the first character to the yth of the verification password to form a character _ of the initial pattern, which is adjacent to the character pattern of the initial pattern. The position of the first character is added—the starting point blank area' so that the user can recognize the starting point of the dynamic graphic verification code to avoid user identification errors. Another object of the present invention is that when the verification ship generates the character map of the ending style, the character of the ending style is added, and the end mark is added adjacent to the last-clear character, and the reading user can recognize (4) The end point of the _-shaped verification code to improve the readability of the dynamic graphic verification code. The re-purpose of the present invention is that when the character map of the end pattern is generated, the end point "area" is added to the position pattern of the end pattern in the character pattern of the end pattern, so that the user The end point of the dynamic graphic verification code can be easily recognized, and the user can be prevented from recognizing errors and the like. For the sake of the examination committee, the purpose, structure and efficacy of the present invention can be further understood and understood. The detailed description is as follows: [Embodiment] In the inventor's research and development process in the related fields such as the long-term verification system, the inventor found that the current complicated and low-level graphic verification code cannot prevent most of the knowledge functions, €, Yicai, *Small test shirt Xiao people carefully shadow analysis ^ graphics verification code _ Rong 'to prevent malicious programs to automatically complete the verification process ^ verification code is complicated, such as · increase a lot of noise, noise lines, distortion graphics, etc., will = 201228326 into graphics The readability of the verification code is greatly reduced, which seriously affects the user's recognition accuracy rate. Most of the current operators want to improve the graphics verification code to Solving the above problems, but still has not got a proper solution. In view of this, the inventor thinks and uses the arrangement of characters to generate dynamic graphic verification code, so as to reach the saga without detracting from the readable graphics code (4). The invention is a method for generating a dynamic graphic verification code by using a character arrangement method, as shown in FIG. 2, in the first preferred embodiment of the present invention, the method is applied to the verification servo. On the device 20, a terminal device 21 is connected to the verification device 2 through the network 22 (internet or zone_road). The verification server 20 is not limited to having only verification function. The verification server 2 can also have the functions of a web page feeder or a slot server, or the verification ship 2 can be connected with a webpage servo H or a file server, when the terminal The device 21 passes the verification servo II 2G _ to verify the process, and Weihu (4) 2G allows the terminal device 21 to access the information on the fine-page ship or the file server (eg, webpage, building case, etc.) Easy in the art The variation of the invention is not limited to the technical scope to be protected by the present invention. In the preferred embodiment, the user connects to the network 22' through the browsing Is of the terminal device 21 and wants to After the verification by the verification server 2〇, the terminal device 21 downloads the file (or reads the web page), in which case the terminal device 21 transmits an access to the verification server 20. The request, the access request is a slot download request (or web page read request) 'to indicate that the terminal device wants to download or read the web page after verification by the verification server 20. In this case, when the verification server 20 receives the access request from the terminal device 21, please refer to the figures 2 to 4, the verification server 2 generates a dynamic graphic verification according to the following steps: 201228326 The code is such that the verification server 20 can perform the verification process subsequently: (300) the verification server 20 randomly generates a verification password consisting of N characters (eg, characters, numbers, symbols, etc.). In the embodiment, N = 6, so the verification password is 4 packets. 6 characters are included. Please refer to FIG. 4, the content of the verification password 4 is "A2B4C9"; (301) the verification server 20 retrieves the first character to the gamma character of the verification password 4, Forming a frame of the initial pattern of the character map 41, where γ is less than N, and in the preferred embodiment, 'Y=3', so the verification feeder 2 will take the first character of the verification code 4 to The third character, that is, "Α2β", to form the initial pattern of the character map 41; (302) the verification server 20 retrieves the first character of the verification password 4 to form, the continued pattern of the word two 42 = initial value No more than Υ. In the preferred embodiment, the initial value of χ is i, so the verification server 20 retrieves the second character to the fourth character of the bribe password 4, that is, "2B4" to form Character of continuous pattern Figure 42; (Net) The verification feeder 20 accumulates the value of X so that the value of X becomes 2, and the ship feeder takes the 1+th character of the verification password 4 to The first γ + χ child pays 'that is the third character to the fifth character: "", to form another frame continuous pattern of characters Figure 43; (3 〇 4) the verification feeder 20 will X The value of the value is incremented by one, so that the value of X becomes 3. At this time, Η ' X=3 ' and Χ + γ = 6, that is, χ + γ = Ν, in this case, the verification ^ 20 will perform the verification. The mth character of the password 4 to the Υ+Χ 固子付', the 4th character to the 6th character: "4 (:9), to form a character of the 201228326 end-of-frame style picture 44; and (305) The verification server 2 is configured to generate the dynamic frame verification code into a dynamic frame verification code. In the preferred embodiment, the dynamic graphics verification code is -GIF (Graphics lnterchange). The case of 'gif' is small in size and relatively clear in imaging. In fact, it is a kind of compressed money, which is encoded by LZW compression algorithm, which can effectively reduce the time for the transmission of the standard on the network. One of the image formats used for network transmission. After the verification ship n 2G completes the production process of the secret verification code verification code, the dynamic verification code is transmitted to the device 21 so that the dynamic graphic verification code can be in the silent state _ In the preferred embodiment, the verification ship 20 is in the process of producing a dynamic graphic verification code according to the character figure 41. Word 42, character map 43, character map 44, character map 43, character map 42 _ sequence to create a shape verification code, so, #动动_ verification code sequentially displays each of the character maps 41, 42, 43 The contents of 44 will show the effect of moving the marquee left and right. However, the present invention is not limited thereto. The verification ship is said to be producing a green graphic verification code, and the dynamic graphic verification code may be produced only in the order of the character picture 4, the character picture 43, and the character picture 44. The effect of the phase # can also be achieved by causing the dynamic graphics verification to display the respective character maps 4, 42, 43, and 44. According to the technology of the present invention, after receiving the dynamic graphics verification code through the terminal device, the characters of the verification password 4 can be viewed and the password (4) of the authentication password 4 can be recognized within the predetermined time.魄, the verification password 4 is input to the terminal device 21, so that the terminal device 21 can transfer the verification password 4 input by the user to 201228326 to the verification ship (4), and ride the final position 21 to successfully pass the verification bribe. ϋ 2G _ miscellaneous. Lin Facai, because the dynamic graphic verification code* produced by the verification word benefit 20 will display the verification f code 4 at the same time, and only some characters will be displayed. Therefore, there are unscrupulous people who want to use malicious The image is carried out by the ship, and the content of the verification password 4 is parsed by means of taking and dividing the image. Since the image of the image is only partially contained, it is impossible to completely correct the whole test _ 4 _, so the financial effect Prevent malicious problems. Furthermore, 'because the present invention can effectively prevent the pre-"solution method, therefore, when the verification ship 2 is making the characters 4|, 42, 43, 44', it is not necessary to add too many defects or Noise lines, there is no need to deal with the distortion of the graphics, etc. 'So, the _ thief of the low side of the cake, reduce the number of people who can identify the wrong one can reduce the loss of the stalker, verify the 祠 service Γ ^ must The situation of re-executing the verification program 'significantly reduces the load on the verification server. In addition, in the present invention, the verification buffer 20 may add some features when generating the initial pattern and the ending character map to improve the readability of the __ verification code! In the embodiment, as shown in the second and fifth figures, the verification commission 2G is at the left end of the character pattern of the initial pattern, that is, adjacent to: the position of the second character "A" is added - the starting point mark 5G, For example: - the font is smaller, the character is not limited to this invention. In the design of the handle of the feeding suit E 20 according to the present invention, the style of the Wei touch mark can also be changed, for example: The style of the mark 50 is changed to other _, which can be used by those skilled in the art. And the father's should be covered in the patents of the present invention. In addition, the reference to the fifth riding show 'the test (four) 2 〇 can also be generated in the silk pattern 12 201228326, Figure 44a, in the end of the character map drag, adjacent to the last character 9" position added At the end point mark 5 丨, the end point mark μ is also a "*" character. Thereby, when the user views the dynamic graphic verification mother, the user can more clearly grasp the start point and the end point of the dynamic graphic verification code, and can smoothly determine the content of the dynamic graphic verification. Further, please refer to FIGS. 2 and 6. In the third preferred embodiment of the present invention, the verification ship 20 is in the process of capturing the verification password 4! When the character to the third character 'to form the character pattern 41b of the initial pattern, a starting point blank area 60 of a predetermined width may be added to the position of the character pattern 41b of the initial pattern adjacent to the first character "A". And setting the width of the starting blank area 6〇 to the width of one character, and the verification server 2 is capturing the 4th character to the 6th character of the verification password 4 to form a character pattern of the ending style At 44b, a position blank area is added to the position adjacent to the last character "9" in the character pattern 44b of the end pattern, and the width of the end blank area 61 is also set to a character width, so that the user The start point and the end point of the dynamic graphics verification code can be identified by the start blank area 60 and the end blank area 61, thereby effectively avoiding the problem of the user identification error 4. The above description is only a few preferred embodiments of the present invention, but the technical features of the present invention are not limited thereto, and any one skilled in the art can easily think of it in the technical field of the present invention. Variations or modifications are intended to be included in the scope of the claims of the invention below. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a schematic diagram of a conventional graphical verification code; 13 201228326 Fig. 2 is a test of the present invention. (4) Relationship with the _terminal device Fig. 3 is the first embodiment of the present invention. The flow chart of Jiashiguan; the fourth picture is the test code of the first-best practice of the present invention and the soil map of each word; the fifth figure is the best implementation of the present invention. Turning to the soil map; and not thinking about Figure 6 is the best implementation of this (4) verification password and the diagram of each character map. Scared thinking [main component symbol description] Verification server terminal device network verification password initial pattern character diagram continuous style character diagram end style character map start point mark end mark start point blank area end point blank area 20 2122 4 4 Bu 41a, 41b 42, 43 44, 44a, 44b 50 51 60 61