Verification code generation to improve recognition accuracy by a person and recognition difficulty by a computer program
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving a verification request;
in response to receiving the verification request;
obtaining a first character string, wherein the first character string comprises one or more variable characters, wherein the first character string is a first instruction to perform one or more operations;
replacing, based on a plurality of pre-established corresponding relationships, at least one of the one or more variable characters in the first character string with at least one backup character to generate a second character string, wherein a replaced variable character of the at least one of the one or more variable characters in the first character string and a corresponding backup character of the at least one backup character are homophonous characters or synonymous characters, and the second character string is a second instruction to perform the one or more operations;
generating a verification code based on the second character string; and
displaying the verification code and an input area corresponding to the verification code, wherein the input area includes a plurality of selectable items, and the verification code instructs a user to select one or more selectable items from the plurality of selectable items;
receiving a user input corresponding to the verification code in the input area; and
verifying the user corresponding to the verification request based on the user input.
3 Assignments
0 Petitions
Accused Products
Abstract
A verification request is received. In response to receiving the verification request, a first character string is obtained. The first character string comprises one or more variable characters. At least one of the one or more variable characters in the first character string is replaced with at least one backup character to generate a second character string based on multiple pre-established corresponding relationships. A verification code is generated based on the second character string. A user corresponding to the verification request is verified based on a user input corresponding to the verification code.
0 Citations
17 Claims
-
1. A computer-implemented method, comprising:
-
receiving a verification request; in response to receiving the verification request; obtaining a first character string, wherein the first character string comprises one or more variable characters, wherein the first character string is a first instruction to perform one or more operations; replacing, based on a plurality of pre-established corresponding relationships, at least one of the one or more variable characters in the first character string with at least one backup character to generate a second character string, wherein a replaced variable character of the at least one of the one or more variable characters in the first character string and a corresponding backup character of the at least one backup character are homophonous characters or synonymous characters, and the second character string is a second instruction to perform the one or more operations; generating a verification code based on the second character string; and displaying the verification code and an input area corresponding to the verification code, wherein the input area includes a plurality of selectable items, and the verification code instructs a user to select one or more selectable items from the plurality of selectable items; receiving a user input corresponding to the verification code in the input area; and verifying the user corresponding to the verification request based on the user input. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
receiving a verification request; in response to receiving the verification request; obtaining a first character string, wherein the first character string comprises one or more variable characters, wherein the first character string is a first instruction to perform one or more operations; replacing, based on a plurality of pre-established corresponding relationships, at least one of the one or more variable characters in the first character string with at least one backup character to generate a second character string, wherein a replaced variable character of the at least one of the one or more variable characters in the first character string and a corresponding backup character of the at least one backup character are homophonous characters or synonymous characters, and the second character string is a second instruction to perform the one or more operations; generating a verification code based on the second character string; and displaying the verification code and an input area corresponding to the verification code, wherein the input area includes a plurality of selectable items, and the verification code instructs a user to select one or more selectable items from the plurality of selectable items; receiving a user input corresponding to the verification code in the input area; and verifying the user corresponding to the verification request based on the user input. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; receiving a verification request; in response to receiving the verification request; obtaining a first character string, wherein the first character string comprises one or more variable characters, wherein the first character string is a first instruction to perform one or more operations; replacing, based on a plurality of pre-established corresponding relationships, at least one of the one or more variable characters in the first character string with at least one backup character to generate a second character string, wherein a replaced variable character of the at least one of the one or more variable characters in the first character string and a corresponding backup character of the at least one backup character are homophonous characters or synonymous characters, and the second character string is a second instruction to perform the one or more operations; generating a verification code based on the second character string; and displaying the verification code and an input area corresponding to the verification code, wherein the input area includes a plurality of selectable items, and the verification code instructs a user to select one or more selectable items from the plurality of selectable items; receiving a user input corresponding to the verification code in the input area; and verifying the user corresponding to the verification request based on the user input. - View Dependent Claims (14, 15, 16, 17)
-
Specification