Font Size: a A A

Verification Code Identification And Counter-identification

Posted on:2008-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:M XuFull Text:PDF
GTID:2208360215498003Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet , more and more enterprises, schools, hospitals and government departments are connected into the Internet world, our life and work are becoming increasingly dependent on the Internet. Information security problems is increasing, getting more and more pronounced. Yahoo, Google and hotmail have devoted a lot of manpower and resources to study the Validate Code generation technology, in order to enhance the safety and anti-attack capability. Carmegie Mellon University (CMU), Xerox Palo Alto Research Center (PARC) are also doing related research and work. Then, the Validate Code application appears, but can it really safeguard these internet systems? This paper on the Validate Code in maintaining the effectiveness of security systems made discussed.This work is mainly reflected in the following aspects :the development of Validate Code.Verification code classification according to the interference added on. Selected some of 'the more representative test of the identification code to do the test,. These demonstrated that the existing tValidate Code is not an effective guarantee for the safety of the system.Finally, two new Validate Codes are provited , the new Validate Codes can effectively prevent attacks, and have a certain value of popularization and application.
Keywords/Search Tags:Validate code, recognition, character, network security, segmentation
PDF Full Text Request
Related items