Home Web Front-end JS Tutorial jQuery plug-in implements static HTML verification code verification_jquery

jQuery plug-in implements static HTML verification code verification_jquery

May 16, 2016 pm 03:33 PM
jquery

jQuery was created by American John Resig. It is a fast and concise JavaScript library that provides many traversal functions, such as each(fn). jQuery can keep the code and HTML content of the user's HTML page separated. That is to say, there is no need to insert a bunch of js in the HTML to call the command. You only need to define the id. It is these operational characteristics that allow users to easily process HTML documents, events, implement animation effects, and easily provide interactions for websites. Today, jQuery has attracted many JavaScript experts from all over the world to join.

The jQuery Real Person Plugin we are going to talk about here is a jQuery verification code plug-in written entirely in JavaScript.

jQuery Real Person Plugin mainly implements two verification methods: letters and mixed letters and numbers, which can effectively prevent automatic submission form. Its appearance display provides customization functions. The default is 6-digit letters, as shown in Figure 1.

According to needs, you can also customize an 8-digit verification code, as shown in Figure 2.

Or a mixed alphanumeric verification code, as shown in Figure 3.

In addition, users can also customize the text at the bottom, as shown in Figure 4.

Seeing these unique and powerful verification interfaces, can we implement them ourselves? The answer is yes. Below, we will analyze the verification process of jQuery Real Person Plugin through step-by-step explanation.
Step 1, before using this verification function, introduce JavaScript and CSS files.

<script type="text/JavaScript" src="Scripts/jquery-1.3.2.js"></script>
<script type="text/JavaScript" src="Scripts/jquery.realperson.js"></script>
<style type="text/css">@import "Styles/jquery.realperson.css";</style>
Copy after login

In the above code, line 1 introduces the jQuery class library. You can download the latest jQuery class library from the official website. Line 2 introduces the verification code plug-in library jquery.realperson.js. Line 3 introduces the verification code style file jquery.realperson.css. The website interface is shown in Figure 5.

Step 2, put the text box element into the page, which is the HTML part.

<table>
<tr>
<td><input type="text" id="txtValidate" name="defaultReal"></td>
</tr>
<tr>
<td><asp:Button ID="btnSubmit" runat="server" Text="登录" /></td>
</tr>
</table>
Copy after login

In the above code, line 1 uses two rows and one column for layout, one row is used to store the text box, and one row is used to store the login button. Line 3 defines the text box with id="txtValidate" for entering the verification code. Line 6 defines the submit button with id="btnSubmit", which is used to trigger background events to log in to the system.
Step 3: When the page is initialized, call the verification code plug-in to initialize the verification code display.

<script>
$(document).ready(function () {
$("#txtValidate").realperson({ length: 5 });
}
);
</script>
Copy after login

In the above code, the second line is the operation performed when the page is loaded, which is equivalent to the onLoad event of the page. Line 3 calls the interface of the verification code control to display the verification code.
Step 4, core code analysis.

/* 核心代码
@param target (jQuery) the input field
@param inst  (object) the current instance settings
@return (string) the additional content */
_generateHTML: function(target, inst) {
var text = '';
for (var i = 0; i < inst.settings.length; i++) {
text += CHARS.charAt(Math.floor(Math.random() *
(inst.settings.includeNumbers &#63; 36 : 26)));
}
 var html = '<div class="realperson-challenge"><div class="realperson-text">';
 for (var i = 0; i < DOTS[0].length; i++) {
 for (var j = 0; j < text.length; j++) {
 html += DOTS[CHARS.indexOf(text.charAt(j))][i] + ' ';
}
html += '\n';
}
html += '</div><div class="realperson-regen">' + inst.settings.regenerate +
'</div></div><input type="hidden" class="realperson-hash" name="' +
inst.settings.hashName.replace(/\{n\}/, target.attr('name')) +
'" value="' + this._hash(text) + '">';
return html;
Copy after login

In the above code, lines 7 to 9 are used to generate random characters of the verification code. Lines 12 to 22 are used to assemble background characters and random characters into HTML code and output it to the browser.

Through the above analysis, we can see that verification codes play a very important role in password security. Thinking of bank account security issues, for example, a hacker obtains a bank account through other means and then opens the login interface of its online banking. Use the method of viewing the source code in the browser to analyze the HTML code of the login interface. It is found that there is no verification code and no other security settings in the page. Only the HTTP protocol is used. The hacker is delighted, so he can use a program to simulate the browser's request. The bank server submits the account and password. The password is usually a 6-digit Arabic numeral, and the possibility of a correct password is 10 to the 6th power, which is 1 million times. A hacker will find a high-performance, high-bandwidth computer and run a program to extract bank passwords. Assuming that this computer can test 10 passwords in one second, it will take 100,000 seconds (that is, 27 hours, about a day) Run through all the passwords. In fact, it won't take that long for the hacker to steal the password, and the money in the bank account will be transferred. In other words, if there is no verification code, hackers can easily obtain illegal income in a day or so by using the program to obtain bank passwords.

In practical applications, the Chinese character verification code is also a relatively common verification code. Its principle is: randomly select several Chinese characters from a Chinese character set, generate a picture and stream it to the page through HTTP output. If the client enters correct Chinese characters, the operation can continue, otherwise login is prohibited. China has five thousand years of history, a vast and profound culture, and more than 90,000 Chinese characters. Compared with the 10-digit numerical verification code and the 26-character alphabetical verification code, the Chinese character verification code is more secure. Therefore, through the study of verification code security, we can better appreciate the profoundness of Chinese culture. It turns out that password verification can also be played in this way!

The above is the entire content of this article, I hope it will be helpful to everyone’s study.

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Detailed explanation of jQuery reference methods: Quick start guide Detailed explanation of jQuery reference methods: Quick start guide Feb 27, 2024 pm 06:45 PM

Detailed explanation of jQuery reference method: Quick start guide jQuery is a popular JavaScript library that is widely used in website development. It simplifies JavaScript programming and provides developers with rich functions and features. This article will introduce jQuery's reference method in detail and provide specific code examples to help readers get started quickly. Introducing jQuery First, we need to introduce the jQuery library into the HTML file. It can be introduced through a CDN link or downloaded

How to use PUT request method in jQuery? How to use PUT request method in jQuery? Feb 28, 2024 pm 03:12 PM

How to use PUT request method in jQuery? In jQuery, the method of sending a PUT request is similar to sending other types of requests, but you need to pay attention to some details and parameter settings. PUT requests are typically used to update resources, such as updating data in a database or updating files on the server. The following is a specific code example using the PUT request method in jQuery. First, make sure you include the jQuery library file, then you can send a PUT request via: $.ajax({u

In-depth analysis: jQuery's advantages and disadvantages In-depth analysis: jQuery's advantages and disadvantages Feb 27, 2024 pm 05:18 PM

jQuery is a fast, small, feature-rich JavaScript library widely used in front-end development. Since its release in 2006, jQuery has become one of the tools of choice for many developers, but in practical applications, it also has some advantages and disadvantages. This article will deeply analyze the advantages and disadvantages of jQuery and illustrate it with specific code examples. Advantages: 1. Concise syntax jQuery's syntax design is concise and clear, which can greatly improve the readability and writing efficiency of the code. for example,

How to remove the height attribute of an element with jQuery? How to remove the height attribute of an element with jQuery? Feb 28, 2024 am 08:39 AM

How to remove the height attribute of an element with jQuery? In front-end development, we often encounter the need to manipulate the height attributes of elements. Sometimes, we may need to dynamically change the height of an element, and sometimes we need to remove the height attribute of an element. This article will introduce how to use jQuery to remove the height attribute of an element and provide specific code examples. Before using jQuery to operate the height attribute, we first need to understand the height attribute in CSS. The height attribute is used to set the height of an element

jQuery Tips: Quickly modify the text of all a tags on the page jQuery Tips: Quickly modify the text of all a tags on the page Feb 28, 2024 pm 09:06 PM

Title: jQuery Tips: Quickly modify the text of all a tags on the page In web development, we often need to modify and operate elements on the page. When using jQuery, sometimes you need to modify the text content of all a tags in the page at once, which can save time and energy. The following will introduce how to use jQuery to quickly modify the text of all a tags on the page, and give specific code examples. First, we need to introduce the jQuery library file and ensure that the following code is introduced into the page: &lt

Use jQuery to modify the text content of all a tags Use jQuery to modify the text content of all a tags Feb 28, 2024 pm 05:42 PM

Title: Use jQuery to modify the text content of all a tags. jQuery is a popular JavaScript library that is widely used to handle DOM operations. In web development, we often encounter the need to modify the text content of the link tag (a tag) on ​​the page. This article will explain how to use jQuery to achieve this goal, and provide specific code examples. First, we need to introduce the jQuery library into the page. Add the following code in the HTML file:

Understand the role and application scenarios of eq in jQuery Understand the role and application scenarios of eq in jQuery Feb 28, 2024 pm 01:15 PM

jQuery is a popular JavaScript library that is widely used to handle DOM manipulation and event handling in web pages. In jQuery, the eq() method is used to select elements at a specified index position. The specific usage and application scenarios are as follows. In jQuery, the eq() method selects the element at a specified index position. Index positions start counting from 0, i.e. the index of the first element is 0, the index of the second element is 1, and so on. The syntax of the eq() method is as follows: $("s

How to tell if a jQuery element has a specific attribute? How to tell if a jQuery element has a specific attribute? Feb 29, 2024 am 09:03 AM

How to tell if a jQuery element has a specific attribute? When using jQuery to operate DOM elements, you often encounter situations where you need to determine whether an element has a specific attribute. In this case, we can easily implement this function with the help of the methods provided by jQuery. The following will introduce two commonly used methods to determine whether a jQuery element has specific attributes, and attach specific code examples. Method 1: Use the attr() method and typeof operator // to determine whether the element has a specific attribute

See all articles