Home Java javaTutorial Analysis of detailed steps for generating verification code in java

Analysis of detailed steps for generating verification code in java

May 03, 2017 pm 02:03 PM

This article mainly introduces in detail the steps to generate verification code in Java. Friends who need it can refer to

1, serialVersionUID

    private static final long serialVersionUID = -8501285780349046114L;
Copy after login

Java The serialization mechanism verifies version consistency by judging the serialVersionUID of the class at runtime.

Equivalent to the Java ID card. Mainly used for version control.

2. BufferedImage class

——BufferedImage subclass describes an Image with an accessible image data buffer.

TYPE_INT_RGB

Represents an image that has 8-bit RGB color components synthesized into integer pixels.

——getGraphics()

This method returns Graphics2D, but this is for backward compatibility reasons.

3. request.getParameter()

The data passed by the request.getParameter() method will be passed from the Web client to the Web server, representing HTTP request data.

The request.getParameter() method returns String type data.

4. String... excludeProperty represents variable parameters, that is, multiple String objects can be passed in when calling this method (variable parameters: suitable for uncertain number of parameters) , when the type is determined, java treats the variable parameters as an array

Note: The variable parameters must be located in the last item eg: private String drawRandomNum(Graphics2D g,String... createTypeFlag))

5. Graphics class

The Graphics class is the abstract base class for all graphics contexts, allowing applications to perform operations on components (already implemented on various devices) and off-screen images. draw.

[Steps]:

1. Create a picture in the memory;

  BufferedImage bi = new BufferedImage(WIDTH,HEIGHT,BufferedImage.TYPE_INT_RGB);
Copy after login

——BufferedImage subclass describes an Image with an accessible image data buffer.​ ​ ​​

——getGraphics()

This method returns Graphics2D, but this is for backward compatibility reasons.


2. Get the picture;

        Graphics g = bi.getGraphics();
Copy after login
3. Set the background color of the picture;

        setBackGround(g);
Copy after login

4. Set the background color of the picture Border;

        setBorder(g);
Copy after login

5. Draw interference lines on the picture;

        drawRandomLine(g);
Copy after login

6. Write random numbers on the picture;

        String random = drawRandomNum((Graphics2D) g,createTypeFlag);//根据客户端传递的createTypeFlag
Copy after login

7. Store random numbers in the session;

        request.getSession().setAttribute("checkcode",random);
Copy after login

8. Set the response header to notify the browser to open it as a picture;

        response.setContentType("image/jpeg");//等同于res[onse.setHeader("Content-Type","image/jpeg");
Copy after login

9. Set the response header to control browsing Do not cache the server;

  response.setDateHeader("expries",-1);
  response.setHeader("Cache-Control","no-cache");
  response.setHeader("Pragma","no-cache");
Copy after login

——setDateHeader

    public void setDateHeader(java.lang.String name,long date)
Copy after login

Parameters:

name - the name of the header to set

date - the assigned date value

——setHeader

            public void setHeader(java.lang.String name, java.lang.String value)
Copy after login

Parameters:


name - the name of the header

                    value - the header value If it contains octet string, it should be encoded according to RFC 2047 (http://www.ietf.org/rfc/rfc2047.txt)

10. Write the image to the browser;

        ImageIO.write(bi,"jpg",response.getOutputStream());
Copy after login
——Parameters:

im - the RenderedImage to be written.

                                                                                                                                          formatName - A String containing the informal name of the format.

# Output -OutputStream will be written into the data.

throwing:

# illegalargumentexception -If any parameter is NULL.

            IOException - if an error occurs during writing. ​

The above is the detailed content of Analysis of detailed steps for generating verification code in java. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Mandragora: Whispers Of The Witch Tree - How To Unlock The Grappling Hook
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1677
14
PHP Tutorial
1280
29
C# Tutorial
1257
24
Composer: Aiding PHP Development Through AI Composer: Aiding PHP Development Through AI Apr 29, 2025 am 12:27 AM

AI can help optimize the use of Composer. Specific methods include: 1. Dependency management optimization: AI analyzes dependencies, recommends the best version combination, and reduces conflicts. 2. Automated code generation: AI generates composer.json files that conform to best practices. 3. Improve code quality: AI detects potential problems, provides optimization suggestions, and improves code quality. These methods are implemented through machine learning and natural language processing technologies to help developers improve efficiency and code quality.

How to use MySQL functions for data processing and calculation How to use MySQL functions for data processing and calculation Apr 29, 2025 pm 04:21 PM

MySQL functions can be used for data processing and calculation. 1. Basic usage includes string processing, date calculation and mathematical operations. 2. Advanced usage involves combining multiple functions to implement complex operations. 3. Performance optimization requires avoiding the use of functions in the WHERE clause and using GROUPBY and temporary tables.

How to configure the character set and collation rules of MySQL How to configure the character set and collation rules of MySQL Apr 29, 2025 pm 04:06 PM

Methods for configuring character sets and collations in MySQL include: 1. Setting the character sets and collations at the server level: SETNAMES'utf8'; SETCHARACTERSETutf8; SETCOLLATION_CONNECTION='utf8_general_ci'; 2. Create a database that uses specific character sets and collations: CREATEDATABASEexample_dbCHARACTERSETutf8COLLATEutf8_general_ci; 3. Specify character sets and collations when creating a table: CREATETABLEexample_table(idINT

How to rename a database in MySQL How to rename a database in MySQL Apr 29, 2025 pm 04:00 PM

Renaming a database in MySQL requires indirect methods. The steps are as follows: 1. Create a new database; 2. Use mysqldump to export the old database; 3. Import the data into the new database; 4. Delete the old database.

How to implement singleton pattern in C? How to implement singleton pattern in C? Apr 28, 2025 pm 10:03 PM

Implementing singleton pattern in C can ensure that there is only one instance of the class through static member variables and static member functions. The specific steps include: 1. Use a private constructor and delete the copy constructor and assignment operator to prevent external direct instantiation. 2. Provide a global access point through the static method getInstance to ensure that only one instance is created. 3. For thread safety, double check lock mode can be used. 4. Use smart pointers such as std::shared_ptr to avoid memory leakage. 5. For high-performance requirements, static local variables can be implemented. It should be noted that singleton pattern can lead to abuse of global state, and it is recommended to use it with caution and consider alternatives.

What role does Java play in the development of IoT (Internet of Things) devices, considering platform independence? What role does Java play in the development of IoT (Internet of Things) devices, considering platform independence? May 03, 2025 am 12:22 AM

JavaplaysasignificantroleinIoTduetoitsplatformindependence.1)Itallowscodetobewrittenonceandrunonvariousdevices.2)Java'secosystemprovidesusefullibrariesforIoT.3)ItssecurityfeaturesenhanceIoTsystemsafety.However,developersmustaddressmemoryandstartuptim

What are the advantages of using Java for web applications that need to run on different servers? What are the advantages of using Java for web applications that need to run on different servers? May 03, 2025 am 12:13 AM

Java is suitable for developing cross-server web applications. 1) Java's "write once, run everywhere" philosophy makes its code run on any platform that supports JVM. 2) Java has a rich ecosystem, including tools such as Spring and Hibernate, to simplify the development process. 3) Java performs excellently in performance and security, providing efficient memory management and strong security guarantees.

How to set the rotation effect of HTML elements How to set the rotation effect of HTML elements Apr 30, 2025 pm 02:42 PM

How to set the rotation effect of an element in HTML? It can be achieved using CSS and JavaScript. 1. The transform property of CSS is used for static rotation, such as rotate(45deg). 2. JavaScript can dynamically control rotation, which is implemented by changing the transform attribute.

See all articles