CN107153786A - A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing - Google Patents

A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing Download PDF

Info

Publication number
CN107153786A
CN107153786A CN201710395331.3A CN201710395331A CN107153786A CN 107153786 A CN107153786 A CN 107153786A CN 201710395331 A CN201710395331 A CN 201710395331A CN 107153786 A CN107153786 A CN 107153786A
Authority
CN
China
Prior art keywords
checking
service
identifying code
operation behavior
main body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710395331.3A
Other languages
Chinese (zh)
Inventor
冀登峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Singularity Technology Co Ltd
Original Assignee
Beijing Singularity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Singularity Technology Co Ltd filed Critical Beijing Singularity Technology Co Ltd
Priority to CN201710395331.3A priority Critical patent/CN107153786A/en
Publication of CN107153786A publication Critical patent/CN107153786A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The present invention proposes a kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing, and this method includes:From the picture fragment of service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, complete identifying code is obtained;The identifying code and corresponding checking instruction are shown, the checking instruction is based on the identifying code for instruction triggering main body and carries out checking interaction, and the checking includes the operation behavior for indicating that the triggering main body is performed in instructing;Operation behavior track of the trigger collection main body in checking interaction is carried out;The operation behavior track is sent to the service end, so that the service for checking credentials end is according to the behavioural characteristic model pre-set, the triggering main body to the operation behavior track carries out man-machine identification.The present invention can accurately identify current operation user for normal users or abnormal user, improve the accuracy rate of man-machine identification, improve Consumer's Experience.

Description

A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing
Technical field
The present invention relates to competing product analysis technical field, more particularly to a kind of man-machine recognition methods, system and terminal device, can Read storage medium.
Background technology
Man-machine identifying system (the public Turing machine for distinguishing computer and the full automation of people is tested) is that a class is asked Answer the safety measure of formula authentication.Man-machine identifying system helps to be protected from spam and password decryption for individual Interference;Comment spam, forum can be effectively prevented to pour water for enterprise, malicious registration, brush is single, ull up the behaviors such as wool.The system meeting It is required that you complete a simple test, to prove that you are people, rather than one attempts to shoot password-protected account or malice The computer of batch operation.
On man-machine identifying system, referred to collectively below as identifying code.At present, the form that overall identifying code is present is relatively more, but It is broadly divided into following several classes from technology and experience angle:
1. standard type identifying code
This kind of graphical verification code is simple graph checking, by the way that numeral/letter/Chinese character is changed into image, then user Original numeral/letter/Chinese character input is reduced to after identification.System is by comparing input and the initial data of user, it is possible to Whether return by the result of checking.Because numeral, letter or word are limited, and splicing is simply fixed, therefore by existing Ripe OCR (optical character identification) technology can be accurately identified easily, and discrimination can reach 100%, therefore lose completely anti- Shield is acted on
2. distortion, adhesion obscures type identifying code
Because standard type identifying code is easily recognized by OCR technique.Therefore in criterion validation code protection process, add in picture Corresponding image blurring, distortion, adhesion and interference dotted line etc. reason means are entered, (optical character are effectively recognized to reduce OCR Identification).This scheme plays a role in the early stage, makes to crack rate decline, resolution reaches 20%.But when then passing through one section Between development, as image processing techniques strengthens, pass through pretreatment, segmentation, identification etc. technology.Preprocessing process, which is used, compares biography The mode of system separates prospect, background and noise reduction.In segmentation stage, the segmentation strategy based on stroke, by foreground pixel point Class is curve pixel and linear pixel, by detection of straight lines stroke trend, separates linear pixel, so as to can equally know with 100% Not.But the identifying code after torsional deformation, but to artificially generated a large amount of interference, under causing verifying speed and accuracy great Drop, has a strong impact on Consumer's Experience.
3. knowledge type identifying code
Core concept of this kind of identifying code based on second generation identifying code (can be answered, and computer is difficult by human knowledge The problem of to answer, carries out man-machine judgement) and the interaction optimizing type identifying code of the innovation of generation.Such identifying code is based on the second generation The central principle of identifying code -- " difference of knowledge between man-machine ", expands out a large amount of innovative identifying codes.But such identifying code The problem of and answer be limited, very easily all identifying codes are downloaded by crawler technology, and be effectively matched, so as to reach To cracking purpose.Acquisition answer can separately be carried out based on search engine, cracked so as to reach by setting up seven layers of convolutional neural networks Purpose.
4. SMS and speech identifying code
This mode needs the short message that user's input handset gets, speech identifying code, and on the one hand this mode uses It is extremely inconvenient, easily influenceed by factors such as mobile phone signals, often there is short message to receive the situation of overaging, on the other hand this The mode of kind is also dangerous, and short message is highly susceptible to interception.Such identifying code, which is sent, in addition depends on operator's platform, therefore itself There is certain expense cost, can so cause this kind of identifying code itself to be attacked, swipe flow produces expense loss.
5. interactive identifying code
Such identifying code, the also known as behavior of inscience type interactive mode identifying code, can be without thinking for most user Examine, directly pass through.In the absence of interrupting for business and flow, experience is smooth, and the lifting to Consumer's Experience need not be queried.Three generations earlier above Identifying code has very big lifting on Consumer's Experience.But therefore class identifying code behavioral data is collected and decision logic, is had JAVASCRPIT realizations, thus it is excessively poor in terms of the security of code, easily it is cracked and data is forged, so as to loses safety Use is done in protection.
In process of the present invention is realized, inventor find current market present on identifying code realize technology at least exist with Lower problem:Script is easily cracked in plain text, and the accuracy rate of man-machine identification is relatively low, poor user experience.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State man-machine recognition methods, system and terminal device, the readable storage medium storing program for executing of problem.
Man-machine recognition methods provided in an embodiment of the present invention, applied to client, this method includes:
From the picture fragment of service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, obtains complete Identifying code;
The identifying code and corresponding checking instruction are shown, the checking instruction is for indicating that it is described that triggering main body is based on Identifying code carries out checking interaction, the operation behavior performed in the checking instruction comprising the instruction triggering main body;
Operation behavior track of the trigger collection main body in checking interaction is carried out;
The operation behavior track is sent to the service end, so that the service for checking credentials end is according to pre-setting Behavioural characteristic model, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine operation Grader.
Wherein, described before the picture fragment of service for checking credentials end dynamic access identifying code, in addition to:
When intended application interface is loaded, the first executable code being pre-set in the intended application is performed, it is described First executable code includes the address information at service for checking credentials end and the mandate ID of the intended application mandate, with according to described The mandate ID is sent to the service for checking credentials end by address information, so that the service for checking credentials end is tested the mandate ID Card, is verified the rear service for checking credentials end and returns to the second executable code;
Second executable code is performed, the interactive module based on security socket layer ssl protocol is loaded.
Wherein, service end checking mark is carried in second executable code;
The picture fragment from service for checking credentials end dynamic access identifying code, including:
The man-machine identification checking request triggered in response to triggering main body, is sent out based on ssl protocol to the service for checking credentials end Identifying code is sent to obtain request, the identifying code, which is obtained, carries the mandate ID and service end checking mark in request, with The mandate ID and service end checking mark are verified for the service for checking credentials end, the rear checking clothes are verified Business end generates unique identifying code at random, and returns to the picture fragment of the identifying code;
The displaying identifying code and corresponding checking instruction, including:
The interactive module is called to show the identifying code and corresponding checking instruction.
Wherein, operation behavior track of the trigger collection main body in checking interaction is carried out, including:
The interactive module is called to gather the hardware letter of the system application layer in checking interaction is carried out based on browser Cease track data, and the hardware based on default system driver collection system drive layer in checking interaction is carried out Information track data.
Wherein, it is described that the operation behavior track is sent to the service end, including:
Calculating is encrypted to the operation behavior track, and is sent out the operation behavior track after encryption based on ssl protocol The service end is sent to, after calculating is decrypted in the operation behavior track to receiving for the service for checking credentials end, is judged Whether obtained operation behavior track is correct, according to the behavioural characteristic model pre-set if correct, and the operation is gone Man-machine identification is carried out for the triggering main body of track.
Wherein, the identifying code has the valid cache time of predetermined time period at the service for checking credentials end;
After the triggering main body to the operation behavior track carries out man-machine identification, methods described also includes:Institute Valid cache time of the service for checking credentials end according to the identifying code is stated, whether the man-machine identification behavior based on the identifying code is judged Effectively.
Wherein, methods described also includes:
Service interaction request is sent to enterprise servers, carrying the service for checking credentials end in the service interaction request returns The corresponding recognition result check code of recognition result returned, the enterprise servers are tested according to the recognition result check code with described The checking of result is identified in card service end, and carries out after being verified service interaction.
The embodiment of the present invention additionally provides a kind of man-machine identifying system, and applied to client, the system includes:
Authentication module, for the picture fragment from service for checking credentials end dynamic access identifying code, is carried out to the picture fragment Restructuring, obtains complete identifying code;
Interactive module, for showing the identifying code and corresponding checking instruction, the checking instruction is used to indicate to touch Send out main body and be based on identifying code progress checking interaction, the operation for indicating the triggering main body execution is included in the checking instruction Behavior;
Acquisition module, for operation behavior track of the trigger collection main body in checking interaction is carried out;
Communication module, for the operation behavior track to be sent into the service end, for the service for checking credentials end, according to According to the behavioural characteristic model pre-set, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine operation Grader.
The embodiment of the present invention additionally provides a kind of terminal device, including memory, processor and is stored in the storage In device and the computer program that can run on the processor, realized as above during computer program described in the computing device The step of methods described.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, the computer-readable recording medium storage There are computer program, the step of computer program realizes method as described above when being executed by processor.
Man-machine recognition methods provided in an embodiment of the present invention, system and terminal device, readable storage medium storing program for executing, by based on broken Piece restructuring identifying code carry out checking interaction, and will trigger main body carry out checking interaction in operation behavior track as Tape verifying information, to carry out man-machine identification to the triggering main body of operation behavior track, the present invention can accurately identify current operation User is normal users or abnormal user, improves the accuracy rate of man-machine identification, improves Consumer's Experience.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is a kind of flow chart of man-machine recognition methods of the embodiment of the present invention;
Fig. 2 is a kind of specific signaling process figure of man-machine recognition methods of the embodiment of the present invention;
Fig. 3 realizes effect diagram one for a kind of man-machine recognition methods of the embodiment of the present invention;
Fig. 4 realizes effect diagram two for a kind of man-machine recognition methods of the embodiment of the present invention;
Fig. 5 realizes effect diagram three for a kind of man-machine recognition methods of the embodiment of the present invention;
Fig. 6 is a kind of structural representation of man-machine identifying system of the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges Diction " comprising " refer to there is the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions, otherwise will not be explained with idealization or excessively formal implication.
Fig. 1 diagrammatically illustrates the flow chart of the man-machine recognition methods of one embodiment of the invention.What the present embodiment was provided Man-machine recognition methods is configured in terminal device, for example, computer, notebook, PDA (personal digital assistant, Personal Digital Assistant) etc. various the electronic equipment for client application of thanks to shielding a shortcoming or fault can be installed.Reference picture 1, the present invention The man-machine recognition methods of embodiment specifically includes following steps:
S11, the picture fragment from service for checking credentials end dynamic access identifying code, recombinate to the picture fragment, obtain Complete identifying code.
In the present embodiment, service for checking credentials end by the identifying code of picture format by carrying out fragmentation, it can be ensured that identifying code The security of transmitting procedure, client application, being capable of basis after the picture fragment of service for checking credentials end dynamic access identifying code Picture combinational algorithm automatic reduction picture, obtains complete identifying code.
S12, the displaying identifying code and corresponding checking instruction, the checking instruction are used for instruction triggering main body and are based on The identifying code carries out checking interaction, the operation behavior performed in the checking instruction comprising the instruction triggering main body.
In the present embodiment, client can use the form of plug-in unit to realize the exhibition that identifying code and corresponding checking are instructed Show, to avoid plaintext code from being cracked.
The operation behavior track of S13, trigger collection main body in checking interaction is carried out.
It is comprehensive in order to ensure data acquisition, can be based on browser and system kernel to hardware view in the present embodiment Various dimensions, precision data collection are carried out,
S14, the operation behavior track is sent to the service end, so that the service for checking credentials end is according to pre-setting Good behavioural characteristic model, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine operation Grader.
Man-machine recognition methods provided in an embodiment of the present invention, checking interaction is carried out by the identifying code recombinated based on fragment, And operation behavior track of the main body in checking interaction is carried out will be triggered as tape verifying information, with to operation behavior track Triggering main body carry out man-machine identification, the present invention can accurately identify current operation user for normal users or abnormal user, The accuracy rate of man-machine identification is improved, Consumer's Experience is improved.
In the embodiment of the present invention, described before the picture fragment of service for checking credentials end dynamic access identifying code, in addition to Following steps:When intended application interface is loaded, the first executable code being pre-set in the intended application is performed, it is described First executable code includes the address information at service for checking credentials end and the mandate ID of the intended application mandate, with according to described The mandate ID is sent to the service for checking credentials end by address information, so that the service for checking credentials end is tested the mandate ID Card, is verified the rear service for checking credentials end and returns to the second executable code;Second executable code is performed, loading is based on The interactive module of security socket layer ssl protocol.Wherein, security socket layer, is certification of the client to server end.Mainly For providing the certification to user and server;Data to transmission are encrypted and hidden;Ensure data in transmission not by Change, i.e. the integrality of data.
In actual applications, enterprise customer in the website of oneself or application, it is necessary to place the position of man-machine identification product Place the integrated standard code of whole identifying code i.e. the first executable code.The IP of setting authentication server is needed in this code The legal ID that location, current application are authorized, and with according to own website pattern, based on the standard API of man-machine identification product offer, The identification specific pattern of product is configured, for example:Color, size etc..Specifically, in enterprise's five application page original upload, the One executable code can automatic running, to load the integrated script module of Js clients (i.e. component 1), by current mandate ID to The corresponding authentication server of specific authentication service end, asynchronous data request is carried out in ssl protocol mode, and authentication server judges ID Can the executable code of auto-returned second, execution second executable code, to load base under legal, SSL ends trustworthy information In the Js interactive modules of security socket layer ssl protocol be component 2.
Specifically, the major function of Js interactive modules be used for local client plug-in card program, based on SSL two-way authentications Agreement enters row data communication, and both sides enter row data communication based on the home domain name mapping (localhost) that client plug-in starts, Heartbeat detection can be set up according to business demand between the two, send ciphertext instruction from js to client plug-in, carry out related service Interactive operation.Wherein, data are that exclusive PKI encryption technology is realized before the two.In first operation, component 2 can be examined automatically Survey, whether active client environment installed client validation coded program, do not install such as, then can interface prompt user first download Security component;If installing can aut sign give client validation coded program, both sides start communication heartbeat detection.
In an alternate embodiment of the present invention where, service end checking mark is also carried in the second executable code.
Correspondingly, step implements flow as follows from the picture fragment of service for checking credentials end dynamic access identifying code:Response The man-machine identification checking request triggered in triggering main body, sends identifying code to the service for checking credentials end based on ssl protocol and obtains Request, the identifying code, which is obtained, carries the mandate ID and service end checking mark in request, for the checking clothes Business end is verified to the mandate ID and service end checking mark, is verified the rear service for checking credentials end and is generated at random Unique identifying code, and return to the picture fragment of the identifying code.In the present embodiment, client is tested based on ssl protocol to described The identifying code acquisition request that service end sends encryption format is demonstrate,proved, service for checking credentials end is obtained to the identifying code for receiving client transmission After request, advanced corresponding decryption processing is verified code and obtains the mandate ID carried in request and service end checking mark, Then after checking mandate is legal, automated randomized generation unduplicated identifying code picture, and carry out fragmentation forever, by identifying code Picture fragment return to client.
Further, step shows the identifying code and corresponding checking instruction, specifically can be by calling the interaction Identifying code described in modules exhibit and corresponding checking instruction.
In the present embodiment, hardware information track data and system drive layer of the operation behavior track including system application layer Hardware information track data, wherein, the reality of operation behavior track of the trigger collection main body in checking interaction is carried out Existing flow is specific as follows:The interactive module is called to gather the system application layer in checking interaction is carried out based on browser Hardware information track data, and the system drive layer in checking interaction is carried out is gathered based on default system driver Hardware information track data.
It is described that the operation behavior track is sent to the service end in the present embodiment, implement flow as follows:It is right Calculating is encrypted in the operation behavior track, and the operation behavior track after encryption is sent into described test based on ssl protocol Service end is demonstrate,proved, after calculating is decrypted in the operation behavior track to receiving for the service for checking credentials end, judges what is obtained Whether operation behavior track is correct, according to the behavioural characteristic model pre-set if correct, to the operation behavior track Triggering main body carry out man-machine identification.
Specifically, the operation behavior track of collection can be uploaded to based on ssl protocol by exclusive PKI encryption technology Service for checking credentials end.
Exclusive PKI encryption technology mainly includes following technology contents:
1st, random factor;
2nd, RSA asymmetric key algorithms;
3rd, AES symmetric key algorithms;
4th, SHA256 cryptographic Hash digest algorithm.
In PKI encryption technology, data encryption message format includes 5 parameters:(what i.e. application was authorized is legal by appid Authorize ID), key keys (workkey for AES encryption of 30), checker (integrity verification code), zip (compress number According to traffic identifier), postmsg (data of submission), all parameter values will need first to be HtmlEncode before incoming, do again Submitted again after UrlEncode.Wherein:
1.appid requires BASE64 (UTF8 codings) encryptions to apply authorized legal authorization ID, during transmission.
2.key is key (16 random factors being made up of numeral, letter used for inclusion AES AES Aeskey, and 14 time string yyyyMMddHHmmss compositions.
Specifically, preceding 16 random codes add for being AES for inclusion, subtract close, rear 14 time goes here and there for server verification Before the deadline whether (each packet is sent differed no more than 5 minutes inclusion with server time, even if otherwise bag loses Effect).This key value to server when sending, it is necessary to which the mandate public key provided using high in the clouds carries out rsa encryption.
3.checker is completeness check, and the postmsg (inclusion) after encryption is done into SHA256 can (SHA256 (postmsg))。
Whether 4.zip identification requests data carried out 7zip compressions.Specifically, 0 does not compress, 1 compression.
5.postmsg is the body data bag of request, and this data demand is that JSON forms (for aeskey do during transmission by content AES encryption is carried out to inclusion for encryption key, offset).
Further, the identifying code has the valid cache time of predetermined time period at the service for checking credentials end.Its In, the specific value of predetermined time period can be configured according to practical application scene, in this regard, the embodiment of the present invention is not made specifically Limit.Accordingly, after the triggering main body to the operation behavior track carries out man-machine identification, methods described is also wrapped Include:The service for checking credentials end judges the man-machine identifying rows based on the identifying code according to the valid cache time of the identifying code To be whether effective.
In actual applications, as shown in Fig. 2 after the dependent instruction of Js interactive modules transmission is received, client journey first Sequence can be according to collected by js browser information, whether the current js running environment of automatic decision is standard common browser, to prevent Counterfeit browser is only carried out by webview or webbrowser etc. and carries out related malicious operation.Then Js interactive modules can root The action of identifying code toolbar is clicked on according to user, is that component 3 sends dependent instruction to client-side program, component 3 is receiving user After click action instruction, newest identifying code picture fragment can be obtained to server, authentication server is awarded in decoding request and verifying After power is legal, automated randomized unduplicated identifying code picture, and carry out fragmentation forever can be generated, return to component 3;Component 3 Presented according to picture combinational algorithm automatic reduction picture and by component 2;Then component 2 is operated according to user's associated verification and gone To be automatically based upon browser and collecting the related hardware information track data such as user's mouse, keyboard, gyroscope, and will finally collect Data submission group component 3;While component 2 collects user's operation behavior, component 3 can call default system driver i.e. Component 4, gathers the hardware information track data of the system drive layer in checking interaction is carried out.Wherein, the phase that hardware is sent True Data is closed to prevent trace simulation program is based on application layer from carrying out behavior forgery.Then, operated by component 3 according to user Result, terminate this checking flow, and the related data that component 2 is collected, and component 3 automatically based on answering that system layer is collected With the data such as environment and hardware information, activation bit, entirely through exclusive PKI encryption technology, based on ssl protocol by data Reach the high in the clouds sub-control authentication center i.e. component 5 at service for checking credentials end.Wherein, sub-control authentication center in high in the clouds is man-machine knowledge identifying system The core column that high in the clouds is calculated, the checking data that reception client is submitted, the comprehensive information that high in the clouds is gathered based on client, according to The successively computing successively of five layers of prevention and control model, tactful pond-model group-feature calculation-air control regulation engine calculating-decision tree, and will Result of calculation and challengeid return to client.Client submits log-on message and challengeid according to result in the lump Enterprise servers.Enterprise servers are based on challengeid and verify identifying code validity with authentication server, can be held after The related service operation of row enterprise.
Wherein, component 3 is used with browser and communicated based on SSLhttps, therefore can accomplish that browser-cross is run, The inside of component 3 uses independent sandbox isolation technology based on different application simultaneously, and component 3 can be caused only to need once mounting, can be with Security service is provided for different web sites, different application;Ensure that each application data is related independent again simultaneously.
FTP client FTP driver (i.e. component 4) in the present embodiment belongs to hardware driving, is based on for matable assembly 3 Layer is driven to collect user's real hardware operation behavior, for example:The relative trajectory events such as mouse movement, click, based on hardware environment Different information of collecting it is different, for example:Windows mouse, keypad information are collected under mac;And for example:Screen is collected under mobile device Curtain is clicked on, gyroscope related data.Wherein, there is provided related visa by legitimate code visa mechanism for associated drives code.
In the present embodiment, client is asked by sending service interaction to enterprise servers, in the service interaction request The corresponding recognition result check code of recognition result that the service for checking credentials end is returned is carried, the enterprise servers are according to described The checking of result is identified in recognition result check code and the service for checking credentials end, and carries out after being verified service interaction.
In practical application, triggering main body of the service for checking credentials end in the operation behavior track to collection carries out man-machine identification Afterwards, it is challengeid to return to recognition result and corresponding recognition result check code, and sending business to enterprise servers hands over Mutually request, the corresponding challengeid of recognition result that the service for checking credentials end is returned is carried in the service interaction request, The checking of result is identified according to the recognition result check code and the service for checking credentials end in the enterprise servers, and is testing Card carries out service interaction after passing through.
In the embodiment of the present invention, in addition to it is arranged at the server end re-authentication SDK (i.e. component 6) at service for checking credentials end. Component 6 is used for enterprise servers and carries out the SDK that secondary-confirmation provides service with component 5.When client is by the result Challengeid, and service related data are submitted after enterprise servers, and enterprise servers pass through component 6 and component 5, base first Carry out confirming current authentication result in challengeid, to prevent client validation result from forging, challengeid is disposable Effectively, after confirming with component 5, fail at once;Component 6 will confirm that result returns to enterprise servers, enterprise servers according to The result of confirmation carries out related service operation again.In the present embodiment, service for checking credentials end uses Risk Calculation engine, with reference to complete Kind model is calculated;Trained using machine intelligence, real-time self-optimization risk control model, and adjust automatically calculates dimension Degree;Behavioral training and identification are improved using depth machine learning (with reference to bayesian algorithm);Using high concurrent architectural schemes, with true Guarantor meets enterprise's high concurrent checking demand;There is provided hommization SAAS management platforms, can comprehensively various dimensions analysis verify data, And personalized identifying code security setting.
In order to improve securities of the JS under browser working environment, the embodiment of the present invention is realized using Js+ plug-in part technologies Man-machine identification, specifically, by the integrated a small amount of standard JS codes of user website, then according to the mandate provided in integrated code ID, automatically from server download plug-in, and points out user first using installation;Plug-in unit can be based on system independent operating afterwards, and By a standard https agreement, browser-cross communication is carried out with JS, to realize that identifying code is presented, and the use based on driving layer Family operation behavior information gathering, and the information after collection is based on exclusive PKI encryption technology, rear upload server is encrypted; It is last that various dimensions calculating is carried out according to gathered data and user behavior by server, and finally provide result of calculation and (customized return cyphertext strings carry out high in the clouds secondary-confirmation for enterprise servers and identifying code server and looked into challengeid Ask, realize the checking of recognition result, and the result will return to client, and so that client is according to result, active user is grasped The business datum of work is uploaded to enterprise servers, carries out downstream industry's service associative operation.Effect is implemented reference can be made to Fig. 3- Shown in Fig. 5, the operation behavior that main body need to be performed is triggered exemplified by clicking on a certain image in identifying code picture in Fig. 3-Fig. 5, after It is continuous man-machine identification to be carried out to triggering main body based on the corresponding operation behavior track of clicking operation for triggering main body.
In the present embodiment, technology is interacted using js and client plug-in (stand-alone utility), client core is tested Card and interaction technique have plug-in unit realization, by from server end dynamic access random code picture fragment, being decrypted by client Recombinated, be spliced into after normal visible picture, point out user to carry out checking interaction.Driving layer is then based on to operate using user Action trail, and a series of tracks are based on PKI technologies by after data encryption, submit service end to be verified.So as to realize people Machine is recognized, while ensureing client secure.The present invention ensures user's body using brand-new inscience type behavior checking interactive mode Test succinct, efficient.And using JS+ plug-in units checking pattern, kernel level actuation techniques, can the essence that calculates of effective guarantee client Parasexuality.
The man-machine recognition methods that the embodiment of the present invention is proposed is a kind of based on kernel, the man-machine recognition methods of driving stage, the party Method uses two-way SSL certifications, guarantees network security;Using PKI (Public Key Infrastructure public key encryptions system) Data acquisition safety is ensured, it is another to be developed using C language, ensure data acquisition comprehensively, client code safety.So as to reach Compared with conventional authentication, not only succinct but also safety.
It should be noted that in the embodiment of the present invention, two-way SSL certifications being used between JS, plug-in unit, server, are prevented Third party is counterfeit or data tampering.Wherein, plug-in unit using C language develop, and use exclusive reinforcement technique, prevent code it is counter compile, Dynamic debugging, internal memory are distorted.
It should be noted that the two-way SSL digital certificates proposed in the embodiment of the present invention need to be provided by lawful authorities, generation Code signing certificate needs to be provided by related legitimate office.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but this area Technical staff should know that the embodiment of the present invention is not limited by described sequence of movement, because according to present invention implementation Example, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know, specification Described in embodiment belong to necessary to preferred embodiment, the involved action not necessarily embodiment of the present invention.
Fig. 6 diagrammatically illustrates the structural representation of the man-machine identifying system of one embodiment of the invention.Reference picture 6, this The man-machine identifying system of inventive embodiments specifically includes authentication module 601, interactive module 602, acquisition module 603 and communication mould Block 604, wherein, authentication module 601 is broken to the picture for the picture fragment from service for checking credentials end dynamic access identifying code Piece is recombinated, and obtains complete identifying code;Interactive module 602, for showing the identifying code and corresponding checking instruction, The checking instruction is based on the identifying code for instruction triggering main body and carries out checking interaction, and the checking is included in instructing and indicated The operation behavior that the triggering main body is performed;Acquisition module 603, for trigger collection main body in checking interaction is carried out Operation behavior track;Communication module 604, for the operation behavior track to be sent into the service end, for the checking Service end, according to the behavioural characteristic model pre-set, the triggering main body to the operation behavior track carries out man-machine identification.
In the present embodiment, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine The grader of device operation.
For system embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related Part illustrates referring to the part of embodiment of the method.
In addition, the embodiment of the present invention additionally provides a kind of terminal device, including memory, processor and it is stored in described In memory and the computer program that can run on the processor, realized described in the computing device during computer program Step in each personal-machine recognition methods embodiment, such as step shown in Fig. 1:From service for checking credentials end dynamic access identifying code Picture fragment, recombinates to the picture fragment, obtains complete identifying code;Show the identifying code and corresponding checking Instruction, the checking instruction is used to indicate that triggering main body is based on the identifying code and carries out checking interaction, is wrapped in the checking instruction Containing the operation behavior for indicating the triggering main body execution;Operation behavior rail of the trigger collection main body in checking interaction is carried out Mark;The operation behavior track is sent to the service end, so that the service for checking credentials end is according to the behavior pre-set Characteristic model, the triggering main body to the operation behavior track carries out man-machine identification.The present invention can accurately identify current operation User is normal users or abnormal user, improves the accuracy rate of man-machine identification, improves Consumer's Experience.Or, the processor The function of each module/unit in above-mentioned each system embodiment is realized when performing the computer program.
Exemplary, the computer program can be divided into one or more module/units, one or many Individual module/unit is stored in the memory, and by the computing device, to complete the present invention.It is one or many Individual module/unit can complete the series of computation machine programmed instruction section of specific function, and the instruction segment is used to describe institute State implementation procedure of the computer program in the terminal device.For example, the computer program can be divided into checking mould Block 601, interactive module 602, acquisition module 603 and communication module 604, each module concrete function are as follows:Authentication module 601, For the picture fragment from service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, complete test is obtained Demonstrate,prove code;Interactive module 602, for showing the identifying code and corresponding checking instruction, the checking instruction is used to indicate to touch Send out main body and be based on identifying code progress checking interaction, the operation for indicating the triggering main body execution is included in the checking instruction Behavior;Acquisition module 603, for operation behavior track of the trigger collection main body in checking interaction is carried out;Communication module 604, for the operation behavior track to be sent into the service end, for the service for checking credentials end, foundation is pre-set Behavioural characteristic model, man-machine identification is carried out to the triggering main body of the operation behavior track.
The terminal device can be the computing devices such as desktop PC, notebook, palm PC and cloud server. The terminal device may include, but be not limited only to, processor, memory.It will be understood by those skilled in the art that the terminal is set It is standby to include more or less parts, some parts or different parts are either combined, such as described terminal device is also Input-output equipment, network access equipment, bus etc. can be included.
Alleged processor can be CPU (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng the processor is the control centre of the terminal device, utilizes each of various interfaces and the whole terminal device of connection Individual part.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing The computer program and/or module being stored in the memory, and the data being stored in memory are called, realize described The various functions of terminal device.The memory can mainly include storing program area and storage data field, wherein, storing program area Application program (such as sound-playing function, image player function etc.) that can be needed for storage program area, at least one function etc.; Storage data field can be stored uses created data (such as voice data, phone directory etc.) etc. according to mobile phone.In addition, storage Device can include high-speed random access memory, can also include nonvolatile memory, such as hard disk, internal memory, plug-in type are hard Disk, intelligent memory card (Smar tMedia Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, the computer-readable recording medium storage There is computer program, the computer program realizes the step in any of the above-described embodiment method when being executed by processor.
If the integrated module/unit of above-mentioned terminal device is realized using in the form of SFU software functional unit and is used as independent production Product are sold or in use, can be stored in a computer read/write memory medium.Understood based on such, the present invention is realized All or part of flow in above-described embodiment method, can also instruct the hardware of correlation to complete by computer program, Described computer program can be stored in a computer-readable recording medium, the computer program when being executed by processor, The step of each above-mentioned embodiment of the method can be achieved.Wherein, the computer program includes computer program code, the calculating Machine program code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer Computer-readable recording medium can include:Any entity or device, recording medium, USB flash disk, the movement of the computer program code can be carried Hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..
Man-machine recognition methods provided in an embodiment of the present invention, system and terminal device, readable storage medium storing program for executing, by based on broken Piece restructuring identifying code carry out checking interaction, and will trigger main body carry out checking interaction in operation behavior track as Tape verifying information, to carry out man-machine identification to the triggering main body of operation behavior track, the present invention can accurately identify current operation User is normal users or abnormal user, improves the accuracy rate of man-machine identification, improves Consumer's Experience.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can To be or may not be physically separate, the part shown as unit can be or may not be physics list Member, you can with positioned at a place, or can also be distributed on multiple NEs.It can be selected according to the actual needs In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Understood based on such, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Order is to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.
Although in addition, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but not the combination of the feature of be the same as Example mean be in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One mode can use in any combination.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (10)

1. a kind of man-machine recognition methods, it is characterised in that applied to client, this method includes:
From the picture fragment of service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, complete test is obtained Demonstrate,prove code;
The identifying code and corresponding checking instruction are shown, the checking instruction is used to indicate that triggering main body is based on the checking Code carries out checking interaction, the operation behavior performed in the checking instruction comprising the instruction triggering main body;
Operation behavior track of the trigger collection main body in checking interaction is carried out;
The operation behavior track is sent to the service end, so that the service for checking credentials end is according to the behavior pre-set Characteristic model, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is point of foundation dry run sample training is obtained, human manipulation and machine operation Class device.
2. according to the method described in claim 1, it is characterised in that in the figure from service for checking credentials end dynamic access identifying code Before piece fragment, in addition to:
When intended application interface is loaded, the first executable code being pre-set in the intended application, described first are performed Executable code includes the address information at service for checking credentials end and the mandate ID of the intended application mandate, with according to the address The mandate ID is sent to the service for checking credentials end by information, so that the service for checking credentials end is verified to the mandate ID, It is verified the rear service for checking credentials end and returns to the second executable code;
Second executable code is performed, the interactive module based on security socket layer ssl protocol is loaded.
3. method according to claim 2, it is characterised in that service end checking is carried in second executable code Mark;
The picture fragment from service for checking credentials end dynamic access identifying code, including:
The man-machine identification checking request triggered in response to triggering main body, is sent to the service for checking credentials end based on ssl protocol and tested Demonstrate,prove code and obtain request, the identifying code, which is obtained, carries the mandate ID and service end checking mark in request, for institute State service for checking credentials end to verify the mandate ID and service end checking mark, be verified the rear service for checking credentials end Unique identifying code is generated at random, and returns to the picture fragment of the identifying code;
The displaying identifying code and corresponding checking instruction, including:
The interactive module is called to show the identifying code and corresponding checking instruction.
4. method according to claim 2, it is characterised in that the trigger collection main body is in checking interaction is carried out Operation behavior track, including:
The interactive module is called to gather the hardware information rail of the system application layer in checking interaction is carried out based on browser Mark data, and the hardware information based on default system driver collection system drive layer in checking interaction is carried out Track data.
5. method according to claim 4, it is characterised in that described that the operation behavior track is sent to the service End, including:
Calculating is encrypted to the operation behavior track, and is sent to the operation behavior track after encryption based on ssl protocol The service end, after calculating is decrypted in the operation behavior track to receiving for the service for checking credentials end, judges to obtain Operation behavior track it is whether correct, according to the behavioural characteristic model pre-set if correct, to the operation behavior rail The triggering main body of mark carries out man-machine identification.
6. method according to claim 5, it is characterised in that when the identifying code has default at the service for checking credentials end Between length the valid cache time;
After the triggering main body to the operation behavior track carries out man-machine identification, methods described also includes:It is described to test Valid cache time of the service end according to the identifying code is demonstrate,proved, judges whether the man-machine identification behavior based on the identifying code has Effect.
7. the method according to claim any one of 1-6, it is characterised in that methods described also includes:
Service interaction request is sent to enterprise servers, carries what the service for checking credentials end was returned in the service interaction request The corresponding recognition result check code of recognition result, the enterprise servers take according to the recognition result check code with the checking The checking of result is identified in business end, and carries out after being verified service interaction.
8. a kind of man-machine identifying system, it is characterised in that applied to client, the system includes:
Authentication module, for the picture fragment from service for checking credentials end dynamic access identifying code, is recombinated to the picture fragment, Obtain complete identifying code;
Interactive module, for showing the identifying code and corresponding checking instruction, the checking instruction is used to indicate triggering master Body is based on the identifying code and carries out checking interaction, the operation row performed in the checking instruction comprising the instruction triggering main body For;
Acquisition module, for operation behavior track of the trigger collection main body in checking interaction is carried out;
Communication module, for the operation behavior track to be sent into the service end, for the service for checking credentials end, according to pre- The behavioural characteristic model first set, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is point of foundation dry run sample training is obtained, human manipulation and machine operation Class device.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, it is characterised in that realize that claim 1-7 such as appoints described in the computing device during computer program The step of one methods described.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, its feature exists In the step of realizing such as any one of claim 1-7 methods describeds when the computer program is executed by processor.
CN201710395331.3A 2017-05-26 2017-05-26 A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing Pending CN107153786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710395331.3A CN107153786A (en) 2017-05-26 2017-05-26 A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710395331.3A CN107153786A (en) 2017-05-26 2017-05-26 A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN107153786A true CN107153786A (en) 2017-09-12

Family

ID=59794837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710395331.3A Pending CN107153786A (en) 2017-05-26 2017-05-26 A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN107153786A (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704874A (en) * 2017-09-29 2018-02-16 上海与德通讯技术有限公司 Intelligent robot and its recognition methods and computer-readable recording medium
CN107729729A (en) * 2017-09-18 2018-02-23 北京知道未来信息技术有限公司 It is a kind of based on random forest slip identifying code automatically by method of testing
CN107729505A (en) * 2017-10-23 2018-02-23 郑州云海信息技术有限公司 Acquisition methods, device and the readable storage medium storing program for executing of a kind of small documents in caching
CN107770171A (en) * 2017-10-18 2018-03-06 厦门集微科技有限公司 The verification method and system of the anti-reptile of server
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN108416198A (en) * 2018-02-06 2018-08-17 平安科技(深圳)有限公司 Man-machine identification model establishes device, method and computer readable storage medium
CN108495272A (en) * 2018-03-19 2018-09-04 上海哔哩哔哩科技有限公司 Robot recognition methods, system and storage medium based on HTML5 browsers
CN109214162A (en) * 2018-08-15 2019-01-15 深圳点猫科技有限公司 A kind of verification method and system based on education resource platform
CN109271762A (en) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 User authen method and device based on sliding block identifying code
CN109284590A (en) * 2018-09-29 2019-01-29 武汉极意网络科技有限公司 Access method, equipment, storage medium and the device of behavior safety protection
CN109509021A (en) * 2018-10-22 2019-03-22 武汉极意网络科技有限公司 Abnormality recognition method, device, server and the storage medium of Behavior-based control track
CN109547426A (en) * 2018-11-14 2019-03-29 腾讯科技(深圳)有限公司 Service response method and server
CN109815658A (en) * 2018-12-14 2019-05-28 平安科技(深圳)有限公司 A kind of verification method and device, computer equipment and computer storage medium
CN109902459A (en) * 2017-12-11 2019-06-18 北京京东尚科信息技术有限公司 Man-machine identification verification method, system, equipment and the storage medium of WEB page
CN109977641A (en) * 2019-03-25 2019-07-05 山东浪潮云信息技术有限公司 A kind of authentication processing method and system of Behavior-based control analysis
CN110120933A (en) * 2018-02-07 2019-08-13 阿里巴巴集团控股有限公司 Air control, man-machine identification and data processing method, equipment and system
CN110348190A (en) * 2019-06-29 2019-10-18 上海淇毓信息科技有限公司 User equipment ownership judgment method and device based on user's operation behavior
CN110427737A (en) * 2019-06-20 2019-11-08 平安科技(深圳)有限公司 Man-machine recognition methods, device and the computer equipment of operation behavior
CN110532755A (en) * 2019-08-09 2019-12-03 北京三快在线科技有限公司 A kind of method and device of computer implemented risk identification
CN110768980A (en) * 2019-10-22 2020-02-07 武汉极意网络科技有限公司 Network man-machine verification method, device, equipment and storage medium
CN110795706A (en) * 2019-10-22 2020-02-14 武汉极意网络科技有限公司 Hash-based verification method, equipment, storage medium and device
CN110879882A (en) * 2018-09-06 2020-03-13 中国移动通信集团重庆有限公司 Method, apparatus, device and medium for confirming user information security
CN111143227A (en) * 2019-12-31 2020-05-12 上海米哈游天命科技有限公司 Data operation method, device, terminal and storage medium
CN111177668A (en) * 2019-11-21 2020-05-19 武汉极意网络科技有限公司 Man-machine interaction verification method based on mobile device sensor
CN111241518A (en) * 2020-01-03 2020-06-05 北京字节跳动网络技术有限公司 User authentication method, device, equipment and medium
CN111259369A (en) * 2018-12-03 2020-06-09 北京京东尚科信息技术有限公司 Man-machine identity verification method and system
CN111382412A (en) * 2018-12-28 2020-07-07 武汉极意网络科技有限公司 Memory, verification code implementation method, device and equipment
CN111544893A (en) * 2020-04-30 2020-08-18 福建天晴在线互动科技有限公司 Reinforcing method and system for preventing code flow from being forged in game
CN111966223A (en) * 2020-08-17 2020-11-20 陈涛 Non-perception MR glasses man-machine identification method, system, equipment and storage medium
CN112187702A (en) * 2019-07-02 2021-01-05 北京京东尚科信息技术有限公司 Method and device for verifying client
WO2021027113A1 (en) * 2019-08-14 2021-02-18 平安科技(深圳)有限公司 Image verification method, device, computer apparatus, and storage medium
CN112580596A (en) * 2020-12-30 2021-03-30 网易(杭州)网络有限公司 Data processing method and device
CN112861094A (en) * 2019-11-27 2021-05-28 北京京东振世信息技术有限公司 Man-machine recognition method and device
CN113703822A (en) * 2021-08-31 2021-11-26 三一专用汽车有限责任公司 Differential upgrading method and device and operation machine
CN115701158A (en) * 2022-10-28 2023-02-07 重庆长安汽车股份有限公司 Method and device for realizing vehicle control function of Bluetooth entity key RKE
CN116112273A (en) * 2023-02-16 2023-05-12 上海云砺信息科技有限公司 Anti-fraud man-machine identification method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188263A (en) * 2013-03-22 2013-07-03 百度在线网络技术(北京)有限公司 Verification method, system and device
CN104794375A (en) * 2015-03-31 2015-07-22 北京奇虎科技有限公司 Interaction page generating method and device
CN106155298A (en) * 2015-04-21 2016-11-23 阿里巴巴集团控股有限公司 Man-machine recognition methods and device, the acquisition method of behavior characteristics data and device
CN106559413A (en) * 2016-10-19 2017-04-05 深圳众享互联科技有限公司 The message fragment method and its system of P2P network data securities transmission

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188263A (en) * 2013-03-22 2013-07-03 百度在线网络技术(北京)有限公司 Verification method, system and device
CN104794375A (en) * 2015-03-31 2015-07-22 北京奇虎科技有限公司 Interaction page generating method and device
CN106155298A (en) * 2015-04-21 2016-11-23 阿里巴巴集团控股有限公司 Man-machine recognition methods and device, the acquisition method of behavior characteristics data and device
CN106559413A (en) * 2016-10-19 2017-04-05 深圳众享互联科技有限公司 The message fragment method and its system of P2P network data securities transmission

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107729729B (en) * 2017-09-18 2021-01-01 北京知道未来信息技术有限公司 Automatic passing test method of sliding verification code based on random forest
CN107729729A (en) * 2017-09-18 2018-02-23 北京知道未来信息技术有限公司 It is a kind of based on random forest slip identifying code automatically by method of testing
CN107704874A (en) * 2017-09-29 2018-02-16 上海与德通讯技术有限公司 Intelligent robot and its recognition methods and computer-readable recording medium
CN107770171A (en) * 2017-10-18 2018-03-06 厦门集微科技有限公司 The verification method and system of the anti-reptile of server
CN107770171B (en) * 2017-10-18 2020-01-24 厦门集微科技有限公司 Verification method and system for anti-crawler of server
CN107729505A (en) * 2017-10-23 2018-02-23 郑州云海信息技术有限公司 Acquisition methods, device and the readable storage medium storing program for executing of a kind of small documents in caching
CN109902459A (en) * 2017-12-11 2019-06-18 北京京东尚科信息技术有限公司 Man-machine identification verification method, system, equipment and the storage medium of WEB page
CN108008898A (en) * 2017-12-13 2018-05-08 东软集团股份有限公司 Page info acquisition methods, device, computer equipment and storage medium
CN108008898B (en) * 2017-12-13 2020-04-28 东软集团股份有限公司 Page information acquisition method and device, computer equipment and storage medium
CN108416198A (en) * 2018-02-06 2018-08-17 平安科技(深圳)有限公司 Man-machine identification model establishes device, method and computer readable storage medium
CN108416198B (en) * 2018-02-06 2022-02-01 平安科技(深圳)有限公司 Device and method for establishing human-machine recognition model and computer readable storage medium
WO2019153604A1 (en) * 2018-02-06 2019-08-15 平安科技(深圳)有限公司 Device and method for creating human/machine identification model, and computer readable storage medium
CN110120933A (en) * 2018-02-07 2019-08-13 阿里巴巴集团控股有限公司 Air control, man-machine identification and data processing method, equipment and system
CN108495272A (en) * 2018-03-19 2018-09-04 上海哔哩哔哩科技有限公司 Robot recognition methods, system and storage medium based on HTML5 browsers
CN109271762B (en) * 2018-08-03 2023-04-07 平安科技(深圳)有限公司 User authentication method and device based on slider verification code
CN109271762A (en) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 User authen method and device based on sliding block identifying code
CN109214162A (en) * 2018-08-15 2019-01-15 深圳点猫科技有限公司 A kind of verification method and system based on education resource platform
CN110879882A (en) * 2018-09-06 2020-03-13 中国移动通信集团重庆有限公司 Method, apparatus, device and medium for confirming user information security
CN110879882B (en) * 2018-09-06 2022-09-27 中国移动通信集团重庆有限公司 Method, apparatus, device and medium for confirming user information security
CN109284590A (en) * 2018-09-29 2019-01-29 武汉极意网络科技有限公司 Access method, equipment, storage medium and the device of behavior safety protection
CN109284590B (en) * 2018-09-29 2021-06-25 武汉极意网络科技有限公司 Method, equipment, storage medium and device for access behavior security protection
CN109509021A (en) * 2018-10-22 2019-03-22 武汉极意网络科技有限公司 Abnormality recognition method, device, server and the storage medium of Behavior-based control track
CN109509021B (en) * 2018-10-22 2021-05-28 武汉极意网络科技有限公司 Behavior track-based anomaly identification method and device, server and storage medium
CN109547426B (en) * 2018-11-14 2021-07-27 腾讯科技(深圳)有限公司 Service response method and server
CN109547426A (en) * 2018-11-14 2019-03-29 腾讯科技(深圳)有限公司 Service response method and server
CN111259369A (en) * 2018-12-03 2020-06-09 北京京东尚科信息技术有限公司 Man-machine identity verification method and system
CN111259369B (en) * 2018-12-03 2024-04-12 北京京东尚科信息技术有限公司 Man-machine identity verification method and system
CN109815658A (en) * 2018-12-14 2019-05-28 平安科技(深圳)有限公司 A kind of verification method and device, computer equipment and computer storage medium
CN111382412A (en) * 2018-12-28 2020-07-07 武汉极意网络科技有限公司 Memory, verification code implementation method, device and equipment
CN109977641A (en) * 2019-03-25 2019-07-05 山东浪潮云信息技术有限公司 A kind of authentication processing method and system of Behavior-based control analysis
CN110427737A (en) * 2019-06-20 2019-11-08 平安科技(深圳)有限公司 Man-machine recognition methods, device and the computer equipment of operation behavior
CN110348190A (en) * 2019-06-29 2019-10-18 上海淇毓信息科技有限公司 User equipment ownership judgment method and device based on user's operation behavior
CN112187702A (en) * 2019-07-02 2021-01-05 北京京东尚科信息技术有限公司 Method and device for verifying client
CN110532755A (en) * 2019-08-09 2019-12-03 北京三快在线科技有限公司 A kind of method and device of computer implemented risk identification
CN110532755B (en) * 2019-08-09 2020-11-03 北京三快在线科技有限公司 Computer-implemented risk identification method and device
WO2021027113A1 (en) * 2019-08-14 2021-02-18 平安科技(深圳)有限公司 Image verification method, device, computer apparatus, and storage medium
CN110795706A (en) * 2019-10-22 2020-02-14 武汉极意网络科技有限公司 Hash-based verification method, equipment, storage medium and device
CN110768980B (en) * 2019-10-22 2022-04-05 武汉极意网络科技有限公司 Network man-machine verification method, device, equipment and storage medium
CN110768980A (en) * 2019-10-22 2020-02-07 武汉极意网络科技有限公司 Network man-machine verification method, device, equipment and storage medium
CN111177668A (en) * 2019-11-21 2020-05-19 武汉极意网络科技有限公司 Man-machine interaction verification method based on mobile device sensor
CN112861094A (en) * 2019-11-27 2021-05-28 北京京东振世信息技术有限公司 Man-machine recognition method and device
CN111143227A (en) * 2019-12-31 2020-05-12 上海米哈游天命科技有限公司 Data operation method, device, terminal and storage medium
CN111143227B (en) * 2019-12-31 2023-11-17 上海米哈游天命科技有限公司 Data operation method, device, terminal and storage medium
CN111241518A (en) * 2020-01-03 2020-06-05 北京字节跳动网络技术有限公司 User authentication method, device, equipment and medium
CN111241518B (en) * 2020-01-03 2023-03-24 北京字节跳动网络技术有限公司 User authentication method, device, equipment and medium
CN111544893B (en) * 2020-04-30 2023-09-01 福建天晴在线互动科技有限公司 Reinforcing method and system for preventing code flow forging based on game
CN111544893A (en) * 2020-04-30 2020-08-18 福建天晴在线互动科技有限公司 Reinforcing method and system for preventing code flow from being forged in game
CN111966223B (en) * 2020-08-17 2022-06-28 陈涛 Method, system, device and storage medium for human-machine identification of non-perception MR glasses
CN111966223A (en) * 2020-08-17 2020-11-20 陈涛 Non-perception MR glasses man-machine identification method, system, equipment and storage medium
CN112580596A (en) * 2020-12-30 2021-03-30 网易(杭州)网络有限公司 Data processing method and device
CN112580596B (en) * 2020-12-30 2024-02-27 杭州网易智企科技有限公司 Data processing method and device
CN113703822A (en) * 2021-08-31 2021-11-26 三一专用汽车有限责任公司 Differential upgrading method and device and operation machine
CN113703822B (en) * 2021-08-31 2022-11-01 三一专用汽车有限责任公司 Differential upgrading method and device and operation machine
CN115701158A (en) * 2022-10-28 2023-02-07 重庆长安汽车股份有限公司 Method and device for realizing vehicle control function of Bluetooth entity key RKE
CN116112273B (en) * 2023-02-16 2023-10-20 上海云砺信息科技有限公司 Anti-fraud man-machine identification method and system
CN116112273A (en) * 2023-02-16 2023-05-12 上海云砺信息科技有限公司 Anti-fraud man-machine identification method and system

Similar Documents

Publication Publication Date Title
CN107153786A (en) A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing
CN109657450B (en) Method, device, medium, and electronic device for evaluation based on block chain
Ellison Ceremony design and analysis
CN110232645B (en) Electronic evidence fixing and network evidence obtaining method and system based on memory evidence obtaining and block chain
CN109936547A (en) Identity identifying method, system and calculating equipment
CN104620225B (en) Method and system for server security checking
CN105207780B (en) A kind of certification user method and device
CN106911684B (en) Authentication method and system
CN107493291A (en) A kind of identity identifying method and device based on safety element SE
CN108322416B (en) Security authentication implementation method, device and system
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN112187702A (en) Method and device for verifying client
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
CN109547426A (en) Service response method and server
CN107483987A (en) A kind of method for authenticating and device of video flowing address
Jain et al. Session hijacking: Threat analysis and countermeasures
Acar et al. A privacy‐preserving multifactor authentication system
CN110166470A (en) A kind of network service analogy method and device
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN109558724A (en) A kind of software action integrity verification method
CN109413004A (en) Verification method, device and equipment
CN116506206A (en) Big data behavior analysis method and system based on zero trust network user
CN110266727A (en) Recognition methods, server and the client of simulation browser behavior
CN104009963B (en) The security authentication mechanism of remote password
CN111639033B (en) Software security threat analysis method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20210312