CN107153786A - A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing - Google Patents
A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN107153786A CN107153786A CN201710395331.3A CN201710395331A CN107153786A CN 107153786 A CN107153786 A CN 107153786A CN 201710395331 A CN201710395331 A CN 201710395331A CN 107153786 A CN107153786 A CN 107153786A
- Authority
- CN
- China
- Prior art keywords
- checking
- service
- identifying code
- operation behavior
- main body
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Abstract
The present invention proposes a kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing, and this method includes:From the picture fragment of service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, complete identifying code is obtained;The identifying code and corresponding checking instruction are shown, the checking instruction is based on the identifying code for instruction triggering main body and carries out checking interaction, and the checking includes the operation behavior for indicating that the triggering main body is performed in instructing;Operation behavior track of the trigger collection main body in checking interaction is carried out;The operation behavior track is sent to the service end, so that the service for checking credentials end is according to the behavioural characteristic model pre-set, the triggering main body to the operation behavior track carries out man-machine identification.The present invention can accurately identify current operation user for normal users or abnormal user, improve the accuracy rate of man-machine identification, improve Consumer's Experience.
Description
Technical field
The present invention relates to competing product analysis technical field, more particularly to a kind of man-machine recognition methods, system and terminal device, can
Read storage medium.
Background technology
Man-machine identifying system (the public Turing machine for distinguishing computer and the full automation of people is tested) is that a class is asked
Answer the safety measure of formula authentication.Man-machine identifying system helps to be protected from spam and password decryption for individual
Interference;Comment spam, forum can be effectively prevented to pour water for enterprise, malicious registration, brush is single, ull up the behaviors such as wool.The system meeting
It is required that you complete a simple test, to prove that you are people, rather than one attempts to shoot password-protected account or malice
The computer of batch operation.
On man-machine identifying system, referred to collectively below as identifying code.At present, the form that overall identifying code is present is relatively more, but
It is broadly divided into following several classes from technology and experience angle:
1. standard type identifying code
This kind of graphical verification code is simple graph checking, by the way that numeral/letter/Chinese character is changed into image, then user
Original numeral/letter/Chinese character input is reduced to after identification.System is by comparing input and the initial data of user, it is possible to
Whether return by the result of checking.Because numeral, letter or word are limited, and splicing is simply fixed, therefore by existing
Ripe OCR (optical character identification) technology can be accurately identified easily, and discrimination can reach 100%, therefore lose completely anti-
Shield is acted on
2. distortion, adhesion obscures type identifying code
Because standard type identifying code is easily recognized by OCR technique.Therefore in criterion validation code protection process, add in picture
Corresponding image blurring, distortion, adhesion and interference dotted line etc. reason means are entered, (optical character are effectively recognized to reduce OCR
Identification).This scheme plays a role in the early stage, makes to crack rate decline, resolution reaches 20%.But when then passing through one section
Between development, as image processing techniques strengthens, pass through pretreatment, segmentation, identification etc. technology.Preprocessing process, which is used, compares biography
The mode of system separates prospect, background and noise reduction.In segmentation stage, the segmentation strategy based on stroke, by foreground pixel point
Class is curve pixel and linear pixel, by detection of straight lines stroke trend, separates linear pixel, so as to can equally know with 100%
Not.But the identifying code after torsional deformation, but to artificially generated a large amount of interference, under causing verifying speed and accuracy great
Drop, has a strong impact on Consumer's Experience.
3. knowledge type identifying code
Core concept of this kind of identifying code based on second generation identifying code (can be answered, and computer is difficult by human knowledge
The problem of to answer, carries out man-machine judgement) and the interaction optimizing type identifying code of the innovation of generation.Such identifying code is based on the second generation
The central principle of identifying code -- " difference of knowledge between man-machine ", expands out a large amount of innovative identifying codes.But such identifying code
The problem of and answer be limited, very easily all identifying codes are downloaded by crawler technology, and be effectively matched, so as to reach
To cracking purpose.Acquisition answer can separately be carried out based on search engine, cracked so as to reach by setting up seven layers of convolutional neural networks
Purpose.
4. SMS and speech identifying code
This mode needs the short message that user's input handset gets, speech identifying code, and on the one hand this mode uses
It is extremely inconvenient, easily influenceed by factors such as mobile phone signals, often there is short message to receive the situation of overaging, on the other hand this
The mode of kind is also dangerous, and short message is highly susceptible to interception.Such identifying code, which is sent, in addition depends on operator's platform, therefore itself
There is certain expense cost, can so cause this kind of identifying code itself to be attacked, swipe flow produces expense loss.
5. interactive identifying code
Such identifying code, the also known as behavior of inscience type interactive mode identifying code, can be without thinking for most user
Examine, directly pass through.In the absence of interrupting for business and flow, experience is smooth, and the lifting to Consumer's Experience need not be queried.Three generations earlier above
Identifying code has very big lifting on Consumer's Experience.But therefore class identifying code behavioral data is collected and decision logic, is had
JAVASCRPIT realizations, thus it is excessively poor in terms of the security of code, easily it is cracked and data is forged, so as to loses safety
Use is done in protection.
In process of the present invention is realized, inventor find current market present on identifying code realize technology at least exist with
Lower problem:Script is easily cracked in plain text, and the accuracy rate of man-machine identification is relatively low, poor user experience.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on
State man-machine recognition methods, system and terminal device, the readable storage medium storing program for executing of problem.
Man-machine recognition methods provided in an embodiment of the present invention, applied to client, this method includes:
From the picture fragment of service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, obtains complete
Identifying code;
The identifying code and corresponding checking instruction are shown, the checking instruction is for indicating that it is described that triggering main body is based on
Identifying code carries out checking interaction, the operation behavior performed in the checking instruction comprising the instruction triggering main body;
Operation behavior track of the trigger collection main body in checking interaction is carried out;
The operation behavior track is sent to the service end, so that the service for checking credentials end is according to pre-setting
Behavioural characteristic model, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine operation
Grader.
Wherein, described before the picture fragment of service for checking credentials end dynamic access identifying code, in addition to:
When intended application interface is loaded, the first executable code being pre-set in the intended application is performed, it is described
First executable code includes the address information at service for checking credentials end and the mandate ID of the intended application mandate, with according to described
The mandate ID is sent to the service for checking credentials end by address information, so that the service for checking credentials end is tested the mandate ID
Card, is verified the rear service for checking credentials end and returns to the second executable code;
Second executable code is performed, the interactive module based on security socket layer ssl protocol is loaded.
Wherein, service end checking mark is carried in second executable code;
The picture fragment from service for checking credentials end dynamic access identifying code, including:
The man-machine identification checking request triggered in response to triggering main body, is sent out based on ssl protocol to the service for checking credentials end
Identifying code is sent to obtain request, the identifying code, which is obtained, carries the mandate ID and service end checking mark in request, with
The mandate ID and service end checking mark are verified for the service for checking credentials end, the rear checking clothes are verified
Business end generates unique identifying code at random, and returns to the picture fragment of the identifying code;
The displaying identifying code and corresponding checking instruction, including:
The interactive module is called to show the identifying code and corresponding checking instruction.
Wherein, operation behavior track of the trigger collection main body in checking interaction is carried out, including:
The interactive module is called to gather the hardware letter of the system application layer in checking interaction is carried out based on browser
Cease track data, and the hardware based on default system driver collection system drive layer in checking interaction is carried out
Information track data.
Wherein, it is described that the operation behavior track is sent to the service end, including:
Calculating is encrypted to the operation behavior track, and is sent out the operation behavior track after encryption based on ssl protocol
The service end is sent to, after calculating is decrypted in the operation behavior track to receiving for the service for checking credentials end, is judged
Whether obtained operation behavior track is correct, according to the behavioural characteristic model pre-set if correct, and the operation is gone
Man-machine identification is carried out for the triggering main body of track.
Wherein, the identifying code has the valid cache time of predetermined time period at the service for checking credentials end;
After the triggering main body to the operation behavior track carries out man-machine identification, methods described also includes:Institute
Valid cache time of the service for checking credentials end according to the identifying code is stated, whether the man-machine identification behavior based on the identifying code is judged
Effectively.
Wherein, methods described also includes:
Service interaction request is sent to enterprise servers, carrying the service for checking credentials end in the service interaction request returns
The corresponding recognition result check code of recognition result returned, the enterprise servers are tested according to the recognition result check code with described
The checking of result is identified in card service end, and carries out after being verified service interaction.
The embodiment of the present invention additionally provides a kind of man-machine identifying system, and applied to client, the system includes:
Authentication module, for the picture fragment from service for checking credentials end dynamic access identifying code, is carried out to the picture fragment
Restructuring, obtains complete identifying code;
Interactive module, for showing the identifying code and corresponding checking instruction, the checking instruction is used to indicate to touch
Send out main body and be based on identifying code progress checking interaction, the operation for indicating the triggering main body execution is included in the checking instruction
Behavior;
Acquisition module, for operation behavior track of the trigger collection main body in checking interaction is carried out;
Communication module, for the operation behavior track to be sent into the service end, for the service for checking credentials end, according to
According to the behavioural characteristic model pre-set, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine operation
Grader.
The embodiment of the present invention additionally provides a kind of terminal device, including memory, processor and is stored in the storage
In device and the computer program that can run on the processor, realized as above during computer program described in the computing device
The step of methods described.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, the computer-readable recording medium storage
There are computer program, the step of computer program realizes method as described above when being executed by processor.
Man-machine recognition methods provided in an embodiment of the present invention, system and terminal device, readable storage medium storing program for executing, by based on broken
Piece restructuring identifying code carry out checking interaction, and will trigger main body carry out checking interaction in operation behavior track as
Tape verifying information, to carry out man-machine identification to the triggering main body of operation behavior track, the present invention can accurately identify current operation
User is normal users or abnormal user, improves the accuracy rate of man-machine identification, improves Consumer's Experience.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is a kind of flow chart of man-machine recognition methods of the embodiment of the present invention;
Fig. 2 is a kind of specific signaling process figure of man-machine recognition methods of the embodiment of the present invention;
Fig. 3 realizes effect diagram one for a kind of man-machine recognition methods of the embodiment of the present invention;
Fig. 4 realizes effect diagram two for a kind of man-machine recognition methods of the embodiment of the present invention;
Fig. 5 realizes effect diagram three for a kind of man-machine recognition methods of the embodiment of the present invention;
Fig. 6 is a kind of structural representation of man-machine identifying system of the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one
It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges
Diction " comprising " refer to there is the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also
Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art
The consistent meaning of meaning, and unless by specific definitions, otherwise will not be explained with idealization or excessively formal implication.
Fig. 1 diagrammatically illustrates the flow chart of the man-machine recognition methods of one embodiment of the invention.What the present embodiment was provided
Man-machine recognition methods is configured in terminal device, for example, computer, notebook, PDA (personal digital assistant, Personal
Digital Assistant) etc. various the electronic equipment for client application of thanks to shielding a shortcoming or fault can be installed.Reference picture 1, the present invention
The man-machine recognition methods of embodiment specifically includes following steps:
S11, the picture fragment from service for checking credentials end dynamic access identifying code, recombinate to the picture fragment, obtain
Complete identifying code.
In the present embodiment, service for checking credentials end by the identifying code of picture format by carrying out fragmentation, it can be ensured that identifying code
The security of transmitting procedure, client application, being capable of basis after the picture fragment of service for checking credentials end dynamic access identifying code
Picture combinational algorithm automatic reduction picture, obtains complete identifying code.
S12, the displaying identifying code and corresponding checking instruction, the checking instruction are used for instruction triggering main body and are based on
The identifying code carries out checking interaction, the operation behavior performed in the checking instruction comprising the instruction triggering main body.
In the present embodiment, client can use the form of plug-in unit to realize the exhibition that identifying code and corresponding checking are instructed
Show, to avoid plaintext code from being cracked.
The operation behavior track of S13, trigger collection main body in checking interaction is carried out.
It is comprehensive in order to ensure data acquisition, can be based on browser and system kernel to hardware view in the present embodiment
Various dimensions, precision data collection are carried out,
S14, the operation behavior track is sent to the service end, so that the service for checking credentials end is according to pre-setting
Good behavioural characteristic model, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine operation
Grader.
Man-machine recognition methods provided in an embodiment of the present invention, checking interaction is carried out by the identifying code recombinated based on fragment,
And operation behavior track of the main body in checking interaction is carried out will be triggered as tape verifying information, with to operation behavior track
Triggering main body carry out man-machine identification, the present invention can accurately identify current operation user for normal users or abnormal user,
The accuracy rate of man-machine identification is improved, Consumer's Experience is improved.
In the embodiment of the present invention, described before the picture fragment of service for checking credentials end dynamic access identifying code, in addition to
Following steps:When intended application interface is loaded, the first executable code being pre-set in the intended application is performed, it is described
First executable code includes the address information at service for checking credentials end and the mandate ID of the intended application mandate, with according to described
The mandate ID is sent to the service for checking credentials end by address information, so that the service for checking credentials end is tested the mandate ID
Card, is verified the rear service for checking credentials end and returns to the second executable code;Second executable code is performed, loading is based on
The interactive module of security socket layer ssl protocol.Wherein, security socket layer, is certification of the client to server end.Mainly
For providing the certification to user and server;Data to transmission are encrypted and hidden;Ensure data in transmission not by
Change, i.e. the integrality of data.
In actual applications, enterprise customer in the website of oneself or application, it is necessary to place the position of man-machine identification product
Place the integrated standard code of whole identifying code i.e. the first executable code.The IP of setting authentication server is needed in this code
The legal ID that location, current application are authorized, and with according to own website pattern, based on the standard API of man-machine identification product offer,
The identification specific pattern of product is configured, for example:Color, size etc..Specifically, in enterprise's five application page original upload, the
One executable code can automatic running, to load the integrated script module of Js clients (i.e. component 1), by current mandate ID to
The corresponding authentication server of specific authentication service end, asynchronous data request is carried out in ssl protocol mode, and authentication server judges ID
Can the executable code of auto-returned second, execution second executable code, to load base under legal, SSL ends trustworthy information
In the Js interactive modules of security socket layer ssl protocol be component 2.
Specifically, the major function of Js interactive modules be used for local client plug-in card program, based on SSL two-way authentications
Agreement enters row data communication, and both sides enter row data communication based on the home domain name mapping (localhost) that client plug-in starts,
Heartbeat detection can be set up according to business demand between the two, send ciphertext instruction from js to client plug-in, carry out related service
Interactive operation.Wherein, data are that exclusive PKI encryption technology is realized before the two.In first operation, component 2 can be examined automatically
Survey, whether active client environment installed client validation coded program, do not install such as, then can interface prompt user first download
Security component;If installing can aut sign give client validation coded program, both sides start communication heartbeat detection.
In an alternate embodiment of the present invention where, service end checking mark is also carried in the second executable code.
Correspondingly, step implements flow as follows from the picture fragment of service for checking credentials end dynamic access identifying code:Response
The man-machine identification checking request triggered in triggering main body, sends identifying code to the service for checking credentials end based on ssl protocol and obtains
Request, the identifying code, which is obtained, carries the mandate ID and service end checking mark in request, for the checking clothes
Business end is verified to the mandate ID and service end checking mark, is verified the rear service for checking credentials end and is generated at random
Unique identifying code, and return to the picture fragment of the identifying code.In the present embodiment, client is tested based on ssl protocol to described
The identifying code acquisition request that service end sends encryption format is demonstrate,proved, service for checking credentials end is obtained to the identifying code for receiving client transmission
After request, advanced corresponding decryption processing is verified code and obtains the mandate ID carried in request and service end checking mark,
Then after checking mandate is legal, automated randomized generation unduplicated identifying code picture, and carry out fragmentation forever, by identifying code
Picture fragment return to client.
Further, step shows the identifying code and corresponding checking instruction, specifically can be by calling the interaction
Identifying code described in modules exhibit and corresponding checking instruction.
In the present embodiment, hardware information track data and system drive layer of the operation behavior track including system application layer
Hardware information track data, wherein, the reality of operation behavior track of the trigger collection main body in checking interaction is carried out
Existing flow is specific as follows:The interactive module is called to gather the system application layer in checking interaction is carried out based on browser
Hardware information track data, and the system drive layer in checking interaction is carried out is gathered based on default system driver
Hardware information track data.
It is described that the operation behavior track is sent to the service end in the present embodiment, implement flow as follows:It is right
Calculating is encrypted in the operation behavior track, and the operation behavior track after encryption is sent into described test based on ssl protocol
Service end is demonstrate,proved, after calculating is decrypted in the operation behavior track to receiving for the service for checking credentials end, judges what is obtained
Whether operation behavior track is correct, according to the behavioural characteristic model pre-set if correct, to the operation behavior track
Triggering main body carry out man-machine identification.
Specifically, the operation behavior track of collection can be uploaded to based on ssl protocol by exclusive PKI encryption technology
Service for checking credentials end.
Exclusive PKI encryption technology mainly includes following technology contents:
1st, random factor;
2nd, RSA asymmetric key algorithms;
3rd, AES symmetric key algorithms;
4th, SHA256 cryptographic Hash digest algorithm.
In PKI encryption technology, data encryption message format includes 5 parameters:(what i.e. application was authorized is legal by appid
Authorize ID), key keys (workkey for AES encryption of 30), checker (integrity verification code), zip (compress number
According to traffic identifier), postmsg (data of submission), all parameter values will need first to be HtmlEncode before incoming, do again
Submitted again after UrlEncode.Wherein:
1.appid requires BASE64 (UTF8 codings) encryptions to apply authorized legal authorization ID, during transmission.
2.key is key (16 random factors being made up of numeral, letter used for inclusion AES AES
Aeskey, and 14 time string yyyyMMddHHmmss compositions.
Specifically, preceding 16 random codes add for being AES for inclusion, subtract close, rear 14 time goes here and there for server verification
Before the deadline whether (each packet is sent differed no more than 5 minutes inclusion with server time, even if otherwise bag loses
Effect).This key value to server when sending, it is necessary to which the mandate public key provided using high in the clouds carries out rsa encryption.
3.checker is completeness check, and the postmsg (inclusion) after encryption is done into SHA256 can (SHA256
(postmsg))。
Whether 4.zip identification requests data carried out 7zip compressions.Specifically, 0 does not compress, 1 compression.
5.postmsg is the body data bag of request, and this data demand is that JSON forms (for aeskey do during transmission by content
AES encryption is carried out to inclusion for encryption key, offset).
Further, the identifying code has the valid cache time of predetermined time period at the service for checking credentials end.Its
In, the specific value of predetermined time period can be configured according to practical application scene, in this regard, the embodiment of the present invention is not made specifically
Limit.Accordingly, after the triggering main body to the operation behavior track carries out man-machine identification, methods described is also wrapped
Include:The service for checking credentials end judges the man-machine identifying rows based on the identifying code according to the valid cache time of the identifying code
To be whether effective.
In actual applications, as shown in Fig. 2 after the dependent instruction of Js interactive modules transmission is received, client journey first
Sequence can be according to collected by js browser information, whether the current js running environment of automatic decision is standard common browser, to prevent
Counterfeit browser is only carried out by webview or webbrowser etc. and carries out related malicious operation.Then Js interactive modules can root
The action of identifying code toolbar is clicked on according to user, is that component 3 sends dependent instruction to client-side program, component 3 is receiving user
After click action instruction, newest identifying code picture fragment can be obtained to server, authentication server is awarded in decoding request and verifying
After power is legal, automated randomized unduplicated identifying code picture, and carry out fragmentation forever can be generated, return to component 3;Component 3
Presented according to picture combinational algorithm automatic reduction picture and by component 2;Then component 2 is operated according to user's associated verification and gone
To be automatically based upon browser and collecting the related hardware information track data such as user's mouse, keyboard, gyroscope, and will finally collect
Data submission group component 3;While component 2 collects user's operation behavior, component 3 can call default system driver i.e.
Component 4, gathers the hardware information track data of the system drive layer in checking interaction is carried out.Wherein, the phase that hardware is sent
True Data is closed to prevent trace simulation program is based on application layer from carrying out behavior forgery.Then, operated by component 3 according to user
Result, terminate this checking flow, and the related data that component 2 is collected, and component 3 automatically based on answering that system layer is collected
With the data such as environment and hardware information, activation bit, entirely through exclusive PKI encryption technology, based on ssl protocol by data
Reach the high in the clouds sub-control authentication center i.e. component 5 at service for checking credentials end.Wherein, sub-control authentication center in high in the clouds is man-machine knowledge identifying system
The core column that high in the clouds is calculated, the checking data that reception client is submitted, the comprehensive information that high in the clouds is gathered based on client, according to
The successively computing successively of five layers of prevention and control model, tactful pond-model group-feature calculation-air control regulation engine calculating-decision tree, and will
Result of calculation and challengeid return to client.Client submits log-on message and challengeid according to result in the lump
Enterprise servers.Enterprise servers are based on challengeid and verify identifying code validity with authentication server, can be held after
The related service operation of row enterprise.
Wherein, component 3 is used with browser and communicated based on SSLhttps, therefore can accomplish that browser-cross is run,
The inside of component 3 uses independent sandbox isolation technology based on different application simultaneously, and component 3 can be caused only to need once mounting, can be with
Security service is provided for different web sites, different application;Ensure that each application data is related independent again simultaneously.
FTP client FTP driver (i.e. component 4) in the present embodiment belongs to hardware driving, is based on for matable assembly 3
Layer is driven to collect user's real hardware operation behavior, for example:The relative trajectory events such as mouse movement, click, based on hardware environment
Different information of collecting it is different, for example:Windows mouse, keypad information are collected under mac;And for example:Screen is collected under mobile device
Curtain is clicked on, gyroscope related data.Wherein, there is provided related visa by legitimate code visa mechanism for associated drives code.
In the present embodiment, client is asked by sending service interaction to enterprise servers, in the service interaction request
The corresponding recognition result check code of recognition result that the service for checking credentials end is returned is carried, the enterprise servers are according to described
The checking of result is identified in recognition result check code and the service for checking credentials end, and carries out after being verified service interaction.
In practical application, triggering main body of the service for checking credentials end in the operation behavior track to collection carries out man-machine identification
Afterwards, it is challengeid to return to recognition result and corresponding recognition result check code, and sending business to enterprise servers hands over
Mutually request, the corresponding challengeid of recognition result that the service for checking credentials end is returned is carried in the service interaction request,
The checking of result is identified according to the recognition result check code and the service for checking credentials end in the enterprise servers, and is testing
Card carries out service interaction after passing through.
In the embodiment of the present invention, in addition to it is arranged at the server end re-authentication SDK (i.e. component 6) at service for checking credentials end.
Component 6 is used for enterprise servers and carries out the SDK that secondary-confirmation provides service with component 5.When client is by the result
Challengeid, and service related data are submitted after enterprise servers, and enterprise servers pass through component 6 and component 5, base first
Carry out confirming current authentication result in challengeid, to prevent client validation result from forging, challengeid is disposable
Effectively, after confirming with component 5, fail at once;Component 6 will confirm that result returns to enterprise servers, enterprise servers according to
The result of confirmation carries out related service operation again.In the present embodiment, service for checking credentials end uses Risk Calculation engine, with reference to complete
Kind model is calculated;Trained using machine intelligence, real-time self-optimization risk control model, and adjust automatically calculates dimension
Degree;Behavioral training and identification are improved using depth machine learning (with reference to bayesian algorithm);Using high concurrent architectural schemes, with true
Guarantor meets enterprise's high concurrent checking demand;There is provided hommization SAAS management platforms, can comprehensively various dimensions analysis verify data,
And personalized identifying code security setting.
In order to improve securities of the JS under browser working environment, the embodiment of the present invention is realized using Js+ plug-in part technologies
Man-machine identification, specifically, by the integrated a small amount of standard JS codes of user website, then according to the mandate provided in integrated code
ID, automatically from server download plug-in, and points out user first using installation;Plug-in unit can be based on system independent operating afterwards, and
By a standard https agreement, browser-cross communication is carried out with JS, to realize that identifying code is presented, and the use based on driving layer
Family operation behavior information gathering, and the information after collection is based on exclusive PKI encryption technology, rear upload server is encrypted;
It is last that various dimensions calculating is carried out according to gathered data and user behavior by server, and finally provide result of calculation and
(customized return cyphertext strings carry out high in the clouds secondary-confirmation for enterprise servers and identifying code server and looked into challengeid
Ask, realize the checking of recognition result, and the result will return to client, and so that client is according to result, active user is grasped
The business datum of work is uploaded to enterprise servers, carries out downstream industry's service associative operation.Effect is implemented reference can be made to Fig. 3-
Shown in Fig. 5, the operation behavior that main body need to be performed is triggered exemplified by clicking on a certain image in identifying code picture in Fig. 3-Fig. 5, after
It is continuous man-machine identification to be carried out to triggering main body based on the corresponding operation behavior track of clicking operation for triggering main body.
In the present embodiment, technology is interacted using js and client plug-in (stand-alone utility), client core is tested
Card and interaction technique have plug-in unit realization, by from server end dynamic access random code picture fragment, being decrypted by client
Recombinated, be spliced into after normal visible picture, point out user to carry out checking interaction.Driving layer is then based on to operate using user
Action trail, and a series of tracks are based on PKI technologies by after data encryption, submit service end to be verified.So as to realize people
Machine is recognized, while ensureing client secure.The present invention ensures user's body using brand-new inscience type behavior checking interactive mode
Test succinct, efficient.And using JS+ plug-in units checking pattern, kernel level actuation techniques, can the essence that calculates of effective guarantee client
Parasexuality.
The man-machine recognition methods that the embodiment of the present invention is proposed is a kind of based on kernel, the man-machine recognition methods of driving stage, the party
Method uses two-way SSL certifications, guarantees network security;Using PKI (Public Key Infrastructure public key encryptions system)
Data acquisition safety is ensured, it is another to be developed using C language, ensure data acquisition comprehensively, client code safety.So as to reach
Compared with conventional authentication, not only succinct but also safety.
It should be noted that in the embodiment of the present invention, two-way SSL certifications being used between JS, plug-in unit, server, are prevented
Third party is counterfeit or data tampering.Wherein, plug-in unit using C language develop, and use exclusive reinforcement technique, prevent code it is counter compile,
Dynamic debugging, internal memory are distorted.
It should be noted that the two-way SSL digital certificates proposed in the embodiment of the present invention need to be provided by lawful authorities, generation
Code signing certificate needs to be provided by related legitimate office.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but this area
Technical staff should know that the embodiment of the present invention is not limited by described sequence of movement, because according to present invention implementation
Example, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know, specification
Described in embodiment belong to necessary to preferred embodiment, the involved action not necessarily embodiment of the present invention.
Fig. 6 diagrammatically illustrates the structural representation of the man-machine identifying system of one embodiment of the invention.Reference picture 6, this
The man-machine identifying system of inventive embodiments specifically includes authentication module 601, interactive module 602, acquisition module 603 and communication mould
Block 604, wherein, authentication module 601 is broken to the picture for the picture fragment from service for checking credentials end dynamic access identifying code
Piece is recombinated, and obtains complete identifying code;Interactive module 602, for showing the identifying code and corresponding checking instruction,
The checking instruction is based on the identifying code for instruction triggering main body and carries out checking interaction, and the checking is included in instructing and indicated
The operation behavior that the triggering main body is performed;Acquisition module 603, for trigger collection main body in checking interaction is carried out
Operation behavior track;Communication module 604, for the operation behavior track to be sent into the service end, for the checking
Service end, according to the behavioural characteristic model pre-set, the triggering main body to the operation behavior track carries out man-machine identification.
In the present embodiment, if the behavioural characteristic model is foundation dry run sample training is obtained, human manipulation and machine
The grader of device operation.
For system embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related
Part illustrates referring to the part of embodiment of the method.
In addition, the embodiment of the present invention additionally provides a kind of terminal device, including memory, processor and it is stored in described
In memory and the computer program that can run on the processor, realized described in the computing device during computer program
Step in each personal-machine recognition methods embodiment, such as step shown in Fig. 1:From service for checking credentials end dynamic access identifying code
Picture fragment, recombinates to the picture fragment, obtains complete identifying code;Show the identifying code and corresponding checking
Instruction, the checking instruction is used to indicate that triggering main body is based on the identifying code and carries out checking interaction, is wrapped in the checking instruction
Containing the operation behavior for indicating the triggering main body execution;Operation behavior rail of the trigger collection main body in checking interaction is carried out
Mark;The operation behavior track is sent to the service end, so that the service for checking credentials end is according to the behavior pre-set
Characteristic model, the triggering main body to the operation behavior track carries out man-machine identification.The present invention can accurately identify current operation
User is normal users or abnormal user, improves the accuracy rate of man-machine identification, improves Consumer's Experience.Or, the processor
The function of each module/unit in above-mentioned each system embodiment is realized when performing the computer program.
Exemplary, the computer program can be divided into one or more module/units, one or many
Individual module/unit is stored in the memory, and by the computing device, to complete the present invention.It is one or many
Individual module/unit can complete the series of computation machine programmed instruction section of specific function, and the instruction segment is used to describe institute
State implementation procedure of the computer program in the terminal device.For example, the computer program can be divided into checking mould
Block 601, interactive module 602, acquisition module 603 and communication module 604, each module concrete function are as follows:Authentication module 601,
For the picture fragment from service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, complete test is obtained
Demonstrate,prove code;Interactive module 602, for showing the identifying code and corresponding checking instruction, the checking instruction is used to indicate to touch
Send out main body and be based on identifying code progress checking interaction, the operation for indicating the triggering main body execution is included in the checking instruction
Behavior;Acquisition module 603, for operation behavior track of the trigger collection main body in checking interaction is carried out;Communication module
604, for the operation behavior track to be sent into the service end, for the service for checking credentials end, foundation is pre-set
Behavioural characteristic model, man-machine identification is carried out to the triggering main body of the operation behavior track.
The terminal device can be the computing devices such as desktop PC, notebook, palm PC and cloud server.
The terminal device may include, but be not limited only to, processor, memory.It will be understood by those skilled in the art that the terminal is set
It is standby to include more or less parts, some parts or different parts are either combined, such as described terminal device is also
Input-output equipment, network access equipment, bus etc. can be included.
Alleged processor can be CPU (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng the processor is the control centre of the terminal device, utilizes each of various interfaces and the whole terminal device of connection
Individual part.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module being stored in the memory, and the data being stored in memory are called, realize described
The various functions of terminal device.The memory can mainly include storing program area and storage data field, wherein, storing program area
Application program (such as sound-playing function, image player function etc.) that can be needed for storage program area, at least one function etc.;
Storage data field can be stored uses created data (such as voice data, phone directory etc.) etc. according to mobile phone.In addition, storage
Device can include high-speed random access memory, can also include nonvolatile memory, such as hard disk, internal memory, plug-in type are hard
Disk, intelligent memory card (Smar tMedia Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, the computer-readable recording medium storage
There is computer program, the computer program realizes the step in any of the above-described embodiment method when being executed by processor.
If the integrated module/unit of above-mentioned terminal device is realized using in the form of SFU software functional unit and is used as independent production
Product are sold or in use, can be stored in a computer read/write memory medium.Understood based on such, the present invention is realized
All or part of flow in above-described embodiment method, can also instruct the hardware of correlation to complete by computer program,
Described computer program can be stored in a computer-readable recording medium, the computer program when being executed by processor,
The step of each above-mentioned embodiment of the method can be achieved.Wherein, the computer program includes computer program code, the calculating
Machine program code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer
Computer-readable recording medium can include:Any entity or device, recording medium, USB flash disk, the movement of the computer program code can be carried
Hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory
(RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..
Man-machine recognition methods provided in an embodiment of the present invention, system and terminal device, readable storage medium storing program for executing, by based on broken
Piece restructuring identifying code carry out checking interaction, and will trigger main body carry out checking interaction in operation behavior track as
Tape verifying information, to carry out man-machine identification to the triggering main body of operation behavior track, the present invention can accurately identify current operation
User is normal users or abnormal user, improves the accuracy rate of man-machine identification, improves Consumer's Experience.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can
To be or may not be physically separate, the part shown as unit can be or may not be physics list
Member, you can with positioned at a place, or can also be distributed on multiple NEs.It can be selected according to the actual needs
In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness
Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Understood based on such, on
The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should
Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers
Order is to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation
Method described in some parts of example or embodiment.
Although in addition, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments
Including some features rather than further feature, but not the combination of the feature of be the same as Example mean be in the scope of the present invention
Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it
One mode can use in any combination.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used
To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic;
And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and
Scope.
Claims (10)
1. a kind of man-machine recognition methods, it is characterised in that applied to client, this method includes:
From the picture fragment of service for checking credentials end dynamic access identifying code, the picture fragment is recombinated, complete test is obtained
Demonstrate,prove code;
The identifying code and corresponding checking instruction are shown, the checking instruction is used to indicate that triggering main body is based on the checking
Code carries out checking interaction, the operation behavior performed in the checking instruction comprising the instruction triggering main body;
Operation behavior track of the trigger collection main body in checking interaction is carried out;
The operation behavior track is sent to the service end, so that the service for checking credentials end is according to the behavior pre-set
Characteristic model, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is point of foundation dry run sample training is obtained, human manipulation and machine operation
Class device.
2. according to the method described in claim 1, it is characterised in that in the figure from service for checking credentials end dynamic access identifying code
Before piece fragment, in addition to:
When intended application interface is loaded, the first executable code being pre-set in the intended application, described first are performed
Executable code includes the address information at service for checking credentials end and the mandate ID of the intended application mandate, with according to the address
The mandate ID is sent to the service for checking credentials end by information, so that the service for checking credentials end is verified to the mandate ID,
It is verified the rear service for checking credentials end and returns to the second executable code;
Second executable code is performed, the interactive module based on security socket layer ssl protocol is loaded.
3. method according to claim 2, it is characterised in that service end checking is carried in second executable code
Mark;
The picture fragment from service for checking credentials end dynamic access identifying code, including:
The man-machine identification checking request triggered in response to triggering main body, is sent to the service for checking credentials end based on ssl protocol and tested
Demonstrate,prove code and obtain request, the identifying code, which is obtained, carries the mandate ID and service end checking mark in request, for institute
State service for checking credentials end to verify the mandate ID and service end checking mark, be verified the rear service for checking credentials end
Unique identifying code is generated at random, and returns to the picture fragment of the identifying code;
The displaying identifying code and corresponding checking instruction, including:
The interactive module is called to show the identifying code and corresponding checking instruction.
4. method according to claim 2, it is characterised in that the trigger collection main body is in checking interaction is carried out
Operation behavior track, including:
The interactive module is called to gather the hardware information rail of the system application layer in checking interaction is carried out based on browser
Mark data, and the hardware information based on default system driver collection system drive layer in checking interaction is carried out
Track data.
5. method according to claim 4, it is characterised in that described that the operation behavior track is sent to the service
End, including:
Calculating is encrypted to the operation behavior track, and is sent to the operation behavior track after encryption based on ssl protocol
The service end, after calculating is decrypted in the operation behavior track to receiving for the service for checking credentials end, judges to obtain
Operation behavior track it is whether correct, according to the behavioural characteristic model pre-set if correct, to the operation behavior rail
The triggering main body of mark carries out man-machine identification.
6. method according to claim 5, it is characterised in that when the identifying code has default at the service for checking credentials end
Between length the valid cache time;
After the triggering main body to the operation behavior track carries out man-machine identification, methods described also includes:It is described to test
Valid cache time of the service end according to the identifying code is demonstrate,proved, judges whether the man-machine identification behavior based on the identifying code has
Effect.
7. the method according to claim any one of 1-6, it is characterised in that methods described also includes:
Service interaction request is sent to enterprise servers, carries what the service for checking credentials end was returned in the service interaction request
The corresponding recognition result check code of recognition result, the enterprise servers take according to the recognition result check code with the checking
The checking of result is identified in business end, and carries out after being verified service interaction.
8. a kind of man-machine identifying system, it is characterised in that applied to client, the system includes:
Authentication module, for the picture fragment from service for checking credentials end dynamic access identifying code, is recombinated to the picture fragment,
Obtain complete identifying code;
Interactive module, for showing the identifying code and corresponding checking instruction, the checking instruction is used to indicate triggering master
Body is based on the identifying code and carries out checking interaction, the operation row performed in the checking instruction comprising the instruction triggering main body
For;
Acquisition module, for operation behavior track of the trigger collection main body in checking interaction is carried out;
Communication module, for the operation behavior track to be sent into the service end, for the service for checking credentials end, according to pre-
The behavioural characteristic model first set, the triggering main body to the operation behavior track carries out man-machine identification;
Wherein, if the behavioural characteristic model is point of foundation dry run sample training is obtained, human manipulation and machine operation
Class device.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor
The computer program of operation, it is characterised in that realize that claim 1-7 such as appoints described in the computing device during computer program
The step of one methods described.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, its feature exists
In the step of realizing such as any one of claim 1-7 methods describeds when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710395331.3A CN107153786A (en) | 2017-05-26 | 2017-05-26 | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710395331.3A CN107153786A (en) | 2017-05-26 | 2017-05-26 | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107153786A true CN107153786A (en) | 2017-09-12 |
Family
ID=59794837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710395331.3A Pending CN107153786A (en) | 2017-05-26 | 2017-05-26 | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107153786A (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107704874A (en) * | 2017-09-29 | 2018-02-16 | 上海与德通讯技术有限公司 | Intelligent robot and its recognition methods and computer-readable recording medium |
CN107729729A (en) * | 2017-09-18 | 2018-02-23 | 北京知道未来信息技术有限公司 | It is a kind of based on random forest slip identifying code automatically by method of testing |
CN107729505A (en) * | 2017-10-23 | 2018-02-23 | 郑州云海信息技术有限公司 | Acquisition methods, device and the readable storage medium storing program for executing of a kind of small documents in caching |
CN107770171A (en) * | 2017-10-18 | 2018-03-06 | 厦门集微科技有限公司 | The verification method and system of the anti-reptile of server |
CN108008898A (en) * | 2017-12-13 | 2018-05-08 | 东软集团股份有限公司 | Page info acquisition methods, device, computer equipment and storage medium |
CN108416198A (en) * | 2018-02-06 | 2018-08-17 | 平安科技(深圳)有限公司 | Man-machine identification model establishes device, method and computer readable storage medium |
CN108495272A (en) * | 2018-03-19 | 2018-09-04 | 上海哔哩哔哩科技有限公司 | Robot recognition methods, system and storage medium based on HTML5 browsers |
CN109214162A (en) * | 2018-08-15 | 2019-01-15 | 深圳点猫科技有限公司 | A kind of verification method and system based on education resource platform |
CN109271762A (en) * | 2018-08-03 | 2019-01-25 | 平安科技(深圳)有限公司 | User authen method and device based on sliding block identifying code |
CN109284590A (en) * | 2018-09-29 | 2019-01-29 | 武汉极意网络科技有限公司 | Access method, equipment, storage medium and the device of behavior safety protection |
CN109509021A (en) * | 2018-10-22 | 2019-03-22 | 武汉极意网络科技有限公司 | Abnormality recognition method, device, server and the storage medium of Behavior-based control track |
CN109547426A (en) * | 2018-11-14 | 2019-03-29 | 腾讯科技(深圳)有限公司 | Service response method and server |
CN109815658A (en) * | 2018-12-14 | 2019-05-28 | 平安科技(深圳)有限公司 | A kind of verification method and device, computer equipment and computer storage medium |
CN109902459A (en) * | 2017-12-11 | 2019-06-18 | 北京京东尚科信息技术有限公司 | Man-machine identification verification method, system, equipment and the storage medium of WEB page |
CN109977641A (en) * | 2019-03-25 | 2019-07-05 | 山东浪潮云信息技术有限公司 | A kind of authentication processing method and system of Behavior-based control analysis |
CN110120933A (en) * | 2018-02-07 | 2019-08-13 | 阿里巴巴集团控股有限公司 | Air control, man-machine identification and data processing method, equipment and system |
CN110348190A (en) * | 2019-06-29 | 2019-10-18 | 上海淇毓信息科技有限公司 | User equipment ownership judgment method and device based on user's operation behavior |
CN110427737A (en) * | 2019-06-20 | 2019-11-08 | 平安科技(深圳)有限公司 | Man-machine recognition methods, device and the computer equipment of operation behavior |
CN110532755A (en) * | 2019-08-09 | 2019-12-03 | 北京三快在线科技有限公司 | A kind of method and device of computer implemented risk identification |
CN110768980A (en) * | 2019-10-22 | 2020-02-07 | 武汉极意网络科技有限公司 | Network man-machine verification method, device, equipment and storage medium |
CN110795706A (en) * | 2019-10-22 | 2020-02-14 | 武汉极意网络科技有限公司 | Hash-based verification method, equipment, storage medium and device |
CN110879882A (en) * | 2018-09-06 | 2020-03-13 | 中国移动通信集团重庆有限公司 | Method, apparatus, device and medium for confirming user information security |
CN111143227A (en) * | 2019-12-31 | 2020-05-12 | 上海米哈游天命科技有限公司 | Data operation method, device, terminal and storage medium |
CN111177668A (en) * | 2019-11-21 | 2020-05-19 | 武汉极意网络科技有限公司 | Man-machine interaction verification method based on mobile device sensor |
CN111241518A (en) * | 2020-01-03 | 2020-06-05 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
CN111259369A (en) * | 2018-12-03 | 2020-06-09 | 北京京东尚科信息技术有限公司 | Man-machine identity verification method and system |
CN111382412A (en) * | 2018-12-28 | 2020-07-07 | 武汉极意网络科技有限公司 | Memory, verification code implementation method, device and equipment |
CN111544893A (en) * | 2020-04-30 | 2020-08-18 | 福建天晴在线互动科技有限公司 | Reinforcing method and system for preventing code flow from being forged in game |
CN111966223A (en) * | 2020-08-17 | 2020-11-20 | 陈涛 | Non-perception MR glasses man-machine identification method, system, equipment and storage medium |
CN112187702A (en) * | 2019-07-02 | 2021-01-05 | 北京京东尚科信息技术有限公司 | Method and device for verifying client |
WO2021027113A1 (en) * | 2019-08-14 | 2021-02-18 | 平安科技(深圳)有限公司 | Image verification method, device, computer apparatus, and storage medium |
CN112580596A (en) * | 2020-12-30 | 2021-03-30 | 网易(杭州)网络有限公司 | Data processing method and device |
CN112861094A (en) * | 2019-11-27 | 2021-05-28 | 北京京东振世信息技术有限公司 | Man-machine recognition method and device |
CN113703822A (en) * | 2021-08-31 | 2021-11-26 | 三一专用汽车有限责任公司 | Differential upgrading method and device and operation machine |
CN115701158A (en) * | 2022-10-28 | 2023-02-07 | 重庆长安汽车股份有限公司 | Method and device for realizing vehicle control function of Bluetooth entity key RKE |
CN116112273A (en) * | 2023-02-16 | 2023-05-12 | 上海云砺信息科技有限公司 | Anti-fraud man-machine identification method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188263A (en) * | 2013-03-22 | 2013-07-03 | 百度在线网络技术(北京)有限公司 | Verification method, system and device |
CN104794375A (en) * | 2015-03-31 | 2015-07-22 | 北京奇虎科技有限公司 | Interaction page generating method and device |
CN106155298A (en) * | 2015-04-21 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Man-machine recognition methods and device, the acquisition method of behavior characteristics data and device |
CN106559413A (en) * | 2016-10-19 | 2017-04-05 | 深圳众享互联科技有限公司 | The message fragment method and its system of P2P network data securities transmission |
-
2017
- 2017-05-26 CN CN201710395331.3A patent/CN107153786A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188263A (en) * | 2013-03-22 | 2013-07-03 | 百度在线网络技术(北京)有限公司 | Verification method, system and device |
CN104794375A (en) * | 2015-03-31 | 2015-07-22 | 北京奇虎科技有限公司 | Interaction page generating method and device |
CN106155298A (en) * | 2015-04-21 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Man-machine recognition methods and device, the acquisition method of behavior characteristics data and device |
CN106559413A (en) * | 2016-10-19 | 2017-04-05 | 深圳众享互联科技有限公司 | The message fragment method and its system of P2P network data securities transmission |
Cited By (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107729729B (en) * | 2017-09-18 | 2021-01-01 | 北京知道未来信息技术有限公司 | Automatic passing test method of sliding verification code based on random forest |
CN107729729A (en) * | 2017-09-18 | 2018-02-23 | 北京知道未来信息技术有限公司 | It is a kind of based on random forest slip identifying code automatically by method of testing |
CN107704874A (en) * | 2017-09-29 | 2018-02-16 | 上海与德通讯技术有限公司 | Intelligent robot and its recognition methods and computer-readable recording medium |
CN107770171A (en) * | 2017-10-18 | 2018-03-06 | 厦门集微科技有限公司 | The verification method and system of the anti-reptile of server |
CN107770171B (en) * | 2017-10-18 | 2020-01-24 | 厦门集微科技有限公司 | Verification method and system for anti-crawler of server |
CN107729505A (en) * | 2017-10-23 | 2018-02-23 | 郑州云海信息技术有限公司 | Acquisition methods, device and the readable storage medium storing program for executing of a kind of small documents in caching |
CN109902459A (en) * | 2017-12-11 | 2019-06-18 | 北京京东尚科信息技术有限公司 | Man-machine identification verification method, system, equipment and the storage medium of WEB page |
CN108008898A (en) * | 2017-12-13 | 2018-05-08 | 东软集团股份有限公司 | Page info acquisition methods, device, computer equipment and storage medium |
CN108008898B (en) * | 2017-12-13 | 2020-04-28 | 东软集团股份有限公司 | Page information acquisition method and device, computer equipment and storage medium |
CN108416198A (en) * | 2018-02-06 | 2018-08-17 | 平安科技(深圳)有限公司 | Man-machine identification model establishes device, method and computer readable storage medium |
CN108416198B (en) * | 2018-02-06 | 2022-02-01 | 平安科技(深圳)有限公司 | Device and method for establishing human-machine recognition model and computer readable storage medium |
WO2019153604A1 (en) * | 2018-02-06 | 2019-08-15 | 平安科技(深圳)有限公司 | Device and method for creating human/machine identification model, and computer readable storage medium |
CN110120933A (en) * | 2018-02-07 | 2019-08-13 | 阿里巴巴集团控股有限公司 | Air control, man-machine identification and data processing method, equipment and system |
CN108495272A (en) * | 2018-03-19 | 2018-09-04 | 上海哔哩哔哩科技有限公司 | Robot recognition methods, system and storage medium based on HTML5 browsers |
CN109271762B (en) * | 2018-08-03 | 2023-04-07 | 平安科技(深圳)有限公司 | User authentication method and device based on slider verification code |
CN109271762A (en) * | 2018-08-03 | 2019-01-25 | 平安科技(深圳)有限公司 | User authen method and device based on sliding block identifying code |
CN109214162A (en) * | 2018-08-15 | 2019-01-15 | 深圳点猫科技有限公司 | A kind of verification method and system based on education resource platform |
CN110879882A (en) * | 2018-09-06 | 2020-03-13 | 中国移动通信集团重庆有限公司 | Method, apparatus, device and medium for confirming user information security |
CN110879882B (en) * | 2018-09-06 | 2022-09-27 | 中国移动通信集团重庆有限公司 | Method, apparatus, device and medium for confirming user information security |
CN109284590A (en) * | 2018-09-29 | 2019-01-29 | 武汉极意网络科技有限公司 | Access method, equipment, storage medium and the device of behavior safety protection |
CN109284590B (en) * | 2018-09-29 | 2021-06-25 | 武汉极意网络科技有限公司 | Method, equipment, storage medium and device for access behavior security protection |
CN109509021A (en) * | 2018-10-22 | 2019-03-22 | 武汉极意网络科技有限公司 | Abnormality recognition method, device, server and the storage medium of Behavior-based control track |
CN109509021B (en) * | 2018-10-22 | 2021-05-28 | 武汉极意网络科技有限公司 | Behavior track-based anomaly identification method and device, server and storage medium |
CN109547426B (en) * | 2018-11-14 | 2021-07-27 | 腾讯科技(深圳)有限公司 | Service response method and server |
CN109547426A (en) * | 2018-11-14 | 2019-03-29 | 腾讯科技(深圳)有限公司 | Service response method and server |
CN111259369A (en) * | 2018-12-03 | 2020-06-09 | 北京京东尚科信息技术有限公司 | Man-machine identity verification method and system |
CN111259369B (en) * | 2018-12-03 | 2024-04-12 | 北京京东尚科信息技术有限公司 | Man-machine identity verification method and system |
CN109815658A (en) * | 2018-12-14 | 2019-05-28 | 平安科技(深圳)有限公司 | A kind of verification method and device, computer equipment and computer storage medium |
CN111382412A (en) * | 2018-12-28 | 2020-07-07 | 武汉极意网络科技有限公司 | Memory, verification code implementation method, device and equipment |
CN109977641A (en) * | 2019-03-25 | 2019-07-05 | 山东浪潮云信息技术有限公司 | A kind of authentication processing method and system of Behavior-based control analysis |
CN110427737A (en) * | 2019-06-20 | 2019-11-08 | 平安科技(深圳)有限公司 | Man-machine recognition methods, device and the computer equipment of operation behavior |
CN110348190A (en) * | 2019-06-29 | 2019-10-18 | 上海淇毓信息科技有限公司 | User equipment ownership judgment method and device based on user's operation behavior |
CN112187702A (en) * | 2019-07-02 | 2021-01-05 | 北京京东尚科信息技术有限公司 | Method and device for verifying client |
CN110532755A (en) * | 2019-08-09 | 2019-12-03 | 北京三快在线科技有限公司 | A kind of method and device of computer implemented risk identification |
CN110532755B (en) * | 2019-08-09 | 2020-11-03 | 北京三快在线科技有限公司 | Computer-implemented risk identification method and device |
WO2021027113A1 (en) * | 2019-08-14 | 2021-02-18 | 平安科技(深圳)有限公司 | Image verification method, device, computer apparatus, and storage medium |
CN110795706A (en) * | 2019-10-22 | 2020-02-14 | 武汉极意网络科技有限公司 | Hash-based verification method, equipment, storage medium and device |
CN110768980B (en) * | 2019-10-22 | 2022-04-05 | 武汉极意网络科技有限公司 | Network man-machine verification method, device, equipment and storage medium |
CN110768980A (en) * | 2019-10-22 | 2020-02-07 | 武汉极意网络科技有限公司 | Network man-machine verification method, device, equipment and storage medium |
CN111177668A (en) * | 2019-11-21 | 2020-05-19 | 武汉极意网络科技有限公司 | Man-machine interaction verification method based on mobile device sensor |
CN112861094A (en) * | 2019-11-27 | 2021-05-28 | 北京京东振世信息技术有限公司 | Man-machine recognition method and device |
CN111143227A (en) * | 2019-12-31 | 2020-05-12 | 上海米哈游天命科技有限公司 | Data operation method, device, terminal and storage medium |
CN111143227B (en) * | 2019-12-31 | 2023-11-17 | 上海米哈游天命科技有限公司 | Data operation method, device, terminal and storage medium |
CN111241518A (en) * | 2020-01-03 | 2020-06-05 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
CN111241518B (en) * | 2020-01-03 | 2023-03-24 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
CN111544893B (en) * | 2020-04-30 | 2023-09-01 | 福建天晴在线互动科技有限公司 | Reinforcing method and system for preventing code flow forging based on game |
CN111544893A (en) * | 2020-04-30 | 2020-08-18 | 福建天晴在线互动科技有限公司 | Reinforcing method and system for preventing code flow from being forged in game |
CN111966223B (en) * | 2020-08-17 | 2022-06-28 | 陈涛 | Method, system, device and storage medium for human-machine identification of non-perception MR glasses |
CN111966223A (en) * | 2020-08-17 | 2020-11-20 | 陈涛 | Non-perception MR glasses man-machine identification method, system, equipment and storage medium |
CN112580596A (en) * | 2020-12-30 | 2021-03-30 | 网易(杭州)网络有限公司 | Data processing method and device |
CN112580596B (en) * | 2020-12-30 | 2024-02-27 | 杭州网易智企科技有限公司 | Data processing method and device |
CN113703822A (en) * | 2021-08-31 | 2021-11-26 | 三一专用汽车有限责任公司 | Differential upgrading method and device and operation machine |
CN113703822B (en) * | 2021-08-31 | 2022-11-01 | 三一专用汽车有限责任公司 | Differential upgrading method and device and operation machine |
CN115701158A (en) * | 2022-10-28 | 2023-02-07 | 重庆长安汽车股份有限公司 | Method and device for realizing vehicle control function of Bluetooth entity key RKE |
CN116112273B (en) * | 2023-02-16 | 2023-10-20 | 上海云砺信息科技有限公司 | Anti-fraud man-machine identification method and system |
CN116112273A (en) * | 2023-02-16 | 2023-05-12 | 上海云砺信息科技有限公司 | Anti-fraud man-machine identification method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107153786A (en) | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing | |
CN109657450B (en) | Method, device, medium, and electronic device for evaluation based on block chain | |
Ellison | Ceremony design and analysis | |
CN110232645B (en) | Electronic evidence fixing and network evidence obtaining method and system based on memory evidence obtaining and block chain | |
CN109936547A (en) | Identity identifying method, system and calculating equipment | |
CN104620225B (en) | Method and system for server security checking | |
CN105207780B (en) | A kind of certification user method and device | |
CN106911684B (en) | Authentication method and system | |
CN107493291A (en) | A kind of identity identifying method and device based on safety element SE | |
CN108322416B (en) | Security authentication implementation method, device and system | |
CN109361508A (en) | Data transmission method, electronic equipment and computer readable storage medium | |
CN112187702A (en) | Method and device for verifying client | |
Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
CN109547426A (en) | Service response method and server | |
CN107483987A (en) | A kind of method for authenticating and device of video flowing address | |
Jain et al. | Session hijacking: Threat analysis and countermeasures | |
Acar et al. | A privacy‐preserving multifactor authentication system | |
CN110166470A (en) | A kind of network service analogy method and device | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN109558724A (en) | A kind of software action integrity verification method | |
CN109413004A (en) | Verification method, device and equipment | |
CN116506206A (en) | Big data behavior analysis method and system based on zero trust network user | |
CN110266727A (en) | Recognition methods, server and the client of simulation browser behavior | |
CN104009963B (en) | The security authentication mechanism of remote password | |
CN111639033B (en) | Software security threat analysis method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20210312 |