CN110120933A - Air control, man-machine identification and data processing method, equipment and system - Google Patents
Air control, man-machine identification and data processing method, equipment and system Download PDFInfo
- Publication number
- CN110120933A CN110120933A CN201810123056.4A CN201810123056A CN110120933A CN 110120933 A CN110120933 A CN 110120933A CN 201810123056 A CN201810123056 A CN 201810123056A CN 110120933 A CN110120933 A CN 110120933A
- Authority
- CN
- China
- Prior art keywords
- man
- machine
- machine identification
- service request
- operation object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the present application provides a kind of air control, man-machine identification and data processing method, equipment and system.In the embodiment of the present application, server device is matched with man-machine identification equipment, man-machine recognition result is supplied to server device by man-machine identification equipment, the man-machine recognition result of man-machine identification equipment and the corresponding business air control strategy of service request is combined to determine the processing mode to corresponding service request by server device, due to considering man-machine recognition result and business air control strategy simultaneously, therefore it can not only accomplish man-machine identification, but also man-machine identification can be reduced and adversely affected to business bring.
Description
Technical field
This application involves Internet technical field more particularly to a kind of air controls, man-machine identification and data processing method, equipment
And system.
Background technique
In some business scenarios, often there is the behavior practised fraud using machine script or program.For example, in electric business
Advertising campaign scene in, often occur using machine script or program brush red packet, rob the behaviors such as discount coupon.Therefore, it is necessary to
Manual operation normal under certain business scenario is distinguished with machine script or procedure operation, i.e., man-machine identification.
Existing man-machine identifying schemes usually generate identifying code by authentication server and are supplied to user, it is desirable that user presses
The input mode that can just accomplish according to the only mankind inputs identifying code.If user inputs the verifying of operation and the input of identifying code
Code is correct, determines that current operation be normal person is operation, corresponding service request will be cleared;Conversely, determining that current operation is
The cheating that machine script or procedure operation carry out, corresponding service request will be intercepted.
Existing man-machine identifying schemes can exclude the behavior practised fraud using machine script or program to a certain extent, but
It is that also will appear erroneous judgement sometimes, this can bring adverse effect to business.
Summary of the invention
The many aspects of the application provide a kind of air control, man-machine identification and data processing method, equipment and system, to
While realizing man-machine identification, man-machine identification is reduced as far as possible and is adversely affected to business bring.
The embodiment of the present application provides a kind of air control method, is suitable for client device, which comprises
Man-machine identification parameter is acquired during operation object initiating business request;
In response to the service request that the operation object is initiated, the service request and the man-machine identification parameter are sent
To server device, so that the server device is according to the corresponding business air control strategy of the service request and by man-machine identification
Equipment asks the business according to the man-machine recognition result determination for the operation object that the man-machine identification parameter obtains
The processing mode asked.
The embodiment of the present application also provides a kind of air control method, is suitable for server device, which comprises
The service request and man-machine identification parameter, the man-machine identification parameter for receiving client device transmission are the clients
End equipment is collected during operation object initiating business request;
The man-machine identification parameter is transmitted to man-machine identification equipment, and receives the man-machine identification equipment according to the people
The man-machine recognition result for the operation object that machine identification parameter returns;And
In conjunction with the man-machine recognition result and the corresponding business air control strategy of the service request, the business is asked in determination
The processing mode asked.
The embodiment of the present application also provides a kind of man-machine recognition methods, is suitable for man-machine identification equipment, which comprises
The man-machine identification parameter that server device is sent is received, the man-machine identification parameter is client device in operation pair
As being acquired during initiating business request and being supplied to the server device;
Man-machine identification is carried out to the operation object according to the man-machine identification parameter, to obtain man-machine recognition result;
The man-machine recognition result is sent to the server device, so that the server device is in conjunction with described man-machine
Recognition result and the corresponding business air control strategy of the service request determine the processing mode to the service request.
The embodiment of the present application also provides a kind of client device, comprising: memory, processor and communication component;
The memory, for storing computer program;
The processor is coupled with the memory and the communication component, for executing the computer program, with
In:
Man-machine identification parameter is acquired during operation object initiating business request;
In response to the service request that the operation object is initiated, by the communication component by the service request and described
Man-machine identification parameter is sent to server device, so that the server device is according to the corresponding business air control of the service request
Strategy and the man-machine recognition result for the operation object obtained by man-machine identification equipment according to the man-machine identification parameter
Determine the processing mode to the service request;
The communication component is set for the service request and the man-machine identification parameter to be sent to the server-side
It is standby.
The embodiment of the present application also provides a kind of server device, comprising: memory, processor and communication component;
The memory, for storing computer program;
The processor is coupled with the memory and the communication component, for executing the computer program, with
In:
The service request and man-machine identification parameter that client device is sent, the man-machine knowledge are received by the communication component
Other parameter is that the client device is collected during operation object initiating business request;
The man-machine identification parameter is transmitted to man-machine identification equipment by the communication component, and receives the man-machine knowledge
The man-machine recognition result for the operation object that other equipment is returned according to the man-machine identification parameter;And
In conjunction with the man-machine recognition result and the corresponding business air control strategy of the service request, the business is asked in determination
The processing mode asked.
The embodiment of the present application also provides a kind of man-machine identification equipment, comprising: memory, processor and communication component;
The memory, for storing computer program;
The processor is coupled with the memory and the communication component, for executing the computer program, with
In:
The man-machine identification parameter that server device is sent is received by the communication component, the man-machine identification parameter is visitor
Family end equipment acquires during operation object initiating business request and is supplied to the server device;
Man-machine identification is carried out to the operation object according to the man-machine identification parameter, to obtain man-machine recognition result;
The man-machine recognition result is sent to the server device by the communication component, for the server-side
Equipment is determined in conjunction with the man-machine recognition result and the corresponding business air control strategy of the service request to the service request
Processing mode.
The embodiment of the present application also provides a kind of air control system, comprising: client device, server device and man-machine identification
Equipment;
The client device, for acquiring man-machine identification parameter during operation object initiating business request, and
In response to the service request that the operation object is initiated, the service request and the man-machine identification parameter are sent to the clothes
Business end equipment;
The server device, the service request and the man-machine identification sent for receiving the client device
The man-machine identification parameter is transmitted to the man-machine identification equipment and receives the man-machine identification equipment according to the people by parameter
The man-machine recognition result for the operation object that machine identification parameter returns, and in conjunction with the man-machine recognition result and described
The corresponding business air control strategy of service request determines the processing mode to the service request;
The man-machine identification equipment, the man-machine identification parameter sent for receiving the server device, according to institute
It states man-machine identification parameter and man-machine identification is carried out to the operation object to obtain the man-machine recognition result and by the man-machine knowledge
Other result is sent to the server device.
The embodiment of the present application also provides another air control system, comprising: client device, server device and man-machine knowledge
Other equipment;
The client device, for acquiring man-machine identification parameter during operation object initiating business request, and
In response to the service request that the operation object is initiated, the service request and the man-machine identification parameter are sent respectively to institute
State server device and the man-machine identification equipment;
The man-machine identification equipment, the man-machine identification parameter sent for receiving the client device, according to institute
It states man-machine identification parameter and man-machine identification is carried out to the operation object to obtain the man-machine recognition result and by the man-machine knowledge
Other result is sent to the server device;
The server device, the service request sent for receiving the client device, and receive the people
Machine identifies the man-machine recognition result that equipment is sent, and corresponding in conjunction with the man-machine recognition result and the service request
Business air control strategy determines the processing mode to the service request.
The embodiment of the present application also provides a kind of data processing method, comprising:
Receive client data, wherein the client data includes man-machine identification data and business identification code;
According to the business identification code, man-machine recognition rule or the man-machine recognition threshold of adjustment are selected;
Based on the man-machine recognition rule or man-machine recognition threshold, judge whether the man-machine identification data are effective;
If effectively, feding back through man-machine identification notice;If invalid, feedback is not notified by man-machine identification.
The embodiment of the present application also provides another data processing method, comprising:
Obtain man-machine identification data;
To server device send client data, wherein the client data include the man-machine identification data and
Business identification code, wherein the business identification code is used to indicate man-machine recognition rule or man-machine recognition threshold.
In the embodiment of the present application, server device is matched with man-machine identification equipment, and man-machine identification equipment is by man-machine knowledge
Other result is supplied to server device, and the man-machine recognition result and service request of man-machine identification equipment are combined by server device
Corresponding business air control strategy determines the processing mode requested corresponding service;Alternatively, server device is based on business identification code
Validation verification, the validity feedback man machine recognition result based on man-machine identification data are carried out to man-machine identification data.Thus may be used
See, man-machine identification in conjunction with business, therefore can not only be accomplished man-machine identification, but also can reduce people by the embodiment of the present application
Machine is identified to be adversely affected to business bring.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of structural schematic diagram for air control system that one exemplary embodiment of the application provides;
Fig. 2 is a kind of flow diagram for air control method that the application another exemplary embodiment provides;
Fig. 3 is the flow diagram for another air control method that the application another exemplary embodiment provides;
Fig. 4 is a kind of flow diagram for man-machine recognition methods that the application another exemplary embodiment provides;
Fig. 5 is the flow diagram for another air control method that the application another exemplary embodiment provides;
Fig. 6 is the structural schematic diagram for another air control system that the application another exemplary embodiment provides;
Fig. 7 a is the air control method realized based on air control system shown in Fig. 6 that the application another exemplary embodiment provides
Flow diagram;
Fig. 7 b is a kind of structural schematic diagram for operation system that the application another exemplary embodiment provides;
Fig. 7 c is a kind of flow diagram for data processing method that the application another exemplary embodiment provides;
Fig. 7 d is the flow diagram for another data processing method that the application another exemplary embodiment provides;
Fig. 8 a is a kind of structural schematic diagram for wind-controlling device that the application another exemplary embodiment provides;
Fig. 8 b is a kind of structural schematic diagram for client device that the application another exemplary embodiment provides;
Fig. 9 a is the structural schematic diagram for another wind-controlling device that the application another exemplary embodiment provides;
Fig. 9 b is a kind of structural schematic diagram for server device that the application another exemplary embodiment provides;
Figure 10 a is a kind of structural schematic diagram for man-machine identification device that the application another exemplary embodiment provides;
Figure 10 b is a kind of structural schematic diagram for man-machine identification equipment that the application another exemplary embodiment provides;
Figure 11 a is the structural schematic diagram for another client device that the application another exemplary embodiment provides;
Figure 11 b is the structural schematic diagram for another server device that the application another exemplary embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
The technical issues of adverse effect may be brought to business for existing man-machine identifying schemes, in some realities of the application
It applies in example: man-machine identification is combined with business, man-machine recognition result and business wind are combined by the server device of offer business
Control strategy determines the processing mode requested corresponding service, or carries out validity to man-machine identification data based on business identification code
Verifying, the validity feedback man machine recognition result based on man-machine identification data.Since man-machine identification and business being combined,
Therefore it can not only accomplish man-machine identification, but also man-machine identification can be reduced and adversely affected to business bring.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Fig. 1 is a kind of structural schematic diagram for air control system that one exemplary embodiment of the application provides.As shown in Figure 1, should
Air control system includes: client device 10, server device 20 and man-machine identification equipment 30.Client device 10 and server-side
It is communicated to connect between equipment 20;It is communicated to connect between server device 20 and man-machine identification equipment 30.
Wherein, between client device 10 and server device 20 and server device 20 and man-machine identification equipment 30 it
Between can be and wirelessly or non-wirelessly communicate to connect.In the present embodiment, if client device 10 is set by mobile network and server-side
Standby 20 communication connection or server device 20 are communicated to connect by mobile network and man-machine identification equipment 30, then the mobile network
The network formats of network can be 2G (GSM), 2.5G (GPRS), 3G (WCDMA, TD-SCDMA, CDMA2000, UTMS), 4G
(LTE), any one in 4G+ (LTE+), WiMax and the subsequent new network formats that will occur etc..
In the present embodiment, the equipment that client device 10 is primarily referred to as bearer service client, predominantly user provide
Local service.In physics realization, client device 10 can be smart phone, tablet computer, PC, wearable device etc.
Terminal device.Client device 10 generally includes at least one processing unit and at least one processor.Processing unit and storage
The quantity of device depends on the configuration and type of client device 10.Memory may include volatibility, such as RAM, can also be with
Including non-volatile, such as read-only memory (Read-Only Memory, ROM), flash memory etc., or can also include simultaneously
It is two kinds of.Operating system (Operating System, OS), one or more application program are typically stored in memory
(application, app), such as service customer end corresponding with business service end, also can store program data etc..It removes
Except processing unit and memory, client device 10 also will include network card chip, IO bus, audio-video component etc. and matches substantially
It sets.Optionally, according to the way of realization of client device 10, client device 10 also may include some peripheral equipments, such as
Keyboard, mouse, input pen, printer etc..These peripheral equipments are well known in the art, and this will not be repeated here.
In the present embodiment, the equipment that server device 20 is primarily referred to as bearer service server-side, predominantly client are set
Standby 10 service, the service request that service content such as customer in response end equipment 10 is sent provide resource to client device 10, protect
Deposit the data etc. of client device 10.In physics realization, server device 20 can be it is any be capable of providing calculating service, ring
The service request of client device 10, and the equipment for carrying out corresponding service processing are answered, such as can be General Server, cloud service
Device, cloud host, virtual center etc..The composition of server mainly includes processor, hard disk, memory, system bus etc. and general
Computer architecture is similar.
According to the difference of business scenario, the way of realization and provided industry of client device 10 and server device 20
Business function will be different.For example, client device 10 and server device 20 can be to provide E-mail receiver/send business
Email client device and e-mail server, alternatively, being also possible to provide the instant messaging visitor of instant messaging business
Family end equipment and instant communication server provide the online shopping visitor of shopping online business alternatively, can also be in e-commerce field
Family end equipment and online shopping server, etc..Wherein, online shopping server is primarily referred to as carrying out trading processing in Network character
Server, typically refer to use a network for the server of commodity transaction on line, such as can be on each electric business platform or line
The trading server of business site, is also possible to third-party server.
In the embodiment of the present application, the user (referred to as user) of client can request to take by client device 10
The business processing logic for end equipment 20 of being engaged in, to realize corresponding business function, such as instant messaging, send and receive e-mail or
Online shopping etc..In some business scenarios, some users may continually request server-side using machine script/program
The business processing logic of equipment 20, to speculate for oneself.In addition to this, this to be made using machine script/program
The behavior of disadvantage can also aggravate the processing load of server device 20, be unfavorable for business and normally carry out.
For example, in order to attract new user, certain can freely be got by often carrying out new registration user in e-commerce field
The red packet activity of amount, referred to as new user lead red packet activity.It is led in red packet activity in new user, some users can use account
A kind of automatic registration software tool (being machine script/program) constantly registers new account, so that a large amount of red packets are got, and actually
Get the user of red packet be it is same, the appearance of this behavior is unfavorable for new user and leads red packet activity purpose, can not be from real meaning
New user is attracted in justice.
The behavior practised fraud in order to prevent using machine script/program increases people in the air control system of the present embodiment
Machine identifies equipment 30, and man-machine identification equipment 30 is identified as far as possible and blocked and utilize machine mainly for the man-machine identification of related operation progress
The behavior that device script/program is practised fraud.In physics realization, man-machine identification equipment 30, which can be, any can be realized man-machine knowledge
The equipment of other function, such as can be the server apparatus such as General Server, Cloud Server, cloud host, virtual center, Huo Zheye
It can be the terminal devices such as smart phone, tablet computer, PC, wearable device.
In the present embodiment, other than being directed to related operation using man-machine identification equipment 30 and carrying out man-machine identification, service
End equipment 20 can also be matched with man-machine identification equipment 30, be asked in combination with man-machine identification and the determination of business air control strategy to business
The processing mode asked allows business air control strategy and man-machine recognition result to influence each other, mutually correction is to generate more
The air control be conducive to is as a result, can not only accomplish man-machine identification in this way, but also can reduce man-machine identification and give business bring unfavorable shadow
It rings.
Client device 10 is described below in detail to the process of 20 initiating business request of server device and in the process
Middle server device 20 cooperates with man-machine identification equipment 30 carries out the process of air control.
In view of can not determine that initiating business request is normal users or cheating machine script/program at the beginning, therefore by industry
Business request promoter is known as operation object.The operation object may be normal users, it is also possible to machine script/program of practising fraud.
Operation object can be interacted with client device 10 so as to 20 initiating business request of server device.It is with login process
Example, operation object can carry out following interactive operation with client device 10: point opens login page, inputs username and password,
Mobile mouse, sliding-rolling item and click login button etc., to initiate logging request to server device 20.
For client device 10, man-machine identification ginseng can be acquired during operation object initiating business request
Number, and may be in response to the service request (such as the operation for clicking login button) of operation object initiation, by the service request and adopt
The man-machine identification parameter collected is sent to server device 20.
For server device 20, the service request and man-machine identification parameter that client device 10 is sent can receive.
After receiving service request and man-machine identification parameter, man-machine identification parameter is transmitted to man-machine identification and set by server device 20
Standby 30, so that man-machine identification equipment 30 carries out man-machine identification for operation object according to the man-machine identification parameter to obtain man-machine knowledge
Not as a result, and receiving the man-machine recognition result for operation object that man-machine identification equipment 30 is returned according to man-machine identification parameter;
In turn, in combination with man-machine recognition result and the corresponding business air control strategy of service request, the processing mode to service request is determined.
For man-machine identification equipment 30, the man-machine identification parameter of the transmission of server device 20 can receive, according to man-machine
Identification parameter carries out man-machine identification to operation object to obtain man-machine recognition result and man-machine recognition result is sent to server-side
Equipment 20, in order to which server device 20 can be determined in conjunction with man-machine recognition result and the corresponding business air control strategy of service request
To the processing mode of service request.
In the present embodiment, server device is matched with man-machine identification equipment, no longer certainly using man-machine identification as one
System is closed, but man-machine identification is coupled on business air control strategy, is supplied to man-machine recognition result by man-machine identification equipment
Server device, and then by server device in conjunction with the man-machine recognition result and the corresponding industry of service request of man-machine identification equipment
Business air control strategy determines the processing mode requested corresponding service, allows business air control strategy and man-machine recognition result mutual
It influences, mutually correction is to generate the air control being more conducive to as a result, can not only accomplish man-machine identification to reach, but also can drop
The beneficial effect that low man-machine identification is adversely affected to business bring.
In each embodiment of the application, when operation object initiating business request, client device 10 can be by service request
And collected man-machine identification parameter is sent to server device 20.The embodiment of the present application do not limit client device 10 to
Server device 20 send service request and man-machine identification parameter mode, it is all can be by service request and man-machine identification parameter
The sending method for being successfully sent to server device 20 is suitable for the embodiment of the present application.It is exemplified below:
In some illustrative embodiments, client device 10 can be during operation object initiating business request
Man-machine identification parameter is acquired, and in operation object initiating business request, by different communication process respectively by service request
Server device 20 is sent to man-machine identification parameter.For example, client device 10 can be in operation object initiating business request
When, service request is first sent to server device 20, then man-machine identification parameter is sent to server device 20.Alternatively, objective
Man-machine identification parameter first can also be sent to server device 20 in operation object initiating business request by family end equipment 10,
Service request is sent to server device 20 again.In this fashion, client device 10 is sent in each communication process
Relatively small to the data volume of server device 20, each communications burden is lighter.
In other illustrative embodiments, client device 10 can be in the process of operation object initiating business request
The man-machine identification parameter of middle acquisition, and in operation object initiating business request, in same communication process by service request and man-machine
Identification parameter is sent to server device 20 together.For example, client device 10 can in operation object initiating business request,
Collected man-machine identification parameter carrying is sent to server device 20 in service request.This mode advantageously reduces visitor
Number of communications between family end equipment 10 and server device 20 is conducive to mitigate client device 10 and server device 20
Communications burden.
In other exemplary embodiment mode, client device 10 can be in the mistake of operation object initiating business request
Man-machine identification parameter is acquired in journey and is sent to server device 20 in real time, and in operation object initiating business request, it will
Service request is sent to server device 20.In this fashion, client device 10 in real time joins collected man-machine identification
Number is sent to server device 20, is conducive to the real-time for improving man-machine identification.
In each embodiment of the application, for the ease of carrying out man-machine identification, client device 10 initiates industry in operation object
Man-machine identification parameter can be acquired during business request.Man-machine identification parameter is primarily referred to as carrying out man-machine knowledge for operation object
Parameter needed for not.The embodiment of the present application is not defined man-machine identification parameter, all to can be used to carry out man-machine identification
Parameter is suitable for each embodiment of the application.It is exemplified below:
In some illustrative embodiments, man-machine identification parameter may include operation object in initiating business request process
In some behavioral datas for generating when being interacted with client device 10 will here for convenient for being distinguished in description
Behavioral data is known as the first behavioral data.First behavioral data can be what operation object generated during initiating business request
Various actions data, can reflect operation object to a certain extent is normal users or cheating machine script/program.
For example, client device 10, which is shown, applies homepage, and the application is first by taking the login process under certain application scenarios as an example
Page is equipped with login button;Operation object clicks login button and enters login page, and user name and close is shown on login page
Code input frame;The mobile mouse of operation object positions a cursor in user name input frame, and inputs and use in user name input frame
Then name in an account book moves mouse and navigates in Password Input frame cursor and input password in Password Input frame;Operation object can
At sliding-rolling item to login button, and clicks login button and issue logging request.Logging request is initiated in aforesaid operations object
Example in, collected first behavioral data of client device 10 can include but is not limited to: click login button operation,
It inputs the operation of the username and password, sliding-rolling item of operation and the input of username and password and clicks login button
Operation etc..If successful acquisition to these behavioral datas, can reflect the operation pair for initiating logging request to a certain extent
Like normal users.
Based on above-mentioned, client device 10 can acquire operation object during operation object initiating business request
The first behavioral data of generation is interacted as man-machine identification parameter with client device 10.
In other illustrative embodiments, man-machine identification parameter may include soft/hard environment of client device 10
Parameter.Soft/hard environment parameter is primarily referred to as some parameters relevant to the software of client device 10 and/hardware, such as can be with
IP address, MAC Address, device model including client device 10, CPU model, operating system version, memory size, disk
Type and size etc..By judging whether soft/hard environment parameter of client device 10 adapts to some cheating machine script/programs
Operation, to judge whether operation object practises fraud machine script/program to a certain extent.Based on this, client device 10
During operation object initiating business request, the soft/hard environment parameter of client device 10 can be acquired as man-machine knowledge
Other parameter.
In other illustrative embodiments, man-machine identification parameter can include that operation object is set with client simultaneously
Soft/hard environment parameter of standby 10 the first behavioral datas and client device 10 generated when interacting.Based on this, client
Equipment 10 can acquire operation object and client device 10 interacts production during operation object initiating business request
Soft/hard environment parameter of raw the first behavioral data and client device 10 is as man-machine identification parameter.
Correspondingly, man-machine identification parameter is different, and man-machine identification equipment 30 carries out operation object according to man-machine identification parameter
The process of man-machine identification would also vary from.
It include the first behavior data instance with man-machine identification parameter, man-machine identification equipment 30 can be mainly according to the first behavior
Data, come determine operation object whether be cheating class machine script/program or determine operation object be cheating class machine script/
The probability of program, as man-machine recognition result.
By taking man-machine identification parameter includes soft/hard environment parameter of client device 10 as an example, then man-machine identification equipment 30 can
With mainly according to soft/hard environment parameter of client device 10 and known cheating machine script/program running environment parameter,
To determine whether operation object is cheating class machine script/program or determines that operation object is cheating class machine script/program
Probability, as man-machine recognition result.
By taking man-machine identification parameter includes simultaneously soft/hard environment parameter of the first behavioral data and client device 10 as an example,
Then man-machine identification equipment 30 can determine that operation object is cheating class machine script/program first according to the first behavioral data
Probability;And joined according to soft/hard environment parameter of client device 10 and known cheating machine script/program running environment
Number determines that operation object is cheating the second probability of class machine script/program;And then the first probability and the second probability is combined to obtain
Final man-machine recognition result.For example, the multiplication can be tied the first probability and the second probability multiplication by man-machine identification equipment 30
Fruit is the cheating final probability of class machine script/program as operation object, and is returned final probability as man-machine recognition result
Back to server device 20.Alternatively, man-machine identification equipment 30 can be by the first probability and the second probability multiplication, according to the multiplication knot
Fruit determine operation object yes or no cheating class machine script/program as a result, and will eventually determine yes or no cheating class
Machine script/program result returns to server device 20 as man-machine recognition result.Alternatively, man-machine identification equipment 30 can also
It is general by first with according to weight coefficient corresponding with soft/hard environment parameter of client device 10 with the first behavioral data
Rate is multiplied with the second probability weight, is the cheating final probability of class machine script/program using the multiplied result as operation object,
And server device 20 is returned to using final probability as man-machine recognition result.Or man-machine identification equipment 30 can be according to
One behavioral data weight coefficient corresponding with soft/hard environment parameter of client device 10, the first probability and second is general
Rate weighting is multiplied, and determines operation object yes or no cheating class machine script/program as a result, and will most according to the multiplied result
Eventually it is confirmed that or not being that cheating class machine script/program result returns to server device 20 as man-machine recognition result.
Still optionally further, client device 10 is after obtaining man-machine identification parameter, can also to man-machine identification parameter into
Row encipherment protection can be encrypted man-machine identification parameter, that is, in transmission process to improve safety and secrecy
Property.In the case where client device 10 encrypts man-machine identification parameter, operation that man-machine identification parameter is decrypted
It can be responsible for by server device 20, i.e., server device 20 is first decrypted man-machine identification parameter, then by the people after decryption
Machine identification parameter is transmitted to man-machine identification equipment 30;Alternatively, the operation that man-machine identification parameter is decrypted can also be by man-machine
Identifying that equipment 30 is responsible for, i.e., the man-machine identification parameter of encryption is directly transmitted to man-machine identification equipment 30 by server device 20, and
Man-machine identification equipment 30 is first decrypted man-machine identification parameter, then further according to the man-machine identification parameter after decryption for operation
Object carries out man-machine identification.The embodiment of the present application does not limit the mode for being encrypted, being decrypted to man-machine identification parameter, can adopt
With various known encryption and decryption modes.
In above-mentioned each illustrative embodiments, client device 10 acquires operation object in the process of initiating business request
In the first behavioral data of generation and/or soft/hard environment parameter of client device 10 are interacted with client device 10.?
During collecting these man-machine identification parameters, user can be not involved in interactive operation relevant to man-machine identification, be convenient for user
More it is absorbed in operation relevant to business, this mode significantly reduces man-machine identification process and interferes to user's bring.
It is worth noting that user can be not involved in related with man-machine identification during collecting man-machine identification parameter
Interactive operation, but it is not limited to this.For example, user is in addition to participating in and business phase during user's initiating business request
Except the interactive operation of pass, some interactive operations related with man-machine identification can also be participated in, such as user can input verifying
Code can move mouse and click verifying button etc., to further increase the accuracy of man-machine recognition result.
In some exemplary embodiments, server device 20, can be with after determining to the processing mode of service request
Response message is sent to client device 10, the response message is for response service end equipment 20 to the processing side of service request
Formula.For client device 10, the response message that server device 20 is sent can receive, and export and the response message phase
The results page matched, in order to which operation object understands server device 20 to the processing mode of the service request.
Optionally, which perhaps indicates that server device 20 receives the service request or indicates that server-side is set
Standby 20 refuse the service request.When the response message indicates that server device 20 receives the service request, client device 10
Request can be exported to user received or carried out the pages such as business processing or service processing result.When the response message
When indicating that server device 20 refuses the service request, client device 10 can export request to user and be rejected or request to lose
Lose the equal pages.
For example, normal users can pass through client so that server device 20 provides cloud storage business towards enterprise as an example
Equipment 10 initiates registration request to server device 20, to apply for cloud storage space.In registration process, machine is utilized in order to prevent
The registration behavior that device script/program is practised fraud, client device 10 can acquire operation object and initiate registration request process
The behavioral data of middle generation and/or soft/hard environment parameter of client device 10 are as man-machine identification parameter, by the man-machine identification
Parameter is supplied to server device 20, and then is transmitted to man-machine identification equipment 30 by server device 20, by man-machine identification equipment
30 determine whether the operation object is normal users based on these man-machine identification parameters.
In above-mentioned registration process, other than identifying whether initiate the operation object of registration request is normal users,
Server device 20 can also do further audit to the registration request from operational angle using business air control strategy.In server-side
Equipment 20 is provided towards enterprise in the example of cloud storage business, and business air control strategy can include but is not limited to: user name and close
The setting rule of code, such as requiring user name must be the Email Accounts of enterprise, password must be by number, character and spcial character
Composition, and Password Length cannot be less than 8 characters etc. and cloud storage space no more than upper limit value, such as 15G, etc..Base
In this, server device 20 can be inputted according to some information relevant to business carried in registration request, such as operation object
User name, password and the size in cloud storage space etc. for requiring application, further judge whether the registration request meets industry
Business air control strategy.For example, if the user name of operation object input is the Email Accounts of enterprise, and password is by number, character and spy
Different character composition, Password Length cannot be less than 8 characters, and requiring the size in the cloud storage space of application is 10G (< 15G),
Then determine that the registration request meets business air control strategy.
When the operation object for initiating registration request is normal users, and the registration request also complies with business air control strategy,
Server device 20 can return to the response message to succeed in registration to client device 10.Client device 10 can will be registered
Function message shows operation object (operation object at this time is actually normal users) on interface, in order to the operation object
Data storage is carried out using cloud storage space.
Further, operation object can initiate storage to server device 20 and ask during using cloud storage space
Ask, inquiry request and downloading request etc. service requests.During operation object initiates these service requests, server-side is set
Standby 20 combine with man-machine identification equipment 30, storage request, inquiry request and downloading can also be requested etc. service requests into
The identification of pedestrian's machine and business air control, give server device 20 bring risk to reduce some malicious attack behaviors, improve service
The safety of end equipment 20 guarantees the service feature of server device 20.
In each embodiment of the application, server device 20 is in combination with man-machine recognition result and the corresponding business of service request
Air control strategy determines the processing mode to service request.Man-machine recognition result and service request is used in combination in server device 20
The mode of corresponding business air control strategy can there are many.It is exemplified below:
In some illustrative embodiments, server device 20 receive service request and man-machine identification parameter it
Afterwards, on the one hand man-machine identification parameter can be sent to man-machine identification equipment 30 and waited and receive the base that man-machine identification equipment 30 returns
It is directed to the man-machine recognition result of operation object in man-machine identification parameter, on the other hand can determine industry corresponding with the service request
Business air control strategy, and according to the business air control strategy, determine the business risk grade of the service request;When determining the service request
Business risk grade and after receiving the man-machine recognition result that man-machine identification equipment 30 returns, in conjunction with man-machine recognition result and
The business risk grade of the service request determines the processing mode to service request.
For example, server device 20 can be by man-machine identification in conjunction with business air control strategy, such as white list, black name
List or traffic threshold etc., and then determine based on these business air control strategies the business risk grade of the service request.For example, working as industry
When equipment or IP address in white list are requested in business, it can determine that service request belongs to low risk level;When business is asked
When asking equipment or IP address in blacklist, it can determine that service request belongs to high-risk grade.In this example, only
Carried out by taking high and low two risk class as an example for example, actually business risk grade be not limited to it is high and low, can be with
According to practical business demand flexible setting.
In other illustrative embodiments, server device 20 receive service request and man-machine identification parameter it
Afterwards, man-machine identification parameter can be sent to man-machine identification equipment 30 and waiting receives that man-machine identification equipment 30 returns based on people
Machine identification parameter is directed to the man-machine recognition result of operation object;When the man-machine recognition result for receiving the man-machine return of identification equipment 30
Later, Credibility judgement can be carried out in conjunction with the relevant some Factors on Human machine recognition results of business demand;When determining man-machine knowledge
It, can be further corresponding according to service request when the confidence level of other result is not very high (be, for example, less than setting believability threshold)
Business air control strategy determines the business risk grade of the service request, and then combines man-machine recognition result and the service request
Business risk grade determines the processing mode to service request.
For example, can determine the confidence level of man-machine recognition result when business demand is without the concern for man-machine recognition result
It is not high.In another example the quantity or hundred for the service request that should be blocked in certain time according to man-machine recognition result can be counted
Point ratio, when the quantity for the service request that should be blocked according to man-machine recognition result or percentage are more than corresponding max-thresholds,
Meaning most of service request all is carried out by cheating machine script/program, this is less reasonable, thus may determine that man-machine identification
As a result confidence level is not high.
In the respective embodiments described above, it in the business risk grade for combining man-machine recognition result and the service request, determines
To during the processing mode of service request:
When man-machine recognition result instruction operation object is cheating machine script/program or indicates that operation object is cheating machine
Script/program probability is greater than or equal to setting probability threshold value, and the business risk grade of service request is more than or equal to default
When business risk grade threshold, refusal service request is determined.
When man-machine recognition result instruction operation object is not cheating machine script/program or indicates that operation object is cheating
Machine script/program probability is less than setting probability threshold value, and the business risk grade of service request is less than pre-set business risk
When grade threshold, request of accepting business is determined.
When man-machine recognition result instruction operation object is cheating machine script/program or indicates that operation object is cheating machine
Script/program probability is greater than or equal to setting probability threshold value, but the business risk grade of service request is less than pre-set business wind
When dangerous grade threshold (such as the equipment or IP address of service request in white list), request of accepting business is determined.
When man-machine recognition result instruction operation object is not cheating machine script/program or indicates that operation object is cheating
Machine script/program probability is less than setting probability threshold value, but the business risk grade of service request is greater than or equal to default industry
When risk level threshold (such as the equipment or IP address of service request in blacklist) of being engaged in, refusal service request is determined.
It can be seen from the above, the man-machine recognition result of man-machine identification equipment 30 can actually regard as server device 20 into
Air control dimension when industry business air control, is based on this, and server device 20, which can choose, trusts man-machine recognition result, Huo Zheye
Man-machine recognition result can be corrected according to the business risk grade of service request, for example, can by it is some can be man-machine
Recognition result blocks, but not the service request having an adverse effect to business is let pass, or can by it is some can be by man-machine knowledge
Other result is let pass, but can be blocked to the service request that business has an adverse effect, to reach more reasonable air control effect.
In some exemplary embodiments, in addition to can be by man-machine identification other than business air control strategy combines, into one
Step can also dispose identifying code scheme and using identifying code scheme as the downstream side of business air control strategy in server device 20
Case is realized.
In these exemplary embodiments, server device 20 preferentially combines the industry of man-machine recognition result and the service request
Business risk class, determines the processing mode to service request;When the processing mode to service request is to refuse the service request,
Server device 20 produces identifying code, and sends identifying code to client device 10, so that operation object is set by client
Standby 10 input the identifying code.For client device 10, the identifying code of the transmission of server device 20 can also be received, with certain
Or certain several ways exports the identifying code, to be supplied to operation object, such as with voice mode broadcasts the identifying code, or with short
The mode of letter mode, system message or application message or notification message shows the identifying code;If operation object is normal users,
The identifying code can be recognized and input identifying code to client device 10.Based on this, client device 10 may be in response to operate
Object inputs the operation of identifying code, obtains the second behavioral data and operation that operation object generates during inputting identifying code
The identifying code of object input, and the identifying code for the second behavioral data and the operation object input that will acquire is sent to server device
20, so that server device 20 is redefined according to the identifying code that the second behavioral data and operation object input to service request
Processing mode.For server device 20, the second behavioral data and the operation of the return of client device 10 can be also received
The identifying code of object input, and the identifying code that can be inputted according to the second behavioral data and operation object, redefine to business
The processing mode of request.Wherein, the second behavioral data be primarily referred to as operation object generated during inputting identifying code it is some
Behavioral data, such as may include input operation, the sequence of input character etc. in identifying code frame.Wherein, according to identifying code
The difference of scheme, the behavioral data that user generates would also vary from.There are respective examples in the example of identifying code scheme below
Property explanation.
Optionally, when the processing mode to service request is to receive the service request, needle is can be performed in server device 20
To the process flow of service request, rather than enter identifying code process.
In realization, above-mentioned identifying code scheme needs to include some operations for only having the mankind to be just able to achieve or only someone comes
The feature having, in order to be able to which distinguishing operation object is normal users or machine script/program.It is all to distinguish operation
Object is that normal users or machine script/program identifying code scheme are suitable for the embodiment of the present application.It is exemplified below:
In a kind of identifying code scheme, server device 20 can human vision identify on the basis of, by picture into
Row obscure, distort generate normal human subject can identify, but the unrecognized identifying code picture of machine and pass through client device 10
It is shown to operation object, in order to which operation object can identify correct identifying code from these identifying code pictures and input,
And then it is normal users (i.e. the mankind) or machine script/journey that the identifying code of binding operation object input, which distinguishes the operation object,
Sequence.This identifying code scheme can be referred to as image authentication code scheme.In this example, the second behavioral data may include:
Sequence, position and the number of clicking operation etc. of character are clicked in picture comprising identifying code.
In another identifying code scheme, server device 20 can embed on client device 10 supports user's interaction
User interface (User Interface, UI) be used to that operation object is guided to complete certain interactive operation, and then can be according to client
The collected operation object of end equipment 10 on the user interface interactive operation (such as click specific button, sliding specific is pressed
Button etc.) come to distinguish the operation object be normal users (i.e. the mankind) or machine script/program.This identifying code scheme can letter
Referred to as behavior identifying code scheme.In this example, the second behavioral data may include: that specific button, sliding spy are clicked on UI
Determine the operation such as button.
In another identifying code scheme, server device 20 is in the mankind to natural language and social common-sense reasoning basis
On, normal human subject is generated by modes such as knowledge mappings and is understood that and response, and the topic that machine can not answer and passes through visitor
Family end equipment 10 is shown to operation object, in order to which operation object can carry out response, and then binding operation pair to these topics
Distinguishing the operation object as the response situation to these topics is normal users (i.e. the mankind) or machine script/program.It is this
Identifying code scheme can be referred to as semantic verification code scheme.In this example, the second behavioral data may include: to carry out to topic
The operation etc. of response.
In another identifying code scheme, server device 20 can be by the sensor on client device 10 for behaviour
Make the biological characteristics such as object acquisition mankind's vocal print, fingerprint, iris, limb action, and then whether is acquired based on client device 10
Distinguishing the operation object to these biological characteristics and collected biological characteristic is normal users (i.e. the mankind) or machine foot
Sheet/program.This identifying code scheme can be referred to as biological characteristic validation code scheme.In this example, the second behavioral data can
To include: the voice signal of sending, place finger offer fingerprint, the adjustment eyeball offer number such as iris or corresponding limb action
According to.
In the above-mentioned scheme combined with identifying code, man-machine recognition result and business air control are combined in server device 10
In the case that strategy determination needs to refuse service request, the advantage of identifying code scheme can be further played, by identifying code side
Case does further identification, further decreases False Rate.
Further, in the above-mentioned scheme combined with identifying code, in order to meet using upper flexibility, it can permit use
Whether flexible configuration uses identifying code scheme and uses which kind of identifying code scheme according to their own needs at family.For example, user can
With the setting function of being provided by client device 10, whether configuration uses identifying code scheme and uses which kind of identifying code side
Case.In addition, user can also replace identifying code scheme at any time according to demand.All kinds of identifying code schemes can be greatly decreased in this way
Cost of access increases the flexibility of whole system in realization.
Based on system shown in Figure 1, the following embodiments of the application also provide some air control methods and man-machine recognition methods.
Fig. 2 is a kind of flow diagram for air control method that the application another exemplary embodiment provides.This method is main
It is the description carried out from the angle of client device.As shown in Fig. 2, this method comprises:
201, man-machine identification parameter is acquired during operation object initiating business request.
202, the service request initiated in response to operation object, is sent to server-side for service request and man-machine identification parameter
Equipment, for server device according to the corresponding business air control strategy of service request and by man-machine identification equipment according to man-machine identification
The man-machine recognition result for operation object of gain of parameter determines the processing mode to service request.
In the present embodiment, the user (referred to as user) of client can request server-side to set by client device
Standby business processing logic to realize corresponding business function, such as instant messaging, is sent and received e-mail or online shopping
Etc..
In some business scenarios, some users may continually request server device using machine script/program
Business processing logic, to speculate for oneself.In addition to this, this row practised fraud using machine script/program
For the processing load that can also aggravate server device, it is unfavorable for business and normally carries out.
In view of can not determine that initiating business request is normal users or cheating machine script/program at the beginning, therefore by industry
Business request promoter is known as operation object.The operation object may be normal users, it is also possible to machine script/program of practising fraud.
Operation object can be interacted with client device so as to server device initiating business request.By taking login process as an example,
Operation object can carry out following interactive operation with client device: point opens login page, inputs username and password, mobile mouse
Mark, sliding-rolling item and click login button etc., to initiate logging request to server device.
For client device, man-machine identification parameter is acquired during operation object initiating business request, and can
The service request (such as the operation for clicking login button) initiated in response to operation object, by the service request and collected people
Machine identification parameter is sent to server device.In the present embodiment, client device to server device provide service request and
Man-machine identification parameter obtains server device based on man-machine identification parameter in combination with man-machine identification equipment man-machine
Identify that business air control strategy corresponding with service request carries out air control for service request, so that business air control strategy and man-machine knowledge
Other result can influence each other, mutually correct to generate the air control being more conducive to as a result, can both accomplish man-machine knowledge in this way
Not, but can reduce man-machine identification give business bring adverse effect.
It in one exemplary embodiment, should after service request and man-machine identification parameter are sent to server device
Method further include: receive the response message that server device is sent, and export the results page to match with response message, the sound
Answer message response service end equipment to the processing mode of service request.
In one exemplary embodiment, above-mentioned steps 202 may is that the service request initiated in response to operation object, will
Man-machine identification parameter carrying is sent to server device in service request.
In one exemplary embodiment, above-mentioned steps 201 may is that during operation object initiating business request,
Acquisition operation object and client device interact the first behavioral data of generation and/or soft/hard environment of client device
Parameter is as man-machine identification parameter.
In one exemplary embodiment, this method further include: the processing mode of service request is refused in server device
When exhausted service request, the identifying code that server device is sent is received, exports identifying code;And it inputs and verifies in response to operation object
The operation of code, what the second behavioral data and operation object that acquisition operation object generates during inputting identifying code inputted tests
Card code is simultaneously sent to server device, the identifying code inputted for server device according to the second behavioral data and operation object
Redefine the processing mode to service request.
Fig. 3 is the flow diagram for another air control method that the application another exemplary embodiment provides.This method master
If the description carried out from the angle of server device.As shown in figure 3, this method comprises:
301, the service request and man-machine identification parameter that client device is sent are received, which is client
Equipment is collected during operation object initiating business request.
302, man-machine identification parameter is transmitted to man-machine identification equipment, and receives man-machine identification equipment and is joined according to man-machine identification
The man-machine recognition result for operation object that number returns.
303, in conjunction with man-machine recognition result and the corresponding business air control strategy of service request, the processing to service request is determined
Mode.
In the present embodiment, server device receives the service request and man-machine identification parameter that client device is sent.?
After receiving service request and man-machine identification parameter, man-machine identification parameter is transmitted to man-machine identification equipment by server device,
So that man-machine identification equipment carries out man-machine identification for operation object according to the man-machine identification parameter to obtain man-machine recognition result,
And receive the man-machine recognition result for operation object that man-machine identification equipment is returned according to man-machine identification parameter;In turn, it can tie
Man-machine recognition result and the corresponding business air control strategy of service request are closed, determines the processing mode to service request.
In the present embodiment, server device is matched with man-machine identification equipment, no longer certainly using man-machine identification as one
System is closed, but man-machine identification is coupled on business air control strategy, is supplied to man-machine recognition result by man-machine identification equipment
Server device, and then by server device in conjunction with the man-machine recognition result and the corresponding industry of service request of man-machine identification equipment
Business air control strategy determines the processing mode requested corresponding service, allows business air control strategy and man-machine recognition result mutual
It influences, mutually correction is to generate the air control being more conducive to as a result, can not only accomplish man-machine identification to reach, but also can drop
The beneficial effect that low man-machine identification is adversely affected to business bring.
In one exemplary embodiment, after determining to the processing mode of service request, this method further include: to client
End equipment sends response message, the results page to match for client device output with response message;Wherein, response message
Processing mode of the response service end equipment to service request.
In one exemplary embodiment, above-mentioned steps 303 may is that according to business air control strategy, determine service request
Business risk grade;In conjunction with the business risk grade of man-machine recognition result and service request, the processing side to service request is determined
Formula.
Still optionally further, the business risk grade of the man-machine recognition result of above-mentioned combination and service request is determined to business
The processing mode of request includes:
When man-machine recognition result instruction operation object is cheating machine script/program or indicates that operation object is cheating machine
Script/program probability is greater than or equal to setting probability threshold value, but the business risk grade of service request is less than pre-set business wind
When dangerous grade threshold, request of accepting business is determined;Or
When man-machine recognition result instruction operation object is not cheating machine script/program or indicates that operation object is cheating
Machine script/program probability is less than setting probability threshold value, but the business risk grade of service request is greater than or equal to default industry
When business risk level threshold, refusal service request is determined.
In one exemplary embodiment, this method further include: when the processing mode to service request is refusal service request
When, identifying code is sent to client device, so that operation object inputs identifying code;Receive the operation object that client device returns
The identifying code of the second behavioral data and the operation object input generated during inputting identifying code;And according to the second behavior
Data and the identifying code of operation object input, redefine the processing mode to service request.
Fig. 4 is a kind of flow diagram for man-machine recognition methods that the application another exemplary embodiment provides.This method
The description mainly carried out from the angle of man-machine identification equipment.As shown in figure 4, this method comprises:
401, the man-machine identification parameter that server device is sent is received, which is that client device is operating
It is acquired during object initiating business request and is supplied to server device.
402, man-machine identification is carried out to operation object according to man-machine identification parameter, to obtain man-machine recognition result.
403, man-machine recognition result is sent to server device, so that server device combines man-machine recognition result and industry
Business requests corresponding business air control strategy to determine the processing mode to service request.
In the present embodiment, man-machine identification equipment receives the man-machine identification parameter that server device is sent, according to man-machine knowledge
Other parameter carries out man-machine identification to operation object and is set with obtaining man-machine recognition result and man-machine recognition result being sent to server-side
It is standby, in order to which server device can be determined in conjunction with man-machine recognition result and the corresponding business air control strategy of service request to business
The processing mode of request allows business air control strategy and man-machine recognition result to influence each other, mutually correction is to generate more
Added with the air control being conducive to as a result, can not only accomplish man-machine identification to reach, but also man-machine identification can be reduced and give business bring
The beneficial effect of adverse effect.
In one exemplary embodiment, man-machine identification parameter include: operation object during initiating business request with
Client device interacts the first behavioral data of generation and soft/hard environment parameter of client device.Based on this, above-mentioned step
Rapid 402 may is that according to the first behavioral data, determine that operation object is cheating the first probability of class machine script/program;According to
Soft/hard environment parameter of client device and known cheating machine script/program running environment parameter, determine operation object
It is cheating the second probability of machine script/program;Man-machine recognition result is obtained in conjunction with the first probability and the second probability.
Fig. 5 is the flow diagram for another air control method that the application another exemplary embodiment provides.Such as Fig. 5 institute
Show, this method comprises:
501, by client device initiating business request, client device initiates business in operation object asks operation object
Man-machine identification parameter is acquired during asking.
For example, during operation object initiating business request, it may be necessary to fill in user name, password, click the page
The corresponding button, rolling scroll bar etc., the behavior number that operation object generates in this process can be monitored and be collected to client device
According to, and soft/hard environment parameter of client device is collected as man-machine identification parameter.
502, man-machine identification parameter is carried and is asked in business by the service request that client device is initiated in response to operation object
Server device is sent in asking together.
It is worth noting that also carrying some other ginseng in service request other than carrying man-machine identification parameter
Number, such as IP address, MAC Address and some call parameters related with business of client device, for example (,) it is user name, close
The information such as code, business identification code.
503, server device parses man-machine identification parameter from service request, man-machine identification parameter is transmitted to man-machine
Identify equipment.
504, man-machine identification equipment carries out people to operation object according to the man-machine identification parameter that server device sends over
Machine identification, to obtain man-machine recognition result.
505, man-machine recognition result is sent to server device by man-machine identification equipment.
506, server device combines man-machine recognition result and the corresponding business air control strategy of service request, determines to business
The processing mode of request.
Server device includes receiving the service request, or refuse the service request to the processing mode of service request.
507, when server device refuses the service request, server device automatically generates identifying code, and by identifying code
It is sent to client device.
508, the identifying code that client device is sended over certain or certain several ways output server device.
For example, client device can export the identifying code by voice broadcasting modes, or can should with display mode
Identifying code is exported to respective user interfaces, or can also according to it is corresponding to the matched control mode control of identifying code indicate into
Portable lighter flashing is to export the identifying code.Certainly, client device can export identifying code using certain mode enumerated here,
Or several ways output identifying code can also be applied in combination.
509, client device obtains operation object in input identifying code in response to the operation of operation object input identifying code
The identifying code of the second behavioral data and the operation object input generated in the process.
510, the identifying code that the second behavioral data and operation object input is sent to server device by client device.
511, server device is redefined according to the identifying code that the second behavioral data and operation object input to business
The processing mode of request.
512, server device sends response message to client device, and the response message response service end equipment is to business
The processing mode of request.
513, client device receives the response message that server device is sent, and exports and match with the response message
Results page.
In the present embodiment, server device is matched with man-machine identification equipment, no longer certainly using man-machine identification as one
System is closed, but man-machine identification is coupled on business air control strategy, is supplied to man-machine recognition result by man-machine identification equipment
Server device, and then by server device in conjunction with the man-machine recognition result and the corresponding industry of service request of man-machine identification equipment
Business air control strategy determines the processing mode requested corresponding service, allows business air control strategy and man-machine recognition result mutual
It influences, mutually correction is to generate the air control being more conducive to as a result, can not only accomplish man-machine identification to reach, but also can drop
The beneficial effect that low man-machine identification is adversely affected to business bring.
Fig. 6 is the structural schematic diagram for another air control system that the application another exemplary embodiment provides.Such as Fig. 6 institute
Show, which includes: client device 61, server device 62 and man-machine identification equipment 63.Client device 61 and service
End equipment 62 and man-machine identification equipment 63 communicate to connect respectively.Optionally, server device 62 can be with man-machine identification equipment 63
Communication connection.
About between client device 61, server device 62 and man-machine identification equipment 63 communication connection mode and
Client device 10, server device 20 and man-machine 30 class of identification equipment in physical implementation, with embodiment illustrated in fig. 1
Seemingly, for details, reference can be made to embodiment illustrated in fig. 1, and details are not described herein.
In the air control system of the present embodiment, man-machine identification equipment 63 is also increased, and pass through man-machine 63 needle of identification equipment
Man-machine identification is carried out to related operation, in addition to this, server device 62 can also be matched with man-machine identification equipment 63, be tied simultaneously
Man-machine identification and the determining processing mode to service request of business air control strategy are closed, so that business air control strategy and man-machine identification knot
Fruit can influence each other, mutually correct to generate the air control being more conducive to as a result, can not only accomplish man-machine identification in this way, but also
Man-machine identification can be reduced to adversely affect to business bring.
In the air control system of the present embodiment, client device 61, server device 62 and man-machine 63 phase of identification equipment
The working principle mutually cooperated, it is different with the working principle of air control system shown in Fig. 1, it is further explained below.
Similarly, in the present embodiment, in view of can not determine at the beginning initiating business request be normal users or cheating machine
Device script/program, therefore service request promoter is known as operation object.The operation object may be normal users, it is also possible to
Cheating machine script/program.Operation object can interact to initiate industry to server device 62 with client device 61
Business request.By taking login process as an example, operation object can carry out following interactive operation with client device 61: point opens log in page
Face inputs username and password, mobile mouse, sliding-rolling item and click login button etc., thus to server device 62
Initiate logging request.
For client device 61, man-machine identification parameter is acquired during operation object initiating business request, and
The service request operation of login button (such as click) that may be in response to operation object initiation, by the service request and collected
Man-machine identification parameter is sent respectively to server device 62 and man-machine identification equipment 63.
For man-machine identification equipment 63, the man-machine identification parameter of the transmission of client device 61 can receive, according to man-machine
Identification parameter carries out man-machine identification to operation object to obtain man-machine recognition result and man-machine recognition result is sent to server-side
Equipment 62, in order to which server device 62 can be determined in conjunction with man-machine recognition result and the corresponding business air control strategy of service request
To the processing mode of service request.
For server device 62, the service request of the transmission of client device 61 can receive, and receive man-machine identification
The man-machine recognition result that equipment 63 is sent, in turn, combinable man-machine recognition result and the corresponding business air control strategy of service request,
Determine the processing mode to service request.
Optionally, man-machine in the case where between man-machine identification equipment 63 and server device 62 there is no communicating to connect
Man-machine recognition result can be transmitted to server device 62 by client device 61 by identification equipment 63.In man-machine identification equipment
In the case where there is communication connection between 63 and server device 62, man-machine identification equipment 63 can pass through itself and server device
Man-machine recognition result is directly sent to server device 62 by the communication connection between 62.
It is worth noting that can be performed about client device 61, server device 62 and man-machine identification equipment 63
The detailed embodiment of some other operation and relevant operation, reference can be made to the corresponding description in previous embodiment, herein no longer
It repeats.
In the present embodiment, server device is matched with man-machine identification equipment, no longer certainly using man-machine identification as one
System is closed, but man-machine identification is coupled on business air control strategy, is supplied to man-machine recognition result by man-machine identification equipment
Server device, and then by server device in conjunction with the man-machine recognition result and the corresponding industry of service request of man-machine identification equipment
Business air control strategy determines the processing mode requested corresponding service, allows business air control strategy and man-machine recognition result mutual
It influences, mutually correction is to generate the air control being more conducive to as a result, can not only accomplish man-machine identification to reach, but also can drop
The beneficial effect that low man-machine identification is adversely affected to business bring.
Fig. 7 a is the air control method realized based on air control system shown in Fig. 6 that the application another exemplary embodiment provides
Flow diagram.As shown in Figure 7a, this method comprises:
701, by client device initiating business request, client device initiates business in operation object asks operation object
Man-machine identification parameter is acquired during asking.
For example, during operation object initiating business request, it may be necessary to fill in user name, password, click the page
The corresponding button, rolling scroll bar etc., the behavior number that operation object generates in this process can be monitored and be collected to client device
According to, and soft/hard environment parameter of client device is collected as man-machine identification parameter.
702, the service request that client device is initiated in response to operation object, by service request and man-machine identification parameter point
It is not sent to server device and man-machine identification equipment.
It is worth noting that carrying the IP address of client device, MAC Address and some and business in service request
The information such as related call parameter, such as user name, password.
703, man-machine identification equipment carries out people to operation object according to the man-machine identification parameter that client device sends over
Machine identification, to obtain man-machine recognition result.
704, man-machine identification equipment is directly sent out man-machine recognition result based on its communication connection between server device
Give server device.
Optionally, in the case where between man-machine identification equipment and server device there is no communicating to connect, man-machine identification
Man-machine recognition result can be transmitted to server device by client device by equipment.
705, server device combines man-machine recognition result and the corresponding business air control strategy of service request, determines to business
The processing mode of request.
Server device includes receiving the service request, or refuse the service request to the processing mode of service request.
706, when server device refuses the service request, server device automatically generates identifying code, and by identifying code
It is sent to client device.
707, the identifying code that client device is sended over certain or certain several ways output server device.
For example, client device can export the identifying code by voice broadcasting modes, or can should with display mode
Identifying code is exported to respective user interfaces, or can also according to it is corresponding to the matched control mode control of identifying code indicate into
Portable lighter flashing is to export the identifying code.Certainly, client device can export identifying code using certain mode enumerated here,
Or several ways output identifying code can also be applied in combination.
708, client device obtains operation object in input identifying code in response to the operation of operation object input identifying code
The identifying code of the second behavioral data and the operation object input generated in the process.
709, the identifying code that the second behavioral data and operation object input is sent to server device by client device.
710, server device is redefined according to the identifying code that the second behavioral data and operation object input to business
The processing mode of request.
711, server device sends response message to client device, and the response message response service end equipment is to business
The processing mode of request.
712, client device receives the response message that server device is sent, and exports and match with the response message
Results page.
In the present embodiment, server device is matched with man-machine identification equipment, no longer certainly using man-machine identification as one
System is closed, but man-machine identification is coupled on business air control strategy, is supplied to man-machine recognition result by man-machine identification equipment
Server device, and then by server device in conjunction with the man-machine recognition result and the corresponding industry of service request of man-machine identification equipment
Business air control strategy determines the processing mode requested corresponding service, allows business air control strategy and man-machine recognition result mutual
It influences, mutually correction is to generate the air control being more conducive to as a result, can not only accomplish man-machine identification to reach, but also can drop
The beneficial effect that low man-machine identification is adversely affected to business bring.
Fig. 7 b is a kind of structural schematic diagram for operation system that the application another exemplary embodiment provides.Such as Fig. 7 b institute
Show, which includes: client device 71 and server device 72.Lead between client device 71 and server device 72
Letter connection.Wherein, it can be between client device 71 and server device 72 and wirelessly or non-wirelessly communicate to connect.Client device
71 are communicated to connect by mobile network and server device 72, then the network formats of the mobile network can be 2G (GSM), 2.5G
(GPRS), 3G (WCDMA, TD-SCDMA, CDMA2000, UTMS), 4G (LTE), 4G+ (LTE+), WiMax and subsequent will go out
Any one in existing new network formats etc..
In the present embodiment, the equipment that client device 71 is primarily referred to as bearer service client, predominantly user provide
Local service.In physics realization, client device 71 can be smart phone, tablet computer, PC, wearable device etc.
Terminal device.
In the present embodiment, the equipment that server device 72 is primarily referred to as bearer service server-side, predominantly client are set
Standby 71 service, the service request that service content such as customer in response end equipment 71 is sent provide resource to client device 71, protect
Deposit the data etc. of client device 71.In physics realization, server device 72 can be it is any be capable of providing calculating service, ring
The service request of client device 71, and the equipment for carrying out corresponding service processing are answered, such as can be General Server, cloud service
Device, cloud host, virtual center etc..
In the embodiment of the present application, the user (referred to as user) of client can request to take by client device 71
The business processing logic for end equipment 72 of being engaged in, to realize corresponding business function, such as instant messaging, send and receive e-mail or
Online shopping etc..In some business scenarios, some users may continually request server-side using machine script/program
The business processing logic of equipment 72, to speculate for oneself.In addition to this, this to be made using machine script/program
The behavior of disadvantage can also aggravate the processing load of server device 72, be unfavorable for business and normally carry out.
The behavior practised fraud in order to prevent using machine script/program, in the operation system of the present embodiment, server-side
Equipment 72 increases man-machine identification function, and man-machine identification is combined with business identification code, can not only accomplish man-machine identification, but also can
It is adversely affected with reducing man-machine identification to business bring.
Client device 71 is described below in detail to the process of 72 initiating business request of server device and in the process
Middle server device 72 carries out the process of man-machine identification in conjunction with business identification code.
For client device 71, man-machine identification data can be obtained, and send client data to server device 72,
Wherein, which includes man-machine identification data and business identification code, which is used to indicate man-machine identification rule
Then or man-machine recognition threshold, so that server device 72 can be based on man-machine recognition rule indicated by the business identification code or man-machine
Recognition threshold carries out Effective judgement to man-machine identification data to obtain man-machine recognition result.
Optionally, client device 71 may be in response to the service request of operation object initiation, obtain man-machine identification data.This
In operation object refer to service request promoter.The operation object may be normal users, it is also possible to and machine script of practising fraud/
Program.About client device 71 in response to the operation of operation object initiating business request, the detailed of man-machine identification data is obtained
Implementation process, reference can be made to the process that client device 10 acquires man-machine identification parameter in previous embodiment is realized, it is no longer superfluous herein
It states.
For server device 72, client data can receive, according to the business identification code in client data, selection
Man-machine recognition rule or the man-machine recognition threshold of adjustment;And then man-machine recognition rule or man-machine identification threshold adjusted based on selection
Value, judges whether man-machine identification data are effective.
Optionally, if it is judged that man-machine identification data are effective, man-machine identification notice is fed back through;If it is judged that man-machine
Identify data invalid, feedback is not notified by man-machine identification.
In some exemplary embodiments, each business identification code and man-machine recognition rule or man-machine identification can be pre-established
The mapping relations of threshold value.Based on this, server device 72 can inquire the mapping relations after receiving client data, from
And determine man-machine recognition rule corresponding with the business identification code in client data or man-machine recognition threshold.
In some exemplary embodiments, above-mentioned man-machine recognition rule or man-machine recognition threshold, which can be, combines business wind
Control strategy and rule or threshold value with man-machine identification function, or there is man-machine identification according to what business air control strategy determined
The rule or threshold value of function.Then server device 72 judges man-machine identification according to these man-machine recognition rules or man-machine recognition threshold
The whether effective detailed embodiment of data can refer to or be analogous to server device 20 in previous embodiment and combines man-machine identification
As a result the corresponding business air control strategy with service request is determined to the realization of the processing mode of service request, can not be done herein
More descriptions.
In the present embodiment, server device is based on business identification code and carries out validation verification to man-machine identification data, from
And man-machine recognition result is obtained, merging between man-machine identification and business is realized, therefore can not only accomplish man-machine identification, but also can
It is adversely affected with reducing man-machine identification to business bring.
Based on system shown in Fig. 7 b, the following embodiments of the application also provide some data processing methods.
Fig. 7 c is a kind of flow diagram for data processing method that the application another exemplary embodiment provides.This method
The description mainly carried out from the angle of client device.As shown in Figure 7 c, this method comprises:
71c, man-machine identification data are obtained.
72c, client data is sent to server device, wherein the client data includes man-machine identification data and industry
Business identification code, the business identification code are used to indicate man-machine recognition rule or man-machine recognition threshold.
Optionally, in step 71c, it may be in response to the service request of operation object initiation, obtain man-machine identification data.This
In operation object refer to service request promoter.The operation object may be normal users, it is also possible to and machine script of practising fraud/
Program.
Wherein, man-machine recognition rule or man-machine recognition threshold indicated by business identification code, for for server device 72
Effective judgement is carried out to obtain man-machine recognition result to man-machine identification data.
In the present embodiment, client device obtains man-machine identification data, and man-machine identification data and business are identified
Code is supplied to server device, allows server device to be based on business identification code and tests man-machine identification data progress validity
Card, to obtain man-machine recognition result, realizes merging between man-machine identification and business, therefore can both accomplish man-machine knowledge
Not, but can reduce man-machine identification give business bring adverse effect.
Fig. 7 d is the flow diagram for another data processing method that the application another exemplary embodiment provides.The party
Method is mainly the description carried out from the angle of server device.As shown in figure 7d, this method comprises:
71d, client data is received, wherein client data includes man-machine identification data and business identification code.
72d, according to business identification code, select man-machine recognition rule or the man-machine recognition threshold of adjustment.
73d, it is based on man-machine recognition rule or man-machine recognition threshold, judges whether man-machine identification data are effective.If so, i.e. people
Machine identifies that data are effective, it is alternatively possible to continue to execute step 74d;If it is not, i.e. man-machine identification data invalid, it is alternatively possible to
Continue to execute step 75d.
74d, man-machine identification notice is fed back through.
75d, feedback are not notified by man-machine identification.
In the present embodiment, server device is based on business identification code and carries out validation verification to man-machine identification data, from
And man-machine recognition result is obtained, merging between man-machine identification and business is realized, therefore can not only accomplish man-machine identification, but also can
It is adversely affected with reducing man-machine identification to business bring.
Illustrate herein, method shown in Fig. 7 c and Fig. 7 d also can be applied in air control system shown in Fig. 1, by Fig. 7 c and
When method shown in Fig. 7 d is applied to air control system shown in Fig. 1, " man-machine recognition rule or man-machine identification threshold can will be based in method
Value, judges whether man-machine identification data effective " operation be deployed in man-machine identification equipment and realize.In addition, Fig. 2-Fig. 5 and figure
Method shown in 7a also can be applied in operation system shown in Fig. 7 b.Method shown in Fig. 2-Fig. 5 and Fig. 7 a is being applied to figure
Shown in 7b when operation system, the man-machine identification operation that man-machine identification equipment is realized can be fused to server device, and omit phase
The communication process of pass.On the basis of previous embodiment, those skilled in the art are readily conceivable that these expansion schemes
Implementation process does not do excessive description to this.
It should be noted that containing in some processes of the description in above-described embodiment and attached drawing according to specific suitable
Multiple operations that sequence occurs, but it should be clearly understood that these operations can not be held according to its sequence what appears in this article
Capable or parallel execution, serial number of operation such as 201,202 etc. are only used for distinguishing each different operation, and serial number itself is no
It represents and any executes sequence.In addition, these processes may include more or fewer operations, and these operations can be by suitable
Sequence executes or parallel execution.It should be noted that the description such as " first " herein, " second ", is for distinguishing different disappear
Breath, equipment, module etc. do not represent sequencing, also do not limit " first " and " second " and are different type.
Fig. 8 a is a kind of structural schematic diagram for wind-controlling device that the application another exemplary embodiment provides.Such as Fig. 8 a institute
Show, which includes: acquisition module 81 and sending module 82.
Acquisition module 81, for acquiring man-machine identification parameter during operation object initiating business request.
Sending module 82, the service request for being initiated in response to operation object, by service request and man-machine identification parameter
It is sent to server device, so that server device is according to the corresponding business air control strategy of service request and by man-machine identification equipment
The processing mode to service request is determined according to the man-machine recognition result for operation object that man-machine identification parameter obtains.
In one exemplary embodiment, wind-controlling device further include: receiving module 83 and output module 84.
Receiving module 83, for receiving the response message of server device transmission.Output module 84 connects with receiving module 83
It connects, the results page to match for exporting the response message received with receiving module 83, the response message response service end
Processing mode of the equipment to service request.
In one exemplary embodiment, sending module 82 is specifically used for: the service request initiated in response to operation object, will
Man-machine identification parameter carrying is sent to server device in service request.
In one exemplary embodiment, acquisition module 81 is specifically used for: during operation object initiating business request,
Acquisition operation object and client device interact the first behavioral data of generation and/or soft/hard environment of client device
Parameter is as man-machine identification parameter.
In one exemplary embodiment, receiving module 83 is also used to: in server device to the processing mode of service request
When to refuse service request, the identifying code that server device is sent is received, output module 84 is also used to export receiving module 83 and connects
The identifying code received.Correspondingly, acquisition module 81 is also used to input the operation of identifying code in response to operation object, obtains operation pair
The identifying code inputted as the second behavioral data and operation object that are generated during inputting identifying code.Correspondingly, mould is sent
The identifying code for the second behavioral data and the operation object input that block 82 is also used to get acquisition module 81 is sent to service
End equipment asks business so that server device is redefined according to the identifying code that the second behavioral data and operation object input
The processing mode asked.
The foregoing describe the built-in function of wind-controlling device and structures, and as shown in Figure 8 b, in practice, which can realize
For client device, comprising: memory 801, processor 802 and communication component 803.
Memory 801 for storing computer program, and can be configured to store various other data to support in client
Operation in end equipment.The example of these data includes any application or method for operating on a client device
Instruction, contact data, telephone book data, message, picture, video etc..
Memory 801 can realize by any kind of volatibility or non-volatile memory device or their combination,
Such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is read-only
Memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk
Or CD.
Processor 802 is coupled with memory 801, for executing the computer program in memory 801, to be used for:
Man-machine identification parameter is acquired during operation object initiating business request;
In response to the service request that operation object is initiated, by communication component 803 by service request and man-machine identification parameter
It is sent to server device, so that server device is according to the corresponding business air control strategy of service request and by man-machine identification equipment
The processing mode to service request is determined according to the man-machine recognition result for operation object that man-machine identification parameter obtains.
Correspondingly, communication component 83, for service request and man-machine identification parameter to be sent to server device.
In one exemplary embodiment, processor 802 is also used to: being received server device by communication component 803 and is sent
Response message, and export the results page to match with the response message, the response message response service end equipment is to business
The processing mode of request.Correspondingly, communication component 803 is also used to receive the response message of server device transmission.
In one exemplary embodiment, processor 802 is specifically used for: the service request initiated in response to operation object is led to
It crosses communication component 803 and the carrying of man-machine identification parameter is sent to server device in service request.
In one exemplary embodiment, processor 802 is specifically used for: during operation object initiating business request,
Acquisition operation object and client device interact the first behavioral data of generation and/or soft/hard environment of client device
Parameter is as man-machine identification parameter.
In one exemplary embodiment, processor 802 is also used to: being in processing mode of the server device to service request
When refusing service request, the identifying code that server device is sent is received by communication component 803, exports identifying code;In response to behaviour
The operation for making object input identifying code obtains the second behavioral data and behaviour that operation object generates during inputting identifying code
Make object input identifying code and, the identifying code for being inputted the second behavioral data and operation object by communication component 803
It is sent to server device, so that server device is again true according to the identifying code of the second behavioral data and operation object input
The fixed processing mode to service request.
Further, as shown in Figure 8 b, client device further include: display 804, power supply module 805, audio component
Other components such as 806.Members are only schematically provided in Fig. 8 b, are not meant to that client device only includes group shown in Fig. 8 b
Part.
Above-mentioned wind-controlling device or client device can provide service request and man-machine identification parameter to server device, make
Obtain man-machine identification and service request that server device can be obtained in combination with man-machine identification equipment based on man-machine identification parameter
Corresponding business air control strategy carries out air control for service request, allows business air control strategy and man-machine recognition result mutual
It influences, mutually correction is to generate the air control being more conducive to as a result, can not only accomplish man-machine identification in this way, but also can reduce people
Machine is identified to be adversely affected to business bring.
Correspondingly, the embodiment of the present application also provides a kind of computer readable storage medium for being stored with computer program, meter
Calculation machine program, which is performed, can be realized each step or operation that can be executed by client device in above method embodiment.
Fig. 9 a is the structural schematic diagram for another wind-controlling device that the application another exemplary embodiment provides.Such as Fig. 9 a institute
Show, which includes: receiving module 91, sending module 92 and determining module 93.
Receiving module 91, for receiving the service request and man-machine identification parameter that client device is sent, the man-machine identification
Parameter is that client device is collected during operation object initiating business request.
Sending module 92, for man-machine identification parameter to be transmitted to man-machine identification equipment.
Receiving module 91 be also used to receive man-machine identification equipment according to man-machine identification parameter return for operation object
Man-machine recognition result.
Determining module 93, man-machine recognition result and the corresponding business of service request for being received in conjunction with receiving module 91
Air control strategy determines the processing mode to service request.
In one exemplary embodiment, sending module 92 is also used to: determining the processing to service request in determining module 93
After mode, response message is sent to client device, the result page to match for client device output with response message
Face;Wherein, processing mode of the response message response service end equipment to service request.
In one exemplary embodiment, determining module 93 is specifically used for: according to business air control strategy, determining service request
Business risk grade;In conjunction with the business risk grade of man-machine recognition result and service request, the processing side to service request is determined
Formula.
Further, determining module 93 is specifically used for: when man-machine recognition result instruction operation object is cheating machine script/journey
Sequence or instruction operation object are that cheating machine script/program probability is greater than or equal to setting probability threshold value, but service request
When business risk grade is less than pre-set business risk level threshold, request of accepting business is determined;Alternatively, when man-machine recognition result refers to
Showing operation object not is cheating machine script/program or instruction operation object is that cheating machine script/program probability is less than
Set probability threshold value, but the business risk grade of service request be greater than or equal to pre-set business risk level threshold when, determination refuse
Exhausted service request.
In one exemplary embodiment, sending module 92 is also used to: when the processing mode to service request is refusal business
When request, identifying code is sent to client device, so that operation object inputs identifying code.Correspondingly, receiving module 91 is also used to:
Receive the second behavioral data and operation object that the operation object that client device returns generates during inputting identifying code
The identifying code of input.Determining module 93 is also used to: the identifying code inputted according to the second behavioral data and operation object, again really
The fixed processing mode to service request.
The foregoing describe the built-in function of wind-controlling device and structures, and as shown in figure 9b, in practice, which can realize
For server device, comprising: memory 901, processor 902 and communication component 903.
Memory 901 for storing computer program, and can be configured to store various other data to support servicing
Operation in end equipment.The example of these data includes any application or method for operating in server device
Instruction, contact data, telephone book data, message, picture, video etc..
Memory 901 can realize by any kind of volatibility or non-volatile memory device or their combination,
Such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is read-only
Memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk
Or CD.
Processor 902 is coupled with memory 901, for executing the computer program in memory 901, to be used for:
The service request and man-machine identification parameter that client device is sent, the man-machine identification are received by communication component 903
Parameter is that client device is collected during operation object initiating business request;
Man-machine identification parameter is transmitted to man-machine identification equipment by communication component 903, and receives man-machine identification equipment root
The man-machine recognition result for operation object returned according to man-machine identification parameter;And
In conjunction with man-machine recognition result and the corresponding business air control strategy of service request, the processing side to service request is determined
Formula.
It correspondingly, communication component 903 will for receiving the service request and man-machine identification parameter that client device is sent
Man-machine identification parameter is transmitted to man-machine identification equipment, and receives the man-machine recognition result that man-machine identification equipment returns.
In one exemplary embodiment, processor 902 is also used to: after determining to the processing mode of service request, being led to
It crosses communication component 903 and sends response message to client device, the knot to match for client device output with response message
The fruit page;Wherein, processing mode of the response message response service end equipment to service request.Correspondingly, communication component 903 is also used
In: response message is sent to client device.
In one exemplary embodiment, processor 902 is specifically used for: according to business air control strategy, determining service request
Business risk grade;In conjunction with the business risk grade of man-machine recognition result and service request, the processing side to service request is determined
Formula.
Further, processor 902 is specifically used for: when man-machine recognition result instruction operation object is cheating machine script/journey
Sequence or instruction operation object are that cheating machine script/program probability is greater than or equal to setting probability threshold value, but service request
When business risk grade is less than pre-set business risk level threshold, request of accepting business is determined;Alternatively, when man-machine recognition result refers to
Showing operation object not is cheating machine script/program or instruction operation object is that cheating machine script/program probability is less than
Set probability threshold value, but the business risk grade of service request be greater than or equal to pre-set business risk level threshold when, determination refuse
Exhausted service request.
In one exemplary embodiment, processor 902 is also used to: when the processing mode to service request is that refusal business is asked
When asking, identifying code is sent to client device by communication component 903, so that operation object inputs identifying code, passes through communication set
Part 903 receives the second behavioral data and operation that the operation object that client device returns generates during inputting identifying code
The identifying code of object input;And the identifying code inputted according to the second behavioral data and operation object, it redefines to business
The processing mode of request.Correspondingly, communication component 903 is also used to: being sent identifying code to client device, and is received client and set
Standby the second behavioral data returned and the identifying code of operation object input.
Further, as shown in figure 9b, server device further include: display 904, power supply module 905, audio component
Other components such as 906.Members are only schematically provided in Fig. 9 b, are not meant to that server device only includes group shown in Fig. 9 b
Part.
Above-mentioned wind-controlling device or server device can be matched with man-machine identification equipment, no longer using man-machine identification as one
A self-closing system, but man-machine identification is coupled on business air control strategy, and then in combination with the man-machine knowledge of man-machine identification equipment
Other result and the corresponding business air control strategy of service request determine the processing mode requested corresponding service, so that business air control
It is tactful to influence each other with man-machine recognition result, mutually correct to generate the air control being more conducive to as a result, to reach
Not only it can accomplish man-machine identification, but also the beneficial effect that man-machine identification is adversely affected to business bring can be reduced.
Correspondingly, the embodiment of the present application also provides a kind of computer readable storage medium for being stored with computer program, meter
Calculation machine program, which is performed, can be realized each step or operation that can be executed by server device in above method embodiment.
Figure 10 a is a kind of structural schematic diagram for man-machine identification device that the application another exemplary embodiment provides.Such as figure
Shown in 10a, which includes: receiving module 101, identification module 102 and sending module 103.
Receiving module 101, for receiving the man-machine identification parameter of server device transmission, man-machine identification parameter is client
Equipment acquires during operation object initiating business request and is supplied to server device.
Identification module 102, for carrying out man-machine identification to operation object according to man-machine identification parameter, to obtain man-machine identification
As a result.
Sending module 103, for man-machine recognition result to be sent to server device, so that server device is in conjunction with man-machine
Recognition result and the corresponding business air control strategy of service request determine the processing mode to service request.
In one exemplary embodiment, man-machine identification parameter include: operation object during initiating business request with
Client device interacts the first behavioral data of generation and soft/hard environment parameter of client device.Based on this, mould is identified
Block 102 is specifically used for: according to the first behavioral data, determining that operation object is cheating the first probability of class machine script/program;Root
According to the soft/hard environment parameter and known cheating machine script/program running environment parameter of client device, operation pair is determined
As if cheating the second probability of machine script/program;Man-machine recognition result is obtained in conjunction with the first probability and the second probability.
The foregoing describe the built-in function of man-machine identification device and structures, as shown in fig. lob, in practice, the man-machine identification
Device can be realized as man-machine identification equipment, comprising: memory 1001, processor 1002 and communication component 1003.
Memory 1001 for storing computer program, and can be configured to store various other data to support in people
Machine identifies the operation in equipment.The example of these data include any application program for being operated in man-machine identification equipment or
The instruction of method, contact data, telephone book data, message, picture, video etc..
Memory 1001 can realize by any kind of volatibility or non-volatile memory device or their combination,
Such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is read-only
Memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk
Or CD.
Processor 1002 is coupled with memory 1001, for executing the computer program in memory 1001, to be used for:
The man-machine identification parameter that server device is sent is received by communication component 1003, man-machine identification parameter is client
Equipment acquires during operation object initiating business request and is supplied to server device;
Man-machine identification is carried out to operation object according to man-machine identification parameter, to obtain man-machine recognition result;
Man-machine recognition result is sent to server device by communication component 1003, so that server device is in conjunction with man-machine
Recognition result and the corresponding business air control strategy of service request determine the processing mode to service request.
In one exemplary embodiment, man-machine identification parameter include: operation object during initiating business request with
Client device interacts the first behavioral data of generation and soft/hard environment parameter of client device.Based on this, processor
1002 are specifically used for: according to the first behavioral data, determining that operation object is cheating the first probability of class machine script/program;Root
According to the soft/hard environment parameter and known cheating machine script/program running environment parameter of client device, operation pair is determined
As if cheating the second probability of machine script/program;Man-machine recognition result is obtained in conjunction with the first probability and the second probability.
Further, as shown in fig. lob, man-machine identification equipment further include: display 1004, power supply module 1005, audio
Other components such as component 1006.Members are only schematically provided in Figure 10 b, are not meant to that man-machine identification equipment only includes figure
Component shown in 10b.
Above-mentioned man-machine identification device or equipment can carry out man-machine identification to operation object according to man-machine identification parameter to obtain
It obtains man-machine recognition result and man-machine recognition result is sent to server device, in order to which server device can combine man-machine knowledge
Other result and the corresponding business air control strategy of service request determine the processing mode to service request so that business air control strategy with
Man-machine recognition result can influence each other, mutually correct to generate the air control being more conducive to as a result, both can be with to reach
Accomplish man-machine identification, and the beneficial effect that man-machine identification is adversely affected to business bring can be reduced.
Correspondingly, the embodiment of the present application also provides a kind of computer readable storage medium for being stored with computer program, meter
Calculation machine program, which is performed, can be realized each step or operation that can be executed by man-machine identification equipment in above method embodiment.
Figure 11 a is the structural schematic diagram for another client device that the application another exemplary embodiment provides.Such as figure
Shown in 11a, which includes: memory 111, processor 112 and communication component 113.
Memory 111 for storing computer program, and can be configured to store various other data to support in client
Operation in end equipment.The example of these data includes any application or method for operating on a client device
Instruction, contact data, telephone book data, message, picture, video etc..
Processor 112 is coupled with memory 111, for executing the computer program in memory 111, to be used for: being obtained
Man-machine identification data send client data to server device by communication component 113, wherein the client data includes
Man-machine identification data and business identification code, the business identification code are used to indicate man-machine recognition rule or man-machine recognition threshold.
In addition to this, as shown in fig. 11a, man-machine identification equipment further include: display 114, power supply module 115, audio
Other components such as component 116.Members are only schematically provided in Figure 11 a, are not meant to that client device only includes Figure 11 a
Shown component.
Correspondingly, the embodiment of the present application also provides a kind of computer readable storage medium for being stored with computer program, meter
Calculation machine program be performed can be realized in above-mentioned Fig. 7 b- Fig. 7 c illustrated embodiment can by each step that client device executes or
Operation.
Figure 11 b is the structural schematic diagram for another server device that the application another exemplary embodiment provides.Such as figure
Shown in 11b, which includes: memory 121, processor 122 and communication component 123.
Memory 121 for storing computer program, and can be configured to store various other data to support in client
Operation in end equipment.The example of these data includes any application or method for operating on a client device
Instruction, contact data, telephone book data, message, picture, video etc..
Processor 122 is coupled with memory 121, for executing the computer program in memory 121, to be used for: passing through
Communication component 123 receives client data and selects man-machine recognition rule or adjustment according to the business identification code in client data
Man-machine recognition threshold;And then man-machine recognition rule or man-machine recognition threshold adjusted based on selection, judge man-machine identification number
According to whether effectively.
Still optionally further, processor 122 is also used to: if it is judged that man-machine identification data are effective, passing through communication component
123 fed back through man-machine identification notice;If it is judged that man-machine identification data invalid, is not passed through by the feedback of communication component 123
Man-machine identification notice.
In addition to this, as shown in figure 11b, man-machine identification equipment further include: display 124, power supply module 125, audio
Other components such as component 126.Members are only schematically provided in Figure 11 b, are not meant to that server device only includes Figure 11 b
Shown component.
Correspondingly, the embodiment of the present application also provides a kind of computer readable storage medium for being stored with computer program, meter
Calculation machine program, which is performed, can be realized each step that can be executed by server device in above-mentioned Fig. 7 b and Fig. 7 d illustrated embodiment
Or operation.
In Fig. 8 b, Fig. 9 b, Figure 10 b, Figure 11 a and Figure 11 b, communication component is configured to facilitate equipment where communication component
The communication of wired or wireless way between other equipment.Equipment where communication component can be accessed based on the wireless of communication standard
Network, such as WiFi, 2G or 3G or their combination.In one exemplary embodiment, communication component is received via broadcast channel
Broadcast singal or broadcast related information from external broadcasting management system.In one exemplary embodiment, communication component is also
Including near-field communication (NFC) module, to promote short range communication.For example, it can be based on radio frequency identification (RFID) technology in NFC module,
Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In Fig. 8 b, Fig. 9 b, Figure 10 b, Figure 11 a and Figure 11 b, display includes screen, and screen may include liquid crystal
Show device (LCD) and touch panel (TP).If screen includes touch panel, screen may be implemented as touch screen, be come with receiving
From the input signal of user.Touch panel includes one or more touch sensors to sense on touch, slide, and touch panel
Gesture.Touch sensor can not only sense the boundary of a touch or slide action, but also detect and touch or slide
Relevant duration and pressure.
In Fig. 8 b, Fig. 9 b, Figure 10 b, Figure 11 a and Figure 11 b, power supply module is various groups of equipment where power supply module
Part provides electric power.Power supply module may include power-supply management system, one or more power supplys and other with for where power supply module
Equipment generates, managees, and distributes the associated component of electric power.
In Fig. 8 b, Fig. 9 b, Figure 10 b, Figure 11 a and Figure 11 b, audio component can be configured to output and/or input audio
Signal.For example, audio component includes a microphone (MIC), the equipment where audio component is in operation mode, such as calls mould
When formula, logging mode and speech recognition mode, microphone is configured as receiving external audio signal.The received audio signal can
To be further stored in memory or be sent via communication component.In some embodiments, audio component further includes one and raises
Sound device is used for output audio signal.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (20)
1. a kind of air control method is suitable for client device, which is characterized in that the described method includes:
Man-machine identification parameter is acquired during operation object initiating business request;
In response to the service request that the operation object is initiated, the service request and the man-machine identification parameter are sent to clothes
Business end equipment, so that the server device is according to the corresponding business air control strategy of the service request and by man-machine identification equipment
It is determined according to the man-machine recognition result for the operation object that the man-machine identification parameter obtains to the service request
Processing mode.
2. the method according to claim 1, wherein being sent out by the service request and the man-machine identification parameter
After giving server device, the method also includes:
The response message that the server device is sent is received, and exports the results page to match with the response message, institute
It states response message and reacts the server device to the processing mode of the service request.
3. the method according to claim 1, wherein the business initiated in response to the operation object is asked
It asks, the service request and the man-machine identification parameter is sent to server device, comprising:
In response to the service request that the operation object is initiated, the man-machine identification parameter is carried and is sent out in the service request
Give the server device.
4. the method according to claim 1, wherein described adopt during operation object initiating business request
Collect man-machine identification parameter, comprising:
During the operation object initiating business request, acquires the operation object and handed over the client device
Soft/hard environment parameter of the first behavioral data and/or the client device that mutually generate is as the man-machine identification parameter.
5. method according to claim 1-4, which is characterized in that further include:
When processing mode of the server device to the service request is to refuse the service request, the service is received
The identifying code that end equipment is sent, exports the identifying code;And
The operation that the identifying code is inputted in response to the operation object obtains the operation object during inputting identifying code
The second behavioral data generated and the identifying code of operation object input are simultaneously sent to the server device, for described
Server device is redefined according to the identifying code that second behavioral data and the operation object input to the business
The processing mode of request.
6. a kind of air control method is suitable for server device, which is characterized in that the described method includes:
The service request and man-machine identification parameter, the man-machine identification parameter for receiving client device transmission are that the client is set
It is standby collected during operation object initiating business request;
The man-machine identification parameter is transmitted to man-machine identification equipment, and receives the man-machine identification equipment according to the man-machine knowledge
The man-machine recognition result for the operation object that other parameter returns;And
In conjunction with the man-machine recognition result and the corresponding business air control strategy of the service request, determine to the service request
Processing mode.
7. according to the method described in claim 6, it is characterized in that, determine to the processing mode of the service request after,
The method also includes:
Response message is sent to the client device, is matched for client device output with the response message
Results page;Wherein, the response message reacts the server device to the processing mode of the service request.
8. according to the method described in claim 6, it is characterized in that, man-machine recognition result and the business described in the combination are asked
Corresponding business air control strategy is sought, determines the processing mode to the service request, comprising:
According to the business air control strategy, the business risk grade of the service request is determined;
In conjunction with the business risk grade of the man-machine recognition result and the service request, the processing to the service request is determined
Mode.
9. according to the method described in claim 8, it is characterized in that, man-machine recognition result and the business described in the combination are asked
The business risk grade asked determines the processing mode to the service request, comprising:
When the man-machine recognition result indicates that the operation object is cheating machine script/program or the instruction operation object is
Machine script/program probability of practising fraud is greater than or equal to setting probability threshold value, but the business risk grade of the service request is small
When pre-set business risk level threshold, determines and receive the service request;Or
It is cheating machine script/program or the instruction operation pair when the man-machine recognition result indicates the operation object not
As if cheating machine script/program probability is less than setting probability threshold value, but the business risk grade of the service request is greater than
Or when being equal to pre-set business risk level threshold, determines and refuse the service request.
10. the method according to claim 6, which is characterized in that further include:
When the processing mode to the service request is to refuse the service request, Xiang Suoshu client device sends verifying
Code, so that the operation object inputs the identifying code;
Receive the second behavioral data that the operation object that the client device returns generates during inputting identifying code
And the identifying code of the operation object input;
According to the identifying code that second behavioral data and the operation object input, redefine to the service request
Processing mode.
11. a kind of man-machine recognition methods is suitable for man-machine identification equipment, which is characterized in that the described method includes:
The man-machine identification parameter that server device is sent is received, the man-machine identification parameter is that client device is sent out in operation object
It is acquired during playing service request and is supplied to the server device;
Man-machine identification is carried out to the operation object according to the man-machine identification parameter, to obtain man-machine recognition result;
The man-machine recognition result is sent to the server device, so that the server device is in conjunction with the man-machine identification
As a result corresponding business air control strategy determines the processing mode to the service request with the service request.
12. according to the method for claim 11, which is characterized in that the man-machine identification parameter includes: the operation object
Interacted during initiating business request with the client device generation the first behavioral data and the client
Soft/hard environment parameter of equipment;
It is described that man-machine identification is carried out to the operation object according to the man-machine identification parameter, to obtain man-machine recognition result, packet
It includes:
According to first behavioral data, determine that the operation object is cheating the first probability of class machine script/program;
According to soft/hard environment parameter of the client device and known cheating machine script/program running environment parameter,
Determine that the operation object is cheating the second probability of machine script/program;
The man-machine recognition result is obtained in conjunction with first probability and second probability.
13. a kind of client device characterized by comprising memory, processor and communication component;
The memory, for storing computer program;
The processor is coupled with the memory and the communication component, for executing the computer program, to be used for:
Man-machine identification parameter is acquired during operation object initiating business request;
In response to the service request that the operation object is initiated, by the communication component by the service request and described man-machine
Identification parameter is sent to server device, so that the server device is according to the corresponding business air control strategy of the service request
It is determined with by man-machine identification equipment according to the man-machine recognition result for the operation object that the man-machine identification parameter obtains
To the processing mode of the service request;
The communication component, for the service request and the man-machine identification parameter to be sent to the server device.
14. a kind of server device characterized by comprising memory, processor and communication component;
The memory, for storing computer program;
The processor is coupled with the memory and the communication component, for executing the computer program, to be used for:
The service request and man-machine identification parameter that client device is sent, the man-machine identification ginseng are received by the communication component
Number is that the client device is collected during operation object initiating business request;
The man-machine identification parameter is transmitted to man-machine identification equipment by the communication component, and receives the man-machine identification and sets
The standby man-machine recognition result for the operation object returned according to the man-machine identification parameter;And
In conjunction with the man-machine recognition result and the corresponding business air control strategy of the service request, determine to the service request
Processing mode.
15. a kind of man-machine identification equipment characterized by comprising memory, processor and communication component;
The memory, for storing computer program;
The processor is coupled with the memory and the communication component, for executing the computer program, to be used for:
The man-machine identification parameter that server device is sent is received by the communication component, the man-machine identification parameter is client
Equipment acquires during operation object initiating business request and is supplied to the server device;
Man-machine identification is carried out to the operation object according to the man-machine identification parameter, to obtain man-machine recognition result;
The man-machine recognition result is sent to the server device by the communication component, for the server device
The processing to the service request is determined in conjunction with the man-machine recognition result and the corresponding business air control strategy of the service request
Mode.
16. a kind of air control system characterized by comprising client device, server device and man-machine identification equipment;
The client device for acquiring man-machine identification parameter during operation object initiating business request, and responds
In the service request that the operation object is initiated, the service request and the man-machine identification parameter are sent to the server-side
Equipment;
The server device, for receiving the service request and the man-machine identification ginseng that the client device is sent
Number, is transmitted to the man-machine identification equipment for the man-machine identification parameter and receives the man-machine identification equipment according to described man-machine
The man-machine recognition result for the operation object that identification parameter returns, and in conjunction with the man-machine recognition result and the industry
Corresponding business air control strategy is requested in business, determines the processing mode to the service request;
The man-machine identification equipment, the man-machine identification parameter sent for receiving the server device, according to the people
Machine identification parameter carries out man-machine identification to the operation object to obtain the man-machine recognition result and by the man-machine identification knot
Fruit is sent to the server device.
17. a kind of air control system characterized by comprising client device, server device and man-machine identification equipment;
The client device for acquiring man-machine identification parameter during operation object initiating business request, and responds
In the service request that the operation object is initiated, the service request and the man-machine identification parameter are sent respectively to the clothes
End equipment of being engaged in and the man-machine identification equipment;
The man-machine identification equipment, the man-machine identification parameter sent for receiving the client device, according to the people
Machine identification parameter carries out man-machine identification to the operation object to obtain the man-machine recognition result and by the man-machine identification knot
Fruit is sent to the server device;
The server device, the service request sent for receiving the client device, and receive the man-machine knowledge
The man-machine recognition result that other equipment is sent, and in conjunction with the man-machine recognition result and the corresponding business of the service request
Air control strategy determines the processing mode to the service request.
18. a kind of data processing method characterized by comprising
Receive client data, wherein the client data includes man-machine identification data and business identification code;
According to the business identification code, man-machine recognition rule or the man-machine recognition threshold of adjustment are selected;
Based on the man-machine recognition rule or man-machine recognition threshold, judge whether the man-machine identification data are effective.
19. according to the method for claim 18, which is characterized in that further include:
If the man-machine identification data are effective, man-machine identification notice is fed back through;
If the man-machine identification data invalid, feedback is not notified by man-machine identification.
20. a kind of data processing method characterized by comprising
Obtain man-machine identification data;
Client data is sent to server device, wherein the client data includes the man-machine identification data and business
Identification code, wherein the business identification code is used to indicate man-machine recognition rule or man-machine recognition threshold.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210033885.XA CN114374560A (en) | 2018-02-07 | 2018-02-07 | Data processing method, device and storage medium |
CN201810123056.4A CN110120933B (en) | 2018-02-07 | 2018-02-07 | Wind control, man-machine recognition and data processing method, equipment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810123056.4A CN110120933B (en) | 2018-02-07 | 2018-02-07 | Wind control, man-machine recognition and data processing method, equipment and system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210033885.XA Division CN114374560A (en) | 2018-02-07 | 2018-02-07 | Data processing method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110120933A true CN110120933A (en) | 2019-08-13 |
CN110120933B CN110120933B (en) | 2022-03-04 |
Family
ID=67519551
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210033885.XA Pending CN114374560A (en) | 2018-02-07 | 2018-02-07 | Data processing method, device and storage medium |
CN201810123056.4A Active CN110120933B (en) | 2018-02-07 | 2018-02-07 | Wind control, man-machine recognition and data processing method, equipment and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210033885.XA Pending CN114374560A (en) | 2018-02-07 | 2018-02-07 | Data processing method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN114374560A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200591A (en) * | 2019-12-20 | 2020-05-26 | 浙江大搜车软件技术有限公司 | Multiple man-machine verification method, device, equipment and storage medium |
CN112351006A (en) * | 2020-10-27 | 2021-02-09 | 杭州安恒信息技术股份有限公司 | Website access attack interception method and related components |
CN114338613A (en) * | 2021-11-30 | 2022-04-12 | 深圳兴智数联科技有限公司 | Internet of things equipment identity retrieving method, device, equipment and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101772781A (en) * | 2007-08-07 | 2010-07-07 | 微软公司 | Reduce junk information in the real-time Communication for Power by human interaction proof |
CN102194177A (en) * | 2011-05-13 | 2011-09-21 | 南京柯富锐软件科技有限公司 | System for risk control over online payment |
US20140373139A1 (en) * | 2013-06-13 | 2014-12-18 | Alibaba Group Holding Limited | Method and system of distinguishing between human and machine |
US20160315948A1 (en) * | 2015-04-21 | 2016-10-27 | Alibaba Group Holding Limited | Method and system for identifying a human or machine |
CN106656932A (en) * | 2015-11-02 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Business processing method and device |
CN107103218A (en) * | 2016-10-24 | 2017-08-29 | 阿里巴巴集团控股有限公司 | A kind of service implementation method and device |
CN107153786A (en) * | 2017-05-26 | 2017-09-12 | 北京奇点数聚科技有限公司 | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing |
CN107241306A (en) * | 2017-01-06 | 2017-10-10 | 深圳市九州安域科技有限公司 | A kind of man-machine recognition methods, service end, client and man-machine identifying system |
CN107392755A (en) * | 2017-07-07 | 2017-11-24 | 南京甄视智能科技有限公司 | Credit risk merges appraisal procedure and system |
CN107644340A (en) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | Risk Identification Method, client device and risk recognition system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104980421B (en) * | 2014-10-15 | 2020-06-16 | 腾讯科技(深圳)有限公司 | Batch request processing method and system |
US10250629B2 (en) * | 2015-05-08 | 2019-04-02 | A10 Networks, Incorporated | Captcha risk or score techniques |
CN106487747B (en) * | 2015-08-26 | 2019-10-08 | 阿里巴巴集团控股有限公司 | User identification method, system, device and processing method, device |
GB2570543B8 (en) * | 2016-04-22 | 2021-12-08 | Sophos Ltd | Detecting triggering events for distributed denial of service attacks |
CN107135212A (en) * | 2017-04-25 | 2017-09-05 | 武汉大学 | Man-machine identifying device and method under a kind of Web environment of Behavior-based control difference |
-
2018
- 2018-02-07 CN CN202210033885.XA patent/CN114374560A/en active Pending
- 2018-02-07 CN CN201810123056.4A patent/CN110120933B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101772781A (en) * | 2007-08-07 | 2010-07-07 | 微软公司 | Reduce junk information in the real-time Communication for Power by human interaction proof |
CN102194177A (en) * | 2011-05-13 | 2011-09-21 | 南京柯富锐软件科技有限公司 | System for risk control over online payment |
US20140373139A1 (en) * | 2013-06-13 | 2014-12-18 | Alibaba Group Holding Limited | Method and system of distinguishing between human and machine |
US20160315948A1 (en) * | 2015-04-21 | 2016-10-27 | Alibaba Group Holding Limited | Method and system for identifying a human or machine |
CN106155298A (en) * | 2015-04-21 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Man-machine recognition methods and device, the acquisition method of behavior characteristics data and device |
CN106656932A (en) * | 2015-11-02 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Business processing method and device |
CN107644340A (en) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | Risk Identification Method, client device and risk recognition system |
CN107103218A (en) * | 2016-10-24 | 2017-08-29 | 阿里巴巴集团控股有限公司 | A kind of service implementation method and device |
CN107241306A (en) * | 2017-01-06 | 2017-10-10 | 深圳市九州安域科技有限公司 | A kind of man-machine recognition methods, service end, client and man-machine identifying system |
CN107153786A (en) * | 2017-05-26 | 2017-09-12 | 北京奇点数聚科技有限公司 | A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing |
CN107392755A (en) * | 2017-07-07 | 2017-11-24 | 南京甄视智能科技有限公司 | Credit risk merges appraisal procedure and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200591A (en) * | 2019-12-20 | 2020-05-26 | 浙江大搜车软件技术有限公司 | Multiple man-machine verification method, device, equipment and storage medium |
CN112351006A (en) * | 2020-10-27 | 2021-02-09 | 杭州安恒信息技术股份有限公司 | Website access attack interception method and related components |
CN114338613A (en) * | 2021-11-30 | 2022-04-12 | 深圳兴智数联科技有限公司 | Internet of things equipment identity retrieving method, device, equipment and storage medium |
CN114338613B (en) * | 2021-11-30 | 2024-05-28 | 深圳兴智数联科技有限公司 | Method, device, equipment and storage medium for retrieving identity of Internet of things equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110120933B (en) | 2022-03-04 |
CN114374560A (en) | 2022-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11983964B2 (en) | Liveness detection | |
US10769635B2 (en) | Authentication techniques including speech and/or lip movement analysis | |
US9083687B2 (en) | Multi-device behavioral fingerprinting | |
US20180191695A1 (en) | System and method for bootstrapping a user binding | |
US20180191501A1 (en) | System and method for sharing keys across authenticators | |
JP2021504860A (en) | Extension of secure key storage for transaction verification and cryptocurrencies | |
US20170053260A1 (en) | Systems and methods for messaging, calling, digital multimedia capture and payment transactions | |
JP2021510978A (en) | Systems and methods for binding verifiable claims | |
US20230351388A1 (en) | System, Device, and Method of User Authentication and Transaction Verification | |
WO2015055095A1 (en) | Identity authentication method and device and storage medium | |
CN104346560B (en) | A kind of safe verification method and device | |
CN110427738B (en) | Resource distribution method, device, equipment and storage medium | |
CN105281907B (en) | Encrypted data processing method and device | |
CN110120933A (en) | Air control, man-machine identification and data processing method, equipment and system | |
WO2016131386A1 (en) | Method and device for service management | |
CN105306202B (en) | Auth method, device and server | |
CN111489172B (en) | Qualification information authentication method, terminal and server | |
CN106060027B (en) | Method, apparatus, equipment and the system verified based on identifying code | |
WO2018027148A1 (en) | Authentication techniques including speech and/or lip movement analysis | |
CN107748991A (en) | Account safety management method and device | |
US20150319617A1 (en) | Methods and devices for providing information in voice service | |
CN106651352A (en) | Paying method and device based on near field communication | |
CN110969434B (en) | Payment method, server, terminal and system | |
CN104346161A (en) | Information processing method and electronic equipment | |
CN111614685A (en) | Security verification method applied to server side and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |