WO2021248707A1 - Operation verification method and apparatus - Google Patents

Operation verification method and apparatus Download PDF

Info

Publication number
WO2021248707A1
WO2021248707A1 PCT/CN2020/112684 CN2020112684W WO2021248707A1 WO 2021248707 A1 WO2021248707 A1 WO 2021248707A1 CN 2020112684 W CN2020112684 W CN 2020112684W WO 2021248707 A1 WO2021248707 A1 WO 2021248707A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
data
target
page
classification model
Prior art date
Application number
PCT/CN2020/112684
Other languages
French (fr)
Chinese (zh)
Inventor
张伟望
覃建策
田本真
陈邦忠
Original Assignee
完美世界(北京)软件科技发展有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 完美世界(北京)软件科技发展有限公司 filed Critical 完美世界(北京)软件科技发展有限公司
Publication of WO2021248707A1 publication Critical patent/WO2021248707A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2413Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
    • G06F18/24133Distances to prototypes
    • G06F18/24137Distances to cluster centroïds
    • G06F18/2414Smoothing the distance, e.g. radial basis function networks [RBFN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques

Definitions

  • the present disclosure relates to the field of computers, and in particular to an operation verification method and device.
  • verification codes have been widely adopted by the industry to resist the attacks of Internet black products.
  • the main principle is that black production usually requires a large number of repetitive visits to obtain benefits, and the verification code can effectively increase the cost of each visit.
  • black production usually requires a large number of repetitive visits to obtain benefits, and the verification code can effectively increase the cost of each visit.
  • Many forms of verification codes can have corresponding mature deep learning model solutions, which greatly reduces the difficulty of cracking pictures or text verification codes by black producers, and also greatly reduces the accuracy of verification results.
  • the present disclosure provides an operation verification method and device to at least solve the technical problem of low accuracy in verifying verification operations performed on a verification page in the related art.
  • embodiments of the present disclosure provide an operation verification method, including:
  • the target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, the first data is browsing behavior data generated by the target object before the target verification operation starts, and the The second data is verification behavior data generated by the target object performing the target verification operation;
  • the target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
  • an operation verification device including:
  • the first obtaining module is configured to obtain the first data and the second data generated by the target object on the displayed verification page during the target time period, wherein the verification page is used to perform the execution on the verification page for the target object
  • the target verification operation is verified by the target verification operation, the target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, and the first data is generated by the target object before the target verification operation starts to be executed Browsing behavior data of, where the second data is verification behavior data generated by the target object performing the target verification operation;
  • a first verification module configured to verify the target object according to the first data to obtain a first verification result, and to verify the target verification operation according to the second data to obtain a second verification result;
  • the first determining module is configured to determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verify.
  • the embodiments of the present disclosure also provide a storage medium, the storage medium includes a stored program, and the above-mentioned method is executed when the program is running.
  • the embodiments of the present disclosure also provide an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and the processor executes the above-mentioned method through the computer program.
  • the beneficial effects of the present disclosure include at least: first data and second data generated by the target object on the displayed verification page during the target time period are acquired, wherein the verification page is used for the target verification operation performed on the verification page by the target object
  • the target time period includes the time from the display of the verification page to the end of the target verification operation.
  • the first data is the browsing behavior data generated by the target object before the target verification operation is executed
  • the second data is the target verification operation generated by the target object.
  • Verification behavior data verify the target object based on the first data to obtain the first verification result, and verify the target verification operation based on the second data to obtain the second verification result; determine the target verification based on the first verification result and the second verification result
  • the behavior data generated on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into browsing
  • the two dimensions of behavior and verification behavior are verified separately to obtain their respective verification results, and then the verification results of the two dimensions are merged to obtain the final verification result of the target verification operation.
  • the technical effect of the accuracy of the verification operation performed on the page which in turn solves the technical problem of the low accuracy of the verification operation performed on the verification page in the related technology.
  • FIG. 1 is a schematic diagram of a hardware environment of an operation verification method according to an embodiment of the present disclosure
  • Fig. 2 is a flowchart of an optional operation verification method according to an embodiment of the present disclosure
  • Fig. 3 is a schematic diagram of a verification process of an operation according to an optional embodiment of the present disclosure
  • Fig. 4 is a schematic diagram of a model training process according to an optional embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of a human-machine verification method based on user behavior according to an optional embodiment of the present disclosure
  • Fig. 6 is a schematic diagram of an optional operation verification device according to an embodiment of the present disclosure.
  • Fig. 7 is a structural block diagram of a terminal according to an embodiment of the present disclosure.
  • an embodiment of a method for verifying an operation there is provided an embodiment of a method for verifying an operation.
  • the verification method of the above operation can be applied to the hardware environment formed by the terminal 101 and the server 103 as shown in FIG. 1.
  • the server 103 is connected to the terminal 101 through the network, and can be used to provide services (such as game services, application services, etc.) for the terminal or the client installed on the terminal.
  • the database can be set on the server or independently of the server. It is used to provide data storage services for the server 103.
  • the aforementioned networks include, but are not limited to: wide area networks, metropolitan area networks, or local area networks.
  • the terminal 101 is not limited to PCs, mobile phones, tablet computers, etc.
  • the operation verification method of the embodiment of the present disclosure may be executed by the server 103, may also be executed by the terminal 101, or may be executed jointly by the server 103 and the terminal 101. Wherein, the verification method for the terminal 101 to perform the operation of the embodiment of the present disclosure may also be executed by the client installed on it.
  • Fig. 2 is a flowchart of an optional operation verification method according to an embodiment of the present disclosure. As shown in Fig. 2, the method may include the following steps:
  • Step S202 Obtain the first data and second data generated by the target object on the displayed verification page during the target time period, where the verification page is used for the target verification operation performed by the target object on the verification page Performing verification, the target time period includes the time from displaying the verification page to the end of performing the target verification operation, and the first data is browsing behavior data generated by the target object before starting to perform the target verification operation , The second data is verification behavior data generated by the target object performing the target verification operation;
  • Step S204 verifying the target object according to the first data to obtain a first verification result, and verifying the target verification operation according to the second data to obtain a second verification result;
  • Step S206 Determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, where the target verification result is used to indicate whether the target verification operation passes verification.
  • the behavior data generated on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into two dimensions, browsing behavior and verification behavior, and verification is performed to obtain respective verification results. Then the verification results of the two dimensions are merged to obtain the final verification result of the target verification operation, which achieves the purpose of increasing the difficulty of passing the verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, and then It solves the technical problem of low accuracy in verifying the verification operation performed on the verification page in the related technology.
  • the verification page is used to verify the target verification operation performed by the target object on the verification page.
  • the verification page can be a page that displays a verification code.
  • the verification code is displayed on the login or registration page of the application, the login or registration page can be called a verification page, or the user logs in on the login or registration page or After the registration operation, it jumps to a new page.
  • the verification code is displayed on the page to verify the user's operation.
  • the newly jumped page can also be called a verification page.
  • the target object may, but is not limited to, an object that performs operations on the verification page, such as a registered account used by a registered user, a temporary account used by a non-registered user, and so on.
  • the aforementioned verification code can include, but is not limited to: a slider verification code, a picture selection verification code, a text click verification code, a semantic understanding quiz verification code, etc., in any form for checking Operate the verification code for man-machine verification.
  • the method for acquiring the first data and the second data may include, but is not limited to, one of the following:
  • Method 1 Collect all the behavior data generated by the target object on the displayed verification page during the target time period, and then divide the collected behavior data into the first data and the second data according to the time when the target verification operation is started.
  • the second method is to collect the behavior data of the operation performed on the verification page from the display of the verification page as the first data until it is detected that the target verification operation is started. From the detection that the target verification operation is performed, the behavior data of the operation performed on the verification page is collected as the second data, and the target verification operation is completed.
  • the first data is browsing behavior data generated by the target object before starting to perform the target verification operation
  • the second data is verification behavior data generated by the target object performing the target verification operation.
  • the behavior data can be, but is not limited to, data generated by the target object performing any type of operation on the verification page during the period from when the verification page is opened to when the verification is completed.
  • the operation types may include, but are not limited to: mouse movement, click, move out of boundary, move in boundary, page scroll, keyboard input, etc.
  • the mobile terminal may also include gyroscope changes.
  • the recorded behavior data can also include the time stamp of the time when the operation occurred.
  • the behavior data also includes the time point when the target object starts to verify.
  • the behavior data sequence can be cut according to the time and divided into two parts. One is the browsing behavior data used to represent the page browsing behavior as the first data, and the second is The verification behavior data used to represent the verification code operation behavior is used as the second data.
  • complex front-end code confusion may be added to the front-end code that collects the first data and the second data.
  • step S204 the first data and the second data are respectively verified, the first data is used to verify the object type of the target object, and the second data is used to verify whether the target verification operation is passed.
  • the first data is behavioral data before the verification start stage, which has a relatively large randomness and does not easily affect the judgment of similarity between operations, and should not be used as data for verifying the target verification operation.
  • the behavior data before the beginning stage can better reflect whether the target object is a real user or a robot intrusion, so it can be used as an object type verification.
  • the actions when performing the verification operation such as dragging the slider, clicking the text, etc., have a very clear paradigm structure, which is more suitable for judging the similarity between operations.
  • the second data generated during the verification operation is used as the operation similarity. Sexual verification.
  • the first verification result and the second verification result may be merged to obtain the target verification result.
  • the method of fusion of the verification results may include, but is not limited to: method one, the first verification result and the second verification result are standardized and then summed, the average is taken or the weighted sum is taken, etc.
  • Operation according to the operation result to determine whether the target verification operation passes the verification.
  • the second method is to input the first verification result and the second verification result into the trained classification model and automatically merge the verification results to output the final result of whether the target verification operation passes the verification.
  • verifying the target object according to the first data to obtain the first verification result includes:
  • S12 Classify the data features, and obtain the target object type corresponding to the target object as the first verification result.
  • data features may be extracted from the first data to reflect the attribute features of the first data, and then the target object type to which the target object belongs is determined according to the obtained data features.
  • the divided object types may include, but are not limited to, normal users, attackers, and so on.
  • the method of classifying data features may include, but is not limited to: searching for features and object types that have a corresponding relationship to obtain the target object type corresponding to the data feature, and using the trained model to perform data feature analysis. Automatic classification and so on.
  • performing feature extraction on the first data to obtain data features corresponding to the first data includes:
  • S22 Perform feature extraction on data of each data type in the data of the multiple data types, respectively, to obtain data features corresponding to the data of each data type;
  • Classifying the data features and obtaining the target object type corresponding to the target object as the first verification result includes:
  • S23 Separately classify the data features corresponding to the data of each data type to obtain the object type corresponding to the data of each data type;
  • feature extraction and classification may be performed, but not limited to, respectively, and then the obtained different classification results are merged to obtain the first verification result.
  • Different data types can set different classification standards according to the characteristics of the data, thereby improving the accuracy of classification.
  • the first data can be divided into mouse trajectory data, keyboard input data, etc. according to the data generation manner, but is not limited to.
  • the method of fusing the object type corresponding to the data of each data type may include, but is not limited to, operations such as weighted summation, averaging, etc., and then based on the threshold value that the operation result falls into.
  • the scope determines the target object type.
  • verifying the target object according to the first data to obtain the first verification result includes:
  • S31 Input the first data into a target feature classification model, where the target feature classification model is obtained by training an initial feature classification model using browsing behavior data samples labeled with object types;
  • the target feature classification model can be obtained through model training but is not limited to automatically detect the target object type corresponding to the first data.
  • the target feature classification model is obtained by training the initial feature classification model using browsing behavior data samples marked with object types.
  • the target feature classification model can include, but is not limited to, structures such as deep neural network dnn, convolutional neural network cnn, and recurrent neural network rnn.
  • acquiring the target object type output by the target feature classification model as the first verification result includes:
  • S41 Perform feature extraction on the first data through a feature extraction layer to obtain data features, wherein the target feature classification model includes a first input layer, the feature extraction layer, a classification layer, and a first output layer that are sequentially connected , The first input layer is used to receive the first data;
  • S42 Classify the data feature through the classification layer to obtain the probability that the data feature belongs to each object type among multiple object types;
  • S43 Determine the target object type from the multiple object types by the first output layer according to the probability that the data feature belongs to each of the multiple object types, and output the target object type.
  • the target feature classification model may include, but is not limited to, a first input layer, a feature extraction layer, a classification layer, and a first output layer that are sequentially connected, wherein the first input layer is used to receive the first Data, the feature extraction layer is used to perform feature extraction on the first data to obtain data features, the classification layer is used to classify data features to obtain classification results, and the first output layer is used to output the target object type according to the classification results obtained by the classification layer.
  • the classification result obtained by the classification layer may, but is not limited to, the probability that the data feature corresponds to each object type among multiple object types.
  • the first output layer judges the target object type according to the probability of each object type. For example, a probability threshold can be set, and the object type corresponding to the highest probability higher than the probability threshold can be used as the target object type.
  • different target feature classification models can be trained for different target verification operation types.
  • the above-mentioned feature extraction layer may, but is not limited to, adopt a Long Short-Term Memory (LSTM) model structure, and the hyperparameters to be tuned for LSTM may include, but are not limited to: LSTM's cell state size, output length, L1 and L2 regularization coefficients, optimization algorithm, learning rate, etc.
  • LSTM Long Short-Term Memory
  • the above-mentioned classification layer may, but is not limited to, adopt a logistic regression (LR) model network.
  • LR logistic regression
  • the process of verifying the target object based on the first data to obtain the first verification result may include, but is not limited to, the following steps:
  • Step A the first data is sampled, where the continuous mouse movement track and continuous page scrolling can be sampled at a fixed time interval (for example, the fixed sampling interval of the mouse track can be set to 100ms).
  • the keyboard input selects the longest continuous input segment as the representative. If the maximum length is exceeded, the continuous segment of the input is randomly intercepted (for example, the maximum input length of the keyboard input sequence can be set to 64).
  • Step B Input the mouse trajectory data and the keyboard input behavior sequence data into two different depth models respectively to perform automatic feature extraction.
  • the mouse track data and keyboard input behavior sequence data can be standardized and then input into the model.
  • Each frame of the mouse track data is represented as a feature vector.
  • the vector can include but is not limited to four bits. One bit indicates the type of operation, which can be: click, press, lift, move, move out of boundary, move in boundary, scroll, etc.
  • the second and third digits are the x and y axis coordinates where the mouse is located.
  • the fourth digit is the time when the operation occurred.
  • Each frame of the keyboard input behavior sequence data can also be represented as a feature vector, which can include but is not limited to two bits, the first bit represents the ascii code corresponding to the letter or symbol input by the keyboard. The second digit indicates the time corresponding to the keyboard input.
  • Step C Perform a weighted summation of the output results of the two feature extraction models to obtain the probability that the operation may come from the attacker.
  • verifying the target verification operation according to the second data to obtain a second verification result includes:
  • the second data is first verified by rules, that is, whether the second data meets the verification conditions.
  • rules that is, whether the second data meets the verification conditions.
  • the drag track of the slider should be related to the position of the slider
  • the position of the text click should be related to the position of the slider. Match the relative position of the text in the picture. If the rule verification fails, the target verification operation is directly determined as the attacker's attack behavior.
  • a certain error tolerance threshold can be added to the verification of whether the second data meets the verification conditions, so as to deal with data collection errors that may occur in the actual production environment, thereby improving the accuracy of the verification results.
  • the target verification operation passes the verification based on the similarity between the target data and the target data extracted from the verification operation that has passed the verification. , Thereby obtaining the second verification result.
  • determining whether the target verification operation passes verification according to the similarity between the second data and target data, and obtaining the second verification result includes:
  • S62 Input the encoded data into a target single classification model, where the target single classification model is obtained by training an initial single classification model using the target data;
  • the similarity between the second data and the historical target data can be automatically detected through the trained target single classification model, so as to automatically determine whether the second data passes the verification.
  • a self-encoder can be used to encode the second data, but is not limited to.
  • a 4-layer self-encoder where the self-encoder includes three hidden layers of 128, 64, and 128, respectively.
  • 64 is the representation length of the final encoding.
  • the depth of the self-encoder and the size of the hidden layer are hyperparameters that can be tuned. What is given here is an example of actual use, which is not limited in the present disclosure.
  • the second data may be preprocessed before the second data is encoded. For example: first remove the data that is not the mouse operation type in the second data, and then remove the field indicating the operation type in the data, leaving only the mouse coordinates and time fields.
  • the above sequence is sampled to 100 coordinate time pairs at uniform time intervals, and a vector with a length of 300 is obtained as the preprocessed second data for encoding.
  • the foregoing target single classification model may, but is not limited to, use the model structure of the SVDD (Support vector domain description, support vector data description) model.
  • SVDD Simple vector domain description, support vector data description
  • the training data (ie target data) of the above-mentioned SVDD model can all come from normal user data (ie, verified verification operations), the data is easy to obtain, and the data labels are highly accurate and can be directly Perform online data set expansion and model iteration.
  • the above-mentioned target data may include, but is not limited to, the following sources: data generated by the intranet IP segment, data generated by the IP whitelist and user whitelist, or by analyzing the daily traffic of the website Find the natural day when the traffic is normal, and treat all data as normal user data.
  • the aforementioned normal flow means that there is no sudden flow peak, and the flow conforms to long-term regularity, such as peaks in the morning and evening, and troughs in the middle of the night.
  • the hyperparameters to be trained for the above-mentioned SVDD model may include, but are not limited to, the selection of the kernel function, the soft interval coefficient, and the like.
  • the aforementioned kernel function may also include secondary hyperparameters, such as coefficients, exponents, and so on.
  • the anomaly detection model is used to verify the user verification code behavior.
  • the anomaly detection model is a single classification model, so only one type of data is needed for training. Because normal user data is very easy to obtain, and the attacker’s data is difficult to label, there are no data collection problems in using this model to classify, thereby reducing the difficulty of model training, using more accurate training data and improving the accuracy of model training .
  • obtaining the verification identifier output by the target single classification model as the second verification result includes:
  • S71 Determine the similarity between the encoded data and the target data through a single classification layer, where the target single classification model includes a second input layer, the single classification layer and a second output layer connected in sequence, The second input layer is used to receive the encoded data;
  • the target single classification model includes a second input layer, a single classification layer, and a second output layer that are sequentially connected.
  • the second input layer is used to receive encoded data
  • the single classification layer is used to determine encoded data.
  • the relationship with the target data can be based on the similarity between the encoded data and the target data to determine a score for the encoded data. The higher the score, the higher the similarity, or the lower the score, the higher the similarity. high.
  • the second output layer is used to determine whether the encoded data has passed the verification based on the output of the single classification layer, determine whether the similarity is higher than the target similarity according to the score, and determine whether the encoded data is higher than the target similarity to pass the verification.
  • the coded data of similarity determines that it has not passed the verification.
  • the normal user behavior classification label is 0, which corresponds to the unique classification of the model.
  • the score threshold is selected to be 1, and a score greater than 1 means that the similarity between the encoded data and the target data is not higher than the target similarity, and it is judged as not a normal user behavior, that is, it is judged that the attacker is forging the data, and the score is less than 1. It means that the similarity between the coded data and the target data is higher than the target similarity, and it is judged to be ordinary user data.
  • FIG. 3 is a schematic diagram of an operation verification process according to an optional implementation manner of the present disclosure, as shown in FIG. 3. As shown, the process can, but is not limited to, include the following steps:
  • Step S302 Obtain user behavior data generated by the user's operation on the verification page.
  • Step S304 Divide the acquired data into page browsing behavior as the first data and verification code operation behavior as the second data.
  • Step S306 Use the LSTM+LR model to classify the page browsing behavior to obtain the classification result.
  • Step S308 Use the self-encoder + SVDD single classification model to process the verification code operation behavior to obtain the classification result.
  • step S310 the above two results are merged to obtain a final judgment.
  • the behavior data features are automatically extracted based on the depth model, which improves the efficiency of feature extraction and the accuracy of verification.
  • the method further includes:
  • S81 Determine the target data type corresponding to the multiple data types of the encoded data, where the multiple data types are obtained by clustering historical encoded data;
  • S82 Obtain the access frequency of the object corresponding to the data generated belonging to the target data type, where the access frequency is used to indicate the frequency of access to the verification page by the object corresponding to the data generated belonging to the target data type;
  • multiple data types are obtained by clustering historical coded data. For example: you can collect user data for a certain period of time, and then use the mean-shift algorithm to cluster the data to obtain n cluster centers, where n depends on the window size of the mean-shift algorithm, and the window size can be based on the specific verification code The characteristics of the data and the desired effect are adjusted.
  • the method for determining the target data type corresponding to the encoded data among the multiple data types may be, but is not limited to, calculating the distance between the encoded data and each of the aforementioned cluster centers, and finding the closest cluster. Class center. If the distance between the encoded data and the cluster center is less than the set threshold, the encoded data is considered to belong to the cluster cluster represented by the cluster center, and the cluster cluster is determined as the target data type.
  • the object identifier of the target object may include but is not limited to: user id, user ip address, and so on. For example: bind the user ip address corresponding to the aforementioned encoded data with the user ip corresponding to other behaviors in the determined cluster, and the bound ip will be combined to calculate its access frequency. If the merging frequency exceeds a certain threshold, the newly accessed ip is set as a suspicious flag, and if the same ip is set as a suspicious flag multiple times, it is added to the ip blacklist.
  • some non-user-friendly verification codes can be replaced at the front end to test them.
  • the score threshold of the target single classification model can be lowered, that is, the target similarity can be raised, so that the behavior data generated by the user ip has a greater probability of being classified as an attacker.
  • the model threshold of the target feature classification model can also be adjusted, thereby improving the behavior data generated by the user ip. Possibility to classify as an attacker.
  • Also before verifying the target object based on the first data to obtain a first verification result, and verifying the target verification operation based on the second data to obtain a second verification result ,Also includes:
  • S91 Obtain target data from the collected data set, where the target data is data extracted from a verification operation that has passed verification;
  • S93 Use the target single classification model to verify the data in the data set, and obtain the data that fails the verification as a result of the verification;
  • S94 Obtain, from the data set, first browsing behavior data corresponding to the target data and second browsing behavior data corresponding to data whose verification result is that the verification fails;
  • S95 Mark the object type corresponding to the first browsing behavior data as a first object type, and mark the object type corresponding to the second browsing behavior data as a second object type, to obtain browsing behavior data marked with the object type sample;
  • the aforementioned data set may, but is not limited to, include user behavior logs and the like.
  • a training module is provided to execute the training process of the model, and the training module can be used to update the online model daily to deal with new forgery behaviors generated by the attacker.
  • Fig. 4 is a schematic diagram of a model training process according to an optional embodiment of the present disclosure. As shown in Fig. 4, the training process may but is not limited to include the following steps:
  • Step S402 training is based on the verification behavior data log recorded every day.
  • the user behavior log of the day is collected.
  • the intranet IP (Internet Protocol) segment as well as the user whitelist, IP whitelist, etc., the user must be filtered out to be ordinary users Behavioral data, that is, target data.
  • Step S404 Use the filtered user behavior data to update the original user data set, and use the updated data set to train the SVDD single classification model.
  • Step S406 Use the pre-segmented test data set for verification.
  • the verification data set contains both user tag data and attacker tag data.
  • the recall rate and accuracy rate of the model are verified, and the online model is updated if the standards are met.
  • Step S408 Use the updated SVDD model to detect all the behavior data of the day, extract all the behavior data classified as attacker data, and add it to the attacker data set.
  • Step S410 Use the updated user data set and the attacker data set to train the LSTM+LR model at the same time, and use the pre-segmented test set for verification to verify the recall rate and accuracy of the model, and update the online model if it meets the standard.
  • the method before acquiring the first data and the second data generated by the target object on the displayed verification page within the target time period, the method further includes:
  • the security of the verification page may be confirmed, but not limited to, the confirmation method may be to store the correspondence between the operation page address and the verification page address in advance .
  • the page page is first verified, and the first page address of the operation page and the second page address of the verification page are obtained, thereby The first page address and the second page address that have a corresponding relationship are searched in the pre-stored operation page addresses and verification page addresses that have a corresponding relationship. If found, the verification page is considered to be safe, if not found If the verification page is reached, it is deemed that the verification page is illegal, and a preset operation is performed on it to indicate that the verification page has a security risk.
  • the target operation performed on the operation page triggers the display of the verification page.
  • the operation page can, but is not limited to, include a game login page, a game registration page, a game transaction page, and other pages that require verification of the target object category (real human user or invading robot).
  • the preset operation is used to indicate that the verification page has a security risk.
  • the preset operations can include, but are not limited to: interception operations, reporting operations, risk warnings, blocking operations, and so on.
  • the correspondence between the operation page and the page address of the verification page is verified to determine whether the corresponding relationship has been stored in advance, and if so, the verification is displayed Page, if not, confirm that the verification page is a security risk.
  • obtaining the first page address of the operation page and the second page address of the verification page includes:
  • S111 Obtain encrypted data reported by the client, where the client is used to display the operation page and the verification page;
  • S112 Acquire secret key information corresponding to the client
  • S113 Use the secret key information to decrypt the encrypted data to obtain the first page address and the second page address.
  • the verification process for the security of the page URL can be, but not limited to, performed by the server, and the client side reports information such as the page address in an encrypted manner.
  • different clients may, but are not limited to, correspond to different secret key information, and may also agree on the same secret key information with all clients.
  • the client uses encrypted transmission to report information to the server, which can further improve security.
  • the method further includes:
  • S121 Perform a security test on the operation page and the verification page to obtain target risk information corresponding to the operation page and the verification page, where the target risk information is used to indicate that the operation page and the verification page are Describe the risks of operations on the verification page;
  • S122 Display the target risk information to the target object.
  • the security test process can be, but is not limited to, used to test the security risks on the page, such as: testing the operation page and verifying whether there are malicious websites, malicious downloads, and phishing links on the page. , Trojan horse virus and other risks, as well as whether the operating environment on the operating page and verification page is safe, whether the operating behavior is guaranteed, and so on.
  • the target risk information may include but is not limited to information including at least one of the risk value and the risk type.
  • the security risk of the page may be scored according to the result of the security test to obtain the risk value.
  • the respective risk values can be scored separately, and the results of the safety inspection can also be merged into a risk value.
  • the target risk information displayed to the target object can be, but is not limited to, the obtained risk value.
  • the risk value is 90 points, which means that there is almost no risk in the operation on the page.
  • the risk value is 45 points, which means that the risk of performing operations on the page is higher.
  • the target risk information can also be used to show the risk type to the target object.
  • the risk value is 45 points, and the risk type is: Trojan horse, malicious website and malicious download.
  • the risk type can also be recorded in a list. While obtaining the risk value, check the existing risk type in the list, and display the risk value and the checked list to target.
  • the security test is performed on the operation page and the verification page, and the obtained target risk information is displayed to the target object, thereby prompting the target object about the possible security risks of the operation.
  • the safety of user operations is improved, and a safe operating environment is provided for users.
  • performing a security test on the operation page and the verification page to obtain target risk information corresponding to the operation page and the verification page includes:
  • S131 Perform a security test on the operation page to obtain first risk information, where the first risk information is used to indicate the risks of operations on the operation page;
  • S132 Perform a security test on the verification page to obtain second risk information, where the second risk information is used to indicate the risks of operations on the verification page;
  • S133 Determine the target risk information according to the first risk information, the second risk information, and the target search result, where the target search result is used to indicate the address and verification of the corresponding operation page from the pre-stored The result of searching for the first page address and the second page address that have a corresponding relationship in the page address.
  • the target search result also affects the security of the operation page and the verification page. For example, if the target search result is that no correspondence is found, the security of the confirmation operation page and the verification page will be reduced. , If the target search result is that the corresponding relationship is found, the security of the confirmation operation page and the verification page will be improved accordingly.
  • Fig. 5 is a schematic diagram of a human-machine verification method based on user behavior according to an optional embodiment of the present disclosure. As shown in Fig. 5, the method may but is not limited to include the following steps:
  • Step S502 Obtain user behavior data and divide it into user page browsing behavior and user verification code operation behavior.
  • step S504 the user page browsing behavior is sampled at a fixed time interval of the mouse, scroll wheel and other behaviors, and the keyboard data is intercepted by the maximum fixed length to obtain the browsing behavior data.
  • the LSTM+LR model is used to classify the browsing behavior data, and the classification result is obtained.
  • Step S506 Regarding the user verification code operation behavior, use it as the verification behavior data and use the self-encoder to encode, and obtain the behavior code as the encoded data. Use the SVDD single classification model to classify it, and get the classification result.
  • step S508 the above two classification results are merged to obtain the final judgment result.
  • the foregoing method may also include but is not limited to the following steps:
  • Step S510 Use a mean-shift (mean shift) algorithm to cluster the behavior codes, and bind related ips according to the clustering results.
  • step S512 the access frequency of the bound ip is jointly counted.
  • step S514 if the joint access frequency exceeds the specified threshold, the newly accessed ip is marked as suspicious, and if the ip is marked as suspicious multiple times, it is added to the blacklist.
  • Step S516 For the blacklist ip, it is fed back to the front end to increase the difficulty of verification, and at the same time, fed back to the classification model to increase the difficulty of classifying it as a normal user.
  • the collected user behavior is not limited to the verification process, and the user behavior is divided into two sequences with relatively different characteristics of page browsing behavior and verification code operation behavior, and different models are used to classify the two sequences, which enriches the dimension of the verification process And the amount of information, thereby improving the accuracy of verification.
  • Use a single classification model to classify user data avoiding the difficulty of collecting attacker data.
  • the clustering model is used to analyze the similarity of the attacker's forged behavior, which prevents the attacker from directly using real user behavior for false verification after cracking the front-end code. Thereby, the accuracy of the verification of the verification operation is improved.
  • the method according to the above embodiment can be implemented by means of software plus the necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is Better implementation.
  • the technical solution of the present disclosure essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) execute the methods described in the various embodiments of the present disclosure.
  • a verification device for implementing the operation of the verification method of the above operation.
  • Fig. 6 is a schematic diagram of an optional operation verification device according to an embodiment of the present disclosure. As shown in Fig. 6, the device may include:
  • the first obtaining module 62 is configured to obtain the first data and the second data generated by the target object on the displayed verification page within the target time period, wherein the verification page is used to verify that the target object is on the verification page
  • the target verification operation performed is verified, the target time period includes the time from displaying the verification page to the end of performing the target verification operation, and the first data is that the target object is before the target verification operation starts to perform the target verification operation.
  • Generated browsing behavior data where the second data is verification behavior data generated by the target object performing the target verification operation;
  • the first verification module 64 is configured to verify the target object according to the first data to obtain a first verification result, and to verify the target verification operation according to the second data to obtain a second verification result;
  • the first determining module 66 is configured to determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation is approved.
  • the first obtaining module 62 in this embodiment can be configured to perform step S202 in the embodiment of the present disclosure
  • the first verification module 64 in this embodiment can be configured to perform step S204 in the embodiment of the present disclosure
  • the first determining module 66 in this embodiment may be configured to execute step S206 in the embodiment of the present disclosure.
  • the behavior data generated on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into two dimensions: browsing behavior and verification behavior.
  • the verification results of the dimensions are merged to obtain the final verification result of the target verification operation, which achieves the purpose of increasing the difficulty of passing the verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, thereby solving related technologies
  • the technical problem of low accuracy in verifying the verification operations performed on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into two dimensions: browsing behavior and verification behavior.
  • the verification results of the dimensions are merged to obtain the final verification result of the target verification operation, which achieves the purpose of increasing the difficulty of passing the verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, thereby solving related technologies
  • the technical problem of low accuracy in verifying the verification operations performed on the verification page is merged to obtain the final verification result of the target verification operation, which achieves the purpose of increasing the difficulty
  • the first verification module includes:
  • An extraction unit configured to perform feature extraction on the first data to obtain data features corresponding to the first data
  • the classification unit is configured to classify the data features, and obtain the target object type corresponding to the target object as the first verification result.
  • the extraction unit is configured to: divide the first data into data of multiple data types according to the data generation mode; Perform feature extraction on data of each type to obtain the data feature corresponding to the data of each data type;
  • the classification unit is configured to: respectively classify the data characteristics corresponding to the data of each data type to obtain the object type corresponding to the data of each data type; and to determine the object corresponding to the data of each data type The types are merged to obtain the target object type.
  • the first verification module includes:
  • the first input unit is configured to input the first data into a target feature classification model, wherein the target feature classification model is obtained by training an initial feature classification model using browsing behavior data samples marked with object types;
  • the first obtaining unit is configured to obtain the target object type output by the target feature classification model as the first verification result, wherein the target object type is included in the object type marked by the behavior data sample.
  • the first acquiring unit is configured to:
  • the feature extraction layer is used to perform feature extraction on the first data to obtain data features, wherein the target feature classification model includes a first input layer, the feature extraction layer, a classification layer, and a first output layer that are sequentially connected.
  • the first input layer is used to receive the first data;
  • the first output layer determines the target object type from the multiple object types according to the probability that the data feature belongs to each of the multiple object types, and outputs the target object type.
  • the first verification module includes:
  • the first determining unit is configured to determine whether the second data meets the verification condition corresponding to the verification page
  • a second determining unit configured to determine that the second verification result is used to indicate that the target verification operation fails verification when it is determined that the second data does not meet the verification condition
  • the third determining unit is configured to determine whether the target verification operation passes the verification according to the similarity between the second data and the target data when it is determined that the second data meets the verification conditions, to obtain the The second verification result, wherein the target data is data extracted from a verification operation that has passed verification.
  • the third determining unit is configured to:
  • the verification identifier output by the target single classification model is obtained as the second verification result, wherein the verification identifier is used to indicate whether the encoded data passes verification.
  • the third determining unit is configured to:
  • the similarity between the encoded data and the target data is determined by a single classification layer, wherein the target single classification model includes a second input layer connected in sequence, the single classification layer and the second output layer, and the The second input layer is used to receive the encoded data;
  • a second verification identifier is output through the second output layer, where the second verification identifier is used to indicate that the encoded data fails verification.
  • the device further includes:
  • the second determining module is configured to, after encoding the second data to obtain the encoded data, determine the target data type corresponding to the encoded data among the multiple data types, wherein the multiple data types It is obtained by clustering historical coded data;
  • the second obtaining module is configured to obtain the access frequency of the object corresponding to the data belonging to the target data type, wherein the access frequency is used to instruct the object corresponding to the data belonging to the target data type to access the verification page Frequency of;
  • a third determining module configured to determine the object identifier of the target object as a suspicious identifier when the access frequency is higher than the target frequency
  • the adjustment module is configured to increase the target when the target single classification model is used to process the data from the target marker when the number of times the target marker is determined to be the suspicious marker is higher than the target number Similarity.
  • the device further includes:
  • the third acquisition module is configured to perform verification on the target object according to the first data to obtain a first verification result, and perform verification on the target verification operation according to the second data to obtain a second verification result, from Obtain target data in a collection of collected data, where the target data is data extracted from verification operations that have passed verification;
  • the first training module is configured to use the target data to train the initial single classification model to obtain a target single classification model, wherein the target single classification model is used to verify the target verification operation according to the second data Obtain the second verification result;
  • the second verification module is configured to use the target single classification model to verify the data in the data set, and obtain the data that fails the verification as a verification result;
  • a fourth obtaining module configured to obtain, from the data set, first browsing behavior data corresponding to the target data and second browsing behavior data corresponding to data that has not passed the verification as a verification result;
  • the labeling module is configured to label the object type corresponding to the first browsing behavior data as the first object type, and label the object type corresponding to the second browsing behavior data as the second object type, to obtain the object type labeled Browse behavioral data samples;
  • the second training module is configured to train the initial feature classification model using the browsing behavior data sample labeled with the object type to obtain a target feature classification model, wherein the target feature classification model is used to pair according to the first data
  • the target object performs verification to obtain a first verification result.
  • the device further includes:
  • the fifth acquisition module is configured to acquire the target operation performed on the displayed operation page before acquiring the first data and the second data generated by the target object on the displayed verification page during the target time period.
  • the search module is configured to search for the first page address and the second page address with the corresponding relationship from the pre-stored operation page address and the verification page address with the corresponding relationship;
  • a display module configured to display the verification page when the first page address and the second page address that have a corresponding relationship are found
  • the operation module is configured to perform a preset operation on the verification page when the first page address and the second page address that have a corresponding relationship are not found, wherein the preset operation is used to instruct The verification page has security risks.
  • the fifth acquiring module includes:
  • the second obtaining unit is configured to obtain encrypted data reported by the client, where the client is used to display the operation page and the verification page;
  • the third obtaining unit is configured to obtain secret key information corresponding to the client
  • the decryption unit is configured to use the secret key information to decrypt the encrypted data to obtain the first page address and the second page address.
  • the device further includes:
  • the test module is configured to perform a security test on the operation page and the verification page after obtaining the first page address of the operation page and the second page address of the verification page to obtain the operation page and the verification page.
  • the display module is configured to display the target risk information to the target object.
  • test module includes:
  • the first test unit is configured to perform a security test on the operation page to obtain first risk information, where the first risk information is used to indicate the risks of performing operations on the operation page;
  • the second test unit is configured to perform a security test on the verification page to obtain second risk information, where the second risk information is used to indicate the risks of operations on the verification page;
  • the fourth determining unit is configured to determine the target risk information according to the first risk information, the second risk information, and the target search result, wherein the target search result is used to indicate the corresponding relationship from the pre-stored The result of searching the first page address and the second page address that have a corresponding relationship in the operation page address and the verification page address.
  • the above-mentioned modules can run in the hardware environment as shown in FIG. 1, and can be implemented by software or hardware, where the hardware environment includes a network environment.
  • a server or terminal for implementing the verification method of the above operation.
  • FIG. 7 is a structural block diagram of a terminal according to an embodiment of the present disclosure.
  • the terminal may include: one or more (only one is shown in the figure) processor 701, memory 703, and transmission device 705 As shown in FIG. 7, the terminal may also include an input and output device 707.
  • the memory 703 can be configured to store software programs and modules, such as the operation verification method and device corresponding program instructions/modules in the embodiments of the present disclosure.
  • the processor 701 runs the software programs and modules stored in the memory 703, thereby Perform various functional applications and data processing, that is, realize the verification method of the above-mentioned operation.
  • the memory 703 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory.
  • the memory 703 may include a memory remotely provided with respect to the processor 701, and these remote memories may be connected to the terminal through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
  • the aforementioned transmission device 705 is configured to receive or send data via a network, and may also be configured to transmit data between the processor and the memory.
  • the above-mentioned optional examples of networks may include wired networks and wireless networks.
  • the transmission device 705 includes a network adapter (Network Interface Controller, NIC), which can be connected to other network devices and routers via a network cable so as to communicate with the Internet or a local area network.
  • the transmission device 705 is a radio frequency (RF) module, which is configured to communicate with the Internet in a wireless manner.
  • RF radio frequency
  • the memory 703 is configured to store an application program.
  • the processor 701 may call the application program stored in the memory 703 through the transmission device 705 to perform the following steps:
  • the target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, the first data is browsing behavior data generated by the target object before the target verification operation starts, and the The second data is verification behavior data generated by the target object performing the target verification operation;
  • the target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
  • a scheme of operation verification is provided.
  • the behavior data generated on the verification page is divided into two dimensions, browsing behavior and verification behavior, and verifying separately to obtain their respective verification results, and then verifying the results of the two dimensions
  • the final verification result of the target verification operation is obtained by fusion, which achieves the purpose of increasing the difficulty of verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, thereby solving the problem of the verification page in the related technology.
  • the verification operation performed on the technical problem of low accuracy of verification.
  • the structure shown in Fig. 7 is only for illustration, and the terminal can be a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a handheld computer, and a mobile Internet device (Mobile Internet Devices, MID), Terminal equipment such as PAD.
  • FIG. 7 does not limit the structure of the above-mentioned electronic device.
  • the terminal may also include more or fewer components (such as a network interface, a display device, etc.) than shown in FIG. 7, or have a different configuration from that shown in FIG.
  • the program can be stored in a computer-readable storage medium, and the storage medium can be Including: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), magnetic disk or optical disk, etc.
  • the embodiment of the present disclosure also provides a storage medium.
  • the above-mentioned storage medium may be set as the program code of the verification method for executing the operation.
  • the foregoing storage medium may be located on at least one of the multiple network devices in the network shown in the foregoing embodiment.
  • the storage medium is configured to store program code for executing the following steps:
  • the target time period includes the time from displaying the verification page to the end of performing the target verification operation, the first data is browsing behavior data generated by the target object before starting to perform the target verification operation, and The second data is verification behavior data generated by the target object performing the target verification operation;
  • the target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
  • the foregoing storage medium may include, but is not limited to: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk Various media that can store program codes such as discs or optical discs.
  • the integrated unit in the foregoing embodiment is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in the foregoing computer-readable storage medium.
  • the technical solution of the present disclosure essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, It includes several instructions to make one or more computer devices (which may be personal computers, servers, or network devices, etc.) execute all or part of the steps of the methods described in the various embodiments of the present disclosure.
  • the disclosed client can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, units or modules, and may be in electrical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.

Abstract

An operation verification method and apparatus. The method comprises: acquiring first data and second data generated by a target object on a displayed verification page within a target period of time (S202); verifying the target object according to the first data to obtain a first verification result, and verifying a target verification operation according to the second data to obtain a second verification result (S204); and determining a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, the target verification result being used for indicating whether the target verification operation passes the verification (S206). The method solves the technical problem in the related art that the accuracy of verifying a verification operation executed on a verification page is low.

Description

一种操作的验证方法和装置Method and device for verifying operation
本公开要求于2020年06月12日提交中国专利局、优先权号为202010538272.2、发明名称为“一种操作的验证方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。This disclosure claims the priority of a Chinese patent application filed with the Chinese Patent Office on June 12, 2020, the priority number is 202010538272.2, and the invention title is "a method and device for verifying an operation", the entire content of which is incorporated herein by reference In the open.
技术领域Technical field
本公开涉及计算机领域,尤其涉及一种操作的验证方法和装置。The present disclosure relates to the field of computers, and in particular to an operation verification method and device.
背景技术Background technique
验证码作为用户认证的一种有效手段,已经被业界广泛采用,来抵御互联网黑产的攻击。其主要原理在于,黑产通常需要通过大量重复性的访问来获取利益,而验证码可以有效的增加每次访问的成本。但是随着近年来深度学习的崛起,利用计算机自动识别网站验证码变得越来越容易。很多验证码的形式都可以有相应成熟的深度学习模型解决方案,这大大降低了黑产破解图片或文字验证码的难度,也使得验证结果的准确率大大降低。As an effective means of user authentication, verification codes have been widely adopted by the industry to resist the attacks of Internet black products. The main principle is that black production usually requires a large number of repetitive visits to obtain benefits, and the verification code can effectively increase the cost of each visit. However, with the rise of deep learning in recent years, it has become easier to use computers to automatically identify website verification codes. Many forms of verification codes can have corresponding mature deep learning model solutions, which greatly reduces the difficulty of cracking pictures or text verification codes by black producers, and also greatly reduces the accuracy of verification results.
针对上述的问题,目前尚未提出有效的解决方案。In view of the above-mentioned problems, no effective solutions have yet been proposed.
发明内容Summary of the invention
本公开提供了一种操作的验证方法和装置,以至少解决相关技术中对验证页面上执行的验证操作进行验证的准确率较低的技术问题。The present disclosure provides an operation verification method and device to at least solve the technical problem of low accuracy in verifying verification operations performed on a verification page in the related art.
一方面,本公开实施例提供了一种操作的验证方法,包括:On the one hand, embodiments of the present disclosure provide an operation verification method, including:
获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;Acquiring the first data and the second data generated by the target object on the displayed verification page within the target time period, wherein the verification page is used to verify the target verification operation performed by the target object on the verification page, The target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, the first data is browsing behavior data generated by the target object before the target verification operation starts, and the The second data is verification behavior data generated by the target object performing the target verification operation;
根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;Verifying the target object according to the first data to obtain a first verification result, and verifying the target verification operation according to the second data to obtain a second verification result;
根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
另一方面,本公开实施例还提供了一种操作的验证装置,包括:On the other hand, an embodiment of the present disclosure also provides an operation verification device, including:
第一获取模块,设置为获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;The first obtaining module is configured to obtain the first data and the second data generated by the target object on the displayed verification page during the target time period, wherein the verification page is used to perform the execution on the verification page for the target object The target verification operation is verified by the target verification operation, the target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, and the first data is generated by the target object before the target verification operation starts to be executed Browsing behavior data of, where the second data is verification behavior data generated by the target object performing the target verification operation;
第一验证模块,设置为根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;A first verification module, configured to verify the target object according to the first data to obtain a first verification result, and to verify the target verification operation according to the second data to obtain a second verification result;
第一确定模块,设置为根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The first determining module is configured to determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verify.
另一方面,本公开实施例还提供了一种存储介质,该存储介质包括存储的程序,程序运行时执行上述的方法。On the other hand, the embodiments of the present disclosure also provide a storage medium, the storage medium includes a stored program, and the above-mentioned method is executed when the program is running.
另一方面,本公开实施例还提供了一种电子装置,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器通过计算机程序执行上述的方法。On the other hand, the embodiments of the present disclosure also provide an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and the processor executes the above-mentioned method through the computer program.
本公开的有益效果至少包括:采用获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,验证页面用于对目标对象在验证页面上执行的目标验证操作进行验证,目标时间段包括从显示验证页面到结束执行目标验证操作的时间,第一数据是目标对象在开始执行目标验证操作之前产生的浏览行为数据,第二数据是目标对象执行目标验证操作产生的验证行为数据;根据第一数据对目标对象进行验证得到第一验证结果,并根据第二数据对目标验证操作进行验证得到第二验证结果;根据第一验证结果和第二验证结果确定目标验证操作对应的目标验证结果,其中,目标验证结果用于指示目标验证操作是否通过验证的方式,通过从显示验证页面开始获取验证页面上产生的行为数据,将验证页面上产生的行为数据划分为浏览行为和验证行为两个维度分别进行验证得到各自的验证结果,再将两个维度的验证结果进行融合得到目标验证操作的最终验证结果,达到了提高验证通过难度的目的,从而实现了提高对验证页面上执行的验证操作进行验证的准确率的技术效果,进而解决了相关技术中对验证页面上执行的验证操作进行验证的准确率较低的技术问题。The beneficial effects of the present disclosure include at least: first data and second data generated by the target object on the displayed verification page during the target time period are acquired, wherein the verification page is used for the target verification operation performed on the verification page by the target object For verification, the target time period includes the time from the display of the verification page to the end of the target verification operation. The first data is the browsing behavior data generated by the target object before the target verification operation is executed, and the second data is the target verification operation generated by the target object. Verification behavior data; verify the target object based on the first data to obtain the first verification result, and verify the target verification operation based on the second data to obtain the second verification result; determine the target verification based on the first verification result and the second verification result The target verification result corresponding to the operation, where the target verification result is used to indicate whether the target verification operation passed the verification method. The behavior data generated on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into browsing The two dimensions of behavior and verification behavior are verified separately to obtain their respective verification results, and then the verification results of the two dimensions are merged to obtain the final verification result of the target verification operation. The technical effect of the accuracy of the verification operation performed on the page, which in turn solves the technical problem of the low accuracy of the verification operation performed on the verification page in the related technology.
附图说明Description of the drawings
此处的附图被并入说明书中并构成本说明书的一部分,示出了符 合本发明的实施例,并与说明书一起用于解释本发明的原理。The drawings here are incorporated into the specification and constitute a part of the specification, show embodiments in accordance with the present invention, and together with the specification are used to explain the principle of the present invention.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, for those of ordinary skill in the art, In other words, other drawings can be obtained based on these drawings without creative labor.
图1是根据本公开实施例的操作的验证方法的硬件环境的示意图;FIG. 1 is a schematic diagram of a hardware environment of an operation verification method according to an embodiment of the present disclosure;
图2是根据本公开实施例的一种可选的操作的验证方法的流程图;Fig. 2 is a flowchart of an optional operation verification method according to an embodiment of the present disclosure;
图3是根据本公开可选的实施方式的一种操作的验证过程的示意图;Fig. 3 is a schematic diagram of a verification process of an operation according to an optional embodiment of the present disclosure;
图4是根据本公开可选的实施方式的模型训练过程的示意图;Fig. 4 is a schematic diagram of a model training process according to an optional embodiment of the present disclosure;
图5是根据本公开可选实施例的一种基于用户行为的人机验证方法的示意图;FIG. 5 is a schematic diagram of a human-machine verification method based on user behavior according to an optional embodiment of the present disclosure;
图6是根据本公开实施例的一种可选的操作的验证装置的示意图;Fig. 6 is a schematic diagram of an optional operation verification device according to an embodiment of the present disclosure;
图7是根据本公开实施例的一种终端的结构框图。Fig. 7 is a structural block diagram of a terminal according to an embodiment of the present disclosure.
具体实施方式detailed description
为了使本技术领域的人员更好地理解本公开方案,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分的实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本公开保护的范围。In order to enable those skilled in the art to better understand the solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are only These are a part of the embodiments of the present disclosure, but not all of the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative work should fall within the protection scope of the present disclosure.
需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本公开的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms “first” and “second” in the specification and claims of the present disclosure and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It should be understood that the data used in this way can be interchanged under appropriate circumstances so that the embodiments of the present disclosure described herein can be implemented in an order other than those illustrated or described herein. In addition, the terms "including" and "having" and any variations of them are intended to cover non-exclusive inclusion. For example, a process, method, system, product, or device that includes a series of steps or units is not necessarily limited to those clearly listed. Those steps or units may include other steps or units that are not clearly listed or are inherent to these processes, methods, products, or equipment.
根据本公开实施例的一方面,提供了一种操作的验证的方法实施例。According to an aspect of the embodiments of the present disclosure, there is provided an embodiment of a method for verifying an operation.
可选地,在本实施例中,上述操作的验证方法可以应用于如图1 所示的由终端101和服务器103所构成的硬件环境中。如图1所示,服务器103通过网络与终端101进行连接,可用于为终端或终端上安装的客户端提供服务(如游戏服务、应用服务等),可在服务器上或独立于服务器设置数据库,用于为服务器103提供数据存储服务,上述网络包括但不限于:广域网、城域网或局域网,终端101并不限定于PC、手机、平板电脑等。本公开实施例的操作的验证方法可以由服务器103来执行,也可以由终端101来执行,还可以是由服务器103和终端101共同执行。其中,终端101执行本公开实施例的操作的验证方法也可以是由安装在其上的客户端来执行。Optionally, in this embodiment, the verification method of the above operation can be applied to the hardware environment formed by the terminal 101 and the server 103 as shown in FIG. 1. As shown in Figure 1, the server 103 is connected to the terminal 101 through the network, and can be used to provide services (such as game services, application services, etc.) for the terminal or the client installed on the terminal. The database can be set on the server or independently of the server. It is used to provide data storage services for the server 103. The aforementioned networks include, but are not limited to: wide area networks, metropolitan area networks, or local area networks. The terminal 101 is not limited to PCs, mobile phones, tablet computers, etc. The operation verification method of the embodiment of the present disclosure may be executed by the server 103, may also be executed by the terminal 101, or may be executed jointly by the server 103 and the terminal 101. Wherein, the verification method for the terminal 101 to perform the operation of the embodiment of the present disclosure may also be executed by the client installed on it.
图2是根据本公开实施例的一种可选的操作的验证方法的流程图,如图2所示,该方法可以包括以下步骤:Fig. 2 is a flowchart of an optional operation verification method according to an embodiment of the present disclosure. As shown in Fig. 2, the method may include the following steps:
步骤S202,获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;Step S202: Obtain the first data and second data generated by the target object on the displayed verification page during the target time period, where the verification page is used for the target verification operation performed by the target object on the verification page Performing verification, the target time period includes the time from displaying the verification page to the end of performing the target verification operation, and the first data is browsing behavior data generated by the target object before starting to perform the target verification operation , The second data is verification behavior data generated by the target object performing the target verification operation;
步骤S204,根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;Step S204, verifying the target object according to the first data to obtain a first verification result, and verifying the target verification operation according to the second data to obtain a second verification result;
步骤S206,根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。Step S206: Determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, where the target verification result is used to indicate whether the target verification operation passes verification.
通过上述步骤S202至步骤S206,通过从显示验证页面开始获取验证页面上产生的行为数据,将验证页面上产生的行为数据划分为浏览行为和验证行为两个维度分别进行验证得到各自的验证结果,再将两个维度的验证结果进行融合得到目标验证操作的最终验证结果,达到了提高验证通过难度的目的,从而实现了提高对验证页面上执行的验证操作进行验证的准确率的技术效果,进而解决了相关技术中对验证页面上执行的验证操作进行验证的准确率较低的技术问题。Through the above steps S202 to S206, the behavior data generated on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into two dimensions, browsing behavior and verification behavior, and verification is performed to obtain respective verification results. Then the verification results of the two dimensions are merged to obtain the final verification result of the target verification operation, which achieves the purpose of increasing the difficulty of passing the verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, and then It solves the technical problem of low accuracy in verifying the verification operation performed on the verification page in the related technology.
在步骤S202提供的技术方案中,验证页面用于对目标对象在验证页面上执行的目标验证操作进行验证。验证页面可以是显示了验证码的页面,比如:应用程序的登录或注册页面上显示了验证码,则该登录或注册页面可以称为验证页面,或者,用户在登录或者注册页面进行了登录或者注册操作后跳转到一个新的页面,页面上显示了验证码 用于对用户的操作进行验证,该新跳转的页面也可以称为验证页面。In the technical solution provided in step S202, the verification page is used to verify the target verification operation performed by the target object on the verification page. The verification page can be a page that displays a verification code. For example, if the verification code is displayed on the login or registration page of the application, the login or registration page can be called a verification page, or the user logs in on the login or registration page or After the registration operation, it jumps to a new page. The verification code is displayed on the page to verify the user's operation. The newly jumped page can also be called a verification page.
可选地,在本实施例中,目标对象可以但不限于指对验证页面执行操作的对象,比如:注册用户使用的注册帐号,非注册用户使用的临时帐号等等。Optionally, in this embodiment, the target object may, but is not limited to, an object that performs operations on the verification page, such as a registered account used by a registered user, a temporary account used by a non-registered user, and so on.
可选地,在本实施例中,上述验证码可以但不限于包括:滑块验证码,图片选择验证码,文字点选验证码,语义理解的问答题验证码等等任何形式的用于对操作进行人机验证的验证码。Optionally, in this embodiment, the aforementioned verification code can include, but is not limited to: a slider verification code, a picture selection verification code, a text click verification code, a semantic understanding quiz verification code, etc., in any form for checking Operate the verification code for man-machine verification.
可选地,在本实施例中,获取第一数据和第二数据的方式可以但不限于包括以下之一:Optionally, in this embodiment, the method for acquiring the first data and the second data may include, but is not limited to, one of the following:
方式一,采集目标时间段内目标对象在显示的验证页面上产生的全部行为数据,再根据开始执行目标验证操作的时间将采集到的行为数据划分为上述第一数据和第二数据。Method 1: Collect all the behavior data generated by the target object on the displayed verification page during the target time period, and then divide the collected behavior data into the first data and the second data according to the time when the target verification operation is started.
方式二,从显示验证页面开始采集验证页面上执行操作的行为数据作为第一数据,直至检测到开始执行目标验证操作。再从检测到开始执行目标验证操作开始采集验证页面上执行操作的行为数据作为第二数据,直至结束执行目标验证操作。The second method is to collect the behavior data of the operation performed on the verification page from the display of the verification page as the first data until it is detected that the target verification operation is started. From the detection that the target verification operation is performed, the behavior data of the operation performed on the verification page is collected as the second data, and the target verification operation is completed.
可选地,在本实施例中,第一数据是目标对象在开始执行目标验证操作之前产生的浏览行为数据,第二数据是目标对象执行目标验证操作产生的验证行为数据。行为数据可以但不限于为从打开验证页面到完成验证的时间段内目标对象在验证页面上执行任何类型的操作产生的数据。Optionally, in this embodiment, the first data is browsing behavior data generated by the target object before starting to perform the target verification operation, and the second data is verification behavior data generated by the target object performing the target verification operation. The behavior data can be, but is not limited to, data generated by the target object performing any type of operation on the verification page during the period from when the verification page is opened to when the verification is completed.
可选地,在本实施例中,操作类型可以但不限于包括:鼠标的移动,点击,移出边界,移入边界,页面滚动,键盘的输入等,移动端还可以包含陀螺仪的变化等。记录的行为数据还可以同时包括操作发生时刻的时间戳。行为数据还包括目标对象开始验证的时间点,可以根据该时间对行为数据序列进行切割,分为两个部分,其一为用于表示页面浏览行为的浏览行为数据作为第一数据,其二为用于表示验证码操作行为的验证行为数据作为第二数据。Optionally, in this embodiment, the operation types may include, but are not limited to: mouse movement, click, move out of boundary, move in boundary, page scroll, keyboard input, etc. The mobile terminal may also include gyroscope changes. The recorded behavior data can also include the time stamp of the time when the operation occurred. The behavior data also includes the time point when the target object starts to verify. The behavior data sequence can be cut according to the time and divided into two parts. One is the browsing behavior data used to represent the page browsing behavior as the first data, and the second is The verification behavior data used to represent the verification code operation behavior is used as the second data.
可选地,在本实施例中,为了增加前端破解的难度,采集第一数据和第二数据的前端代码上可以增加复杂的前端代码混淆。Optionally, in this embodiment, in order to increase the difficulty of front-end cracking, complex front-end code confusion may be added to the front-end code that collects the first data and the second data.
在步骤S204提供的技术方案中,分别对第一数据和第二数据进行验证,第一数据用于对目标对象的对象类型进行验证,第二数据用于对目标验证操作是否通过进行验证。In the technical solution provided in step S204, the first data and the second data are respectively verified, the first data is used to verify the object type of the target object, and the second data is used to verify whether the target verification operation is passed.
可选地,在本实施例中,第一数据是验证开始阶段之前的行为数据,具有较大的随机性,不容易影响操作之间相似性的判断,不宜用作对目标验证操作进行验证的数据,但是开始阶段之前的行为数据能 够较好地体现出目标对象是真实用户还是机器人入侵,因此可以用作对象类型的验证。而执行验证操作时的动作,如拖动滑块,点击文字等,具有很明确的范式结构,比较适用于进行操作之间相似性的判断,将验证操作时产生的第二数据用作操作相似性的验证。Optionally, in this embodiment, the first data is behavioral data before the verification start stage, which has a relatively large randomness and does not easily affect the judgment of similarity between operations, and should not be used as data for verifying the target verification operation. , But the behavior data before the beginning stage can better reflect whether the target object is a real user or a robot intrusion, so it can be used as an object type verification. The actions when performing the verification operation, such as dragging the slider, clicking the text, etc., have a very clear paradigm structure, which is more suitable for judging the similarity between operations. The second data generated during the verification operation is used as the operation similarity. Sexual verification.
在步骤S206提供的技术方案中,可以将第一验证结果和第二验证结果进行融合得到目标验证结果。In the technical solution provided in step S206, the first verification result and the second verification result may be merged to obtain the target verification result.
可选地,在本实施例中,验证结果的融合方式可以但不限于包括:方式一,对第一验证结果和第二验证结果进行标准化处理后进行求和,取平均数或者加权求和等运算,根据运算结果判定目标验证操作是否通过验证。方式二,将第一验证结果和第二验证结果输入到训练好的分类模型中自动对验证结果进行融合输出目标验证操作是否通过验证的最终结果。Optionally, in this embodiment, the method of fusion of the verification results may include, but is not limited to: method one, the first verification result and the second verification result are standardized and then summed, the average is taken or the weighted sum is taken, etc. Operation, according to the operation result to determine whether the target verification operation passes the verification. The second method is to input the first verification result and the second verification result into the trained classification model and automatically merge the verification results to output the final result of whether the target verification operation passes the verification.
作为一种可选的实施例,根据所述第一数据对所述目标对象进行验证得到第一验证结果包括:As an optional embodiment, verifying the target object according to the first data to obtain the first verification result includes:
S11,对所述第一数据进行特征提取,得到所述第一数据对应的数据特征;S11: Perform feature extraction on the first data to obtain data features corresponding to the first data;
S12,对所述数据特征进行分类,得到所述目标对象所对应的目标对象类型作为所述第一验证结果。S12: Classify the data features, and obtain the target object type corresponding to the target object as the first verification result.
可选地,在本实施例中,可以但不限于从第一数据中提取出数据特征从而体现出第一数据的属性特征,再按照得到的数据特征确定目标对象所属于的目标对象类型。Optionally, in this embodiment, data features may be extracted from the first data to reflect the attribute features of the first data, and then the target object type to which the target object belongs is determined according to the obtained data features.
可选地,在本实施例中,划分的对象类型可以但不限于包括正常用户和攻击者等等。Optionally, in this embodiment, the divided object types may include, but are not limited to, normal users, attackers, and so on.
可选地,在本实施例中,对数据特征进行分类的方式可以但不限于包括:查找具有对应关系的特征和对象类型得到数据特征对应的目标对象类型,使用训练后的模型对数据特征进行自动分类等等。Optionally, in this embodiment, the method of classifying data features may include, but is not limited to: searching for features and object types that have a corresponding relationship to obtain the target object type corresponding to the data feature, and using the trained model to perform data feature analysis. Automatic classification and so on.
作为一种可选的实施例,对所述第一数据进行特征提取,得到所述第一数据对应的数据特征包括:As an optional embodiment, performing feature extraction on the first data to obtain data features corresponding to the first data includes:
S21,按照数据的产生方式将所述第一数据划分为多种数据类型的数据;S21: Divide the first data into data of multiple data types according to a data generation manner;
S22,分别对所述多种数据类型的数据中每种数据类型的数据进行特征提取,得到所述每种数据类型的数据对应的数据特征;S22: Perform feature extraction on data of each data type in the data of the multiple data types, respectively, to obtain data features corresponding to the data of each data type;
对所述数据特征进行分类,得到所述目标对象所对应的目标对象类型作为所述第一验证结果包括:Classifying the data features and obtaining the target object type corresponding to the target object as the first verification result includes:
S23,分别对所述每种数据类型的数据对应的数据特征进行分类,得到所述每种数据类型的数据对应的对象类型;S23: Separately classify the data features corresponding to the data of each data type to obtain the object type corresponding to the data of each data type;
S24,对所述每种数据类型的数据对应的对象类型进行融合,得到所述目标对象类型。S24. Fusion of the object types corresponding to the data of each data type to obtain the target object type.
可选地,在本实施例中,对于不同数据类型的第一数据可以但不限于分别进行特征提取和分类,再对得到的不同分类结果进行融合得到第一验证结果。不同数据类型的数据可以根据数据的特点设定不同的分类标准,从而提高分类的准确率。Optionally, in this embodiment, for the first data of different data types, feature extraction and classification may be performed, but not limited to, respectively, and then the obtained different classification results are merged to obtain the first verification result. Different data types can set different classification standards according to the characteristics of the data, thereby improving the accuracy of classification.
可选地,在本实施例中,按照数据的产生方式可以但不限于将第一数据划分为鼠标轨迹数据和键盘输入数据等等。Optionally, in this embodiment, the first data can be divided into mouse trajectory data, keyboard input data, etc. according to the data generation manner, but is not limited to.
可选地,在本实施例中,对每种数据类型的数据对应的对象类型进行融合的方式可以但不限于包括加权求和,取平均数等等运算,再根据运算结果所落入的阈值范围确定目标对象类型。Optionally, in this embodiment, the method of fusing the object type corresponding to the data of each data type may include, but is not limited to, operations such as weighted summation, averaging, etc., and then based on the threshold value that the operation result falls into. The scope determines the target object type.
作为一种可选的实施例,根据所述第一数据对所述目标对象进行验证得到第一验证结果包括:As an optional embodiment, verifying the target object according to the first data to obtain the first verification result includes:
S31,将所述第一数据输入目标特征分类模型,其中,所述目标特征分类模型是使用标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练得到的;S31: Input the first data into a target feature classification model, where the target feature classification model is obtained by training an initial feature classification model using browsing behavior data samples labeled with object types;
S32,获取所述目标特征分类模型输出的目标对象类型作为所述第一验证结果,其中,所述行为数据样本所标注的对象类型中包括所述目标对象类型。S32. Obtain a target object type output by the target feature classification model as the first verification result, wherein the target object type is included in the object type marked by the behavior data sample.
可选地,在本实施例中,可以但不限于通过模型训练得到目标特征分类模型来自动检测第一数据所对应的目标对象类型。Optionally, in this embodiment, the target feature classification model can be obtained through model training but is not limited to automatically detect the target object type corresponding to the first data.
可选地,在本实施例中,目标特征分类模型是使用标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练得到的。目标特征分类模型可以但不限于包括深度神经网络dnn,卷积神经网络cnn,循环神经网络rnn等结构。Optionally, in this embodiment, the target feature classification model is obtained by training the initial feature classification model using browsing behavior data samples marked with object types. The target feature classification model can include, but is not limited to, structures such as deep neural network dnn, convolutional neural network cnn, and recurrent neural network rnn.
作为一种可选的实施例,获取所述目标特征分类模型输出的目标对象类型作为所述第一验证结果包括:As an optional embodiment, acquiring the target object type output by the target feature classification model as the first verification result includes:
S41,通过特征提取层对所述第一数据进行特征提取,得到数据特征,其中,所述目标特征分类模型包括依次连接的第一输入层、所述特征提取层、分类层和第一输出层,所述第一输入层用于接收所述第一数据;S41: Perform feature extraction on the first data through a feature extraction layer to obtain data features, wherein the target feature classification model includes a first input layer, the feature extraction layer, a classification layer, and a first output layer that are sequentially connected , The first input layer is used to receive the first data;
S42,通过所述分类层对所述数据特征进行分类,得到所述数据特征属于多个对象类型中每种对象类型的概率;S42: Classify the data feature through the classification layer to obtain the probability that the data feature belongs to each object type among multiple object types;
S43,通过所述第一输出层根据所述数据特征属于多个对象类型中每种对象类型的概率,从所述多个对象类型中确定所述目标对象类型,并输出所述目标对象类型。S43: Determine the target object type from the multiple object types by the first output layer according to the probability that the data feature belongs to each of the multiple object types, and output the target object type.
可选地,在本实施例中,目标特征分类模型可以但不限于包括依次连接的第一输入层、特征提取层、分类层和第一输出层,其中,第一输入层用于接收第一数据,特征提取层用于对第一数据进行特征提取得到数据特征,分类层用于对数据特征进行分类,得到分类结果,第一输出层用于根据分类层得到的分类结果输出目标对象类型。Optionally, in this embodiment, the target feature classification model may include, but is not limited to, a first input layer, a feature extraction layer, a classification layer, and a first output layer that are sequentially connected, wherein the first input layer is used to receive the first Data, the feature extraction layer is used to perform feature extraction on the first data to obtain data features, the classification layer is used to classify data features to obtain classification results, and the first output layer is used to output the target object type according to the classification results obtained by the classification layer.
可选地,在本实施例中,分类层得到的分类结果可以但不限于是数据特征对应多个对象类型中每种对象类型的概率。第一输出层根据每种对象类型的概率对目标对象类型进行判定。比如:可以设定概率阈值,将高于概率阈值的最高概率对应的对象类型作为目标对象类型。Optionally, in this embodiment, the classification result obtained by the classification layer may, but is not limited to, the probability that the data feature corresponds to each object type among multiple object types. The first output layer judges the target object type according to the probability of each object type. For example, a probability threshold can be set, and the object type corresponding to the highest probability higher than the probability threshold can be used as the target object type.
可选地,在本实施例中,可以针对不同目标验证操作的类型,训练不同的目标特征分类模型。Optionally, in this embodiment, different target feature classification models can be trained for different target verification operation types.
可选地,在本实施例中,上述特征提取层可以但不限于采用长短期记忆网络(Long Short-Term Memory,LSTM)的模型结构,LSTM的待调优的超参数可以但不限于包括:LSTM的细胞状态大小、输出长度、L1及L2正则化系数、优化算法、学习率等。Optionally, in this embodiment, the above-mentioned feature extraction layer may, but is not limited to, adopt a Long Short-Term Memory (LSTM) model structure, and the hyperparameters to be tuned for LSTM may include, but are not limited to: LSTM's cell state size, output length, L1 and L2 regularization coefficients, optimization algorithm, learning rate, etc.
可选地,在本实施例中,上述分类层可以但不限于采用逻辑回归(Logistic Regression,LR)的模型网络。Optionally, in this embodiment, the above-mentioned classification layer may, but is not limited to, adopt a logistic regression (LR) model network.
在一个可选的实施方式中,根据第一数据对目标对象进行验证得到第一验证结果的过程可以但不限于包括以下步骤:In an optional implementation manner, the process of verifying the target object based on the first data to obtain the first verification result may include, but is not limited to, the following steps:
步骤A,对第一数据进行采样,其中连续的鼠标移动轨迹,连续的页面滚动可以按固定时间间隔采样(比如:鼠标轨迹固定采样间隔可以设置为100ms)。键盘输入选取其中连续输入最长的一段作为代表,如果超过最大长度,则随机截取其中连续的一段输入(比如:键盘输入序列的最大输入长度可以设置为64)。Step A, the first data is sampled, where the continuous mouse movement track and continuous page scrolling can be sampled at a fixed time interval (for example, the fixed sampling interval of the mouse track can be set to 100ms). The keyboard input selects the longest continuous input segment as the representative. If the maximum length is exceeded, the continuous segment of the input is randomly intercepted (for example, the maximum input length of the keyboard input sequence can be set to 64).
步骤B,将鼠标轨迹数据和键盘输入行为序列数据分别输入两个不同的深度模型,进行自动的特征提取。其中,可以但不限于对鼠标轨迹数据和键盘输入行为序列数据进行标准化处理后输入到模型中,鼠标轨迹数据的每一帧被表示为一个特征向量,该向量可以但不限于包括四位,第一位表示操作类型,可以为:点击,按下,抬起,移动,移出边界,移入边界,滚动等等。第二位和第三位分别为鼠标所在的x,y轴坐标。第四位为操作发生的时间。键盘输入行为序列数据的每一帧也可以被表示为一个特征向量,该向量可以但不限于包括两位,第一位表示键盘输入的字母或符号对应的ascii码。第二位表示键盘输入对应的时间。Step B: Input the mouse trajectory data and the keyboard input behavior sequence data into two different depth models respectively to perform automatic feature extraction. Among them, the mouse track data and keyboard input behavior sequence data can be standardized and then input into the model. Each frame of the mouse track data is represented as a feature vector. The vector can include but is not limited to four bits. One bit indicates the type of operation, which can be: click, press, lift, move, move out of boundary, move in boundary, scroll, etc. The second and third digits are the x and y axis coordinates where the mouse is located. The fourth digit is the time when the operation occurred. Each frame of the keyboard input behavior sequence data can also be represented as a feature vector, which can include but is not limited to two bits, the first bit represents the ascii code corresponding to the letter or symbol input by the keyboard. The second digit indicates the time corresponding to the keyboard input.
步骤C,对两个特征提取模型输出的结果进行加权求和来得到操作可能来自攻击者的概率,可以使用1代表攻击者,0代表普通用户,0.5 作为中间阈值,将概率大于0.5的分类为攻击者,概率小于0.5的分类为普通用户。Step C: Perform a weighted summation of the output results of the two feature extraction models to obtain the probability that the operation may come from the attacker. You can use 1 to represent the attacker, 0 to represent the ordinary user, and 0.5 as the intermediate threshold, and classify the probability greater than 0.5 as Attackers are classified as ordinary users with probability less than 0.5.
作为一种可选的实施例,根据所述第二数据对所述目标验证操作进行验证得到第二验证结果包括:As an optional embodiment, verifying the target verification operation according to the second data to obtain a second verification result includes:
S51,确定所述第二数据是否符合所述验证页面对应的验证条件;S51: Determine whether the second data meets the verification condition corresponding to the verification page;
S52,在确定所述第二数据不符合所述验证条件的情况下,确定所述第二验证结果用于指示所述目标验证操作未通过验证;S52: In a case where it is determined that the second data does not meet the verification condition, determine that the second verification result is used to indicate that the target verification operation fails verification;
S53,在确定所述第二数据符合所述验证条件的情况下,根据所述第二数据与目标数据之间的相似度确定所述目标验证操作是否通过验证,得到所述第二验证结果,其中,所述目标数据是从已通过验证的验证操作中提取的数据。S53: In a case where it is determined that the second data meets the verification condition, determine whether the target verification operation passes verification according to the similarity between the second data and the target data, and obtain the second verification result, Wherein, the target data is data extracted from verification operations that have passed verification.
可选地,在本实施例中,首先对第二数据进行规则验证,即确定第二数据是否符合验证条件,如滑块的拖动轨迹应当与滑块放置位置有关,文字点击的位置应当与文字在图片中的相对位置相匹配。如果规则验证失败,则直接将目标验证操作判定为攻击者的攻击行为。Optionally, in this embodiment, the second data is first verified by rules, that is, whether the second data meets the verification conditions. For example, the drag track of the slider should be related to the position of the slider, and the position of the text click should be related to the position of the slider. Match the relative position of the text in the picture. If the rule verification fails, the target verification operation is directly determined as the attacker's attack behavior.
可选地,在本实施例中,在第二数据是否符合验证条件的验证中可以加入一定的误差容忍阈值,以便应对实际生产环境中可能出现的数据采集误差,从而提高验证结果的准确率。Optionally, in this embodiment, a certain error tolerance threshold can be added to the verification of whether the second data meets the verification conditions, so as to deal with data collection errors that may occur in the actual production environment, thereby improving the accuracy of the verification results.
可选地,在本实施例中,对于确定为符合验证条件的第二数据,再根据其与从已通过验证的验证操作中提取的目标数据之间的相似度确定该目标验证操作是否通过验证,从而得到第二验证结果。Optionally, in this embodiment, for the second data determined to meet the verification conditions, it is determined whether the target verification operation passes the verification based on the similarity between the target data and the target data extracted from the verification operation that has passed the verification. , Thereby obtaining the second verification result.
作为一种可选的实施例,根据所述第二数据与目标数据之间的相似度确定所述目标验证操作是否通过验证,得到所述第二验证结果包括:As an optional embodiment, determining whether the target verification operation passes verification according to the similarity between the second data and target data, and obtaining the second verification result includes:
S61,对所述第二数据进行编码,得到编码数据;S61: Encode the second data to obtain encoded data;
S62,将所述编码数据输入目标单分类模型,其中,所述目标单分类模型是使用所述目标数据对初始单分类模型进行训练得到的;S62: Input the encoded data into a target single classification model, where the target single classification model is obtained by training an initial single classification model using the target data;
S63,获取所述目标单分类模型输出的验证标识作为所述第二验证结果,其中,所述验证标识用于指示所述编码数据是否通过验证。S63. Obtain a verification identifier output by the target single classification model as the second verification result, where the verification identifier is used to indicate whether the encoded data passes verification.
可选地,在本实施例中,可以但不限于通过训练后的目标单分类模型自动检测第二数据与历史目标数据之间的相似度,从而自动判定第二数据是否通过验证。Optionally, in this embodiment, the similarity between the second data and the historical target data can be automatically detected through the trained target single classification model, so as to automatically determine whether the second data passes the verification.
可选地,在本实施例中,可以但不限于使用自编码器对第二数据进行编码。比如:4层的自编码器,其中,该自编码器包括的三个大小分别为128,64,128的隐层。其中64为最终编码的表示长度。此处自编码器的深度,和隐层的大小为可以调优的超参数,此处给出的是 实际使用的一个例子,本公开对此不作限定。Optionally, in this embodiment, a self-encoder can be used to encode the second data, but is not limited to. For example: a 4-layer self-encoder, where the self-encoder includes three hidden layers of 128, 64, and 128, respectively. Where 64 is the representation length of the final encoding. Here, the depth of the self-encoder and the size of the hidden layer are hyperparameters that can be tuned. What is given here is an example of actual use, which is not limited in the present disclosure.
可选地,在本实施例中,在对第二数据进行编码之前可以先对第二数据进行预处理。例如:首先去除第二数据中非鼠标操作类型的数据,再去除数据中表示操作类型的字段,只保留鼠标坐标及时间字段。将上述序列按均匀时间间隔采样至100个坐标时间对,得到一个长度为300的向量作为预处理后的第二数据进行编码。Optionally, in this embodiment, the second data may be preprocessed before the second data is encoded. For example: first remove the data that is not the mouse operation type in the second data, and then remove the field indicating the operation type in the data, leaving only the mouse coordinates and time fields. The above sequence is sampled to 100 coordinate time pairs at uniform time intervals, and a vector with a length of 300 is obtained as the preprocessed second data for encoding.
可选地,在本实施例中,上述目标单分类模型可以但不限于使用SVDD(Support vector domain description,支持向量数据描述)模型的模型结构。Optionally, in this embodiment, the foregoing target single classification model may, but is not limited to, use the model structure of the SVDD (Support vector domain description, support vector data description) model.
可选地,在本实施例中,上述SVDD模型的训练数据(即目标数据)可以全部来自于正常用户数据(即已通过验证的验证操作),数据易于获得,数据标签准确度高,可以直接进行线上的数据集扩充和模型迭代。Optionally, in this embodiment, the training data (ie target data) of the above-mentioned SVDD model can all come from normal user data (ie, verified verification operations), the data is easy to obtain, and the data labels are highly accurate and can be directly Perform online data set expansion and model iteration.
可选地,在本实施例中,上述目标数据可以但不限于包括以下来源:内网IP段所产生的数据,IP白名单及用户白名单所产生的数据,也可以通过分析网站每日流量的规律,找到流量正常的自然日,并把所有数据作为正常用户数据。前述流量正常是指没有突发的流量高峰,流量符合长期的规律性,如早上和傍晚出现峰值,半夜出现低谷等。Optionally, in this embodiment, the above-mentioned target data may include, but is not limited to, the following sources: data generated by the intranet IP segment, data generated by the IP whitelist and user whitelist, or by analyzing the daily traffic of the website Find the natural day when the traffic is normal, and treat all data as normal user data. The aforementioned normal flow means that there is no sudden flow peak, and the flow conforms to long-term regularity, such as peaks in the morning and evening, and troughs in the middle of the night.
可选地,在本实施例中,上述SVDD模型待训练的超参数可以但不限于包括:核函数的选择,软间隔系数等。上述核函数还可以包括二级超参数,如系数、指数等。Optionally, in this embodiment, the hyperparameters to be trained for the above-mentioned SVDD model may include, but are not limited to, the selection of the kernel function, the soft interval coefficient, and the like. The aforementioned kernel function may also include secondary hyperparameters, such as coefficients, exponents, and so on.
通过上述过程,对用户验证码行为使用异常检测模型进行验证,异常检测模型为单分类模型,因此只需要一类数据进行训练即可。因为正常用户数据非常容易获得,而攻击者的数据难以标记,所以使用该模型分类不存在数据收集上的难题,从而降低了模型训练的难度,使用的训练数据更加准确也提高了模型训练的精度。Through the above process, the anomaly detection model is used to verify the user verification code behavior. The anomaly detection model is a single classification model, so only one type of data is needed for training. Because normal user data is very easy to obtain, and the attacker’s data is difficult to label, there are no data collection problems in using this model to classify, thereby reducing the difficulty of model training, using more accurate training data and improving the accuracy of model training .
作为一种可选的实施例,获取所述目标单分类模型输出的验证标识作为所述第二验证结果包括:As an optional embodiment, obtaining the verification identifier output by the target single classification model as the second verification result includes:
S71,通过单分类层确定所述编码数据与所述目标数据之间的相似度,其中,所述目标单分类模型包括依次连接的第二输入层,所述单分类层和第二输出层,所述第二输入层用于接收所述编码数据;S71. Determine the similarity between the encoded data and the target data through a single classification layer, where the target single classification model includes a second input layer, the single classification layer and a second output layer connected in sequence, The second input layer is used to receive the encoded data;
S72,通过所述第二输出层确定所述相似度与目标相似度之间的关系;S72. Determine the relationship between the similarity and the target similarity through the second output layer;
S73,在所述相似度高于所述目标相似度的情况下,通过所述第二输出层输出第一验证标识,其中,所述第一验证标识用于指示所述编码数据通过验证;S73: When the similarity is higher than the target similarity, output a first verification identifier through the second output layer, where the first verification identifier is used to indicate that the encoded data passes verification;
S74,在所述相似度不高于所述目标相似度的情况下,通过所述第二输出层输出第二验证标识,其中,所述第二验证标识用于指示所述编码数据未通过验证。S74: In a case where the similarity is not higher than the target similarity, output a second verification identifier through the second output layer, where the second verification identifier is used to indicate that the encoded data has not passed verification .
可选地,在本实施例中,目标单分类模型包括依次连接的第二输入层,单分类层和第二输出层,第二输入层用于接收编码数据,单分类层用于确定编码数据与目标数据之间的关系,可以给根据编码数据和目标数据之间的相似度为编码数据确定一个分值,可以分值越高表示相似度越高,也可以分值越低表示相似度越高。第二输出层用于根据单分类层的输出判定编码数据是否通过验证,根据分值确定相似度是否高于目标相似度,对于高于目标相似度的编码数据确定其通过验证,对于低于目标相似度的编码数据确定其未通过验证。Optionally, in this embodiment, the target single classification model includes a second input layer, a single classification layer, and a second output layer that are sequentially connected. The second input layer is used to receive encoded data, and the single classification layer is used to determine encoded data. The relationship with the target data can be based on the similarity between the encoded data and the target data to determine a score for the encoded data. The higher the score, the higher the similarity, or the lower the score, the higher the similarity. high. The second output layer is used to determine whether the encoded data has passed the verification based on the output of the single classification layer, determine whether the similarity is higher than the target similarity according to the score, and determine whether the encoded data is higher than the target similarity to pass the verification. The coded data of similarity determines that it has not passed the verification.
比如:普通用户行为分类标签为0,对应模型的唯一分类。选取分值阈值为1,分值大于1表示编码数据与目标数据的相似度不高于目标相似度,将其判定为不属于普通用户行为,即判定为攻击者伪造数据,而分值小于1表示编码数据与目标数据的相似度高于目标相似度,则判将其定为普通用户数据。For example, the normal user behavior classification label is 0, which corresponds to the unique classification of the model. The score threshold is selected to be 1, and a score greater than 1 means that the similarity between the encoded data and the target data is not higher than the target similarity, and it is judged as not a normal user behavior, that is, it is judged that the attacker is forging the data, and the score is less than 1. It means that the similarity between the coded data and the target data is higher than the target similarity, and it is judged to be ordinary user data.
在一个可选的实施方式中,提供了一种对用户在验证页面上的操作进行验证的方式,图3是根据本公开可选的实施方式的一种操作的验证过程的示意图,如图3所示,该过程可以但不限于包括以下步骤:In an optional implementation manner, a way of verifying the user's operation on the verification page is provided. FIG. 3 is a schematic diagram of an operation verification process according to an optional implementation manner of the present disclosure, as shown in FIG. 3. As shown, the process can, but is not limited to, include the following steps:
步骤S302,获取用户在验证页面上的操作产生的用户行为数据。Step S302: Obtain user behavior data generated by the user's operation on the verification page.
步骤S304,将获取到的数据切分为页面浏览行为作为第一数据和验证码操作行为作为第二数据。Step S304: Divide the acquired data into page browsing behavior as the first data and verification code operation behavior as the second data.
步骤S306,使用LSTM+LR模型分类页面浏览行为,得到分类结果。Step S306: Use the LSTM+LR model to classify the page browsing behavior to obtain the classification result.
步骤S308,使用自编码器+SVDD单分类模型处理验证码操作行为,得到分类结果。Step S308: Use the self-encoder + SVDD single classification model to process the verification code operation behavior to obtain the classification result.
步骤S310,融合上述两个结果得到最终判断。In step S310, the above two results are merged to obtain a final judgment.
在上述过程中,对于用户或攻击者提交的验证行为数据,基于深度模型对行为数据特征进行自动提取,提高了特征提取的效率,也提高了验证的准确性。In the above process, for the verification behavior data submitted by the user or the attacker, the behavior data features are automatically extracted based on the depth model, which improves the efficiency of feature extraction and the accuracy of verification.
作为一种可选的实施例,在对所述第二数据进行编码,得到所述编码数据之后,还包括:As an optional embodiment, after encoding the second data to obtain the encoded data, the method further includes:
S81,确定所述编码数据在多个数据类型中所对应的目标数据类型,其中,所述多个数据类型是对历史编码数据进行聚类得到的;S81: Determine the target data type corresponding to the multiple data types of the encoded data, where the multiple data types are obtained by clustering historical encoded data;
S82,获取产生属于所述目标数据类型的数据对应的对象的访问频率,其中,所述访问频率用于指示产生属于所述目标数据类型的数据对应的对象访问所述验证页面的频率;S82: Obtain the access frequency of the object corresponding to the data generated belonging to the target data type, where the access frequency is used to indicate the frequency of access to the verification page by the object corresponding to the data generated belonging to the target data type;
S83,在所述访问频率高于目标频率的情况下,将所述目标对象的对象标识确定为可疑标识;S83: When the access frequency is higher than the target frequency, determine the object identifier of the target object as a suspicious identifier;
S84,在所述对象标识被确定为所述可疑标识的次数高于目标次数的情况下,上调使用所述目标单分类模型对来自所述对象标志的数据进行处理时的所述目标相似度。S84: In the case where the number of times the object identifier is determined to be the suspicious identifier is higher than the target number of times, increase the target similarity when the target single classification model is used to process the data from the object identifier.
可选地,在本实施例中,多个数据类型是对历史编码数据进行聚类得到的。比如:可以收集一定时间的用户数据,然后使用mean-shift算法对数据进行聚类,得到n个聚类中心,其中,n取决于mean-shift算法的窗口大小,窗口大小可以根据具体验证码的数据特点和需要达到的效果进行调整。Optionally, in this embodiment, multiple data types are obtained by clustering historical coded data. For example: you can collect user data for a certain period of time, and then use the mean-shift algorithm to cluster the data to obtain n cluster centers, where n depends on the window size of the mean-shift algorithm, and the window size can be based on the specific verification code The characteristics of the data and the desired effect are adjusted.
可选地,在本实施例中,确定编码数据在多个数据类型中所对应的目标数据类型的方式可以但不限于为计算编码数据距离上述各个聚类中心的距离,找出距离最近的聚类中心。如果编码数据距离该聚类中心的距离小于设定的阈值,则认为该编码数据属于该聚类中心所代表的聚类簇,从而将该聚类簇确定为目标数据类型。Optionally, in this embodiment, the method for determining the target data type corresponding to the encoded data among the multiple data types may be, but is not limited to, calculating the distance between the encoded data and each of the aforementioned cluster centers, and finding the closest cluster. Class center. If the distance between the encoded data and the cluster center is less than the set threshold, the encoded data is considered to belong to the cluster cluster represented by the cluster center, and the cluster cluster is determined as the target data type.
可选地,在本实施例中,目标对象的对象标识可以但不限于包括:用户id,用户ip地址等等。例如:将上述编码数据所对应的用户ip地址与确定出的聚类簇内其他行为对应的用户ip进行绑定,绑定后的ip将合并计算其访问频率。如果合并频率超过某一阈值,则将最新访问的ip设为可疑标识,如果同一个ip多次被设为可疑标识,则将其加入ip黑名单。Optionally, in this embodiment, the object identifier of the target object may include but is not limited to: user id, user ip address, and so on. For example: bind the user ip address corresponding to the aforementioned encoded data with the user ip corresponding to other behaviors in the determined cluster, and the bound ip will be combined to calculate its access frequency. If the merging frequency exceeds a certain threshold, the newly accessed ip is set as a suspicious flag, and if the same ip is set as a suspicious flag multiple times, it is added to the ip blacklist.
可选地,在本实施例中,对于加入黑名单的ip,一方面可以在前端替换一些非用户友好的验证码对其进行测试。另一方面可以调低目标单分类模型的分数阈值,即上调目标相似度,使得该用户ip产生的行为数据有更大的概率被分类为攻击者。或者也可以使用一些特定的页面,将验证码验证改为要求用户进行手机验证,或是要求用户回答密保问题等,从而极大的增加攻击者的暴力访问的成本。Optionally, in this embodiment, for ips added to the blacklist, on the one hand, some non-user-friendly verification codes can be replaced at the front end to test them. On the other hand, the score threshold of the target single classification model can be lowered, that is, the target similarity can be raised, so that the behavior data generated by the user ip has a greater probability of being classified as an attacker. Or you can use some specific pages to change the verification code verification to require the user to verify with a mobile phone, or to require the user to answer the secret security question, which greatly increases the cost of the attacker's violent visit.
可选地,在本实施例中,对于对象标识被确定为可疑标识的次数高于目标次数的情况,也可以对目标特征分类模型的模型阈值进行调整,从而提高该用户ip产生的行为数据被分类为攻击者的可能性。Optionally, in this embodiment, for the case where the number of times the object identifier is determined to be a suspicious identifier is higher than the target number of times, the model threshold of the target feature classification model can also be adjusted, thereby improving the behavior data generated by the user ip. Possibility to classify as an attacker.
攻击者在使用真实的用户数据进行攻击时,往往这一类数据获取渠道有限,不会非常多,不像软件生成的随机轨迹那样无穷无尽。攻击者往往基于一个或一组真人操作数据,进行一些微小的修改,作为新的伪造行为。然而这种方式产生新行为往往存在机器学习模型可以发现的相似之处,从而可以将其有效的归为一类。通过上述步骤,利用了伪造行为之间的相似度进行聚类分析。虽然攻击者可以使用成千 上万个ip进行访问,使网站方无法定位其存在,但是可以通过构造行为的相似性,将这些ip进行捆绑判定。这样虽然攻击者使用的是真实的用户行为(比如自己或其他用户的操作),分类模型无法将其拦截,但是通过相似性聚类依然可以发现他们的存在,从而提高了验证的准确性。When attackers use real user data to attack, they often have limited access to this type of data, not very many, unlike the endless random trajectories generated by software. Attackers often make some minor modifications based on one or a group of real-person operating data as a new forgery. However, new behaviors generated in this way often have similarities that can be found by machine learning models, so that they can be effectively classified into one category. Through the above steps, the similarity between forgery behaviors is used for cluster analysis. Although the attacker can use thousands of ips for access, making the website unable to locate their existence, they can be bundled and determined by constructing similarities in behavior. In this way, although the attacker uses real user behavior (such as the operation of himself or other users), the classification model cannot intercept it, but their existence can still be found through similarity clustering, thereby improving the accuracy of verification.
作为一种可选的实施例,在根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果之前,还包括:As an optional embodiment, before verifying the target object based on the first data to obtain a first verification result, and verifying the target verification operation based on the second data to obtain a second verification result ,Also includes:
S91,从采集的数据集中获取目标数据,其中,所述目标数据是从已通过验证的验证操作中提取的数据;S91: Obtain target data from the collected data set, where the target data is data extracted from a verification operation that has passed verification;
S92,使用所述目标数据对初始单分类模型进行训练,得到目标单分类模型,其中,所述目标单分类模型用于根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;S92. Use the target data to train the initial single classification model to obtain a target single classification model, where the target single classification model is used to verify the target verification operation according to the second data to obtain a second verification result ;
S93,使用所述目标单分类模型对所述数据集中的数据进行验证,得到验证结果为未通过验证的数据;S93: Use the target single classification model to verify the data in the data set, and obtain the data that fails the verification as a result of the verification;
S94,从所述数据集中获取所述目标数据对应的第一浏览行为数据以及验证结果为未通过验证的数据对应的第二浏览行为数据;S94: Obtain, from the data set, first browsing behavior data corresponding to the target data and second browsing behavior data corresponding to data whose verification result is that the verification fails;
S95,将所述第一浏览行为数据对应的对象类型标注为第一对象类型,并将所述第二浏览行为数据对应的对象类型标注为第二对象类型,得到标注了对象类型的浏览行为数据样本;S95: Mark the object type corresponding to the first browsing behavior data as a first object type, and mark the object type corresponding to the second browsing behavior data as a second object type, to obtain browsing behavior data marked with the object type sample;
S96,使用所述标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练,得到目标特征分类模型,其中,所述目标特征分类模型用于根据所述第一数据对所述目标对象进行验证得到第一验证结果。S96. Use the browsing behavior data sample labeled with the object type to train an initial feature classification model to obtain a target feature classification model, wherein the target feature classification model is used to perform a classification on the target object according to the first data. The verification obtains the first verification result.
可选地,在本实施例中,可以首先采集目标数据对初始单分类模型进行训练,得到目标单分类模型,再利用目标单分类模型生成目标特征分类模型的训练数据对初始特征分类模型进行训练,得到目标特征分类模型。Optionally, in this embodiment, you can first collect target data to train the initial single classification model to obtain the target single classification model, and then use the target single classification model to generate training data for the target feature classification model to train the initial feature classification model , Get the target feature classification model.
可选地,在本实施例中,上述数据集可以但不限于包括用户行为日志等等。Optionally, in this embodiment, the aforementioned data set may, but is not limited to, include user behavior logs and the like.
在一个可选的实施方式中,提供了一种训练模块,用于执行模型的训练过程,训练模块可以用于每日更新线上模型,用于应对攻击者新产生的伪造行为。图4是根据本公开可选的实施方式的模型训练过程的示意图,如图4所示,该训练过程可以但不限于包括以下步骤:In an optional implementation manner, a training module is provided to execute the training process of the model, and the training module can be used to update the online model daily to deal with new forgery behaviors generated by the attacker. Fig. 4 is a schematic diagram of a model training process according to an optional embodiment of the present disclosure. As shown in Fig. 4, the training process may but is not limited to include the following steps:
步骤S402,训练基于每天记录的验证行为数据日志,首先收集当日用户行为日志,基于内网IP(Internet Protocol,网际互连协议) 段,以及用户白名单,IP白名单等过滤出肯定为普通用户行为的数据,即目标数据。Step S402, training is based on the verification behavior data log recorded every day. First, the user behavior log of the day is collected. Based on the intranet IP (Internet Protocol) segment, as well as the user whitelist, IP whitelist, etc., the user must be filtered out to be ordinary users Behavioral data, that is, target data.
步骤S404,使用上述过滤出的用户行为数据,更新原有用户数据集,并用更新后的数据集训练SVDD单分类模型。Step S404: Use the filtered user behavior data to update the original user data set, and use the updated data set to train the SVDD single classification model.
步骤S406,使用预先分割的测试数据集进行验证,此验证数据集中同时包含用户标签数据和攻击者标签数据,验证得到模型的召回率和准确率,如果达标则更新线上模型。Step S406: Use the pre-segmented test data set for verification. The verification data set contains both user tag data and attacker tag data. The recall rate and accuracy rate of the model are verified, and the online model is updated if the standards are met.
步骤S408,使用更新后的SVDD模型对当日所有行为数据进行检测,提取出所有被分类为攻击者数据的行为数据,加入攻击者数据集。Step S408: Use the updated SVDD model to detect all the behavior data of the day, extract all the behavior data classified as attacker data, and add it to the attacker data set.
步骤S410,使用更新后的用户数据集和攻击者数据集同时训练LSTM+LR模型,并使用预先分割的测试集进行验证,验证得到模型的召回率和准确率,如果达标则更新线上模型。Step S410: Use the updated user data set and the attacker data set to train the LSTM+LR model at the same time, and use the pre-segmented test set for verification to verify the recall rate and accuracy of the model, and update the online model if it meets the standard.
作为一种可选的实施例,在获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据之前,还包括:As an optional embodiment, before acquiring the first data and the second data generated by the target object on the displayed verification page within the target time period, the method further includes:
S101,在检测到在显示的操作页面上执行的目标操作的情况下,获取所述操作页面的第一页面地址和所述验证页面的第二页面地址;S101: In a case where a target operation performed on a displayed operation page is detected, obtain a first page address of the operation page and a second page address of the verification page;
S102,从预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址;S102, searching for the first page address and the second page address having the corresponding relationship from the pre-stored operation page address and the verification page address having the corresponding relationship;
S103,在查找到具有对应关系的所述第一页面地址和所述第二页面地址的情况下,显示所述验证页面;S103, in a case where the first page address and the second page address that have a corresponding relationship are found, display the verification page;
S104,在未查找到具有对应关系的所述第一页面地址和所述第二页面地址的情况下,对所述验证页面进行预设操作,其中,所述预设操作用于指示所述验证页面存在安全风险。S104, in the case that the first page address and the second page address that have a corresponding relationship are not found, perform a preset operation on the verification page, where the preset operation is used to instruct the verification There is a security risk on the page.
可选地,在本实施例中,在显示验证页面之前,可以但不限于对验证页面的安全性进行确认,确认的方式可以是预先将操作页面地址和验证页面地址之间的对应关系存储起来,以标识出各个操作页面对应的合法的验证页面,在对用户的操作进行人机验证之前,首先对页面页面进行验证,获取操作页面的第一页面地址和验证页面的第二页面地址,从而预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址,如果查找到,则认为该验证页面是安全的,如果没有查找到,则认为该验证页面不合法,对其执行预设操作来指示该验证页面存在安全风险。Optionally, in this embodiment, before the verification page is displayed, the security of the verification page may be confirmed, but not limited to, the confirmation method may be to store the correspondence between the operation page address and the verification page address in advance , In order to identify the legal verification page corresponding to each operation page, before the user's operation is verified by man-machine, the page page is first verified, and the first page address of the operation page and the second page address of the verification page are obtained, thereby The first page address and the second page address that have a corresponding relationship are searched in the pre-stored operation page addresses and verification page addresses that have a corresponding relationship. If found, the verification page is considered to be safe, if not found If the verification page is reached, it is deemed that the verification page is illegal, and a preset operation is performed on it to indicate that the verification page has a security risk.
可选地,在本实施例中,操作页面上执行的目标操作触发了验证页面的显示。操作页面可以但不限于包括游戏登录页面,游戏注册页面,游戏交易页面等等需要对目标对象的类别(真实人类用户或是入侵机器人)进行验证的页面。Optionally, in this embodiment, the target operation performed on the operation page triggers the display of the verification page. The operation page can, but is not limited to, include a game login page, a game registration page, a game transaction page, and other pages that require verification of the target object category (real human user or invading robot).
可选地,在本实施例中,预设操作用于指示验证页面存在安全风险。比如:预设操作可以但不限于包括:拦截操作、举报操作、风险提示、屏蔽操作等等。Optionally, in this embodiment, the preset operation is used to indicate that the verification page has a security risk. For example, the preset operations can include, but are not limited to: interception operations, reporting operations, risk warnings, blocking operations, and so on.
通过上述过程,如果检测到目标对象在操作页面上执行了目标操作,则对操作页面和验证页面的页面地址的对应性进行验证,确定是否已经预先存储了其对应关系,如果是,则显示验证页面,如果否,则确认验证页面是有安全风险的。从而避免验证页面被入侵者劫持导致用户在验证页面上执行操作对用户造成风险和损失的情况发生,从而提高了验证页面的安全性,进而提高了用户操作的安全性,为用户提供了一个安全的操作环境。Through the above process, if it is detected that the target object has performed the target operation on the operation page, the correspondence between the operation page and the page address of the verification page is verified to determine whether the corresponding relationship has been stored in advance, and if so, the verification is displayed Page, if not, confirm that the verification page is a security risk. This prevents the verification page from being hijacked by an intruder, causing the user to perform operations on the verification page, causing risks and losses to the user, thereby improving the security of the verification page, thereby improving the security of user operations, and providing users with a safe Operating environment.
作为一种可选的实施例,获取所述操作页面的第一页面地址和所述验证页面的第二页面地址包括:As an optional embodiment, obtaining the first page address of the operation page and the second page address of the verification page includes:
S111,获取客户端上报的加密数据,其中,所述客户端用于显示所述操作页面和所述验证页面;S111: Obtain encrypted data reported by the client, where the client is used to display the operation page and the verification page;
S112,获取所述客户端对应的秘钥信息;S112: Acquire secret key information corresponding to the client;
S113,使用所述秘钥信息对所述加密数据进行解密,得到所述第一页面地址和所述第二页面地址。S113: Use the secret key information to decrypt the encrypted data to obtain the first page address and the second page address.
可选地,在本实施例中,页面网址安全性的验证过程可以但不限于是由服务器执行的,客户端将页面地址等信息通过加密的方式进行上报。Optionally, in this embodiment, the verification process for the security of the page URL can be, but not limited to, performed by the server, and the client side reports information such as the page address in an encrypted manner.
可选地,在本实施例中,不同客户端可以但不限于对应不同的秘钥信息,也可以与所有客户端都约定相同的秘钥信息。Optionally, in this embodiment, different clients may, but are not limited to, correspond to different secret key information, and may also agree on the same secret key information with all clients.
通过上述过程,客户端采用加密传输的方式向服务器上报信息,能够进一步提高安全性。Through the above process, the client uses encrypted transmission to report information to the server, which can further improve security.
作为一种可选的实施例,在获取所述操作页面的第一页面地址和所述验证页面的第二页面地址之后,还包括:As an optional embodiment, after obtaining the first page address of the operation page and the second page address of the verification page, the method further includes:
S121,对所述操作页面和所述验证页面进行安全性测试,得到所述操作页面和所述验证页面对应的目标风险信息,其中,所述目标风险信息用于指示在所述操作页面和所述验证页面上进行操作存在的风险;S121: Perform a security test on the operation page and the verification page to obtain target risk information corresponding to the operation page and the verification page, where the target risk information is used to indicate that the operation page and the verification page are Describe the risks of operations on the verification page;
S122,向所述目标对象展示所述目标风险信息。S122: Display the target risk information to the target object.
可选地,在本实施例中,安全性测试的过程可以但不限于用于对页面上存在的安全风险进行测试,比如:测试操作页面和验证页面上是否存在恶意网站,恶意下载,钓鱼链接,木马病毒等风险,以及在操作页面和验证页面上操作环境是否安全,操作行为是否有保障等等。Optionally, in this embodiment, the security test process can be, but is not limited to, used to test the security risks on the page, such as: testing the operation page and verifying whether there are malicious websites, malicious downloads, and phishing links on the page. , Trojan horse virus and other risks, as well as whether the operating environment on the operating page and verification page is safe, whether the operating behavior is guaranteed, and so on.
可选地,在本实施例中,目标风险信息可以但不限于包括风险值 和风险类型中至少之一的信息,比如:可以根据安全性测试的结果对页面的安全风险进行打分,得到风险值,对于操作页面和验证页面可以分别打分得到各自的风险值,也可以将安全性检测的结果融合为一个风险值。展示给目标对象的目标风险信息可以但不限于为得到的风险值,比如:风险值为90分,表示在页面上的操作几乎不会存在风险。风险值为45分,表示在页面上执行操作的风险较高。也可以通过目标风险信息向目标对象展示存在风险的风险类型,比如:风险值为45分,风险类型为:木马,恶意网站和恶意下载。Optionally, in this embodiment, the target risk information may include but is not limited to information including at least one of the risk value and the risk type. For example, the security risk of the page may be scored according to the result of the security test to obtain the risk value. , For the operation page and the verification page, the respective risk values can be scored separately, and the results of the safety inspection can also be merged into a risk value. The target risk information displayed to the target object can be, but is not limited to, the obtained risk value. For example, the risk value is 90 points, which means that there is almost no risk in the operation on the page. The risk value is 45 points, which means that the risk of performing operations on the page is higher. The target risk information can also be used to show the risk type to the target object. For example, the risk value is 45 points, and the risk type is: Trojan horse, malicious website and malicious download.
可选地,在本实施例中,风险类型也可以记录在一个列表中,在得到风险值的同时,对存在的风险类型在列表中进行勾选,将风险值和勾选后的列表展示给目标对象。Optionally, in this embodiment, the risk type can also be recorded in a list. While obtaining the risk value, check the existing risk type in the list, and display the risk value and the checked list to target.
通过上述过程,对操作页面和验证页面进行安全性测试,并将得到的目标风险信息展示给目标对象,从而为目标对象提示操作可能存在的安全风险。提高了用户操作的安全性,为用户提供了一个安全的操作环境。Through the above process, the security test is performed on the operation page and the verification page, and the obtained target risk information is displayed to the target object, thereby prompting the target object about the possible security risks of the operation. The safety of user operations is improved, and a safe operating environment is provided for users.
作为一种可选的实施例,对所述操作页面和所述验证页面进行安全性测试,得到所述操作页面和所述验证页面对应的目标风险信息包括:As an optional embodiment, performing a security test on the operation page and the verification page to obtain target risk information corresponding to the operation page and the verification page includes:
S131,对所述操作页面进行安全性测试,得到第一风险信息,其中,所述第一风险信息用于指示在所述操作页面上进行操作存在的风险;S131: Perform a security test on the operation page to obtain first risk information, where the first risk information is used to indicate the risks of operations on the operation page;
S132,对所述验证页面进行安全性测试,得到第二风险信息,其中,所述第二风险信息用于指示在所述验证页面上进行操作存在的风险;S132: Perform a security test on the verification page to obtain second risk information, where the second risk information is used to indicate the risks of operations on the verification page;
S133,根据所述第一风险信息、所述第二风险信息和目标查找结果确定所述目标风险信息,其中,所述目标查找结果用于指示从预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址的结果。S133: Determine the target risk information according to the first risk information, the second risk information, and the target search result, where the target search result is used to indicate the address and verification of the corresponding operation page from the pre-stored The result of searching for the first page address and the second page address that have a corresponding relationship in the page address.
可选地,在本实施例中,可以但不限于对操作页面和验证页面分别进行安全性测试,得到各自对应的风险信息,再结合对页面地址对应关系进行验证得到的验证结果来确定目标风险信息。Optionally, in this embodiment, it is possible, but not limited to, to perform security tests on the operation page and the verification page respectively to obtain respective corresponding risk information, and then combine the verification results obtained by verifying the page address correspondence relationship to determine the target risk information.
可选地,在本实施例中,目标查找结果也影响了操作页面和验证页面的安全性,比如:如果目标查找结果为未查找到对应关系,则确认操作页面和验证页面的安全性会降低,如果目标查找结果为查找到对应关系,则确认操作页面和验证页面的安全性会相应有所提升。Optionally, in this embodiment, the target search result also affects the security of the operation page and the verification page. For example, if the target search result is that no correspondence is found, the security of the confirmation operation page and the verification page will be reduced. , If the target search result is that the corresponding relationship is found, the security of the confirmation operation page and the verification page will be improved accordingly.
本公开还提供了一种可选实施例,该可选实施例提供了一种基于 用户行为的人机验证方法。图5是根据本公开可选实施例的一种基于用户行为的人机验证方法的示意图,如图5所示,该方法可以但不限于包括以下步骤:The present disclosure also provides an optional embodiment, which provides a human-machine verification method based on user behavior. Fig. 5 is a schematic diagram of a human-machine verification method based on user behavior according to an optional embodiment of the present disclosure. As shown in Fig. 5, the method may but is not limited to include the following steps:
步骤S502,获取用户行为数据,并将其划分为用户页面浏览行为和用户验证码操作行为。Step S502: Obtain user behavior data and divide it into user page browsing behavior and user verification code operation behavior.
步骤S504,对于用户页面浏览行为进行鼠标、滚轮等行为的固定时间间隔的采样,对键盘数据截取最大固定长度,得到浏览行为数据。使用LSTM+LR模型对浏览行为数据进行分类,得到分类结果。In step S504, the user page browsing behavior is sampled at a fixed time interval of the mouse, scroll wheel and other behaviors, and the keyboard data is intercepted by the maximum fixed length to obtain the browsing behavior data. The LSTM+LR model is used to classify the browsing behavior data, and the classification result is obtained.
步骤S506,对于用户验证码操作行为,将其作为验证行为数据使用自编码器进行编码,得到行为编码作为编码数据。使用SVDD单分类模型对其进行分类,得到分类结果。Step S506: Regarding the user verification code operation behavior, use it as the verification behavior data and use the self-encoder to encode, and obtain the behavior code as the encoded data. Use the SVDD single classification model to classify it, and get the classification result.
步骤S508,融合上述两种分类结果得到最终判断结果。In step S508, the above two classification results are merged to obtain the final judgment result.
可选地,在本可选实施例中,在使用自编码器进行编码得到行为编码之后,上述方法还可以但不限于包括以下步骤:Optionally, in this optional embodiment, after using a self-encoder to perform encoding to obtain behavioral encoding, the foregoing method may also include but is not limited to the following steps:
步骤S510,对行为编码使用mean-shift(均值漂移)算法进行聚类,根据聚类结果对相关的ip进行绑定。Step S510: Use a mean-shift (mean shift) algorithm to cluster the behavior codes, and bind related ips according to the clustering results.
步骤S512,对绑定ip的访问频率进行联合计数。In step S512, the access frequency of the bound ip is jointly counted.
步骤S514,如果联合访问频率超过指定阈值,则将最新访问的ip标记为可疑,如果ip多次被标记为可疑,则将其加入黑名单。In step S514, if the joint access frequency exceeds the specified threshold, the newly accessed ip is marked as suspicious, and if the ip is marked as suspicious multiple times, it is added to the blacklist.
步骤S516,对于黑名单ip,将其反馈给前端增加其验证难度,同时反馈给分类模型,增加其分类为正常用户的难度。Step S516: For the blacklist ip, it is fed back to the front end to increase the difficulty of verification, and at the same time, fed back to the classification model to increase the difficulty of classifying it as a normal user.
通过上述过程,基于深度网络自动提取数据特征,避免了手动提取特征的局限性,也提高了特征提取的效率和准确性。收集的用户行为不限于验证过程,并将用户行为划分为页面浏览行为和验证码操作行为两个特征差别较大的序列,并针对两种序列使用不同的模型进行分类,丰富了验证过程的维度和信息量,从而提高了验证准确率。使用单分类模型对用户数据进行分类,避免了收集攻击者数据的困难。使用聚类模型对攻击者伪造行为进行相似性分析,避免了攻击者在破解了前端代码后,直接使用真实用户行为进行虚假验证。从而提高了对验证操作进行验证的准确性。Through the above process, data features are automatically extracted based on the deep network, which avoids the limitations of manually extracting features, and also improves the efficiency and accuracy of feature extraction. The collected user behavior is not limited to the verification process, and the user behavior is divided into two sequences with relatively different characteristics of page browsing behavior and verification code operation behavior, and different models are used to classify the two sequences, which enriches the dimension of the verification process And the amount of information, thereby improving the accuracy of verification. Use a single classification model to classify user data, avoiding the difficulty of collecting attacker data. The clustering model is used to analyze the similarity of the attacker's forged behavior, which prevents the attacker from directly using real user behavior for false verification after cracking the front-end code. Thereby, the accuracy of the verification of the verification operation is improved.
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本公开并不受所描述的动作顺序的限制,因为依据本公开,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于可选实施例,所涉及的动作和模块并不一定是本公开所必须的。It should be noted that for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present disclosure is not limited by the described sequence of actions. Because according to the present disclosure, certain steps can be performed in other order or at the same time. Secondly, those skilled in the art should also know that the embodiments described in the specification are all optional embodiments, and the involved actions and modules are not necessarily required by the present disclosure.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本公开各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus the necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is Better implementation. Based on this understanding, the technical solution of the present disclosure essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) execute the methods described in the various embodiments of the present disclosure.
根据本公开实施例的另一个方面,还提供了一种用于实施上述操作的验证方法的操作的验证装置。图6是根据本公开实施例的一种可选的操作的验证装置的示意图,如图6所示,该装置可以包括:According to another aspect of the embodiments of the present disclosure, there is also provided a verification device for implementing the operation of the verification method of the above operation. Fig. 6 is a schematic diagram of an optional operation verification device according to an embodiment of the present disclosure. As shown in Fig. 6, the device may include:
第一获取模块62,设置为获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;The first obtaining module 62 is configured to obtain the first data and the second data generated by the target object on the displayed verification page within the target time period, wherein the verification page is used to verify that the target object is on the verification page The target verification operation performed is verified, the target time period includes the time from displaying the verification page to the end of performing the target verification operation, and the first data is that the target object is before the target verification operation starts to perform the target verification operation. Generated browsing behavior data, where the second data is verification behavior data generated by the target object performing the target verification operation;
第一验证模块64,设置为根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;The first verification module 64 is configured to verify the target object according to the first data to obtain a first verification result, and to verify the target verification operation according to the second data to obtain a second verification result;
第一确定模块66,设置为根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The first determining module 66 is configured to determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation is approved.
需要说明的是,该实施例中的第一获取模块62可以设置为执行本公开实施例中的步骤S202,该实施例中的第一验证模块64可以设置为执行本公开实施例中的步骤S204,该实施例中的第一确定模块66可以设置为执行本公开实施例中的步骤S206。It should be noted that the first obtaining module 62 in this embodiment can be configured to perform step S202 in the embodiment of the present disclosure, and the first verification module 64 in this embodiment can be configured to perform step S204 in the embodiment of the present disclosure. , The first determining module 66 in this embodiment may be configured to execute step S206 in the embodiment of the present disclosure.
此处需要说明的是,上述模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在如图1所示的硬件环境中,可以通过软件实现,也可以通过硬件实现。It should be noted here that the examples and application scenarios implemented by the foregoing modules and corresponding steps are the same, but are not limited to the content disclosed in the foregoing embodiments. It should be noted that, as a part of the device, the above-mentioned modules can run in the hardware environment as shown in FIG. 1, and can be implemented by software or hardware.
通过上述模块,通过从显示验证页面开始获取验证页面上产生的行为数据,将验证页面上产生的行为数据划分为浏览行为和验证行为两个维度分别进行验证得到各自的验证结果,再将两个维度的验证结果进行融合得到目标验证操作的最终验证结果,达到了提高验证通过 难度的目的,从而实现了提高对验证页面上执行的验证操作进行验证的准确率的技术效果,进而解决了相关技术中对验证页面上执行的验证操作进行验证的准确率较低的技术问题。Through the above modules, the behavior data generated on the verification page is obtained from the display verification page, and the behavior data generated on the verification page is divided into two dimensions: browsing behavior and verification behavior. The verification results of the dimensions are merged to obtain the final verification result of the target verification operation, which achieves the purpose of increasing the difficulty of passing the verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, thereby solving related technologies The technical problem of low accuracy in verifying the verification operations performed on the verification page.
作为一种可选的实施例,所述第一验证模块包括:As an optional embodiment, the first verification module includes:
提取单元,设置为对所述第一数据进行特征提取,得到所述第一数据对应的数据特征;An extraction unit, configured to perform feature extraction on the first data to obtain data features corresponding to the first data;
分类单元,设置为对所述数据特征进行分类,得到所述目标对象所对应的目标对象类型作为所述第一验证结果。The classification unit is configured to classify the data features, and obtain the target object type corresponding to the target object as the first verification result.
作为一种可选的实施例,所述提取单元设置为:按照数据的产生方式将所述第一数据划分为多种数据类型的数据;分别对所述多种数据类型的数据中每种数据类型的数据进行特征提取,得到所述每种数据类型的数据对应的数据特征;As an optional embodiment, the extraction unit is configured to: divide the first data into data of multiple data types according to the data generation mode; Perform feature extraction on data of each type to obtain the data feature corresponding to the data of each data type;
所述分类单元设置为:分别对所述每种数据类型的数据对应的数据特征进行分类,得到所述每种数据类型的数据对应的对象类型;对所述每种数据类型的数据对应的对象类型进行融合,得到所述目标对象类型。The classification unit is configured to: respectively classify the data characteristics corresponding to the data of each data type to obtain the object type corresponding to the data of each data type; and to determine the object corresponding to the data of each data type The types are merged to obtain the target object type.
作为一种可选的实施例,所述第一验证模块包括:As an optional embodiment, the first verification module includes:
第一输入单元,设置为将所述第一数据输入目标特征分类模型,其中,所述目标特征分类模型是使用标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练得到的;The first input unit is configured to input the first data into a target feature classification model, wherein the target feature classification model is obtained by training an initial feature classification model using browsing behavior data samples marked with object types;
第一获取单元,设置为获取所述目标特征分类模型输出的目标对象类型作为所述第一验证结果,其中,所述行为数据样本所标注的对象类型中包括所述目标对象类型。The first obtaining unit is configured to obtain the target object type output by the target feature classification model as the first verification result, wherein the target object type is included in the object type marked by the behavior data sample.
作为一种可选的实施例,所述第一获取单元设置为:As an optional embodiment, the first acquiring unit is configured to:
通过特征提取层对所述第一数据进行特征提取,得到数据特征,其中,所述目标特征分类模型包括依次连接的第一输入层、所述特征提取层、分类层和第一输出层,所述第一输入层用于接收所述第一数据;The feature extraction layer is used to perform feature extraction on the first data to obtain data features, wherein the target feature classification model includes a first input layer, the feature extraction layer, a classification layer, and a first output layer that are sequentially connected. The first input layer is used to receive the first data;
通过所述分类层对所述数据特征进行分类,得到所述数据特征属于多个对象类型中每种对象类型的概率;Classify the data feature through the classification layer to obtain the probability that the data feature belongs to each object type among multiple object types;
通过所述第一输出层根据所述数据特征属于多个对象类型中每种对象类型的概率,从所述多个对象类型中确定所述目标对象类型,并输出所述目标对象类型。The first output layer determines the target object type from the multiple object types according to the probability that the data feature belongs to each of the multiple object types, and outputs the target object type.
作为一种可选的实施例,所述第一验证模块包括:As an optional embodiment, the first verification module includes:
第一确定单元,设置为确定所述第二数据是否符合所述验证页面对应的验证条件;The first determining unit is configured to determine whether the second data meets the verification condition corresponding to the verification page;
第二确定单元,设置为在确定所述第二数据不符合所述验证条件的情况下,确定所述第二验证结果用于指示所述目标验证操作未通过验证;A second determining unit, configured to determine that the second verification result is used to indicate that the target verification operation fails verification when it is determined that the second data does not meet the verification condition;
第三确定单元,设置为在确定所述第二数据符合所述验证条件的情况下,根据所述第二数据与目标数据之间的相似度确定所述目标验证操作是否通过验证,得到所述第二验证结果,其中,所述目标数据是从已通过验证的验证操作中提取的数据。The third determining unit is configured to determine whether the target verification operation passes the verification according to the similarity between the second data and the target data when it is determined that the second data meets the verification conditions, to obtain the The second verification result, wherein the target data is data extracted from a verification operation that has passed verification.
作为一种可选的实施例,所述第三确定单元设置为:As an optional embodiment, the third determining unit is configured to:
对所述第二数据进行编码,得到编码数据;Encoding the second data to obtain encoded data;
将所述编码数据输入目标单分类模型,其中,所述目标单分类模型是使用所述目标数据对初始单分类模型进行训练得到的;Inputting the encoded data into a target single classification model, wherein the target single classification model is obtained by training an initial single classification model using the target data;
获取所述目标单分类模型输出的验证标识作为所述第二验证结果,其中,所述验证标识用于指示所述编码数据是否通过验证。The verification identifier output by the target single classification model is obtained as the second verification result, wherein the verification identifier is used to indicate whether the encoded data passes verification.
作为一种可选的实施例,所述第三确定单元设置为:As an optional embodiment, the third determining unit is configured to:
通过单分类层确定所述编码数据与所述目标数据之间的相似度,其中,所述目标单分类模型包括依次连接的第二输入层,所述单分类层和第二输出层,所述第二输入层用于接收所述编码数据;The similarity between the encoded data and the target data is determined by a single classification layer, wherein the target single classification model includes a second input layer connected in sequence, the single classification layer and the second output layer, and the The second input layer is used to receive the encoded data;
通过所述第二输出层确定所述相似度与目标相似度之间的关系;Determine the relationship between the similarity and the target similarity through the second output layer;
在所述相似度高于所述目标相似度的情况下,通过所述第二输出层输出第一验证标识,其中,所述第一验证标识用于指示所述编码数据通过验证;In the case where the similarity is higher than the target similarity, output a first verification identifier through the second output layer, where the first verification identifier is used to indicate that the encoded data passes verification;
在所述相似度不高于所述目标相似度的情况下,通过所述第二输出层输出第二验证标识,其中,所述第二验证标识用于指示所述编码数据未通过验证。In the case that the similarity is not higher than the target similarity, a second verification identifier is output through the second output layer, where the second verification identifier is used to indicate that the encoded data fails verification.
作为一种可选的实施例,所述装置还包括:As an optional embodiment, the device further includes:
第二确定模块,设置为在对所述第二数据进行编码,得到所述编码数据之后,确定所述编码数据在多个数据类型中所对应的目标数据类型,其中,所述多个数据类型是对历史编码数据进行聚类得到的;The second determining module is configured to, after encoding the second data to obtain the encoded data, determine the target data type corresponding to the encoded data among the multiple data types, wherein the multiple data types It is obtained by clustering historical coded data;
第二获取模块,设置为获取产生属于所述目标数据类型的数据对应的对象的访问频率,其中,所述访问频率用于指示产生属于所述目标数据类型的数据对应的对象访问所述验证页面的频率;The second obtaining module is configured to obtain the access frequency of the object corresponding to the data belonging to the target data type, wherein the access frequency is used to instruct the object corresponding to the data belonging to the target data type to access the verification page Frequency of;
第三确定模块,设置为在所述访问频率高于目标频率的情况下,将所述目标对象的对象标识确定为可疑标识;A third determining module, configured to determine the object identifier of the target object as a suspicious identifier when the access frequency is higher than the target frequency;
调整模块,设置为在所述对象标识被确定为所述可疑标识的次数高于目标次数的情况下,上调使用所述目标单分类模型对来自所述对象标志的数据进行处理时的所述目标相似度。The adjustment module is configured to increase the target when the target single classification model is used to process the data from the target marker when the number of times the target marker is determined to be the suspicious marker is higher than the target number Similarity.
作为一种可选的实施例,所述装置还包括:As an optional embodiment, the device further includes:
第三获取模块,设置为在根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果之前,从采集的数据集中获取目标数据,其中,所述目标数据是从已通过验证的验证操作中提取的数据;The third acquisition module is configured to perform verification on the target object according to the first data to obtain a first verification result, and perform verification on the target verification operation according to the second data to obtain a second verification result, from Obtain target data in a collection of collected data, where the target data is data extracted from verification operations that have passed verification;
第一训练模块,设置为使用所述目标数据对初始单分类模型进行训练,得到目标单分类模型,其中,所述目标单分类模型用于根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;The first training module is configured to use the target data to train the initial single classification model to obtain a target single classification model, wherein the target single classification model is used to verify the target verification operation according to the second data Obtain the second verification result;
第二验证模块,设置为使用所述目标单分类模型对所述数据集中的数据进行验证,得到验证结果为未通过验证的数据;The second verification module is configured to use the target single classification model to verify the data in the data set, and obtain the data that fails the verification as a verification result;
第四获取模块,设置为从所述数据集中获取所述目标数据对应的第一浏览行为数据以及验证结果为未通过验证的数据对应的第二浏览行为数据;A fourth obtaining module, configured to obtain, from the data set, first browsing behavior data corresponding to the target data and second browsing behavior data corresponding to data that has not passed the verification as a verification result;
标注模块,设置为将所述第一浏览行为数据对应的对象类型标注为第一对象类型,并将所述第二浏览行为数据对应的对象类型标注为第二对象类型,得到标注了对象类型的浏览行为数据样本;The labeling module is configured to label the object type corresponding to the first browsing behavior data as the first object type, and label the object type corresponding to the second browsing behavior data as the second object type, to obtain the object type labeled Browse behavioral data samples;
第二训练模块,设置为使用所述标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练,得到目标特征分类模型,其中,所述目标特征分类模型用于根据所述第一数据对所述目标对象进行验证得到第一验证结果。The second training module is configured to train the initial feature classification model using the browsing behavior data sample labeled with the object type to obtain a target feature classification model, wherein the target feature classification model is used to pair according to the first data The target object performs verification to obtain a first verification result.
作为一种可选的实施例,所述装置还包括:As an optional embodiment, the device further includes:
第五获取模块,设置为在获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据之前,在检测到在显示的操作页面上执行的目标操作的情况下,获取所述操作页面的第一页面地址和所述验证页面的第二页面地址;The fifth acquisition module is configured to acquire the target operation performed on the displayed operation page before acquiring the first data and the second data generated by the target object on the displayed verification page during the target time period. The first page address of the operation page and the second page address of the verification page;
查找模块,设置为从预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址;The search module is configured to search for the first page address and the second page address with the corresponding relationship from the pre-stored operation page address and the verification page address with the corresponding relationship;
显示模块,设置为在查找到具有对应关系的所述第一页面地址和所述第二页面地址的情况下,显示所述验证页面;A display module, configured to display the verification page when the first page address and the second page address that have a corresponding relationship are found;
操作模块,设置为在未查找到具有对应关系的所述第一页面地址和所述第二页面地址的情况下,对所述验证页面进行预设操作,其中,所述预设操作用于指示所述验证页面存在安全风险。The operation module is configured to perform a preset operation on the verification page when the first page address and the second page address that have a corresponding relationship are not found, wherein the preset operation is used to instruct The verification page has security risks.
作为一种可选的实施例,所述第五获取模块包括:As an optional embodiment, the fifth acquiring module includes:
第二获取单元,设置为获取客户端上报的加密数据,其中,所述客户端用于显示所述操作页面和所述验证页面;The second obtaining unit is configured to obtain encrypted data reported by the client, where the client is used to display the operation page and the verification page;
第三获取单元,设置为获取所述客户端对应的秘钥信息;The third obtaining unit is configured to obtain secret key information corresponding to the client;
解密单元,设置为使用所述秘钥信息对所述加密数据进行解密,得到所述第一页面地址和所述第二页面地址。The decryption unit is configured to use the secret key information to decrypt the encrypted data to obtain the first page address and the second page address.
作为一种可选的实施例,所述装置还包括:As an optional embodiment, the device further includes:
测试模块,设置为在获取所述操作页面的第一页面地址和所述验证页面的第二页面地址之后,对所述操作页面和所述验证页面进行安全性测试,得到所述操作页面和所述验证页面对应的目标风险信息,其中,所述目标风险信息用于指示在所述操作页面和所述验证页面上进行操作存在的风险;The test module is configured to perform a security test on the operation page and the verification page after obtaining the first page address of the operation page and the second page address of the verification page to obtain the operation page and the verification page. The target risk information corresponding to the verification page, where the target risk information is used to indicate the risks of operations on the operation page and the verification page;
展示模块,设置为向所述目标对象展示所述目标风险信息。The display module is configured to display the target risk information to the target object.
作为一种可选的实施例,所述测试模块包括:As an optional embodiment, the test module includes:
第一测试单元,设置为对所述操作页面进行安全性测试,得到第一风险信息,其中,所述第一风险信息用于指示在所述操作页面上进行操作存在的风险;The first test unit is configured to perform a security test on the operation page to obtain first risk information, where the first risk information is used to indicate the risks of performing operations on the operation page;
第二测试单元,设置为对所述验证页面进行安全性测试,得到第二风险信息,其中,所述第二风险信息用于指示在所述验证页面上进行操作存在的风险;The second test unit is configured to perform a security test on the verification page to obtain second risk information, where the second risk information is used to indicate the risks of operations on the verification page;
第四确定单元,设置为根据所述第一风险信息、所述第二风险信息和目标查找结果确定所述目标风险信息,其中,所述目标查找结果用于指示从预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址的结果。The fourth determining unit is configured to determine the target risk information according to the first risk information, the second risk information, and the target search result, wherein the target search result is used to indicate the corresponding relationship from the pre-stored The result of searching the first page address and the second page address that have a corresponding relationship in the operation page address and the verification page address.
此处需要说明的是,上述模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在如图1所示的硬件环境中,可以通过软件实现,也可以通过硬件实现,其中,硬件环境包括网络环境。It should be noted here that the examples and application scenarios implemented by the foregoing modules and corresponding steps are the same, but are not limited to the content disclosed in the foregoing embodiments. It should be noted that, as a part of the device, the above-mentioned modules can run in the hardware environment as shown in FIG. 1, and can be implemented by software or hardware, where the hardware environment includes a network environment.
根据本公开实施例的另一个方面,还提供了一种用于实施上述操作的验证方法的服务器或终端。According to another aspect of the embodiments of the present disclosure, there is also provided a server or terminal for implementing the verification method of the above operation.
图7是根据本公开实施例的一种终端的结构框图,如图7所示,该终端可以包括:一个或多个(图中仅示出一个)处理器701、存储器703、以及传输装置705,如图7所示,该终端还可以包括输入输出设备707。FIG. 7 is a structural block diagram of a terminal according to an embodiment of the present disclosure. As shown in FIG. 7, the terminal may include: one or more (only one is shown in the figure) processor 701, memory 703, and transmission device 705 As shown in FIG. 7, the terminal may also include an input and output device 707.
其中,存储器703可设置为存储软件程序以及模块,如本公开实施例中的操作的验证方法和装置对应的程序指令/模块,处理器701通过运行存储在存储器703内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的操作的验证方法。存储器703可包 括高速随机存储器,还可以包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器703可包括相对于处理器701远程设置的存储器,这些远程存储器可以通过网络连接至终端。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 703 can be configured to store software programs and modules, such as the operation verification method and device corresponding program instructions/modules in the embodiments of the present disclosure. The processor 701 runs the software programs and modules stored in the memory 703, thereby Perform various functional applications and data processing, that is, realize the verification method of the above-mentioned operation. The memory 703 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 703 may include a memory remotely provided with respect to the processor 701, and these remote memories may be connected to the terminal through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
上述的传输装置705设置为经由一个网络接收或者发送数据,还可以设置为处理器与存储器之间的数据传输。上述的网络可选实例可包括有线网络及无线网络。在一个实例中,传输装置705包括一个网络适配器(Network Interface Controller,NIC),其可通过网线与其他网络设备与路由器相连从而可与互联网或局域网进行通讯。在一个实例中,传输装置705为射频(Radio Frequency,RF)模块,其设置为通过无线方式与互联网进行通讯。The aforementioned transmission device 705 is configured to receive or send data via a network, and may also be configured to transmit data between the processor and the memory. The above-mentioned optional examples of networks may include wired networks and wireless networks. In one example, the transmission device 705 includes a network adapter (Network Interface Controller, NIC), which can be connected to other network devices and routers via a network cable so as to communicate with the Internet or a local area network. In one example, the transmission device 705 is a radio frequency (RF) module, which is configured to communicate with the Internet in a wireless manner.
其中,可选地,存储器703设置为存储应用程序。Wherein, optionally, the memory 703 is configured to store an application program.
处理器701可以通过传输装置705调用存储器703存储的应用程序,以执行下述步骤:The processor 701 may call the application program stored in the memory 703 through the transmission device 705 to perform the following steps:
获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;Acquiring the first data and the second data generated by the target object on the displayed verification page within the target time period, wherein the verification page is used to verify the target verification operation performed by the target object on the verification page, The target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, the first data is browsing behavior data generated by the target object before the target verification operation starts, and the The second data is verification behavior data generated by the target object performing the target verification operation;
根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;Verifying the target object according to the first data to obtain a first verification result, and verifying the target verification operation according to the second data to obtain a second verification result;
根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
采用本公开实施例,提供了一种操作的验证的方案。通过从显示验证页面开始获取验证页面上产生的行为数据,将验证页面上产生的行为数据划分为浏览行为和验证行为两个维度分别进行验证得到各自的验证结果,再将两个维度的验证结果进行融合得到目标验证操作的最终验证结果,达到了提高验证通过难度的目的,从而实现了提高对验证页面上执行的验证操作进行验证的准确率的技术效果,进而解决了相关技术中对验证页面上执行的验证操作进行验证的准确率较低的技术问题。By adopting the embodiments of the present disclosure, a scheme of operation verification is provided. By starting from displaying the verification page to obtain the behavior data generated on the verification page, the behavior data generated on the verification page is divided into two dimensions, browsing behavior and verification behavior, and verifying separately to obtain their respective verification results, and then verifying the results of the two dimensions The final verification result of the target verification operation is obtained by fusion, which achieves the purpose of increasing the difficulty of verification, thereby achieving the technical effect of improving the accuracy of the verification operation performed on the verification page, thereby solving the problem of the verification page in the related technology. The verification operation performed on the technical problem of low accuracy of verification.
可选地,本实施例中的可选示例可以参考上述实施例中所描述的示例,本实施例在此不再赘述。Optionally, for optional examples in this embodiment, reference may be made to the examples described in the foregoing embodiment, and this embodiment will not be repeated here.
本领域普通技术人员可以理解,图7所示的结构仅为示意,终端可以是智能手机(如Android手机、iOS手机等)、平板电脑、掌上电脑以及移动互联网设备(Mobile Internet Devices,MID)、PAD等终端设备。图7其并不对上述电子装置的结构造成限定。例如,终端还可包括比图7中所示更多或者更少的组件(如网络接口、显示装置等),或者具有与图7所示不同的配置。Those of ordinary skill in the art can understand that the structure shown in Fig. 7 is only for illustration, and the terminal can be a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a handheld computer, and a mobile Internet device (Mobile Internet Devices, MID), Terminal equipment such as PAD. FIG. 7 does not limit the structure of the above-mentioned electronic device. For example, the terminal may also include more or fewer components (such as a network interface, a display device, etc.) than shown in FIG. 7, or have a different configuration from that shown in FIG.
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令终端设备相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:闪存盘、只读存储器(Read-Only Memory,ROM)、随机存取器(Random Access Memory,RAM)、磁盘或光盘等。Those of ordinary skill in the art can understand that all or part of the steps in the various methods of the above-mentioned embodiments can be completed by instructing the relevant hardware of the terminal device through a program. The program can be stored in a computer-readable storage medium, and the storage medium can be Including: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), magnetic disk or optical disk, etc.
本公开的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以设置为执行操作的验证方法的程序代码。The embodiment of the present disclosure also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be set as the program code of the verification method for executing the operation.
可选地,在本实施例中,上述存储介质可以位于上述实施例所示的网络中的多个网络设备中的至少一个网络设备上。Optionally, in this embodiment, the foregoing storage medium may be located on at least one of the multiple network devices in the network shown in the foregoing embodiment.
可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:Optionally, in this embodiment, the storage medium is configured to store program code for executing the following steps:
获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;Acquiring first data and second data generated by the target object on the displayed verification page within the target time period, wherein the verification page is used to verify the target verification operation performed by the target object on the verification page, The target time period includes the time from displaying the verification page to the end of performing the target verification operation, the first data is browsing behavior data generated by the target object before starting to perform the target verification operation, and The second data is verification behavior data generated by the target object performing the target verification operation;
根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;Verifying the target object according to the first data to obtain a first verification result, and verifying the target verification operation according to the second data to obtain a second verification result;
根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
可选地,本实施例中的可选示例可以参考上述实施例中所描述的示例,本实施例在此不再赘述。Optionally, for optional examples in this embodiment, reference may be made to the examples described in the foregoing embodiment, and this embodiment will not be repeated here.
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random  Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the foregoing storage medium may include, but is not limited to: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk Various media that can store program codes such as discs or optical discs.
上述本公开实施例序号仅仅为了描述,不代表实施例的优劣。The sequence numbers of the above-mentioned embodiments of the present disclosure are only for description, and do not represent the superiority or inferiority of the embodiments.
上述实施例中的集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在上述计算机可读取的存储介质中。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在存储介质中,包括若干指令用以使得一台或多台计算机设备(可为个人计算机、服务器或者网络设备等)执行本公开各个实施例所述方法的全部或部分步骤。If the integrated unit in the foregoing embodiment is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in the foregoing computer-readable storage medium. Based on this understanding, the technical solution of the present disclosure essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, It includes several instructions to make one or more computer devices (which may be personal computers, servers, or network devices, etc.) execute all or part of the steps of the methods described in the various embodiments of the present disclosure.
在本公开的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above-mentioned embodiments of the present disclosure, the description of each embodiment has its own focus. For parts that are not described in detail in an embodiment, reference may be made to related descriptions of other embodiments.
在本公开所提供的几个实施例中,应该理解到,所揭露的客户端,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in the present disclosure, it should be understood that the disclosed client can be implemented in other ways. The device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, units or modules, and may be in electrical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本公开各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
以上所述仅是本公开的可选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本公开原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本公开的保护范围。The above are only optional implementations of the present disclosure. It should be pointed out that for those of ordinary skill in the art, without departing from the principles of the present disclosure, several improvements and modifications can be made. These improvements and modifications It should also be regarded as the protection scope of the present disclosure.

Claims (17)

  1. 一种操作的验证方法,包括:An operation verification method, including:
    获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;Acquiring the first data and the second data generated by the target object on the displayed verification page within the target time period, wherein the verification page is used to verify the target verification operation performed by the target object on the verification page, The target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, the first data is browsing behavior data generated by the target object before the target verification operation starts, and the The second data is verification behavior data generated by the target object performing the target verification operation;
    根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;Verifying the target object according to the first data to obtain a first verification result, and verifying the target verification operation according to the second data to obtain a second verification result;
    根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The target verification result corresponding to the target verification operation is determined according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verification.
  2. 根据权利要求1所述的方法,其中,根据所述第一数据对所述目标对象进行验证得到第一验证结果包括:The method according to claim 1, wherein, verifying the target object according to the first data to obtain the first verification result comprises:
    对所述第一数据进行特征提取,得到所述第一数据对应的数据特征;Performing feature extraction on the first data to obtain data features corresponding to the first data;
    对所述数据特征进行分类,得到所述目标对象所对应的目标对象类型作为所述第一验证结果。The data characteristics are classified, and the target object type corresponding to the target object is obtained as the first verification result.
  3. 根据权利要求2所述的方法,其中,The method of claim 2, wherein:
    对所述第一数据进行特征提取,得到所述第一数据对应的数据特征包括:按照数据的产生方式将所述第一数据划分为多种数据类型的数据;分别对所述多种数据类型的数据中每种数据类型的数据进行特 征提取,得到所述每种数据类型的数据对应的数据特征;Performing feature extraction on the first data to obtain the data feature corresponding to the first data includes: dividing the first data into data of multiple data types according to the way the data is generated; Feature extraction for data of each data type in the data to obtain the data feature corresponding to the data of each data type;
    对所述数据特征进行分类,得到所述目标对象所对应的目标对象类型作为所述第一验证结果包括:分别对所述每种数据类型的数据对应的数据特征进行分类,得到所述每种数据类型的数据对应的对象类型;对所述每种数据类型的数据对应的对象类型进行融合,得到所述目标对象类型。Classifying the data characteristics to obtain the target object type corresponding to the target object as the first verification result includes: separately classifying the data characteristics corresponding to the data of each data type to obtain the The object type corresponding to the data of the data type; the object type corresponding to the data of each data type is merged to obtain the target object type.
  4. 根据权利要求1所述的方法,其中,根据所述第一数据对所述目标对象进行验证得到第一验证结果包括:The method according to claim 1, wherein, verifying the target object according to the first data to obtain the first verification result comprises:
    将所述第一数据输入目标特征分类模型,其中,所述目标特征分类模型是使用标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练得到的;Inputting the first data into a target feature classification model, where the target feature classification model is obtained by training an initial feature classification model using browsing behavior data samples marked with object types;
    获取所述目标特征分类模型输出的目标对象类型作为所述第一验证结果,其中,所述行为数据样本所标注的对象类型中包括所述目标对象类型。The target object type output by the target feature classification model is acquired as the first verification result, wherein the target object type is included in the object type marked by the behavior data sample.
  5. 根据权利要求4所述的方法,其中,获取所述目标特征分类模型输出的目标对象类型作为所述第一验证结果包括:The method according to claim 4, wherein obtaining the target object type output by the target feature classification model as the first verification result comprises:
    通过特征提取层对所述第一数据进行特征提取,得到数据特征,其中,所述目标特征分类模型包括依次连接的第一输入层、所述特征提取层、分类层和第一输出层,所述第一输入层用于接收所述第一数据;The feature extraction layer is used to perform feature extraction on the first data to obtain data features, wherein the target feature classification model includes a first input layer, the feature extraction layer, a classification layer, and a first output layer that are sequentially connected. The first input layer is used to receive the first data;
    通过所述分类层对所述数据特征进行分类,得到所述数据特征属于多个对象类型中每种对象类型的概率;Classify the data feature through the classification layer to obtain the probability that the data feature belongs to each object type among multiple object types;
    通过所述第一输出层根据所述数据特征属于多个对象类型中每种对象类型的概率,从所述多个对象类型中确定所述目标对象类型,并输出所述目标对象类型。The first output layer determines the target object type from the multiple object types according to the probability that the data feature belongs to each of the multiple object types, and outputs the target object type.
  6. 根据权利要求1所述的方法,其中,根据所述第二数据对所述目标验证操作进行验证得到第二验证结果包括:The method according to claim 1, wherein verifying the target verification operation according to the second data to obtain a second verification result comprises:
    确定所述第二数据是否符合所述验证页面对应的验证条件;Determining whether the second data meets the verification condition corresponding to the verification page;
    在确定所述第二数据不符合所述验证条件的情况下,确定所述第二验证结果用于指示所述目标验证操作未通过验证;In a case where it is determined that the second data does not meet the verification condition, determining that the second verification result is used to indicate that the target verification operation fails verification;
    在确定所述第二数据符合所述验证条件的情况下,根据所述第二数据与目标数据之间的相似度确定所述目标验证操作是否通过验证,得到所述第二验证结果,其中,所述目标数据是从已通过验证的验证操作中提取的数据。In a case where it is determined that the second data meets the verification condition, it is determined whether the target verification operation passes verification according to the similarity between the second data and the target data, and the second verification result is obtained, wherein, The target data is data extracted from verification operations that have passed verification.
  7. 根据权利要求6所述的方法,其中,根据所述第二数据与目标数据之间的相似度确定所述目标验证操作是否通过验证,得到所述第二验证结果包括:The method according to claim 6, wherein determining whether the target verification operation passes verification according to the similarity between the second data and target data, and obtaining the second verification result comprises:
    对所述第二数据进行编码,得到编码数据;Encoding the second data to obtain encoded data;
    将所述编码数据输入目标单分类模型,其中,所述目标单分类模型是使用所述目标数据对初始单分类模型进行训练得到的;Inputting the encoded data into a target single classification model, wherein the target single classification model is obtained by training an initial single classification model using the target data;
    获取所述目标单分类模型输出的验证标识作为所述第二验证结果,其中,所述验证标识用于指示所述编码数据是否通过验证。The verification identifier output by the target single classification model is obtained as the second verification result, wherein the verification identifier is used to indicate whether the encoded data passes verification.
  8. 根据权利要求7所述的方法,其中,获取所述目标单分类模型输出的验证标识作为所述第二验证结果包括:The method according to claim 7, wherein obtaining the verification identifier output by the target single classification model as the second verification result comprises:
    通过单分类层确定所述编码数据与所述目标数据之间的相似度,其中,所述目标单分类模型包括依次连接的第二输入层,所述单分类层和第二输出层,所述第二输入层用于接收所述编码数据;The similarity between the encoded data and the target data is determined by a single classification layer, wherein the target single classification model includes a second input layer connected in sequence, the single classification layer and the second output layer, and the The second input layer is used to receive the encoded data;
    通过所述第二输出层确定所述相似度与目标相似度之间的关系;Determine the relationship between the similarity and the target similarity through the second output layer;
    在所述相似度高于所述目标相似度的情况下,通过所述第二输出 层输出第一验证标识,其中,所述第一验证标识用于指示所述编码数据通过验证;In the case where the similarity is higher than the target similarity, output a first verification identifier through the second output layer, where the first verification identifier is used to indicate that the encoded data passes verification;
    在所述相似度不高于所述目标相似度的情况下,通过所述第二输出层输出第二验证标识,其中,所述第二验证标识用于指示所述编码数据未通过验证。In the case that the similarity is not higher than the target similarity, a second verification identifier is output through the second output layer, where the second verification identifier is used to indicate that the encoded data fails verification.
  9. 根据权利要求8所述的方法,其中,在对所述第二数据进行编码,得到所述编码数据之后,所述方法还包括:The method according to claim 8, wherein, after encoding the second data to obtain the encoded data, the method further comprises:
    确定所述编码数据在多个数据类型中所对应的目标数据类型,其中,所述多个数据类型是对历史编码数据进行聚类得到的;Determine the target data type corresponding to the encoded data among multiple data types, where the multiple data types are obtained by clustering historical encoded data;
    获取产生属于所述目标数据类型的数据对应的对象的访问频率,其中,所述访问频率用于指示产生属于所述目标数据类型的数据对应的对象访问所述验证页面的频率;Acquiring the access frequency of the object corresponding to the data belonging to the target data type, where the access frequency is used to indicate the frequency of the object corresponding to the data generating the target data type accessing the verification page;
    在所述访问频率高于目标频率的情况下,将所述目标对象的对象标识确定为可疑标识;If the access frequency is higher than the target frequency, determining the object identifier of the target object as a suspicious identifier;
    在所述对象标识被确定为所述可疑标识的次数高于目标次数的情况下,上调使用所述目标单分类模型对来自所述对象标志的数据进行处理时的所述目标相似度。In the case where the object identification is determined to be the number of times the suspicious identification is higher than the target number, the target similarity when the target single classification model is used to process the data from the object identification is adjusted upward.
  10. 根据权利要求1所述的方法,其中,在根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果之前,所述方法还包括:The method according to claim 1, wherein the first verification result is obtained by verifying the target object according to the first data, and the second verification is obtained by verifying the target verification operation according to the second data Before the result, the method also includes:
    从采集的数据集中获取目标数据,其中,所述目标数据是从已通过验证的验证操作中提取的数据;Obtain target data from the collected data set, where the target data is data extracted from verification operations that have passed verification;
    使用所述目标数据对初始单分类模型进行训练,得到目标单分类模型,其中,所述目标单分类模型用于根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;Use the target data to train an initial single classification model to obtain a target single classification model, wherein the target single classification model is used to verify the target verification operation according to the second data to obtain a second verification result;
    使用所述目标单分类模型对所述数据集中的数据进行验证,得到验证结果为未通过验证的数据;Use the target single classification model to verify the data in the data set, and obtain the data that fails the verification as a verification result;
    从所述数据集中获取所述目标数据对应的第一浏览行为数据以及验证结果为未通过验证的数据对应的第二浏览行为数据;Acquiring, from the data set, first browsing behavior data corresponding to the target data and second browsing behavior data corresponding to data whose verification result is that the verification fails;
    将所述第一浏览行为数据对应的对象类型标注为第一对象类型,并将所述第二浏览行为数据对应的对象类型标注为第二对象类型,得到标注了对象类型的浏览行为数据样本;Marking the object type corresponding to the first browsing behavior data as a first object type, and marking the object type corresponding to the second browsing behavior data as a second object type, to obtain a browsing behavior data sample marked with the object type;
    使用所述标注了对象类型的浏览行为数据样本对初始特征分类模型进行训练,得到目标特征分类模型,其中,所述目标特征分类模型用于根据所述第一数据对所述目标对象进行验证得到第一验证结果。Use the browsing behavior data sample labeled with the object type to train the initial feature classification model to obtain a target feature classification model, wherein the target feature classification model is used to verify the target object according to the first data to obtain The first verification result.
  11. 根据权利要求1所述的方法,其中,在获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据之前,所述方法还包括:The method according to claim 1, wherein before acquiring the first data and the second data generated by the target object on the displayed verification page within the target time period, the method further comprises:
    在检测到在显示的操作页面上执行的目标操作的情况下,获取所述操作页面的第一页面地址和所述验证页面的第二页面地址;In the case of detecting the target operation performed on the displayed operation page, acquiring the first page address of the operation page and the second page address of the verification page;
    从预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址;Searching for the first page address and the second page address that have a corresponding relationship from the pre-stored operation page addresses and verification page addresses that have a corresponding relationship;
    在查找到具有对应关系的所述第一页面地址和所述第二页面地址的情况下,显示所述验证页面;In a case where the first page address and the second page address that have a corresponding relationship are found, display the verification page;
    在未查找到具有对应关系的所述第一页面地址和所述第二页面地址的情况下,对所述验证页面进行预设操作,其中,所述预设操作用于指示所述验证页面存在安全风险。In the case that the first page address and the second page address that have a corresponding relationship are not found, perform a preset operation on the verification page, where the preset operation is used to indicate that the verification page exists Security Risk.
  12. 根据权利要求11所述的方法,其中,获取所述操作页面的第一页面地址和所述验证页面的第二页面地址包括:The method according to claim 11, wherein acquiring the first page address of the operation page and the second page address of the verification page comprises:
    获取客户端上报的加密数据,其中,所述客户端用于显示所述操作页面和所述验证页面;Acquiring encrypted data reported by the client, where the client is used to display the operation page and the verification page;
    获取所述客户端对应的秘钥信息;Acquiring secret key information corresponding to the client;
    使用所述秘钥信息对所述加密数据进行解密,得到所述第一页面地址和所述第二页面地址。Use the secret key information to decrypt the encrypted data to obtain the first page address and the second page address.
  13. 根据权利要求11所述的方法,其中,在获取所述操作页面的第一页面地址和所述验证页面的第二页面地址之后,所述方法还包括:The method according to claim 11, wherein, after obtaining the first page address of the operation page and the second page address of the verification page, the method further comprises:
    对所述操作页面和所述验证页面进行安全性测试,得到所述操作页面和所述验证页面对应的目标风险信息,其中,所述目标风险信息用于指示在所述操作页面和所述验证页面上进行操作存在的风险;Perform a security test on the operation page and the verification page to obtain target risk information corresponding to the operation page and the verification page, where the target risk information is used to indicate that the operation page and the verification page The risks of operations on the page;
    向所述目标对象展示所述目标风险信息。The target risk information is displayed to the target object.
  14. 根据权利要求13所述的方法,其中,对所述操作页面和所述验证页面进行安全性测试,得到所述操作页面和所述验证页面对应的目标风险信息包括:The method according to claim 13, wherein performing a security test on the operation page and the verification page to obtain target risk information corresponding to the operation page and the verification page comprises:
    对所述操作页面进行安全性测试,得到第一风险信息,其中,所述第一风险信息用于指示在所述操作页面上进行操作存在的风险;Performing a security test on the operation page to obtain first risk information, where the first risk information is used to indicate the risks of performing operations on the operation page;
    对所述验证页面进行安全性测试,得到第二风险信息,其中,所述第二风险信息用于指示在所述验证页面上进行操作存在的风险;Performing a security test on the verification page to obtain second risk information, where the second risk information is used to indicate the risks of operations on the verification page;
    根据所述第一风险信息、所述第二风险信息和目标查找结果确定所述目标风险信息,其中,所述目标查找结果用于指示从预先存储的具有对应关系的操作页面地址和验证页面地址中查找具有对应关系的所述第一页面地址和所述第二页面地址的结果。The target risk information is determined according to the first risk information, the second risk information, and the target search result, wherein the target search result is used to indicate that the address of the corresponding operation page and the verification page are stored in advance. The result of searching for the first page address and the second page address that have a corresponding relationship in the.
  15. 一种操作的验证装置,包括:An operational verification device, including:
    第一获取模块,设置为获取目标时间段内目标对象在显示的验证页面上产生的第一数据和第二数据,其中,所述验证页面用于对所述目标对象在所述验证页面上执行的目标验证操作进行验证,所述目标时间段包括从显示所述验证页面到结束执行所述目标验证操作的时间,所述第一数据是所述目标对象在开始执行所述目标验证操作之前产生的浏览行为数据,所述第二数据是所述目标对象执行所述目标验证操作产生的验证行为数据;The first obtaining module is configured to obtain the first data and the second data generated by the target object on the displayed verification page during the target time period, wherein the verification page is used to perform the execution on the verification page for the target object The target verification operation is verified by the target verification operation, the target time period includes the time from the display of the verification page to the end of the execution of the target verification operation, and the first data is generated by the target object before the target verification operation starts to be executed Browsing behavior data of, where the second data is verification behavior data generated by the target object performing the target verification operation;
    第一验证模块,设置为根据所述第一数据对所述目标对象进行验证得到第一验证结果,并根据所述第二数据对所述目标验证操作进行验证得到第二验证结果;A first verification module, configured to verify the target object according to the first data to obtain a first verification result, and to verify the target verification operation according to the second data to obtain a second verification result;
    第一确定模块,设置为根据所述第一验证结果和所述第二验证结果确定所述目标验证操作对应的目标验证结果,其中,所述目标验证结果用于指示所述目标验证操作是否通过验证。The first determining module is configured to determine a target verification result corresponding to the target verification operation according to the first verification result and the second verification result, wherein the target verification result is used to indicate whether the target verification operation passes verify.
  16. 一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行上述权利要求1至14任一项中所述的方法。A storage medium including a stored program, wherein the method described in any one of claims 1 to 14 is executed when the program is running.
  17. 一种电子装置,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器通过所述计算机程序执行上述权利要求1至14任一项中所述的方法。An electronic device comprising a memory, a processor, and a computer program stored on the memory and capable of running on the processor, and the processor executes any one of claims 1 to 14 through the computer program The method described.
PCT/CN2020/112684 2020-06-12 2020-08-31 Operation verification method and apparatus WO2021248707A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010538272.2A CN111783063A (en) 2020-06-12 2020-06-12 Operation verification method and device
CN202010538272.2 2020-06-12

Publications (1)

Publication Number Publication Date
WO2021248707A1 true WO2021248707A1 (en) 2021-12-16

Family

ID=72757602

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/112684 WO2021248707A1 (en) 2020-06-12 2020-08-31 Operation verification method and apparatus

Country Status (2)

Country Link
CN (1) CN111783063A (en)
WO (1) WO2021248707A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114049508A (en) * 2022-01-12 2022-02-15 成都无糖信息技术有限公司 Fraud website identification method and system based on picture clustering and manual research and judgment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150137B (en) * 2022-06-23 2023-06-23 浪潮通用软件有限公司 Redis-based high-frequency access early warning method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107622072A (en) * 2016-07-15 2018-01-23 阿里巴巴集团控股有限公司 A kind of recognition methods and server, terminal for web page operation behavior
CN108491714A (en) * 2018-04-09 2018-09-04 众安信息技术服务有限公司 The man-machine recognition methods of identifying code
CN109241709A (en) * 2018-08-03 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on the verifying of sliding block identifying code
CN109271762A (en) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 User authen method and device based on sliding block identifying code
US20190377853A1 (en) * 2018-06-07 2019-12-12 T-Mobile Usa, Inc. User-behavior-based adaptive authentication
CN111163072A (en) * 2019-12-24 2020-05-15 五八有限公司 Method and device for determining characteristic value in machine learning model and electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348980A (en) * 2018-04-08 2019-10-18 阿里巴巴集团控股有限公司 System, the method and apparatus of safety check
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107622072A (en) * 2016-07-15 2018-01-23 阿里巴巴集团控股有限公司 A kind of recognition methods and server, terminal for web page operation behavior
CN108491714A (en) * 2018-04-09 2018-09-04 众安信息技术服务有限公司 The man-machine recognition methods of identifying code
US20190377853A1 (en) * 2018-06-07 2019-12-12 T-Mobile Usa, Inc. User-behavior-based adaptive authentication
CN109241709A (en) * 2018-08-03 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on the verifying of sliding block identifying code
CN109271762A (en) * 2018-08-03 2019-01-25 平安科技(深圳)有限公司 User authen method and device based on sliding block identifying code
CN111163072A (en) * 2019-12-24 2020-05-15 五八有限公司 Method and device for determining characteristic value in machine learning model and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114049508A (en) * 2022-01-12 2022-02-15 成都无糖信息技术有限公司 Fraud website identification method and system based on picture clustering and manual research and judgment

Also Published As

Publication number Publication date
CN111783063A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN111428231B (en) Safety processing method, device and equipment based on user behaviors
CN109525595B (en) Black product account identification method and equipment based on time flow characteristics
CN106992994B (en) Automatic monitoring method and system for cloud service
US10721245B2 (en) Method and device for automatically verifying security event
US11496495B2 (en) System and a method for detecting anomalous patterns in a network
CN111401416B (en) Abnormal website identification method and device and abnormal countermeasure identification method
CN101971591B (en) System and method of analyzing web addresses
US20170026390A1 (en) Identifying Malware Communications with DGA Generated Domains by Discriminative Learning
JP2012527691A (en) System and method for application level security
CN109922065B (en) Quick identification method for malicious website
CN107888606B (en) Domain name credit assessment method and system
WO2021248707A1 (en) Operation verification method and apparatus
CN104579773A (en) Domain name system analysis method and device
CN110929203B (en) Abnormal user identification method, device, equipment and storage medium
CN104202291A (en) Anti-phishing method based on multi-factor comprehensive assessment method
CN113704328B (en) User behavior big data mining method and system based on artificial intelligence
CN111371778B (en) Attack group identification method, device, computing equipment and medium
CN110162958B (en) Method, apparatus and recording medium for calculating comprehensive credit score of device
CN111526136A (en) Malicious attack detection method, system, device and medium based on cloud WAF
CN112532624B (en) Black chain detection method and device, electronic equipment and readable storage medium
Rahman et al. New biostatistics features for detecting web bot activity on web applications
Harbola et al. Improved intrusion detection in DDoS applying feature selection using rank & score of attributes in KDD-99 data set
WO2018047027A1 (en) A method for exploring traffic passive traces and grouping similar urls
CN112437034A (en) False terminal detection method and device, storage medium and electronic device
CN110519228B (en) Method and system for identifying malicious cloud robot in black-production scene

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20940447

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20940447

Country of ref document: EP

Kind code of ref document: A1