Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Open knowledge bases method and equipment for user authentication

A user equipment and user verification technology, applied in the information field, can solve problems such as poor anti-automatic machine identification mechanism and verification code cracking, and achieve the effects of avoiding machine brute force cracking, alleviating cost pressure, and high security

Inactive Publication Date: 2011-01-05
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the above-mentioned verification methods can prevent the malicious behavior of automatic machines to a certain extent, the verification codes containing only letters, numbers and their combinations are easily cracked by automatic machines, and with the development of image recognition technology, text-based verification codes The accuracy and efficiency of image recognition are also increasing day by day, resulting in the effect of the anti-automaton recognition mechanism getting worse and worse, and verifying the questions in the picture is generally very simple, and the automaton is still easy to grab the answer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Open knowledge bases method and equipment for user authentication
  • Open knowledge bases method and equipment for user authentication
  • Open knowledge bases method and equipment for user authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0025] figure 1 A topological diagram of a system for user authentication based on an open knowledge base is shown according to one aspect of the present invention, which includes a network device 1 and multiple user devices 2 . Among them, the network device 1 can be connected to multiple user devices 2 via the network, the network device 1 selects a question from the open knowledge base 101, and performs user verification according to the user response corresponding to the question sent by the user from the user device 2 . Here, the network includes but is not limited to Internet, wide area network, metropolitan area network, local area network, VPN network, wireless self-organizing network (Ad Hoc network); User equipment 2 includes wired user equipment 21 and wireless user equipment 22, wherein, wired user equipment 21 is directly connected to the netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide open knowledge bases method and equipment for user authentication. The method comprises the following steps of: selecting a problem from the open knowledge base by the network equipment; sending the problem and an answer input frame thereof to the UE (User Equipment) of a user; acquiring a user response to the problem, wherein the user response is input in the answer input frame by the user; and matching and comparing the user response with the answer to the problem so as to acquire a matching result; and feeding back information related to the matching result to the UE. Compared with the prior art, by selecting the user authentication problem from the open knowledge base, the invention effectively avoids brutal computer cracking and relieves the cost pressure of an authentication service provider for maintaining a great amount of data so as to realize a user authentication technology with high security and high reliability in an effective cost mode.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a technology for user verification based on an open knowledge base. Background technique [0002] In the prior art, in order to prevent malicious registration and malicious replies by the automatic registration machine and the automatic reply machine, the service provider often requires the user to perform verification when registering or logging in. Commonly used verification methods are: 1) Display a verification picture on the client, and the verification picture contains letters, numbers or combinations thereof, and these contents in the verification picture are verification codes; 2) The verification picture displays text, and the verification picture Add interference on the image, such as distorted text, different fonts, etc., these texts are the verification code; 3) The verification picture shows a question composed of text, and the answer to the question is the veri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F17/30
Inventor 黄方荣佘晓歌
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products