Network authentication method and system based on behavior mode

A verification method and verification system technology, which are applied in the field of behavior-based network verification methods and systems, can solve problems such as security reduction, and achieve the effect of good experience.

Inactive Publication Date: 2012-11-28
WUHAN JIYI NETWORK TECH CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security of using traditional verification codes is also reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method and system based on behavior mode
  • Network authentication method and system based on behavior mode
  • Network authentication method and system based on behavior mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0036] Such as figure 2 As shown, the behavior-based network verification system includes: a trigger device 101 , a collection device 102 , and a feedback device 103 provided at the client end 100 , and a creation device 201 and a judgment device 202 provided at the server end 200 .

[0037] The signal input end of the triggering device 101 is connected to the signal receiving end of the creation device 201, the signal output end of the creation device 201 is connected to the signal input end of the acquisition device 102, and the signal output end of the acquisition device 102 is connected to the signal input end of the discrimination device 202, The signal output end of the judging device 202 is connected to the signal input end of the feedback device 103 , and the judging device 202 is connected to the creating device 201 .

[0038] Such a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network authentication method and a network authentication system based on a behavior mode. The network authentication method comprises the following steps of: triggering a behavior authentication request, establishing a behavior sandbox according to the behavior authentication request, displaying the behavior sandbox to a user, and acquiring behavior information of the user; judging whether the behavior information of the user corresponds to a behavior required in the behavior sandbox; if so, allowing to pass authentication, otherwise refusing to pass the authentication. The behavior which can be identified and made by human thinking serves as the basis for judging whether the authentication is passed, and compared with the existing security code mode in a character form, the method has the advantages that the passing defects are easily identified by computer software, and the human user is uniquely determined.

Description

technical field [0001] The invention relates to network security verification, in particular to a behavior-based network verification method and system. Background technique [0002] With the development of the Internet, the security of the Internet has become a problem that people cannot ignore. In order to prevent software such as irrigation machines from maliciously registering and logging in to websites, verification systems have been widely used in various websites to distinguish "human users" from "computer programs", thereby preventing "computer programs" from Pretending to be a "human user" to perform actions that affect network security. [0003] At present, the commonly used network verification system is "captcha" or CAPTCHA[2], which is the abbreviation of "Completely Automated Public Turing test to tell Computers and Humans Apart", which is a kind of A public fully automatic program that differentiates users as computers and humans. [0004] Captcha is also a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吴渊
Owner WUHAN JIYI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products