Man-machine identification method and system

A human-machine identification and user technology, applied in the computer field, can solve the problem of character recognition but cannot prevent computer programs, sound CAPTCHA attacks, machine learning algorithm attacks, etc., to prevent single point failures and internal attacks, improve security, and guarantee safe effect

Active Publication Date: 2014-09-10
ALIBABA GRP HLDG LTD
View PDF7 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Text CAPTCHA recognizes people and machines by distorting text or characters, which prevents malicious registration or login of computer programs to some extent, but with the development of character segmentation and Optical Character Recognition (OCR) technology, most The text CAPTCHA has been successfully cracked, and the simple character recognition problem can no longer stop the computer program, and the distorted text is also difficult to recognize, making the user experience very bad
[0010] Image CAPTCHA takes advantage of the differences between humans and machines in image classification, object recognition, and common understanding. It is usually independent of different languages ​​and does not require user text input. Although it is more difficult to crack than text CAPTCHA, these image CAPTCHAs require huge database support and cannot be large-scale. Scale generation, in addition, is vulnerable to machine learning algorithms, such as: Golle designed a SVM (Support Vector Machine, Support Vector Machine) classifier that combines color and texture features to classify cat and dog images, and obtain High correct rate of 82.7%, the success rate of cracking Asirra containing 12 pictures can reach 10.3%
[0011] Sound CAPTCHA uses the difference in speech recognition between humans and machines to distinguish between humans and machines, but sound CAPTCHAs are also vulnerable to machine learning algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-machine identification method and system
  • Man-machine identification method and system
  • Man-machine identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Embodiment one, a method of human-machine identification, such as figure 1 Shown, including:

[0074] S101. When receiving a registration request from a user, provide registration verification information that the user is required to dictate;

[0075] S102: Receive the user's voice data, establish a voiceprint feature model and save it;

[0076] S103. When receiving the user's login request, provide the login verification information that the user is required to dictate;

[0077] S104: Receive the user's voice data, establish a voiceprint feature model, and compare it with the voiceprint feature model when the user registers;

[0078] S105: Determine whether it is the user who logs in according to the comparison result.

[0079] This embodiment combines voiceprint recognition and human-machine recognition technology, which can improve the reliability and accuracy of recognition. Voiceprint recognition is a type of biometric technology. It is a technology that automatically recogn...

other Embodiment approach

[0122] In other embodiments, text-related (that is, the login verification information and the registration verification information are completely the same) or text-independent (that is, the login verification information and the registration verification information are completely different) may also be used for voiceprint recognition.

[0123] In an implementation manner of this embodiment, after receiving the user's registration request, it may further include:

[0124] Save the password entered by the user;

[0125] Before step S105, it may further include:

[0126] Receive the password entered by the user and compare it with the password entered when the user registered.

[0127] Step S105 may specifically include:

[0128] If the voiceprint feature model matches the voiceprint feature model and the password, it is determined that the user is logged in; otherwise, it is determined that the user is not logged in.

[0129] In this embodiment, the manual input of the password can ensur...

Embodiment 2

[0148] Embodiment two, a human-machine identification system, such as Figure 7 Shown, including:

[0149] Voiceprint feature model establishment module 21;

[0150] The voiceprint identity registration module 22 is used to provide registration verification information that requires the user to dictate when a user's registration request is received; to receive the user's voice data, instruct the voiceprint feature model establishment module 21 to establish a voiceprint feature model, and save The established voiceprint feature model;

[0151] The voiceprint identity verification module 23 is used to provide the user's dictated login verification information when receiving the user's login request; receive the user's voice data, instruct the voiceprint feature model establishment module 21 to establish a voiceprint feature model, and Compare the established voiceprint feature model with the voiceprint feature model when the user registered;

[0152] The human-machine recognition evalu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a man-machine identification method and system. The method comprises: when a registration request of a user is received, providing registration verification information which the user is requested to orally state; receiving voice data of the user, and establishing a voiceprint characteristic model for storage; when a login request of the user is received, providing login verification information which the user is requested to orally state; receiving voice data of the user, and establishing a voiceprint characteristic model, and comparing with the voiceprint characteristic model during registration of the user; and according to a comparison result, determining whether the user himself logs in. The man-machine identification method and system can improve declassification difficulties in man-machine identification.

Description

Technical field [0001] The invention relates to the field of computers, in particular to a method and system for human-machine identification. Background technique [0002] With the popularity of the Internet, various network services have increasingly become part of people's daily lives, such as e-commerce, free e-mail services, free resource downloads, and so on. However, these services for human users are often attacked by illegal users and abused by some malicious computer programs. They occupy service resources, generate a large amount of network junk, affect users' network experience, and pose a great threat to the security of network services. [0003] The human-machine identification system is a fully automated open-type human-machine distinguishing Turing test (Completely Automated Public Turing test to tell computers and humans apart, CAPTCHA), which uses security measures for question-and-answer authentication to distinguish between computers and humans. The operating m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/04G10L17/22H04L29/06
CPCG06F2221/2133H04L63/083G06F21/32H04L63/0861G06F3/167G06Q20/40145G10L15/00G10L15/063G10L15/26G10L17/22G10L25/48G10L25/51G10L25/69G10L2015/0631
Inventor 付颖芳张玉东
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products