Request behavior characteristic based user identification method, apparatus, equipment and system

A user identification and user identification code technology, applied in the electronic field, can solve problems such as easy cracking of CAPTCHA

Inactive Publication Date: 2017-03-01
ALIBABA GRP HLDG LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Based on the above-mentioned defects that CAPTCHA is easy to be cracked, in real life, there are still many DDOS attacks launched by hackers to enterprises, and crawlers are used to crawl a large amount of valuable data in enterprises. Therefore, a method is needed to identify the Whether a person is requesting or a malicious program is requesting the method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request behavior characteristic based user identification method, apparatus, equipment and system
  • Request behavior characteristic based user identification method, apparatus, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0145] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0146] This application provides a user identification method based on request behavior characteristics, a user identification device based on request behavior characteristics, a user identification terminal device based on request behavior characteristics, and a user identification system based on request behavior characteristics, as follows Embodiments of the present application will be described in detail in conjunction with the accompanying drawings.

[0147] Please refer to figure 1 , which is a flowchart of an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a request behavior characteristic based user identification method, comprising the following steps: firstly, receiving a request message sent from a user terminal; then, decoding and analyzing the request message to obtain a user identification code; according to the user identification code, checking the historical request record of the user; according to the historical request record, calculating the eigenvalues of the user's request behavior wherein the request behavior includes the request frequency characteristics and/or the corresponding relationship characteristic; and finally, determining whether the eigenvalues of the request behavior are larger than a threshold value of the eigenvalues and based on the determination result, identifying whether the user is a normal user or a non-normal user. Compared with the CAPTCHA technology that is applied to the user's front end, the method of the invention is applied to the back end of a server and is based on the request frequency characteristic of a user and the corresponding relationship characteristic for analysis and statistics. Through the determination whether the user's request behavior eigenvalues exceed a threshold value or not, it is possible to identify illegal users and malicious computer software. With a high success rate of identification, the method and system of the invention cannot be hacked easily.

Description

technical field [0001] This application relates to the field of electronic technology, specifically a user identification method based on request behavior characteristics, a user identification device based on request behavior characteristics, a user identification terminal device based on request behavior characteristics, and a request behavior-based Characteristic user identification system. Background technique [0002] With the popularity of the Internet, various network services have increasingly become a part of people's daily life, such as e-commerce, free e-mail services, free resource downloads, and so on. However, these services for human users are often attacked by illegal users and abused by some malicious computer programs (malicious computer programs use one computer with multiple accounts, or one account with multiple computers) to occupy service resources, generate a large amount of network garbage, and affect legitimate users. The network experience poses a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 付颖芳
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products