User identification method, user identification system, user identification device, user identification processing method, and user identification processing device

A user identification and user technology, applied in the communication field, can solve problems such as poor user experience, and achieve the effect of improving technical effects

Active Publication Date: 2017-03-08
ALIBABA GRP HLDG LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a user identification method, system, device, and processing method and device to at least solve the technical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method, user identification system, user identification device, user identification processing method, and user identification processing device
  • User identification method, user identification system, user identification device, user identification processing method, and user identification processing device
  • User identification method, user identification system, user identification device, user identification processing method, and user identification processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] According to an embodiment of the present invention, an embodiment of a method for user identification is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0049] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of a user identification method in an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the process...

Embodiment 2

[0112] According to an embodiment of the present invention, a user identification system is also provided, Figure 5 is a schematic diagram of a user identification system according to an embodiment of the present invention Figure 1 ,Such as Figure 5 As shown, the system includes: a network resource service component 52, a human-machine identification component 54;

[0113] The network resource service component 52 is used to receive the user's access request for the browser, and send the access request to the machine identification component 54;

[0114] In an optional embodiment of the present invention, the above-mentioned network resource service component includes but is not limited to at least one of the following: member registration server, mail server, transaction server, content management server, real-time communication server, payment server, and forum server.

[0115]In the embodiment of the present invention, taking a user posting a new post in a forum as an ...

Embodiment 3

[0135] According to an embodiment of the present invention, a device for implementing the user identification method in Embodiment 1 is also provided, Figure 8 is the structural frame of the user identification device of the embodiment of the present invention Figure 1 ,Such as Figure 8 As shown, the device includes:

[0136] A receiving module 82, configured to receive an access request from a user for a browser;

[0137] In the embodiment of the present invention, taking a forum to publish a new post as an example, the access request includes a form of page information filled in by the user, such as the title of the forum post filled in by the user, the content of the post, etc., and may also include browser information. Browser information includes browser operation behavior information, such as mouse and keyboard operation information performed by users when filling in post titles or post content. The operation information may refer to the number of operations, but is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identification method, a user identification system, a user identification device, a user identification processing method, and a user identification processing device. The user identification method comprises the following steps: receiving an access request for a browser from a user; parsing the access request to get a parsing result; when there is no browser information used to reflect the browser behavior in the parsing result, judging the user to be a robot, wherein the browser behavior includes a browser operation behavior; and when there is browser information used to reflect the browser behavior in the parsing result, judging the user to be a robot or a natural person according to default rules. The technical problem that the user experience is poor as the CAPTCHA mechanism needs additional verification code input operation on the basis of normal network operation is solved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a user identification method, system, device, and processing method and device. Background technique [0002] With the rapid development of the Internet, Internet products such as online communities, search, social networking sites, online banks, wikis, e-commerce, and online games have emerged and penetrated into people's daily lives. But the users of these Internet products are not only human beings, but also Internet bots. Internet robots usually refer to programs that perform automated tasks through the Internet. These robots can be used for normal purposes such as search engine crawlers, or for malicious purposes such as spam registration, placing orders for malicious online transactions, and publishing spamming advertising information. [0003] In related technologies, the human-computer identification verification system is defined as a fully automated Turing test (Comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 彭高建
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products