Unlock instant, AI-driven research and patent intelligence for your innovation.

User identification method, system, device and processing method, device

A user identification and user technology, applied in the field of communication, can solve problems such as poor user experience, and achieve the effect of improving technical effects

Active Publication Date: 2019-10-08
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The embodiment of the present application provides a user identification method, system, device, and processing method and device to at least solve the technical problem of poor user experience caused by the CAPTCHA mechanism requiring additional verification code input operations on the basis of normal network operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method, system, device and processing method, device
  • User identification method, system, device and processing method, device
  • User identification method, system, device and processing method, device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] According to the embodiments of the present application, an embodiment of a method for user identification is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.

[0051] The method embodiment provided in Embodiment 1 of the present application can be executed in a mobile terminal, a computer terminal or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of a user identification method in an embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include, but is...

Embodiment 2

[0114] According to the embodiment of the present application, a user identification system is also provided, Figure 5 Is a schematic diagram of a user identification system according to an embodiment of the present application Figure one ,Such as Figure 5 As shown, the system includes: a network resource service component 52 and a human-machine identification component 54;

[0115] The network resource service component 52 is used to receive the user's access request for the browser, and send the access request to the human-machine identification component 54;

[0116] In an optional embodiment of the present application, the aforementioned network resource service component includes but is not limited to at least one of the following: member registration server, mail server, transaction server, content management server, real-time communication server, payment server, forum server.

[0117] In the embodiment of this application, taking the user posting a new post on the forum as ...

Embodiment 3

[0137] According to an embodiment of the present application, a device for implementing the user identification method in Embodiment 1 is also provided, Picture 8 It is the structural frame of the user identification device of the embodiment of the application Figure one ,Such as Picture 8 As shown, the device includes:

[0138] The receiving module 82 is used to receive a browser access request from a user;

[0139] In the embodiment of this application, taking the forum for publishing a new post as an example, the visit request contains the page information filled in by the user, such as the forum post title and the content of the post filled in by the user, and may also include browser information. The browser information includes operation behavior information on the browser, for example, mouse and keyboard operation information performed by the user when filling in the post title or the post content. The operation information may refer to the number of operations, but is not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identification method, a user identification system, a user identification device, a user identification processing method, and a user identification processing device. The user identification method comprises the following steps: receiving an access request for a browser from a user; parsing the access request to get a parsing result; when there is no browser information used to reflect the browser behavior in the parsing result, judging the user to be a robot, wherein the browser behavior includes a browser operation behavior; and when there is browser information used to reflect the browser behavior in the parsing result, judging the user to be a robot or a natural person according to default rules. The technical problem that the user experience is poor as the CAPTCHA mechanism needs additional verification code input operation on the basis of normal network operation is solved.

Description

Technical field [0001] This application relates to the field of communications, and specifically to a user identification method, system, device, and processing method and device. Background technique [0002] With the rapid development of the Internet, Internet products such as online communities, search, social networking sites, online banks, wikis, e-commerce, and online games have begun to emerge and penetrate people's daily lives. But the users of these Internet products are not only humans, but also Internet bots. Internet bots usually refer to programs that perform automated tasks through the Internet. These bots can be used for normal purposes such as search engine crawlers, and can also be used for malicious purposes such as spam registration, malicious online transaction ordering, and publishing of flooding advertising information. [0003] In related technologies, the human-machine recognition verification system is defined as a fully automated Turing test (Completely A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 彭高建
Owner ALIBABA GRP HLDG LTD