User authentication method and device

A technology for user verification and user acceptance, applied in the field of user verification and devices

Inactive Publication Date: 2017-07-04
ALIBABA GRP HLDG LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method is much safer than the picture text verification code in terms of security, and the operation is also very convenient, but with the development of computer technology, the machine's ability to recognize pictures is getting stronger and stronger, and it may be possible to simply identify a single picture. will be easily cracked by machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present application provides a user verification method, which is generally applied in the environment of user verification. Due to the complexity of today's network environment, there may be many machine behaviors in the complex network environment. In order to prevent the impact of machine behavior on the network environment, verification methods are generally set to avoid machine behavior, and this verification method generally allows natural persons to simply and easily pass. Therefore, the method provided in the embodiment of the present application takes the essential difference between a natural person and a machine as the identification object. A natural person can perform thinking activities on the identified things on the basis of recognition, and judge a certain thing based on the thinking activities, while a machine It can perform recognition actions, but it cannot perform thinking activities. Therefore, the machine's cognition of things is limited to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method and device. The method comprises the following steps of: providing a video, audio or audio / video with emotional characteristics through a user interface; receiving feedback operation information, aiming at the video, audio or audio / video, of a user, wherein the feedback operation information represents operation information, for a discrimination result of the emotional characteristics in the video, audio or audio / video, of the user; judging whether the discrimination result represented by the feedback operation information is correct or not; and if the judging result is positive, indicating that the authentication passes. According to the method, the emotional characteristics which can be perceived and deduced by natural persons are used as basic differences for discriminating the natural persons and machines. The authentication in the method represents analysis and deduction for emotions displayed in the video, audio or audio / video, so that the real users can carry out thought analysis according to the displayed emotional characteristics so as to discriminate the correct options, and the machines cannot correctly discriminate the correct options. The authentication method is capable of ensuring the correctness and effectiveness of the authentication process.

Description

technical field [0001] The present application relates to the technical field of user verification of electronic equipment, in particular to a user verification method and device. Background technique [0002] The development of the network brings great convenience to network users on the one hand, but also has certain disadvantages on the other hand. For example, common scenarios such as voting, downloading, and posting and commenting on websites need to prevent spam data generated by a large number of machine behaviors. Certain means of man-machine identification are used to distinguish between human behavior and machine behavior, such as the use of verification codes to prevent cheaters from maliciously cracking passwords, swiping tickets, flooding forums, and other illegal activities through machine behavior. [0003] In the prior art, generally adopt such as Picture 1-1 and Figure 1-2 The method shown is a verification code technology based on pictures and texts. S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 储刚苏鹏
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products