Turing test method and system based on user business behavior analysis

A technology of Turing test and behavior analysis, applied in the field of Turing test, can solve problems such as increasing the difficulty of human recognition, deteriorating user interaction experience, and interrupting the experience process

Active Publication Date: 2017-09-29
新方正控股发展有限责任公司 +1
4 Cites 4 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] However, with the continuous improvement of computer identification technology, the anti-interference ability of computer identification is also increasing day by day, and the correct identification rate of the computer is also increasing day by day under the condition of interference, so the attacker may simulate a large number of user operations through the computer to try to pass the Turing test, and then achieve the purpose of attack. Therefore, the Turing...
View more

Method used

As shown in Figure 3, be used for carrying out background Turing test based on user business behavior analysis tracking and adopt the Turing test mode in the auxiliary related technology of arbitration mechanism to improve the reliability of Turing test and background silent Turing test promotion user Experience, including the following aspects:
Implicit Turing test: track the change of the user business behavior model by constantly adding user business behavior and user behavior data, if the user business behavior model has a sudden change or the user behavior data has a large variance (the user behavior data is not in the predetermined Assuming that the user behavior data is within the range) or the user’s business behavior matches the determined computer-generated risk behavior (the user’s business behavior matches the preset risk behavior), then it can be determined that the operating subject at this time is not the user. Therefore, this graph The Turing test does not rely on the displayed mode of making a test request to the user to determine the answer, and will not interrupt the user's process experience, which can greatly improve the user experience; at the same time, this kind of user business behavior and user behavior data can be compared with the Turing test. Extended to the time axis, thereby improving the reliability of the Turing test.
In above-mentioned technical scheme, on the one hand introduce new Turing test variable (user's business behavior and user behavior data corresponding with user's business behavior), pass new Turing's test variable on the basis of not increasing user identification difficulty The introduction of the Turing test increases the difficulty of computer recognition and increases the reliability of the test results. On the other hand, the new variables introduced can perform statistical calculations through the background mode without user interaction, so as to ensure the user experience to the greatest extent and realize continuous test tracking in the time dimension.
In this technical solution, by analyzing the collected user business behavior and the user behavior data corresponding to the user business behavior, it is judged whether the operator who performs the Turing test is a user, thus, by performing the Turing test in the background The Turing test avoids the method of user participation in related technologies to determine whether the operating subject is a user, thereby preventing the user experience process from being interrupted by problems, thereby improving user experience. At the same time, this kind of user business behavior and user The analysis of behavioral data can extend the Turing test to the time axis, thereby improving the reliability of the Turing test, so as to improve the security protection capabilities and risk control capabilities in response to computer simulated user operations to deceive and attack, for example, in the historical user business Analyze current user business behavior and current user behavior data on the basis of user behavior and historical user behavior data, where historical user business behavior and historical user behavior data are user business behavior and user behavior data before current user business behavior, Of course, a solution for analyzing user business behavior and user behavior data can also be added to the solution of the Turing test in the related art, thereby effectively improving the reliability of the Turing test without increasing the difficulty of user identification.
In this technical solution, by analyzing the user business behavior collected and the user behavior data corresponding to the user business behavior, it is judged whether the operating subject who carries out the Turing test is a user, thus, by performing in the background The Turing test avoids the method of user participation in related technologies to determine whether the operating subject is a user, thereby preventing the user experience process from being interrupted by problems, thereby improving user experience. At the same time, this kind of user business behavior and user The analysis of behavioral data can extend the Turing test to the time axis, thereby improving the reliability of the Turing test, so as to improve the security protection capabilities and risk control capabilities in response to computer simulated user operations to deceive and attack, for example, in the historical user business Analyze current user business behavior and current user behavior data on the basis of user behavior and historical user behavior data, where historical user business behavior and historical user behavior data are user business behavior and user behavior data before current user business behavior, Of course, a solution for analyzing user business behavior and user behavior data can also be added to the solution of the Turing test in the related art, thereby effectively improving the reliability of the Turing test without increasing the difficulty of user i...
View more

Abstract

The invention provides a turing test method based on user business behavior analysis and a turing test system based on user business behavior analysis. The method includes the steps that user business behaviors and user behavior data corresponding to the user business behaviors are collected; the user business behaviors and the user behavior data are analyzed; according to the analysis result, whether an main operator of a turing test is a user or not is determined. According to the technical scheme, the turing test is conducted in the background so as to determine whether the main operator of the turing test is the user or not, a user participation means is avoided to use for determining whether the main operator of the turing test is the user or not, the experience process of the user is prevented from being interrupted by questions, the user experience is thus improved, at the same time, the reliability of the turing test is ensured, and the safety protection capability and the risk control capability for copying with cheating and attacking conducted by situation that computer simulated user operation are improved.

Application Domain

Digital data authentication

Technology Topic

Risk ControlBehavioral analytics +4

Image

  • Turing test method and system based on user business behavior analysis
  • Turing test method and system based on user business behavior analysis
  • Turing test method and system based on user business behavior analysis

Examples

  • Experimental program(1)

Example Embodiment

[0029] In order to have a clearer understanding of the above objectives, features and advantages of the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and specific implementations. It should be noted that the embodiments of the application and the features in the embodiments can be combined with each other if there is no conflict.
[0030] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited to the specific details disclosed below. Limitations of the embodiment.
[0031] figure 1 It shows a schematic flow chart of a Turing test method based on user business behavior analysis according to an embodiment of the present invention.
[0032] Such as figure 1 As shown, the Turing test method based on user business behavior analysis according to an embodiment of the present invention includes:
[0033] Step 102: Collect user business behaviors and user behavior data corresponding to the user business behaviors;
[0034] Step 104: Analyze the user business behavior and the user behavior data;
[0035] Step 106: Determine whether the operating subject of the Turing test is the user according to the analysis result.
[0036] In this technical solution, the collected user business behaviors and user behavior data corresponding to the user business behaviors are analyzed to determine whether the operating subject of the Turing test is the user. Therefore, the Turing test is performed in the background. It avoids determining whether the operating subject is the user through user participation in related technologies, thereby avoiding the user's experience process being interrupted by problems, thereby improving the user experience. At the same time, this kind of user business behavior and user behavior data The analysis can extend the Turing test to the time axis, thereby improving the reliability of the Turing test to improve the security protection capabilities and risk control capabilities for computer simulation user operations to deceive and attack, for example, in historical user business behavior and history Based on user behavior data, the current user business behavior and current user behavior data are analyzed. Among them, the historical user business behavior and historical user behavior data are the user business behavior and user behavior data before the current user business behavior is performed. Of course, also A solution for analyzing user business behaviors and user behavior data can be added to the Turing test solution in the related technology, thereby effectively improving the reliability of the Turing test without increasing the difficulty of user identification.
[0037] In the above technical solution, preferably, step 106 specifically includes: establishing a user business behavior model according to the analysis result; judging whether the user business behavior model has a sudden change, and when the judgment result is no, determining that the operation subject is The user.
[0038] In this technical solution, by judging whether there is a sudden change in the user's business behavior model, the Turing test is performed in the background to determine whether the subject of the Turing test is the user, and the user participation method is avoided to determine whether the operating subject is the user. The user experience process is interrupted by the problem, which improves the user experience to the greatest extent and enables continuous test tracking in the time dimension.
[0039] In the above technical solution, preferably, step 106 specifically includes: judging whether the user behavior data is within the preset user behavior data range according to the analysis result; when the judgment result is yes, determining that the operation subject is 述Users.
[0040] In this technical solution, by judging whether the user behavior data is within the preset user behavior data range, a Turing test is performed in the background to determine whether the operating subject is the user, avoiding the user participation to determine whether the operating subject is the user , Thus avoiding the interruption of the user experience process by the problem, thereby maximizing the user experience and realizing continuous test tracking in the time dimension. At the same time, it also further improves the reliability of the Turing test to improve the response to computer simulation The security protection ability and risk control ability of user operations to deceive and attack. For example, when the operation subject is the user, the user will have a mouse track when accessing the webpage, and when the operation subject is a computer, the computer will not have a mouse when accessing the webpage Track, even if the computer can imitate the user to generate the mouse track, the characteristics of the mouse track generated by the computer are different from the characteristics of the mouse track generated by the user. Therefore, the user behavior data of the mouse track can be analyzed to determine whether the operating subject is the user .
[0041] In the above technical solution, preferably, step 106 specifically includes: judging whether the user's business behavior matches a preset risk behavior according to the analysis result, wherein the preset risk behavior includes when a computer executes the user's business behavior The generated risk behavior; when the judgment result is no, the operation subject is determined to be the user.
[0042] In this technical solution, the Turing test is performed in the background to determine whether the operating subject is the user by judging whether the user's business behavior matches the preset risk behavior, avoiding the user participation to determine whether the operating subject is the user, thereby avoiding The user experience process is interrupted by the problem, which improves the user experience to the greatest extent and can achieve continuous test tracking in the time dimension. At the same time, it further improves the reliability and accuracy of the Turing test to improve the response to computer simulation users Operational deception and attack security protection capabilities and risk control capabilities. For example, in online shopping, users usually have a certain time delay between selecting goods, placing an order and confirming payment, especially before confirming payment, but if it is When using a computer for online shopping, there will be no time delay between the steps of online shopping, or the time delay has a certain regularity. Therefore, it can be judged whether the user’s business behavior of online shopping matches the preset risk behavior of online shopping without delay. To determine whether the operation subject is a user.
[0043] In the above technical solution, preferably, it further includes: when it is determined that the user business behavior model has no mutation, or the user behavior data is not within the preset user behavior data range, or the user business behavior is When the preset risk behavior does not match, it is determined whether the user's business behavior matches the preset potential risk behavior, and when the judgment result is yes, verification information is sent to the operating subject, wherein the preset potential risk Behavior is the risk behavior generated when the user performs the user business behavior; when the operator’s feedback on the verification information is received, the weighted score of the user’s business behavior is determined according to the feedback to determine the Whether the operation subject is the user.
[0044] In this technical solution, if the user behavior matches the preset potential risk behavior, the user behavior may be risky, and verification information is sent to the operator to determine whether the operator is a user, that is, the Turing test in related technologies On the basis of the solution, the user behavior is analyzed to ensure the accuracy and reliability of the Turing test, so as to improve the security protection ability and risk control ability against computer simulation user operations to deceive and attack. For example, the user is confirming payment There will be a certain delay before, and the computer does not delay before confirming the payment, there may be potential risks. Therefore, if there is no delay before confirming the payment, you can send verification information, such as a verification code, to the operator. The received feedback from the user on the verification information performs a weighted score on the user's business behavior. If the weighted score is within the preset weighted score range, the operating subject is determined to be the user; otherwise, the operating subject is determined to be the computer.
[0045] figure 2 It shows a schematic structural diagram of a Turing test system based on user business behavior analysis according to an embodiment of the present invention.
[0046] Such as figure 2 As shown, a Turing test system 200 based on user business behavior analysis according to an embodiment of the present invention includes: a collection unit 202, configured to collect user business behaviors and user behavior data corresponding to the user business behaviors; an analysis unit 204, configured to analyze the user service behavior and the user behavior data; the determining unit 206, configured to determine whether the operating subject of the Turing test is the user according to the analysis result.
[0047] In this technical solution, the collected user business behaviors and user behavior data corresponding to the user business behaviors are analyzed to determine whether the operating subject of the Turing test is the user. Therefore, the Turing test is performed in the background. It avoids determining whether the operating subject is the user through user participation in related technologies, thereby avoiding the user's experience process being interrupted by problems, thereby improving the user experience. At the same time, this kind of user business behavior and user behavior data The analysis can extend the Turing test to the time axis, thereby improving the reliability of the Turing test to improve the security protection capabilities and risk control capabilities for computer simulation user operations to deceive and attack, for example, in historical user business behavior and history Based on user behavior data, the current user business behavior and current user behavior data are analyzed. Among them, the historical user business behavior and historical user behavior data are the user business behavior and user behavior data before the current user business behavior is performed. Of course, also A solution for analyzing user business behaviors and user behavior data can be added to the Turing test solution in the related technology, thereby effectively improving the reliability of the Turing test without increasing the difficulty of user identification.
[0048] In the above technical solution, preferably, the determining unit 206 specifically includes: a establishing unit 2062, configured to establish a user business behavior model according to the analysis result; and a first determining unit 2064, configured to determine whether the user business behavior model is When a sudden change occurs, the determining unit 206 is specifically configured to: and when the judgment result is no, determine that the operation subject is the user.
[0049] In this technical solution, by judging whether there is a sudden change in the user's business behavior model, the Turing test is performed in the background to determine whether the subject of the Turing test is the user, and the user participation method is avoided to determine whether the operating subject is the user. The user experience process is interrupted by the problem, which improves the user experience to the greatest extent and enables continuous test tracking in the time dimension.
[0050] In the above technical solution, preferably, the determining unit 206 further includes: a second determining unit 2066, configured to determine whether the user behavior data is within a preset user behavior data range according to the analysis result; the determining The unit 206 is specifically configured to determine that the operation subject is the user when the judgment result is yes.
[0051] In this technical solution, by judging whether the user behavior data is within the preset user behavior data range, a Turing test is performed in the background to determine whether the operating subject is the user, avoiding the user participation to determine whether the operating subject is the user , Thus avoiding the interruption of the user experience process by the problem, thereby maximizing the user experience and realizing continuous test tracking in the time dimension. At the same time, it also further improves the reliability of the Turing test to improve the response to computer simulation The security protection ability and risk control ability of user operations to deceive and attack. For example, when the operation subject is the user, the user will have a mouse track when accessing the webpage, and when the operation subject is a computer, the computer will not have a mouse when accessing the webpage Track, even if the computer can imitate the user to generate the mouse track, the characteristics of the mouse track generated by the computer are different from the characteristics of the mouse track generated by the user. Therefore, the user behavior data of the mouse track can be analyzed to determine whether the operating subject is the user .
[0052] In the above technical solution, preferably, the determining unit 206 further includes: a third determining unit 2068, configured to determine whether the user business behavior matches a preset risk behavior according to the analysis result, wherein the preset risk behavior The risk behavior includes the risk behavior generated when the computer executes the user's business behavior; the determining unit 206 is specifically configured to: when the judgment result is no, determine that the operating subject is the user.
[0053] In this technical solution, the Turing test is performed in the background to determine whether the operating subject is the user by judging whether the user's business behavior matches the preset risk behavior, avoiding the user participation to determine whether the operating subject is the user, thereby avoiding The user experience process is interrupted by the problem, which improves the user experience to the greatest extent and can achieve continuous test tracking in the time dimension. At the same time, it further improves the reliability and accuracy of the Turing test to improve the response to computer simulation users Operational deception and attack security protection capabilities and risk control capabilities. For example, in online shopping, users usually have a certain time delay between selecting goods, placing an order and confirming payment, especially before confirming payment, but if it is When using a computer for online shopping, there will be no time delay between the steps of online shopping, or the time delay has a certain regularity. Therefore, it can be judged whether the user’s business behavior of online shopping matches the preset risk behavior of online shopping without delay. To determine whether the operation subject is a user.
[0054] In the above technical solution, preferably, it further includes: a fourth judging unit 208, configured to determine that the user's business behavior model has no mutation or the user behavior data is not within the preset user behavior data range , Or when the user's business behavior does not match the preset risk behavior, it is determined whether the user's business behavior matches the preset potential risk behavior, and the sending unit 210 is configured to, and when the judgment result is yes, send the The operation subject sends verification information, where the preset potential risk behavior is a risk behavior generated when the user performs the user's business behavior; the determining unit 206 is specifically configured to: when the operation subject pair is received During the feedback of the verification information, a weighted score of the user's business behavior is determined according to the feedback to determine whether the operation subject is the user.
[0055] In this technical solution, if the user behavior matches the preset potential risk behavior, the user behavior may be risky, and verification information is sent to the operator to determine whether the operator is a user, that is, the Turing test in related technologies On the basis of the solution, the user behavior is analyzed to ensure the accuracy and reliability of the Turing test, so as to improve the security protection ability and risk control ability against computer simulation user operations to deceive and attack. For example, the user is confirming payment There will be a certain delay before, and the computer does not delay before confirming the payment, there may be potential risks. Therefore, if there is no delay before confirming the payment, you can send verification information, such as a verification code, to the operator. The received feedback from the user on the verification information performs a weighted score on the user's business behavior. If the weighted score is within the preset weighted score range, the operating subject is determined to be the user; otherwise, the operating subject is determined to be the computer.
[0056] image 3 It shows a schematic diagram of the principle of a Turing test system based on user business behavior analysis according to an embodiment of the present invention.
[0057] Such as image 3 As shown, it is used to perform background Turing test based on user business behavior analysis and tracking, and use arbitration mechanism to assist Turing test in related technologies to improve the reliability of Turing test and background silent Turing test to improve user experience, including the following Aspects:
[0058] User behavior collection: Collect user behavior and user behavior data corresponding to user behavior through the user behavior tracking mechanism, such as a series of user behavior data such as user browsing, clicking, and mouse tracking. In addition, through ETL (Extract-Transform- Load, extraction, conversion, loading, used to describe the process of extracting, converting, and loading data from the source to the destination) The mechanism collects, cleans, and converts the user business behavior and the user behavior data corresponding to the user business behavior to the user Business behavior library.
[0059] User behavior analysis: analyze user business behavior and user behavior data through the behavior analysis engine, for example, analyze the user’s operating habits and user historical browsing information, and establish a user’s business behavior model, because when analyzing the above data, you can The time axis traces user business behaviors and user behavior data, so as to determine the operation subject of Turing test to a certain extent through user business behaviors and user behavior data. In addition, through clustering analysis of user business behaviors and user behavior data, Collaborative analysis can find some risk operations that deviate from user habits (the risk operations that deviate from user habits match the preset potential risk behaviors).
[0060] Implicit Turing test: Track changes in user business behavior models through continuously added user business behavior and user behavior data. If the user business behavior model changes or there is a large variance in user behavior data (user behavior data is not in the preset user behavior Within the scope of the data) or if the user’s business behavior matches the determined computer-generated risk behavior (the user’s business behavior matches the preset risk behavior), then it can be determined that the operating subject at this time is not the user. Therefore, this Turing test does not It does not rely on the displayed mode to determine the answer to the user’s test request, and will not interrupt the user’s process experience, thereby greatly improving the user experience; at the same time, this user business behavior and user behavior data can extend the Turing test to time Shaft, thereby improving the reliability of the Turing test.
[0061] Risk arbitration: If there is no sudden change in the user's business behavior model, the user behavior data does not show large variance, or the user's business behavior does not match the determined computer-generated risk behavior, if the user's business behavior is determined to be the preset potential risk behavior (operation sample) If it matches, the verification information is sent to the operator (the Turing test is displayed to allow the operator to give feedback on the verification information), and based on the operator's feedback on the verification information, the user service that matches the preset potential risk behavior is calculated The weighted score of the behavior. If the weighted score exceeds a certain range, the operator is determined to be the user and the result of the Turing test is displayed. Therefore, in the above technical solution, risk arbitration implements a multi-dimensional user Turing test, which is related to Compared with the Turing test in technology, the technical solution of the present invention provides more critical basis to further improve the reliability of the test result.
[0062] In the above technical solution, on the one hand, new Turing test variables (user business behaviors and user behavior data corresponding to user business behaviors) are introduced, and new Turing test variables are introduced without increasing the difficulty of user identification. The computer recognition difficulty of Turing test increases the reliability of test results. On the other hand, the new variables introduced can be statistically calculated through the background mode without user interaction to ensure the user experience to the greatest extent and achieve continuous test tracking in the time dimension.
[0063] The technical scheme of the present invention is described in detail above with reference to the accompanying drawings. The Turing test is performed in the background to determine whether the operating subject of the Turing test is the user, which avoids determining whether the operating subject is the user through user participation, thereby avoiding The user experience process is interrupted by the problem, thereby improving the user experience, and at the same time ensuring the reliability of the Turing test, so as to improve the security protection ability and risk control ability for computer simulation user operations to deceive and attack.
[0064] The above are only preferred embodiments of the present invention and are not used to limit the present invention. For those skilled in the art, the present invention can have various modifications and changes. Any modification, equivalent replacement, improvement, etc., made within the spirit and principle of the present invention shall be included in the protection scope of the present invention.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products