Human-machine identification method, server, client and human-machine identification system
A human-machine identification and client-side technology, applied in the field of network security, can solve the problems that affect the smoothness of operation, it is difficult for machines to recognize random strings, cumbersome and other problems, and achieve the effect of improving efficiency and fluency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] figure 1 The implementation process of the human-computer identification method provided by Embodiment 1 of the present invention is shown, and the details are as follows:
[0039] In step S101, the server receives the operation request sent by the client, and establishes a connection with the client.
[0040] In the embodiment of the present invention, the server first receives the operation request sent by the client, and establishes a network connection with the client when the server has not established a connection with the client. The operation request sent by the above-mentioned client may be a request to access a highly sensitive page, such as a request to access a login page that requires the user to enter an account number and password to log in, an information download page, or a page with a high degree of user privacy. Only under the above-mentioned operation requests, it is necessary to perform human-machine identification on these operations to avoid stea...
Embodiment 2
[0060] image 3 It shows the implementation flow of a human-computer identification method provided in Embodiment 2 of the present invention, and is described in detail as follows;
[0061] In step S301, the client sends an operation request to the server to establish a connection with the server.
[0062] In step S302, the client receives and executes the code segment to be executed sent by the server to obtain an execution result.
[0063] In the embodiment of the present invention, when the user needs to access a highly sensitive page, the client first initiates an application request to the server, and establishes a network connection with the server. After establishing a connection with the server, the server will respond to the application request initiated by the client, and the code segment to be executed will be included in the HTTP response body. The above-mentioned client will find and execute the above-mentioned to-be-executed code segment in the HTTP response bo...
Embodiment 3
[0068] Figure 4 A specific structural block diagram of the server provided by Embodiment 3 of the present invention is shown, and for convenience of description, only parts related to the embodiment of the present invention are shown. The server 4 includes: a connection establishment unit 41 , a code generation unit 42 , a data sending unit 43 , a verification unit 44 , and a human-machine identification result determination unit 45 .
[0069] Wherein, the connection establishment unit 41 is configured to receive an operation request sent by the client, and establish a connection with the above-mentioned client;
[0070] A code generating unit 42, configured to generate a random code segment as a code segment to be executed, wherein the code segment to be executed is a code segment that can only be executed in a preset client operating environment;
[0071] A data sending unit 43, configured to send the to-be-executed code segment generated by the above-mentioned code genera...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



