Supercharge Your Innovation With Domain-Expert AI Agents!

Human-machine identification method, server, client and human-machine identification system

A human-machine identification and client-side technology, applied in the field of network security, can solve the problems that affect the smoothness of operation, it is difficult for machines to recognize random strings, cumbersome and other problems, and achieve the effect of improving efficiency and fluency

Active Publication Date: 2020-11-06
深圳市九州安域科技有限公司 +2
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the protection method commonly used in the industry is the fully automated Turing test (CAPTCHA, Completely Automated Public Turing Test to Tell Computers and Humans Apart), that is, when the user reaches the application login interface with sensitive data operations, the system will A picture is generated in the background and a random string is embedded in the picture. When the client sends a login request to the server, if the server detects that the client has sent the correct string content on the picture, it will be considered The client is operated by ordinary users rather than network robots, because it is generally believed that it is difficult for machines to quickly, dynamically and accurately identify random strings on pictures
[0003] Although CAPTCHA technology has solved most of the work of man-machine recognition to a certain extent, it has also greatly affected the fluency of people's operations.
Especially when the Internet device used by the user is a mobile terminal, it is very cumbersome to identify and input random numbers on the picture
Therefore, the existing human-machine recognition technology has caused low efficiency and fluency in user operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Human-machine identification method, server, client and human-machine identification system
  • Human-machine identification method, server, client and human-machine identification system
  • Human-machine identification method, server, client and human-machine identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 The implementation process of the human-computer identification method provided by Embodiment 1 of the present invention is shown, and the details are as follows:

[0039] In step S101, the server receives the operation request sent by the client, and establishes a connection with the client.

[0040] In the embodiment of the present invention, the server first receives the operation request sent by the client, and establishes a network connection with the client when the server has not established a connection with the client. The operation request sent by the above-mentioned client may be a request to access a highly sensitive page, such as a request to access a login page that requires the user to enter an account number and password to log in, an information download page, or a page with a high degree of user privacy. Only under the above-mentioned operation requests, it is necessary to perform human-machine identification on these operations to avoid stea...

Embodiment 2

[0060] image 3 It shows the implementation flow of a human-computer identification method provided in Embodiment 2 of the present invention, and is described in detail as follows;

[0061] In step S301, the client sends an operation request to the server to establish a connection with the server.

[0062] In step S302, the client receives and executes the code segment to be executed sent by the server to obtain an execution result.

[0063] In the embodiment of the present invention, when the user needs to access a highly sensitive page, the client first initiates an application request to the server, and establishes a network connection with the server. After establishing a connection with the server, the server will respond to the application request initiated by the client, and the code segment to be executed will be included in the HTTP response body. The above-mentioned client will find and execute the above-mentioned to-be-executed code segment in the HTTP response bo...

Embodiment 3

[0068] Figure 4 A specific structural block diagram of the server provided by Embodiment 3 of the present invention is shown, and for convenience of description, only parts related to the embodiment of the present invention are shown. The server 4 includes: a connection establishment unit 41 , a code generation unit 42 , a data sending unit 43 , a verification unit 44 , and a human-machine identification result determination unit 45 .

[0069] Wherein, the connection establishment unit 41 is configured to receive an operation request sent by the client, and establish a connection with the above-mentioned client;

[0070] A code generating unit 42, configured to generate a random code segment as a code segment to be executed, wherein the code segment to be executed is a code segment that can only be executed in a preset client operating environment;

[0071] A data sending unit 43, configured to send the to-be-executed code segment generated by the above-mentioned code genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a man-machine recognition method, a server, a client and a man-machine recognition system. The man-machine recognition method comprises the following steps of making the server receive an operation request sent by the client and establish a connection with the client; generating a random code snippet only used for a preset client as a to-be-executed code segment in the server and sending the to-be-executed code segment to the client; making the server receive and verify an executive result sent by the client after the to-be-executed code segment is executed; if the verification of the executive result is successful, determining a man-machine recognition result as an operation of a user at the preset client; and if the verification of the executive result is failed, determining the man-machine recognition result as a machine operation. According to the scheme, the characteristics of the client are taken as a judgment criteria of man-machine recognition, so that the user does not need to participate in a process of man-machine recognition, the tedious operations of the user are removed, and the efficiency and the fluency of the user operations can be greatly improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a human-machine identification method, a server, a client and a human-machine identification system. Background technique [0002] The rapid emergence of the Internet in recent years has enriched and entertained people's lives. More and more people choose to use the Internet for daily financial operations, such as logging in to online banking to manage bank accounts and online shopping. The Internet is often accompanied by hacker activities. Hackers use network robots, such as automated scripts, desktop or server programs, etc., to quickly crack usage scenarios with high data sensitivity in a fully automatic brute force method, and obtain various private information of ordinary users, such as bank account passwords, Login passwords for online shopping, etc., seriously endanger the interests of users. At present, the protection method commonly used in the industry is the fully au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/31
CPCG06F21/316H04L63/08H04L67/141
Inventor 万振华徐瑞祝
Owner 深圳市九州安域科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More