Verification method and device

A verification method and user verification technology, applied in the field of verification methods and devices, can solve the problems of distortion, cracking, and trouble of numbers and letters, and achieve the effect of avoiding the possibility of verification, preventing malicious program attacks, and improving user experience.

Active Publication Date: 2018-06-29
CHINA UNIONPAY
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Verification information in the form of numbers and letters: This verification information may be all letters, or all numbers, or a combination of letters and numbers, such as a randomly generated 4-digit string, which is easy to verify The information identification program is cracked, which cannot prevent malicious submissions
[0005] 2. Verification information in the form of Chinese characters: This verification information is at least one Chinese character randomly generated. This verification information can also be deciphered by the recognition program of the verification information, and the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device
  • Verification method and device
  • Verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The specific implementation manners of the verification method, device and server based on the verification picture provided in the embodiment of the present application will be described in detail below with reference to the accompanying drawings.

[0060] At present, the commonly used human-computer identification method is the Turing Test (Completely Automated Public Turing Test to Tell Computers and Humans Apart, CAPTCHA), which is fully automated to distinguish between computers and humans, and its manifestations are character verification codes, SMS verification codes, and voice verification codes.

[0061] The character verification code completes the verification by requiring the user to input the text in the picture. The manifestations include: multiple English characters, adding interference lines or noise points in the background, and the characters are processed by sticking and distorting, which increases the difficulty of cracking; the simple calculation form...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a verification method and device. The method includes: acquiring user verification data which are generated by user behaviors; generating machine verification data through machine simulation according to the user verification data, wherein the machine verification data are used for representation of verification data generated by machine behaviors; taking the user verification data as a positive sample and the machine verification data as a negative sample to generate a user verification behavior model through machine learning, wherein the user verification behavior model is used for judging whether verification requests are user behaviors or machine behaviors.

Description

technical field [0001] The present application relates to the technical field of web page development, in particular to a verification method and device. Background technique [0002] At present, in order to increase the security of network information in the web browser interface, for example, to prevent malicious cracking of passwords, swiping tickets, flooding forums, or continuous login attempts for specific registered users using specific program brute force cracking methods, generally use Verify the information for verification. After the user enters the user name and static password, the network side will send a random verification information to the client. The user can identify the content of the verification information with the naked eye, input it into the input box of the client, and submit it to the website for verification. After success, the user can perform normal follow-up operations through the client. [0003] At present, the verification information use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/36H04L9/32
CPCG06F21/36H04L9/3228
Inventor 吕伟孙黎明唐旭东陈卓
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products