Unlock instant, AI-driven research and patent intelligence for your innovation.

Boundary construction method, system, server and storage medium of human-computer behavior characteristics

A construction method and behavioral technology, applied in the field of human-machine behavioral feature boundary construction methods, systems, servers and storage media, can solve problems such as the inability to protect user account information security, to ensure the infringement and consumption of malicious programs, improve user experience, Guaranteed safe effect

Active Publication Date: 2021-08-10
WUHAN JIYI NETWORK TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a method, system, server and storage medium for constructing the boundary of human-computer behavior characteristics, aiming to solve the technical problem in the prior art that traditional graphic verification codes cannot protect the user's account information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boundary construction method, system, server and storage medium of human-computer behavior characteristics
  • Boundary construction method, system, server and storage medium of human-computer behavior characteristics
  • Boundary construction method, system, server and storage medium of human-computer behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] The solution of the embodiment of the present invention is mainly: the present invention obtains the user behavior sample data and the machine behavior sample data of the target verification code; generates user behavior characteristics according to the user behavior sample data, and generates a machine behavior feature according to the machine behavior sample data; Behavioral characteristics; compare the user behavior characteristics with the machine behavior characteristics, and obtain the difference characteristics according to the comparison results; construct the human-machine behavior characteristic boundary according to the difference characteristics, and can use the human-computer behavior characteristic boundary to quickly distinguish between verification behaviors User behavior is still human-computer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a system, a server and a storage medium for constructing a boundary of human-machine behavior characteristics. By acquiring user behavior sample data and machine behavior sample data of target verification codes; generating user behavior characteristics according to the user behavior sample data, and Generate machine behavior features according to the machine behavior sample data; compare the user behavior features with the machine behavior features, and obtain difference features according to the comparison results; construct human-machine behavior feature boundaries according to the difference features, and be able to use man-machine Behavioral feature boundaries can quickly distinguish whether the verification behavior is user behavior or human-computer behavior, and can establish an effective human-machine verification mechanism to ensure the security of user account information, effectively resist batch brute-force cracking of verification codes by machines, and ensure that website resources are not maliciously used. Program infringement and consumption improve user experience.

Description

technical field [0001] The invention relates to the field of computer vision image processing, in particular to a method, system, server and storage medium for constructing a human-computer behavior characteristic boundary. Background technique [0002] Verification code, as a verification mechanism to distinguish between human and machine, is widely used in interactive modules such as online banking, free download, forum login, account registration, etc., to prevent computer programs from simulating human users to abuse network resources; traditional graphic verification codes are mainly used Questions and answers build a human-machine boundary, that is, determine whether it is a user or a machine through the correctness of the answer to the question, such as a character verification code. When the user logs in and registers, enter some numbers and letters that are correct to proceed to the next step. However, with the optical With the wide application of image recognition ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 吴渊汪智勇
Owner WUHAN JIYI NETWORK TECH CO LTD