Interface interaction and authentication method thereof, login request generation and authentication method and device

An interface interaction and interface technology, applied in digital data authentication, instruments, electrical digital data processing, etc., can solve the problems of server resource waste, load pressure increase, complex interactive operation, etc., to improve user experience, improve stability, Resist the effects of aggressive behavior

Inactive Publication Date: 2019-03-01
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD +1
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing script programs can also identify the above-mentioned verification pictures through the picture recognition function, thereby simulating human operations to submit interactive requests, which makes it difficult for the system to reliably resist malicious attacks initiated by machines, such as cracking passwords, swiping screens, and flooding forums. And other phenomena, resulting in waste of server resources and increased load pressure, affecting the stability of server performance; in addition, from the user's point of view, each time an interaction request is submitted, it is necessary to manually input the recognition result of the verification picture, and the interaction operation is complicated. Affect user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interface interaction and authentication method thereof, login request generation and authentication method and device
  • Interface interaction and authentication method thereof, login request generation and authentication method and device
  • Interface interaction and authentication method thereof, login request generation and authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0042] Taking cracking the account password for user system login as an example, in order to crack the account password of a registered user in a certain system, hackers can automatically generate various passwords through pre-written software programs, and input them into the password input box for continuous attempts until they log in. Successful; in this brute force cracking method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an interface interaction and an authentication method thereof, a login request generation and authentication method and a device. The interface interaction method comprises thefollowing steps of: listening for movement events of a mouse in a predetermined area of the interface; acquiring movement information of a mouse in a predetermined area based on the movement event; generating an interface interaction request according to the mobile information; the interface interaction request includes mobile information; the interface interaction request is sent to the receivingend, so that the receiving end verifies the legitimacy of the interface interaction request according to the mobile information. The invention can accurately verify the legitimacy of the user throughthe mobile information of the mouse, effectively resists the attack behavior of the hacker, and improves the stability of the system. At the same time, in the process of interface interaction, user authentication can be realized without additional operations, which improves the degree of user experience.

Description

technical field [0001] The present invention relates to the technical field of interface interaction, in particular to an interface interaction and its verification method, a login request generation and verification method and device. Background technique [0002] In order to prevent the system from being maliciously attacked, when users submit interactive requests such as logging in to the system, voting, posting, or uploading files, they often need to first identify the verification picture generated by the system and send the identification result back to the system server. If the identification result is incorrect, the system Then it is considered that the user submits the interaction request as a machine operation, and then refuses to respond to the interaction request. However, the existing script programs can also identify the above-mentioned verification pictures through the picture recognition function, thereby simulating human operations to submit interactive requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0487G06F21/31
CPCG06F3/0487G06F21/31
Inventor 钟望
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products