Verification processing method and system based on behavior analysis

A behavior analysis and behavior technology, applied in the field of verification code processing, can solve the problems of complex verification code, low defense effect, poor user experience, etc., and achieve the effect of good user experience, reduced operation difficulty, and high cracking difficulty.

Inactive Publication Date: 2019-07-05
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the advancement of machine recognition technology, the defense effect of traditional image verification codes based on character recognition is gradually reduced. Criminals can easily bypass verification codes through text recognition and continue to attack. In order to increase the difficulty of machine recognition, verification codes are also gradually It becomes more complicated, but while increasing the difficulty of machine recognition, the difficulty of human recognition is also increasing, which will easily lead to problems that normal users cannot recognize and operate, and the user experience is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification processing method and system based on behavior analysis
  • Verification processing method and system based on behavior analysis
  • Verification processing method and system based on behavior analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention provides a verification processing system based on behavior analysis, including a client, a server and a feature database,

[0035] The client initiates a verification request and sends user environment information to the server, and the server returns the operation behavior verification code to the client.

[0036] The client submits the user verification operation behavior information to the server,

[0037] The server uses the characteristic database to analyze the user's operation behavior, and matches with the human operation characteristic data in the characteristic database. If the matching is successful, it is considered as the user's real operation, and the result information is returned to the client.

[0038] The client initiates a verification request to the server again for secondary verification.

[0039] At the same time, a verification processing method based on behavior analysis corresponding to the above system is provided, and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification processing method and system based on behavior analysis, and relates to the technical field of data security. The system comprises a client, a server and a feature database, wherein the client initiates a verification request and sends user environment information to the server; the server returns the operation behavior verification code to the client; the client submits the user verification operation behavior information to the server; and the server analyzes the user operation behavior by using the feature database, matches the user operation behaviorwith the human operation feature data in the feature database, considers that the user operates truly if the matching is successful and returns result information to the client, and the client initiates a verification request to the server again to carry out the secondary verification.

Description

technical field [0001] The invention discloses a verification code processing method and system based on behavior analysis, and relates to the technical field of data security. Background technique [0002] With the continuous development of network technology, the Internet has greatly affected people's production and life. As the portal of the information system, the website is the primary target chosen by criminals to attack. Generally speaking, attackers usually use methods such as batch registration, web crawlers, SMS interface attacks, and credential stuffing attacks to maliciously steal information and data, and carry out SMS bombing, causing a large amount of economic losses to the website owner. The appearance of the verification code can effectively resist the automatic attack of the machine script, and is the first line of defense for website security. [0003] However, with the advancement of machine recognition technology, the defense effect of traditional imag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/36H04L29/06
CPCG06F21/31G06F21/36H04L63/1441
Inventor 刘恩琦杨继伟
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products