Safety processing method, device and equipment based on user behaviors

A security processing and behavior technology, applied in the field of security processing based on user behavior, can solve the problems of black production attack defense failure, reduce website security and other problems, so as to avoid training set pollution, reduce the risk of black production attack, and increase verification difficulty Effect

Active Publication Date: 2020-07-17
BEIJING PERFECT WORLD SOFTWARE TECH DEV CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, this application provides a security processing method, device, and equipment based on user behavior, the main purpose of which is to...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety processing method, device and equipment based on user behaviors
  • Safety processing method, device and equipment based on user behaviors
  • Safety processing method, device and equipment based on user behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0031] Aiming at improving the current technical problem that attackers can automatically identify the verification code of the website through the computer, it is easy to make the defense of black production attacks fail, thereby reducing the security of the website. This embodiment provides a security processing method based on user behavior, such as figure 1 As shown, the method includes:

[0032] 101. Obtain the page browsing behavior data before the user operates the verification code, and the operation behavior data on the verification code.

[0033] Wherein, the page browsing behavior data before the verification code operation may include: the user's mouse operation sequence and keyboa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety processing method, device and equipment based on user behaviors, and relates to the technical field of data safety. The method comprises the following steps: judging whether a user is an attacker or not according to page browsing behavior data of the user before operating a verification code and operation behavior data of the verification code; if it is judged thatthe operation behavior data of the user is behavior data of a real user, based on the operation behavior data of the user, carrying out clustering analysis by utilizing the similarity between forgedbehaviors, and if the number of times that the user is set to be suspicious is greater than the preset number of times threshold, increasing the verification difficulty, increasing the probability that a model is classified as an attacker, and re-classifying behavior data re-collected by the user; and finally, determining whether the user is an attacker or not by fusing classification results. According to the invention, stricter black product attack defense can be realized based on the user behavior data of the operation verification code, and the website security is ensured.

Description

technical field [0001] The present application relates to the technical field of data security, in particular to a security processing method, device and equipment based on user behavior. Background technique [0002] As an effective means of user authentication, verification codes have been widely adopted by the industry to defend against attacks from Internet hackers. The main principle is that black production usually needs a large number of repeated visits to obtain benefits, and verification codes can effectively increase the cost of each visit. [0003] At present, with the rise of deep learning in recent years, it has become easier and easier to use computers to automatically identify website verification codes. Regardless of slider verification codes, picture selection verification codes, text selection verification codes, or even quizzes that require semantic understanding, there are corresponding mature in-depth model solutions, which greatly reduces the need for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/36G06K9/62
CPCG06F21/36G06F2221/2133G06F18/22G06F18/23G06F18/24
Inventor 张伟望覃建策田本真陈邦忠
Owner BEIJING PERFECT WORLD SOFTWARE TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products