Safety processing method, device and apparatus based on user behaviors

一种用户、行为的技术,应用在基于用户行为的安全处理领域,能够解决降低黑产破解图片或文字验证码难度、黑产攻击防御失败、降低网站安全性等问题,达到避免训练集污染、增加验证难度、降低黑产攻击的风险的效果

Pending Publication Date: 2020-12-11
BEIJING PERFECT WORLD SOFTWARE TECH DEV CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of slider verification codes, picture selection verification codes, text selection verification codes, or even quizzes that require semantic understanding, there are corresponding mature in-depth model solutions, which greatly reduces the need for hackers to crack picture or text verification codes. Difficulty, which makes the defense against illegal attacks fail, thus reducing the security of the website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety processing method, device and apparatus based on user behaviors
  • Safety processing method, device and apparatus based on user behaviors
  • Safety processing method, device and apparatus based on user behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0032] Aiming at improving the current technical problem that attackers can automatically identify the verification code of the website through the computer, it is easy to make the defense of black production attacks fail, thereby reducing the security of the website. This embodiment provides a security processing method based on user behavior, such as figure 1 As shown, the method includes:

[0033] 101. Obtain the page browsing behavior data before the user operates the verification code, and the operation behavior data on the verification code.

[0034] Wherein, the page browsing behavior data before the verification code operation may include: the user's mouse operation sequence and keyboa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety processing method, device and apparatus based on user behaviors, and relates to the technical field of data safety. The method comprises the following steps: judging whether a user is an attacker or not according to page browsing behavior data of the user before operating a verification code and operation behavior data of the verification code; and if judging the operation behavior data of the user is behavior data of a real user, performing clustering analysis by using similarity between counterfeit behaviors based on the operation behavior data of the user, and if the suspicious frequency of the user is set to be greater than a preset frequency threshold, performing clustering analysis by using similarity between counterfeit behaviors; If not, increasingthe verification difficulty, and the probability that the model is classified as an attacker, and re-classifying behavior data re-collected by the user by using the model; and finally, determining whether the user is an attacker or not by fusing classification results. Stricter black product attack defense can be realized based on the user behavior data of the operation verification code, and thewebsite security is ensured.

Description

[0001] This application is a divisional application of a Chinese patent application with application number 2020105367972 and titled "User Behavior-Based Security Processing Method, Device, and Equipment" submitted to the China Patent Office on June 12, 2020. technical field [0002] The present application relates to the technical field of data security, in particular to a security processing method, device and equipment based on user behavior. Background technique [0003] As an effective means of user authentication, verification codes have been widely adopted by the industry to defend against attacks from Internet hackers. The main principle is that black production usually needs a large number of repeated visits to obtain benefits, and verification codes can effectively increase the cost of each visit. [0004] At present, with the rise of deep learning in recent years, it has become easier and easier to use computers to automatically identify website verification codes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06K9/62
CPCG06F21/36G06F2221/2133G06F18/22G06F18/23G06F18/24
Inventor 张伟望覃建策田本真陈邦忠
Owner BEIJING PERFECT WORLD SOFTWARE TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products