Nothing Special   »   [go: up one dir, main page]

CN107341384A - A kind of service verification method and system - Google Patents

A kind of service verification method and system Download PDF

Info

Publication number
CN107341384A
CN107341384A CN201610272888.3A CN201610272888A CN107341384A CN 107341384 A CN107341384 A CN 107341384A CN 201610272888 A CN201610272888 A CN 201610272888A CN 107341384 A CN107341384 A CN 107341384A
Authority
CN
China
Prior art keywords
identifying code
user
difficulty
corresponding user
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610272888.3A
Other languages
Chinese (zh)
Inventor
李恺
季虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suning Commerce Group Co Ltd
Original Assignee
Suning Commerce Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suning Commerce Group Co Ltd filed Critical Suning Commerce Group Co Ltd
Priority to CN201610272888.3A priority Critical patent/CN107341384A/en
Publication of CN107341384A publication Critical patent/CN107341384A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a kind of service verification method and system, it is related to Internet technical field, it is possible to increase stop the success rate of malice instrument.The present invention includes:The historical data identified according to corresponding user generates the correct item of identifying code that the corresponding user identifies, and at least two identifying codes of corresponding user's mark are generated according to the correct item of the identifying code;Validation difficulty is determined further according to the user behavior data of corresponding user's mark;The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and the identifying code extracted is issued to user equipment.The present invention is applied to improve man-machine recognition accuracy and stops that malice logs in.

Description

A kind of service verification method and system
Technical field
The present invention relates to Internet technical field, more particularly to a kind of service verification method and system.
Background technology
Currently, because the malice log in means such as increasing Shua Piao robots, automated log on script appear in On network, cause major website to frequently suffer from malice and log in the attack of behavior, and hamper validated user Log in.Therefore, can be by requiring to use in the display interface of the subscriber terminal sides such as webpage, web and APP The mode of family input validation code, to prevent the malice of robot or automatic script from logging in.
Currently used identifying code can be largely classified into:Character type, question and answer class, voice class etc..It is defeated in user When entering important information or when monitoring system feeds back corresponding alarm information, triggering shows identifying code, and passes through checking What the verifying function of code determined current execution register is the batch operation or user's sheet of malice log in means The true login of people.
But with the development of OCR, automatic answering, speech recognition technology etc., These this lawless people of technology utilizations simultaneously improve malice log in means so that malice log in means is submitted automatically Correct identifying code becomes more and more easily, and currently used several identifying code forms are stopping malice instrument side The success rate in face is reducing rapidly.
The content of the invention
Embodiments of the invention provide a kind of service verification method and system, it is possible to increase stop malice instrument Success rate.
To reach above-mentioned purpose, embodiments of the invention adopt the following technical scheme that:
In a first aspect, embodiments of the invention provide a kind of service verification method, including:
The correct item of identifying code that the corresponding user of historical data generation identified according to corresponding user identifies, and At least two identifying codes identified according to the correct corresponding user of item generation of the identifying code, described at least two Kind identifying code sorts according to difficult parameters
Validation difficulty is determined according to the user behavior data that corresponding user identifies;
The identifying code identified according to the corresponding user of identified validation difficulty extraction, and tested what is extracted Code is demonstrate,proved to issue to user equipment.
With reference in a first aspect, in the first possible implementation of first aspect, the corresponding user marks The historical data of knowledge includes:Corresponding user's mark browse record, operation note, transaction record and/or Logistics information, the transaction record include corresponding to the sequence information of user's mark in the range of at the appointed time, The sequence information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
With reference in a first aspect, in second of possible implementation of first aspect, in addition to:
According to predetermined period, the identifying code for corresponding to the user and identifying is generated according to the correct item of the identifying code, And the difficult parameters of generated identifying code and the identifying code generated are sent to checking equipment, in order to verify The identifying code to be sorted according to difficult parameters that renewal of the equipment is preserved.
With reference in a first aspect, in the third possible implementation of first aspect, the user behavior number According to including temporal information, address information and/or operation trace;
The user behavior data identified according to corresponding user determines validation difficulty, including:
Determined whether according to the temporal information within the business activity time specified, if then basis The type of the business activity specified determines validation difficulty;
And/or the address information is parsed, and the content obtained according to parsing determines the peace of the address information Whole degree, validation difficulty is determined according to identified safe coefficient;
And/or detect whether abnormal operation behavior be present according to the operation trace, tested if then selection is specified Demonstrate,prove the identifying code of difficulty.
With reference in a first aspect, in the 4th kind of possible implementation of first aspect, in addition to:
The warning information that air control center is sent is received, if warning information points to user's mark, setting is tested Card difficulty is highest difficulty.
Second aspect, embodiments of the invention provide a kind of business checking device, including:
Identifying code generation module, the historical data for being identified according to corresponding user generate the corresponding user and marked The correct item of identifying code of knowledge, and generate at least the two of corresponding user's mark according to the correct item of the identifying code Kind identifying code, at least two identifying code sort according to difficult parameters;
Difficulty management module, the user behavior data for being identified according to corresponding user determine validation difficulty;
Release module, the identifying code identified for the corresponding user of validation difficulty extraction determined by, And the identifying code extracted is issued to user equipment.
With reference to second aspect, in the first possible implementation of second aspect, corresponding user's mark The historical data of knowledge includes:Corresponding user's mark browse record, operation note, transaction record and/or Logistics information, the transaction record include corresponding to the sequence information of user's mark in the range of at the appointed time, The sequence information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
With reference to second aspect, in second of possible implementation of second aspect, in addition to:
Update module, for according to predetermined period, the corresponding user to be generated according to the correct item of the identifying code The identifying code of mark, and join to the difficulty of checking the generated identifying code of equipment transmission and the identifying code generated Number, in order to verify the identifying code to be sorted according to difficult parameters that renewal of the equipment preserved.
With reference to second aspect, in the third possible implementation of second aspect, the difficulty manages mould Block, specifically for being determined whether according to the temporal information within the business activity time specified, if It is validation difficulty to be determined according to the type of the business activity specified, when the user behavior data includes Between information, address information and/or operation trace;
And/or specifically for parsing the address information, and the content obtained according to parsing determines the address The safe coefficient of information, validation difficulty is determined according to identified safe coefficient;
And/or specifically for detecting whether abnormal operation behavior be present according to the operation trace, if then selecting Select the identifying code of specific authentication difficulty.
With reference to second aspect, in the 4th kind of possible implementation of second aspect, the difficulty manages mould Block, it is additionally operable to receive the warning information that air control center is sent, if warning information points to user's mark, Validation difficulty is set as highest difficulty.
Service verification method and device provided in an embodiment of the present invention, the historical data identified according to corresponding user The correct item of identifying code of the corresponding user's mark of generation, and corresponding institute is generated according to the correct item of the identifying code State at least two identifying codes of user's mark;Checking is determined further according to the user behavior data of corresponding user's mark Difficulty;The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and will be carried The identifying code taken is issued to user equipment.Fixed relative to use in the prior art, single verification mode, The embodiment of the present invention can be according to user's history behavioral data, and dynamic adjusts verification mode difficulty, and increase carries High man-machine recognition accuracy, so as to improve the success rate for stopping malice instrument.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to required in embodiment The accompanying drawing used is briefly described, it should be apparent that, drawings in the following description are only the one of the present invention A little embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, also Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of service verification method provided in an embodiment of the present invention;
Fig. 3,4,5 are the schematic diagram of identifying code instantiation provided in an embodiment of the present invention;
Fig. 6,7 be business provided in an embodiment of the present invention verify device structural representation.
Embodiment
To make those skilled in the art more fully understand technical scheme, below in conjunction with the accompanying drawings and specifically Embodiment is described in further detail to the present invention.Embodiments of the present invention are described in more detail below, The example of the embodiment is shown in the drawings, wherein same or similar label represents identical from beginning to end Or similar element or the element with same or like function.Below with reference to the embodiment party of accompanying drawing description Formula is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.This technology is led Field technique personnel are appreciated that unless expressly stated, singulative " one " used herein, "one", " described " and "the" may also comprise plural form.It is to be further understood that the specification of the present invention The middle wording " comprising " used refers to the feature, integer, step, operation, element and/or component be present, But it is not excluded that in the presence of or other one or more features of addition, integer, step, operation, element, group Part and/or their group.It should be understood that when we claim element to be " connected " or " coupled " to another element When, it can be directly connected or coupled to other elements, or there may also be intermediary element.In addition, this In " connection " or " coupling " that uses wireless connection or coupling can be included.Wording used herein " and/ Or " include any cell of one or more associated list items and all combine.The art skill Art personnel are appreciated that unless otherwise defined, all terms used herein (including technical term and science Term) with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also Have and prior art it should be appreciated that those terms defined in such as general dictionary should be understood that The consistent meaning of meaning in context, and unless defined as here, idealization or excessively will not be used Formal implication is explained.
Involved execution flow, specifically may operate in system as shown in Figure 1 in the present embodiment, wherein Including the identifying code server for generating simultaneously admin-authentication code, for storing the history number of corresponding user's mark According to database and for user issue identifying code front-end server, user by operate mobile terminal or The user equipmenies such as person's PC, access front-end server and carry out corresponding business operation, in business operation During, front-end server is issued in the link for needing to carry out safety verification by identifying code to user equipment The identifying code provided by identifying code server.Specifically, user equipment can with implementation into an independent table apparatus, Or it is integrated in a variety of media data playing devices, such as set top box, mobile phone, tablet personal computer (Tablet Personal Computer), laptop computer (Laptop Computer), multimedia Device, digital camera, personal digital assistant (personal digital assistant, abbreviation PDA), Guider, mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..The historical data of corresponding user's mark can also be stored in front-end server, Such as:Front-end server is connected and is integrated in operation system with database, and operation system is by business provider Operation;Identifying code server set corresponds to user into identifying code management platform to operation system acquisition request The historical data of mark.Specifically, in system as shown in Figure 1, the interaction of each equipment can wrap Include:
Identifying code is generated by identifying code server, and is stored in database.
Front-end server obtains customer service operation requests, and gathers the user behavior data.
Identifying code server feeds back different Authentication-Types and the identifying code of complexity according to user behavior data;Or The identifying code of generation is sent to front-end server by person, identifying code server in advance, and by front-end server according to Different Authentication-Types and the identifying code of complexity are fed back according to user behavior data.
Front-end server receives the checking information of user's input, and determines whether to be proved to be successful, wherein for judging The comparison code (or being Validation Answer Key) being whether proved to be successful can be previously generated by identifying code server And it is sent to front-end server;The checking information that user inputs can also be sent to checking by front-end server Code server, and determine whether to be proved to be successful by identifying code server and result of determination is fed back into front-end server, The result for being proved to be successful/being failed by front-end server issue again.
The embodiment of the present invention provides a kind of service verification method, as shown in Fig. 2 including:
S1, the historical data identified according to corresponding user generate the correct item of identifying code that the corresponding user identifies, And at least two identifying codes of corresponding user's mark are generated according to the correct item of the identifying code.
In the present embodiment, user's mark can be specifically the account information of user, ID number or to user Identification code of terminal distribution etc..
In the present embodiment, the historical data of corresponding user's mark includes:Corresponding user's mark Record, operation note, transaction record and/or logistics information are browsed, the transaction record is included at the appointed time In the range of correspond to the sequence information of user mark, the sequence information includes using in the range of at the appointed time The commodity category and/or commodity amount of family purchase.Wherein, the correct item of identifying code can specifically be included to application The content information that extracts in the historical data of family mark, the content information extracted have recorded user when specified Interior browses the information such as record, operation note, transaction record and/or logistics information.
Such as:User is identified as the account pet name of user, and identifying code server browses from the corresponding account pet name The commodity category and statistics that extracting data user is browsed by the account in given number of days obtain number of visits Most commodity categories, such as clothes, then using the most commodity category of number of visits as the correct item of identifying code, And the just list of a variety of commodity categories including the most commodity category of number of visits is generated, and scheming Display reminding message " you please be select and browsed most commodity in upper one week " in piece list, so as to generate such as figure The identifying code of picture selection class shown in 3 (be able to can also be shown correspondingly in figure with the title of display of commodity category The picture of commodity category), afterwards by the identifying code and the correct item forward end of identifying code of the picture generated selection class Server is sent.
Again for example:User is identified as the cell-phone number of user, transaction note of the identifying code server from corresponding cell-phone number The quantity on order or wait to sign that extraction user is signed for by the account in given number of days in record and/or logistics information The quantity on order of receipts, such as identifying code server can be used by reading logistics information statistics in given number of days Family successfully completes the quantity on order signed for or quantity on order to be signed for, then is ordered what is signed in given number of days Odd number amount or quantity on order to be signed for generate testing for question and answer class as shown in Figure 4 as the correct item of identifying code Code is demonstrate,proved, afterwards sends the identifying code of the question and answer class generated and the correct item forward end server of identifying code.
In the present embodiment, identifying code server can generate and manage the different identifying code of at least two difficulty, Specific at least two identifying code sorts according to difficult parameters.Wherein, can be with for a type of identifying code Corresponding difficult parameters value is set, the bigger expression of numerical value is more difficult to, such as:Verified according to the character input of display The difficult parameters of the verification mode of code are 1, such as:Figure identifies identifying code, typically by 4-digit number, letter And/or its combination is formed, it is applied to not be related to user sensitive information and identity school because interactive form is more friendly The situation tested, and different grade of difficulty can also be further set:The difficulty ginseng that naked eyes are readily recognized that Number for 1, visually identify the difficult parameters for having few error situation be 1.5, the visually more difficult and error rate of identification High difficult parameters are 1.9;The difficult parameters of the identifying code of picture selection class are 2;The identifying code of question and answer class The difficult parameters of identifying code are 3.Specifically, in the practical application of the present embodiment, can be answered according to specific With the difficulty of the self-defined all types of identifying code of scene.Further, other classes can be also used in the present embodiment The identifying code of type, such as:The proof scheme of click action is completed according to prompting, that is, shows a number of figure Piece, and require that user clicks on picture concerned as indicated, be applicable to user's assets, neck certificate, panic buying, The scenes such as activity, and can also further set different grade of difficulty, such as common people to be readily recognized that, And anyone identification all acquires a certain degree of difficulty.Again for example:Drag action or sliding trace are completed by prompting Proof scheme, with reference to example as shown in Figure 5.
S2, the user behavior data identified according to corresponding user determine validation difficulty.
Wherein, the user behavior data can be temporal information, address information and/or operation trace etc..And And it can further analyze user type or customer service by gathering user behavior data.Wherein, institute The occasion that customer service includes but is not limited to need authentication is stated, such as:Log in, lead certificate, panic buying, use Family asset management.When user carries out business operation, member account can be inputted first, described in collection of server The historical record behavior of member account, then user type can be analyzed, such as:Whether it is malicious attack, Huang Ox, recruit, high-quality member etc..And different Authentication-Types or complexity can be fed back according to user type Identifying code.Such as:For new user, the higher verification mode of feedback grade of difficulty;For high-quality member, Feed back simple character checking.Further, decision verification code difficulty, can also according to air control center to Family behavioral data analysis result, for example monitor whether as robot brush machine etc., can also be according to the business of user Behavior judgement, such as:At the appointed time the lower odd number in section, lower odd number then need to improve hardly possible counting user extremely Degree.
S3, the corresponding user's mark of the validation difficulty extraction determined by identifying code, and will be extracted Identifying code to user equipment issue.
Front-end server receives the checking information or operation information of user's input, such as:Completed according to prompting The proof scheme of click action, or the proof scheme by prompting completion drag action or sliding trace, And the correct item of identifying code or the correct option of identifying code provided with identifying code server is compared, according to Comparison result determines whether to be proved to be successful.
In the present embodiment, in addition to:According to predetermined period, generated according to the correct item of the identifying code corresponding The identifying code of user's mark, and send generated identifying code and the identifying code generated to checking equipment Difficult parameters.In order to verify the identifying code to be sorted according to difficult parameters that renewal of the equipment preserved.Such as: Identifying code server can refresh the correct item of identifying code according to the specified time cycle, such as:Each Zhou Douchong Commodity categories newly most to user's number of visits count, and using the correct item of identifying code after renewal more The identifying code of new selection class or question and answer class.
In the present embodiment, the user behavior data includes temporal information, address information and/or operation trace.
The user behavior data identified according to corresponding user determines validation difficulty, including:
Determined whether according to the temporal information within the business activity time specified, if then basis The type of the business activity specified determines validation difficulty.Such as:" in the advertising campaign such as double 11 ", In order to farthest prevent the quick-fried single situation of automatic script, difficult parameters value can be used in advertising campaign Not less than the identifying code of appointed threshold (such as 2).
And/or the address information is parsed, and the content obtained according to parsing determines the peace of the address information Whole degree, validation difficulty is determined according to identified safe coefficient.Such as:Front-end server can record it is black/ White list, for the IP address being recorded in blacklist, minimum threshold can be not less than using difficult parameters value The identifying code of (such as 2);For the IP address being recorded in white list, difficult parameters value can be used little Identifying code in max threshold (such as 1.5).
And/or detect whether abnormal operation behavior be present according to the operation trace, tested if then selection is specified Demonstrate,prove the identifying code of difficulty.Such as:Anti- plug-in, the abnormal number of detecting used in current online game can be used According to scheme, detection user terminal whether there is abnormal operation behavior.
In the present embodiment, in addition to:The warning information that air control center is sent is received, if warning information points to User's mark, then set validation difficulty as highest difficulty.Wherein, air control center can be specifically with it is preceding Hold the air control system of the connected manual or automatic operation of server.
The further way to manage that can also take following identifying code difficulty in the present embodiment:
From the historical data of corresponding user's mark, user's mark is corresponded in the range of extraction at the appointed time Liveness information, the liveness information include transaction record and/or login record.When at the appointed time scope The transaction count of interior completion is in given transaction quantity section.And/or the login in the range of at the appointed time It is recorded in specify and logs in quantity section, then extraction is sorted close to the identifying code of most easy difficulty according to difficult parameters. The user of normal range (NR) is in hence for the transaction count completed in the range of at the appointed time reduces identifying code Difficulty.
Service verification method provided in an embodiment of the present invention, the historical data generation pair identified according to corresponding user The correct item of identifying code of user's mark is answered, and the corresponding user is generated according to the correct item of the identifying code At least two identifying codes of mark;Validation difficulty is determined further according to the user behavior data of corresponding user's mark; The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and tested what is extracted Code is demonstrate,proved to issue to user equipment.Relative in the prior art using fixed, single verification mode, the present invention Embodiment can be according to user's history behavioral data, and dynamic adjusts verification mode difficulty, and increase improves man-machine Recognition accuracy, so as to improve the success rate for stopping malice instrument.
The present embodiment also provides a kind of business checking device, specifically may operate on identifying code server, such as Described in Fig. 6, business checking device includes:
Identifying code generation module, the historical data for being identified according to corresponding user generate the corresponding user and marked The correct item of identifying code of knowledge, and generate at least the two of corresponding user's mark according to the correct item of the identifying code Kind identifying code, at least two identifying code sort according to difficult parameters.
Wherein, the historical data of corresponding user's mark includes:Corresponding user's mark browse record, Operation note, transaction record and/or logistics information, the transaction record include corresponding in the range of at the appointed time The sequence information of user's mark, the sequence information include the business of user's purchase in the range of at the appointed time Product category and/or commodity amount.
Difficulty management module, the user behavior data for being identified according to corresponding user determine validation difficulty.
Release module, the identifying code identified for the corresponding user of validation difficulty extraction determined by, And the identifying code extracted is issued to user equipment.
Further, as shown in fig. 7, can also include:Update module, for according to predetermined period, according to The identifying code of the corresponding user's mark of the correct item generation of identifying code, and send and generated to checking equipment Identifying code and the difficult parameters of identifying code that are generated, in order to verify that renewal of the equipment preserved according to difficulty Spend the identifying code of parameter marshalling.
In the present embodiment, the difficulty management module, it is current specifically for being determined according to the temporal information Whether within the business activity time specified, if then being determined according to the type of the business activity specified Validation difficulty, the user behavior data include temporal information, address information and/or operation trace.
And/or specifically for parsing the address information, and the content obtained according to parsing determines the address The safe coefficient of information, validation difficulty is determined according to identified safe coefficient.
And/or specifically for detecting whether abnormal operation behavior be present according to the operation trace, if then selecting Select the identifying code of specific authentication difficulty.
In the present embodiment, the difficulty management module, it is additionally operable to receive the warning information that air control center is sent, If warning information points to user's mark, validation difficulty is set as highest difficulty.
Business provided in an embodiment of the present invention verifies device, the historical data generation pair identified according to corresponding user The correct item of identifying code of user's mark is answered, and the corresponding user is generated according to the correct item of the identifying code At least two identifying codes of mark;Validation difficulty is determined further according to the user behavior data of corresponding user's mark; The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and tested what is extracted Code is demonstrate,proved to issue to user equipment.Relative in the prior art using fixed, single verification mode, the present invention Embodiment can be according to user's history behavioral data, and dynamic adjusts verification mode difficulty, and increase improves man-machine Recognition accuracy, so as to improve the success rate for stopping malice instrument.
Each embodiment in this specification is described by the way of progressive, identical phase between each embodiment As part mutually referring to, what each embodiment stressed be it is different from other embodiment it Place.For apparatus embodiments, because it is substantially similar to embodiment of the method, so describing Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Those of ordinary skill in the art can It is that can be referred to by computer program to understand all or part of flow realized in above-described embodiment method Related hardware is made to complete, described program can be stored in a computer read/write memory medium, the journey Sequence is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can For magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..The foregoing is only a specific embodiment of the invention, But protection scope of the present invention is not limited thereto, any one skilled in the art is in the present invention In the technical scope of exposure, the change or replacement that can readily occur in should all be covered in protection scope of the present invention Within.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (10)

  1. A kind of 1. service verification method, it is characterised in that including:
    The correct item of identifying code that the corresponding user of historical data generation identified according to corresponding user identifies, and At least two identifying codes identified according to the correct corresponding user of item generation of the identifying code, described at least two Kind identifying code sorts according to difficult parameters;
    Validation difficulty is determined according to the user behavior data that corresponding user identifies;
    The identifying code identified according to the corresponding user of identified validation difficulty extraction, and tested what is extracted Code is demonstrate,proved to issue to user equipment.
  2. 2. according to the method for claim 1, it is characterised in that the history number of corresponding user's mark According to including:Corresponding user's mark browses record, operation note, transaction record and/or logistics information, The transaction record includes corresponding to the sequence information of user's mark, the order in the range of at the appointed time Information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
  3. 3. according to the method for claim 1, it is characterised in that also include:
    According to predetermined period, the identifying code for corresponding to the user and identifying is generated according to the correct item of the identifying code, And the difficult parameters of generated identifying code and the identifying code generated are sent to checking equipment, in order to verify The identifying code to be sorted according to difficult parameters that renewal of the equipment is preserved.
  4. 4. according to the method for claim 1, it is characterised in that the user behavior data includes the time Information, address information and/or operation trace;
    The user behavior data identified according to corresponding user determines validation difficulty, including:
    Determined whether according to the temporal information within the business activity time specified, if then basis The type of the business activity specified determines validation difficulty;
    And/or the address information is parsed, and the content obtained according to parsing determines the peace of the address information Whole degree, validation difficulty is determined according to identified safe coefficient;
    And/or detect whether abnormal operation behavior be present according to the operation trace, tested if then selection is specified Demonstrate,prove the identifying code of difficulty.
  5. 5. according to the method for claim 1, it is characterised in that also include:
    The warning information that air control center is sent is received, if warning information points to user's mark, setting is tested Card difficulty is highest difficulty.
  6. 6. a kind of business verifies device, it is characterised in that including:
    Identifying code generation module, the historical data for being identified according to corresponding user generate the corresponding user and marked The correct item of identifying code of knowledge, and generate at least the two of corresponding user's mark according to the correct item of the identifying code Kind identifying code, at least two identifying code sort according to difficult parameters;
    Difficulty management module, the user behavior data for being identified according to corresponding user determine validation difficulty;
    Release module, the identifying code identified for the corresponding user of validation difficulty extraction determined by, And the identifying code extracted is issued to user equipment.
  7. 7. device according to claim 6, it is characterised in that the history number of corresponding user's mark According to including:Corresponding user's mark browses record, operation note, transaction record and/or logistics information, The transaction record includes corresponding to the sequence information of user's mark, the order in the range of at the appointed time Information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
  8. 8. device according to claim 6, it is characterised in that also include:
    Update module, for according to predetermined period, the corresponding user to be generated according to the correct item of the identifying code The identifying code of mark, and join to the difficulty of checking the generated identifying code of equipment transmission and the identifying code generated Number, in order to verify the identifying code to be sorted according to difficult parameters that renewal of the equipment preserved.
  9. 9. device according to claim 6, it is characterised in that the difficulty management module is specific to use In being determined whether to be in the business activity time specified according to the temporal information, if then according to institute The type for stating the business activity specified determines validation difficulty, the user behavior data include temporal information, Location information and/or operation trace;
    And/or specifically for parsing the address information, and the content obtained according to parsing determines the address The safe coefficient of information, validation difficulty is determined according to identified safe coefficient;
    And/or specifically for detecting whether abnormal operation behavior be present according to the operation trace, if then selecting Select the identifying code of specific authentication difficulty.
  10. 10. device according to claim 6, it is characterised in that the difficulty management module, be additionally operable to The warning information that air control center is sent is received, if warning information points to user's mark, setting checking is difficult Spend for highest difficulty.
CN201610272888.3A 2016-04-28 2016-04-28 A kind of service verification method and system Pending CN107341384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610272888.3A CN107341384A (en) 2016-04-28 2016-04-28 A kind of service verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610272888.3A CN107341384A (en) 2016-04-28 2016-04-28 A kind of service verification method and system

Publications (1)

Publication Number Publication Date
CN107341384A true CN107341384A (en) 2017-11-10

Family

ID=60221838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610272888.3A Pending CN107341384A (en) 2016-04-28 2016-04-28 A kind of service verification method and system

Country Status (1)

Country Link
CN (1) CN107341384A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173864A (en) * 2017-12-29 2018-06-15 咪咕文化科技有限公司 Information verification mode adjusting method and device and storage medium
CN108449186A (en) * 2018-06-11 2018-08-24 北京京东金融科技控股有限公司 Safe verification method and device
CN108650226A (en) * 2018-03-30 2018-10-12 平安科技(深圳)有限公司 A kind of login validation method, device, terminal device and storage medium
CN109447758A (en) * 2018-11-02 2019-03-08 北京汉迪移动互联网科技股份有限公司 Using the method and relevant apparatus of interior purchase
CN110427745A (en) * 2019-07-02 2019-11-08 五八有限公司 Identifying code acquisition methods, device, electronic equipment and computer-readable medium
CN110689400A (en) * 2019-08-29 2020-01-14 苏宁云计算有限公司 Man-machine similar track detection method and device based on screen segmentation
CN111597538A (en) * 2020-04-02 2020-08-28 上海瀚之友信息技术服务有限公司 Verification code generation method and system
CN112926037A (en) * 2020-12-30 2021-06-08 南京披云信息科技有限公司 Internet of things authentication method and device and storage medium
CN113496017A (en) * 2020-04-08 2021-10-12 阿里巴巴集团控股有限公司 Verification method, device, equipment and storage medium
CN113961891A (en) * 2021-10-26 2022-01-21 北京天融信网络安全技术有限公司 User authentication method and device
CN114757729A (en) * 2022-03-03 2022-07-15 未鲲(上海)科技服务有限公司 Transaction request processing method and device, terminal equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070277224A1 (en) * 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN102750464A (en) * 2012-02-06 2012-10-24 青岛印象派信息技术有限公司 Verification code method based on user identification
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
CN103853948A (en) * 2012-11-28 2014-06-11 阿里巴巴集团控股有限公司 User identity recognizing and information filtering and searching method and server
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system
CN104580075A (en) * 2013-10-14 2015-04-29 深圳市腾讯计算机系统有限公司 User login validation method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070277224A1 (en) * 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
CN102750464A (en) * 2012-02-06 2012-10-24 青岛印象派信息技术有限公司 Verification code method based on user identification
CN103853948A (en) * 2012-11-28 2014-06-11 阿里巴巴集团控股有限公司 User identity recognizing and information filtering and searching method and server
CN104580075A (en) * 2013-10-14 2015-04-29 深圳市腾讯计算机系统有限公司 User login validation method, device and system
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
FOREVER小娘门: "《京东重置密码怎么操作》", 《百度经验HTTPSJINGYAN.BAIDU.COMARTICLE647F0115BC1A847F2048A875.HTML》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173864A (en) * 2017-12-29 2018-06-15 咪咕文化科技有限公司 Information verification mode adjusting method and device and storage medium
WO2019184122A1 (en) * 2018-03-30 2019-10-03 平安科技(深圳)有限公司 Login verification method and apparatus, terminal device and storage medium
CN108650226A (en) * 2018-03-30 2018-10-12 平安科技(深圳)有限公司 A kind of login validation method, device, terminal device and storage medium
CN108449186A (en) * 2018-06-11 2018-08-24 北京京东金融科技控股有限公司 Safe verification method and device
CN109447758B (en) * 2018-11-02 2021-07-06 北京汉迪移动互联网科技股份有限公司 Method and related apparatus for in-application purchasing
CN109447758A (en) * 2018-11-02 2019-03-08 北京汉迪移动互联网科技股份有限公司 Using the method and relevant apparatus of interior purchase
CN110427745A (en) * 2019-07-02 2019-11-08 五八有限公司 Identifying code acquisition methods, device, electronic equipment and computer-readable medium
CN110689400A (en) * 2019-08-29 2020-01-14 苏宁云计算有限公司 Man-machine similar track detection method and device based on screen segmentation
CN110689400B (en) * 2019-08-29 2022-02-25 苏宁云计算有限公司 Man-machine similar track detection method and device based on screen segmentation
CN111597538A (en) * 2020-04-02 2020-08-28 上海瀚之友信息技术服务有限公司 Verification code generation method and system
CN113496017A (en) * 2020-04-08 2021-10-12 阿里巴巴集团控股有限公司 Verification method, device, equipment and storage medium
CN112926037A (en) * 2020-12-30 2021-06-08 南京披云信息科技有限公司 Internet of things authentication method and device and storage medium
CN113961891A (en) * 2021-10-26 2022-01-21 北京天融信网络安全技术有限公司 User authentication method and device
CN114757729A (en) * 2022-03-03 2022-07-15 未鲲(上海)科技服务有限公司 Transaction request processing method and device, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107341384A (en) A kind of service verification method and system
CN109034209B (en) Training method and device for active risk real-time recognition model
US20170221111A1 (en) Method for detecting spam reviews written on websites
US20160140626A1 (en) Web page advertisement configuration and optimization with visual editor and automatic website and webpage analysis
CN108876213B (en) Block chain-based product management method, device, medium and electronic equipment
CN108022080A (en) One kind complaint processing method and relevant device
CN107679054A (en) Data comparison method, device and readable storage medium storing program for executing
CN105101122A (en) Verification code input method and device
CN110310123B (en) Risk judging method and device
CN106487603A (en) A kind of response test method and device
CN113574843B (en) Distributed log for anomaly monitoring
CN106485261A (en) A kind of method and apparatus of image recognition
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN110392155A (en) It has been shown that, processing method, device and the equipment of notification message
CN118115178B (en) Quality tracing method, system and equipment based on industrial Internet of things
KR20190115343A (en) Operating method for post product management using managing server
CN111784360B (en) Anti-fraud prediction method and system based on network link backtracking
CN102819801B (en) A kind of antiforge system of testing for anti counterfeit appts
KR20150045543A (en) Genuine product certification and sns posting system, and method using nfc tag and smart phone
CN105450462A (en) On-line state monitoring method and system
CN116402334A (en) Multimode data compliance analysis and intelligent evaluation method and device
JP6928073B2 (en) How to identify fraudulent use in online services, devices, and computer programs
CN108364219A (en) A kind of single monitoring method of record and terminal
Parthasarathy et al. A framework for managing ethics in data science projects
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171110