CN107341384A - A kind of service verification method and system - Google Patents
A kind of service verification method and system Download PDFInfo
- Publication number
- CN107341384A CN107341384A CN201610272888.3A CN201610272888A CN107341384A CN 107341384 A CN107341384 A CN 107341384A CN 201610272888 A CN201610272888 A CN 201610272888A CN 107341384 A CN107341384 A CN 107341384A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- user
- difficulty
- corresponding user
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention discloses a kind of service verification method and system, it is related to Internet technical field, it is possible to increase stop the success rate of malice instrument.The present invention includes:The historical data identified according to corresponding user generates the correct item of identifying code that the corresponding user identifies, and at least two identifying codes of corresponding user's mark are generated according to the correct item of the identifying code;Validation difficulty is determined further according to the user behavior data of corresponding user's mark;The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and the identifying code extracted is issued to user equipment.The present invention is applied to improve man-machine recognition accuracy and stops that malice logs in.
Description
Technical field
The present invention relates to Internet technical field, more particularly to a kind of service verification method and system.
Background technology
Currently, because the malice log in means such as increasing Shua Piao robots, automated log on script appear in
On network, cause major website to frequently suffer from malice and log in the attack of behavior, and hamper validated user
Log in.Therefore, can be by requiring to use in the display interface of the subscriber terminal sides such as webpage, web and APP
The mode of family input validation code, to prevent the malice of robot or automatic script from logging in.
Currently used identifying code can be largely classified into:Character type, question and answer class, voice class etc..It is defeated in user
When entering important information or when monitoring system feeds back corresponding alarm information, triggering shows identifying code, and passes through checking
What the verifying function of code determined current execution register is the batch operation or user's sheet of malice log in means
The true login of people.
But with the development of OCR, automatic answering, speech recognition technology etc.,
These this lawless people of technology utilizations simultaneously improve malice log in means so that malice log in means is submitted automatically
Correct identifying code becomes more and more easily, and currently used several identifying code forms are stopping malice instrument side
The success rate in face is reducing rapidly.
The content of the invention
Embodiments of the invention provide a kind of service verification method and system, it is possible to increase stop malice instrument
Success rate.
To reach above-mentioned purpose, embodiments of the invention adopt the following technical scheme that:
In a first aspect, embodiments of the invention provide a kind of service verification method, including:
The correct item of identifying code that the corresponding user of historical data generation identified according to corresponding user identifies, and
At least two identifying codes identified according to the correct corresponding user of item generation of the identifying code, described at least two
Kind identifying code sorts according to difficult parameters
Validation difficulty is determined according to the user behavior data that corresponding user identifies;
The identifying code identified according to the corresponding user of identified validation difficulty extraction, and tested what is extracted
Code is demonstrate,proved to issue to user equipment.
With reference in a first aspect, in the first possible implementation of first aspect, the corresponding user marks
The historical data of knowledge includes:Corresponding user's mark browse record, operation note, transaction record and/or
Logistics information, the transaction record include corresponding to the sequence information of user's mark in the range of at the appointed time,
The sequence information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
With reference in a first aspect, in second of possible implementation of first aspect, in addition to:
According to predetermined period, the identifying code for corresponding to the user and identifying is generated according to the correct item of the identifying code,
And the difficult parameters of generated identifying code and the identifying code generated are sent to checking equipment, in order to verify
The identifying code to be sorted according to difficult parameters that renewal of the equipment is preserved.
With reference in a first aspect, in the third possible implementation of first aspect, the user behavior number
According to including temporal information, address information and/or operation trace;
The user behavior data identified according to corresponding user determines validation difficulty, including:
Determined whether according to the temporal information within the business activity time specified, if then basis
The type of the business activity specified determines validation difficulty;
And/or the address information is parsed, and the content obtained according to parsing determines the peace of the address information
Whole degree, validation difficulty is determined according to identified safe coefficient;
And/or detect whether abnormal operation behavior be present according to the operation trace, tested if then selection is specified
Demonstrate,prove the identifying code of difficulty.
With reference in a first aspect, in the 4th kind of possible implementation of first aspect, in addition to:
The warning information that air control center is sent is received, if warning information points to user's mark, setting is tested
Card difficulty is highest difficulty.
Second aspect, embodiments of the invention provide a kind of business checking device, including:
Identifying code generation module, the historical data for being identified according to corresponding user generate the corresponding user and marked
The correct item of identifying code of knowledge, and generate at least the two of corresponding user's mark according to the correct item of the identifying code
Kind identifying code, at least two identifying code sort according to difficult parameters;
Difficulty management module, the user behavior data for being identified according to corresponding user determine validation difficulty;
Release module, the identifying code identified for the corresponding user of validation difficulty extraction determined by,
And the identifying code extracted is issued to user equipment.
With reference to second aspect, in the first possible implementation of second aspect, corresponding user's mark
The historical data of knowledge includes:Corresponding user's mark browse record, operation note, transaction record and/or
Logistics information, the transaction record include corresponding to the sequence information of user's mark in the range of at the appointed time,
The sequence information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
With reference to second aspect, in second of possible implementation of second aspect, in addition to:
Update module, for according to predetermined period, the corresponding user to be generated according to the correct item of the identifying code
The identifying code of mark, and join to the difficulty of checking the generated identifying code of equipment transmission and the identifying code generated
Number, in order to verify the identifying code to be sorted according to difficult parameters that renewal of the equipment preserved.
With reference to second aspect, in the third possible implementation of second aspect, the difficulty manages mould
Block, specifically for being determined whether according to the temporal information within the business activity time specified, if
It is validation difficulty to be determined according to the type of the business activity specified, when the user behavior data includes
Between information, address information and/or operation trace;
And/or specifically for parsing the address information, and the content obtained according to parsing determines the address
The safe coefficient of information, validation difficulty is determined according to identified safe coefficient;
And/or specifically for detecting whether abnormal operation behavior be present according to the operation trace, if then selecting
Select the identifying code of specific authentication difficulty.
With reference to second aspect, in the 4th kind of possible implementation of second aspect, the difficulty manages mould
Block, it is additionally operable to receive the warning information that air control center is sent, if warning information points to user's mark,
Validation difficulty is set as highest difficulty.
Service verification method and device provided in an embodiment of the present invention, the historical data identified according to corresponding user
The correct item of identifying code of the corresponding user's mark of generation, and corresponding institute is generated according to the correct item of the identifying code
State at least two identifying codes of user's mark;Checking is determined further according to the user behavior data of corresponding user's mark
Difficulty;The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and will be carried
The identifying code taken is issued to user equipment.Fixed relative to use in the prior art, single verification mode,
The embodiment of the present invention can be according to user's history behavioral data, and dynamic adjusts verification mode difficulty, and increase carries
High man-machine recognition accuracy, so as to improve the success rate for stopping malice instrument.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to required in embodiment
The accompanying drawing used is briefly described, it should be apparent that, drawings in the following description are only the one of the present invention
A little embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, also
Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of service verification method provided in an embodiment of the present invention;
Fig. 3,4,5 are the schematic diagram of identifying code instantiation provided in an embodiment of the present invention;
Fig. 6,7 be business provided in an embodiment of the present invention verify device structural representation.
Embodiment
To make those skilled in the art more fully understand technical scheme, below in conjunction with the accompanying drawings and specifically
Embodiment is described in further detail to the present invention.Embodiments of the present invention are described in more detail below,
The example of the embodiment is shown in the drawings, wherein same or similar label represents identical from beginning to end
Or similar element or the element with same or like function.Below with reference to the embodiment party of accompanying drawing description
Formula is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.This technology is led
Field technique personnel are appreciated that unless expressly stated, singulative " one " used herein, "one",
" described " and "the" may also comprise plural form.It is to be further understood that the specification of the present invention
The middle wording " comprising " used refers to the feature, integer, step, operation, element and/or component be present,
But it is not excluded that in the presence of or other one or more features of addition, integer, step, operation, element, group
Part and/or their group.It should be understood that when we claim element to be " connected " or " coupled " to another element
When, it can be directly connected or coupled to other elements, or there may also be intermediary element.In addition, this
In " connection " or " coupling " that uses wireless connection or coupling can be included.Wording used herein " and/
Or " include any cell of one or more associated list items and all combine.The art skill
Art personnel are appreciated that unless otherwise defined, all terms used herein (including technical term and science
Term) with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also
Have and prior art it should be appreciated that those terms defined in such as general dictionary should be understood that
The consistent meaning of meaning in context, and unless defined as here, idealization or excessively will not be used
Formal implication is explained.
Involved execution flow, specifically may operate in system as shown in Figure 1 in the present embodiment, wherein
Including the identifying code server for generating simultaneously admin-authentication code, for storing the history number of corresponding user's mark
According to database and for user issue identifying code front-end server, user by operate mobile terminal or
The user equipmenies such as person's PC, access front-end server and carry out corresponding business operation, in business operation
During, front-end server is issued in the link for needing to carry out safety verification by identifying code to user equipment
The identifying code provided by identifying code server.Specifically, user equipment can with implementation into an independent table apparatus,
Or it is integrated in a variety of media data playing devices, such as set top box, mobile phone, tablet personal computer
(Tablet Personal Computer), laptop computer (Laptop Computer), multimedia
Device, digital camera, personal digital assistant (personal digital assistant, abbreviation PDA),
Guider, mobile Internet access device (Mobile Internet Device, MID) or wearable device
(Wearable Device) etc..The historical data of corresponding user's mark can also be stored in front-end server,
Such as:Front-end server is connected and is integrated in operation system with database, and operation system is by business provider
Operation;Identifying code server set corresponds to user into identifying code management platform to operation system acquisition request
The historical data of mark.Specifically, in system as shown in Figure 1, the interaction of each equipment can wrap
Include:
Identifying code is generated by identifying code server, and is stored in database.
Front-end server obtains customer service operation requests, and gathers the user behavior data.
Identifying code server feeds back different Authentication-Types and the identifying code of complexity according to user behavior data;Or
The identifying code of generation is sent to front-end server by person, identifying code server in advance, and by front-end server according to
Different Authentication-Types and the identifying code of complexity are fed back according to user behavior data.
Front-end server receives the checking information of user's input, and determines whether to be proved to be successful, wherein for judging
The comparison code (or being Validation Answer Key) being whether proved to be successful can be previously generated by identifying code server
And it is sent to front-end server;The checking information that user inputs can also be sent to checking by front-end server
Code server, and determine whether to be proved to be successful by identifying code server and result of determination is fed back into front-end server,
The result for being proved to be successful/being failed by front-end server issue again.
The embodiment of the present invention provides a kind of service verification method, as shown in Fig. 2 including:
S1, the historical data identified according to corresponding user generate the correct item of identifying code that the corresponding user identifies,
And at least two identifying codes of corresponding user's mark are generated according to the correct item of the identifying code.
In the present embodiment, user's mark can be specifically the account information of user, ID number or to user
Identification code of terminal distribution etc..
In the present embodiment, the historical data of corresponding user's mark includes:Corresponding user's mark
Record, operation note, transaction record and/or logistics information are browsed, the transaction record is included at the appointed time
In the range of correspond to the sequence information of user mark, the sequence information includes using in the range of at the appointed time
The commodity category and/or commodity amount of family purchase.Wherein, the correct item of identifying code can specifically be included to application
The content information that extracts in the historical data of family mark, the content information extracted have recorded user when specified
Interior browses the information such as record, operation note, transaction record and/or logistics information.
Such as:User is identified as the account pet name of user, and identifying code server browses from the corresponding account pet name
The commodity category and statistics that extracting data user is browsed by the account in given number of days obtain number of visits
Most commodity categories, such as clothes, then using the most commodity category of number of visits as the correct item of identifying code,
And the just list of a variety of commodity categories including the most commodity category of number of visits is generated, and scheming
Display reminding message " you please be select and browsed most commodity in upper one week " in piece list, so as to generate such as figure
The identifying code of picture selection class shown in 3 (be able to can also be shown correspondingly in figure with the title of display of commodity category
The picture of commodity category), afterwards by the identifying code and the correct item forward end of identifying code of the picture generated selection class
Server is sent.
Again for example:User is identified as the cell-phone number of user, transaction note of the identifying code server from corresponding cell-phone number
The quantity on order or wait to sign that extraction user is signed for by the account in given number of days in record and/or logistics information
The quantity on order of receipts, such as identifying code server can be used by reading logistics information statistics in given number of days
Family successfully completes the quantity on order signed for or quantity on order to be signed for, then is ordered what is signed in given number of days
Odd number amount or quantity on order to be signed for generate testing for question and answer class as shown in Figure 4 as the correct item of identifying code
Code is demonstrate,proved, afterwards sends the identifying code of the question and answer class generated and the correct item forward end server of identifying code.
In the present embodiment, identifying code server can generate and manage the different identifying code of at least two difficulty,
Specific at least two identifying code sorts according to difficult parameters.Wherein, can be with for a type of identifying code
Corresponding difficult parameters value is set, the bigger expression of numerical value is more difficult to, such as:Verified according to the character input of display
The difficult parameters of the verification mode of code are 1, such as:Figure identifies identifying code, typically by 4-digit number, letter
And/or its combination is formed, it is applied to not be related to user sensitive information and identity school because interactive form is more friendly
The situation tested, and different grade of difficulty can also be further set:The difficulty ginseng that naked eyes are readily recognized that
Number for 1, visually identify the difficult parameters for having few error situation be 1.5, the visually more difficult and error rate of identification
High difficult parameters are 1.9;The difficult parameters of the identifying code of picture selection class are 2;The identifying code of question and answer class
The difficult parameters of identifying code are 3.Specifically, in the practical application of the present embodiment, can be answered according to specific
With the difficulty of the self-defined all types of identifying code of scene.Further, other classes can be also used in the present embodiment
The identifying code of type, such as:The proof scheme of click action is completed according to prompting, that is, shows a number of figure
Piece, and require that user clicks on picture concerned as indicated, be applicable to user's assets, neck certificate, panic buying,
The scenes such as activity, and can also further set different grade of difficulty, such as common people to be readily recognized that,
And anyone identification all acquires a certain degree of difficulty.Again for example:Drag action or sliding trace are completed by prompting
Proof scheme, with reference to example as shown in Figure 5.
S2, the user behavior data identified according to corresponding user determine validation difficulty.
Wherein, the user behavior data can be temporal information, address information and/or operation trace etc..And
And it can further analyze user type or customer service by gathering user behavior data.Wherein, institute
The occasion that customer service includes but is not limited to need authentication is stated, such as:Log in, lead certificate, panic buying, use
Family asset management.When user carries out business operation, member account can be inputted first, described in collection of server
The historical record behavior of member account, then user type can be analyzed, such as:Whether it is malicious attack, Huang
Ox, recruit, high-quality member etc..And different Authentication-Types or complexity can be fed back according to user type
Identifying code.Such as:For new user, the higher verification mode of feedback grade of difficulty;For high-quality member,
Feed back simple character checking.Further, decision verification code difficulty, can also according to air control center to
Family behavioral data analysis result, for example monitor whether as robot brush machine etc., can also be according to the business of user
Behavior judgement, such as:At the appointed time the lower odd number in section, lower odd number then need to improve hardly possible counting user extremely
Degree.
S3, the corresponding user's mark of the validation difficulty extraction determined by identifying code, and will be extracted
Identifying code to user equipment issue.
Front-end server receives the checking information or operation information of user's input, such as:Completed according to prompting
The proof scheme of click action, or the proof scheme by prompting completion drag action or sliding trace,
And the correct item of identifying code or the correct option of identifying code provided with identifying code server is compared, according to
Comparison result determines whether to be proved to be successful.
In the present embodiment, in addition to:According to predetermined period, generated according to the correct item of the identifying code corresponding
The identifying code of user's mark, and send generated identifying code and the identifying code generated to checking equipment
Difficult parameters.In order to verify the identifying code to be sorted according to difficult parameters that renewal of the equipment preserved.Such as:
Identifying code server can refresh the correct item of identifying code according to the specified time cycle, such as:Each Zhou Douchong
Commodity categories newly most to user's number of visits count, and using the correct item of identifying code after renewal more
The identifying code of new selection class or question and answer class.
In the present embodiment, the user behavior data includes temporal information, address information and/or operation trace.
The user behavior data identified according to corresponding user determines validation difficulty, including:
Determined whether according to the temporal information within the business activity time specified, if then basis
The type of the business activity specified determines validation difficulty.Such as:" in the advertising campaign such as double 11 ",
In order to farthest prevent the quick-fried single situation of automatic script, difficult parameters value can be used in advertising campaign
Not less than the identifying code of appointed threshold (such as 2).
And/or the address information is parsed, and the content obtained according to parsing determines the peace of the address information
Whole degree, validation difficulty is determined according to identified safe coefficient.Such as:Front-end server can record it is black/
White list, for the IP address being recorded in blacklist, minimum threshold can be not less than using difficult parameters value
The identifying code of (such as 2);For the IP address being recorded in white list, difficult parameters value can be used little
Identifying code in max threshold (such as 1.5).
And/or detect whether abnormal operation behavior be present according to the operation trace, tested if then selection is specified
Demonstrate,prove the identifying code of difficulty.Such as:Anti- plug-in, the abnormal number of detecting used in current online game can be used
According to scheme, detection user terminal whether there is abnormal operation behavior.
In the present embodiment, in addition to:The warning information that air control center is sent is received, if warning information points to
User's mark, then set validation difficulty as highest difficulty.Wherein, air control center can be specifically with it is preceding
Hold the air control system of the connected manual or automatic operation of server.
The further way to manage that can also take following identifying code difficulty in the present embodiment:
From the historical data of corresponding user's mark, user's mark is corresponded in the range of extraction at the appointed time
Liveness information, the liveness information include transaction record and/or login record.When at the appointed time scope
The transaction count of interior completion is in given transaction quantity section.And/or the login in the range of at the appointed time
It is recorded in specify and logs in quantity section, then extraction is sorted close to the identifying code of most easy difficulty according to difficult parameters.
The user of normal range (NR) is in hence for the transaction count completed in the range of at the appointed time reduces identifying code
Difficulty.
Service verification method provided in an embodiment of the present invention, the historical data generation pair identified according to corresponding user
The correct item of identifying code of user's mark is answered, and the corresponding user is generated according to the correct item of the identifying code
At least two identifying codes of mark;Validation difficulty is determined further according to the user behavior data of corresponding user's mark;
The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and tested what is extracted
Code is demonstrate,proved to issue to user equipment.Relative in the prior art using fixed, single verification mode, the present invention
Embodiment can be according to user's history behavioral data, and dynamic adjusts verification mode difficulty, and increase improves man-machine
Recognition accuracy, so as to improve the success rate for stopping malice instrument.
The present embodiment also provides a kind of business checking device, specifically may operate on identifying code server, such as
Described in Fig. 6, business checking device includes:
Identifying code generation module, the historical data for being identified according to corresponding user generate the corresponding user and marked
The correct item of identifying code of knowledge, and generate at least the two of corresponding user's mark according to the correct item of the identifying code
Kind identifying code, at least two identifying code sort according to difficult parameters.
Wherein, the historical data of corresponding user's mark includes:Corresponding user's mark browse record,
Operation note, transaction record and/or logistics information, the transaction record include corresponding in the range of at the appointed time
The sequence information of user's mark, the sequence information include the business of user's purchase in the range of at the appointed time
Product category and/or commodity amount.
Difficulty management module, the user behavior data for being identified according to corresponding user determine validation difficulty.
Release module, the identifying code identified for the corresponding user of validation difficulty extraction determined by,
And the identifying code extracted is issued to user equipment.
Further, as shown in fig. 7, can also include:Update module, for according to predetermined period, according to
The identifying code of the corresponding user's mark of the correct item generation of identifying code, and send and generated to checking equipment
Identifying code and the difficult parameters of identifying code that are generated, in order to verify that renewal of the equipment preserved according to difficulty
Spend the identifying code of parameter marshalling.
In the present embodiment, the difficulty management module, it is current specifically for being determined according to the temporal information
Whether within the business activity time specified, if then being determined according to the type of the business activity specified
Validation difficulty, the user behavior data include temporal information, address information and/or operation trace.
And/or specifically for parsing the address information, and the content obtained according to parsing determines the address
The safe coefficient of information, validation difficulty is determined according to identified safe coefficient.
And/or specifically for detecting whether abnormal operation behavior be present according to the operation trace, if then selecting
Select the identifying code of specific authentication difficulty.
In the present embodiment, the difficulty management module, it is additionally operable to receive the warning information that air control center is sent,
If warning information points to user's mark, validation difficulty is set as highest difficulty.
Business provided in an embodiment of the present invention verifies device, the historical data generation pair identified according to corresponding user
The correct item of identifying code of user's mark is answered, and the corresponding user is generated according to the correct item of the identifying code
At least two identifying codes of mark;Validation difficulty is determined further according to the user behavior data of corresponding user's mark;
The identifying code of the corresponding user's mark of the validation difficulty extraction determined by afterwards, and tested what is extracted
Code is demonstrate,proved to issue to user equipment.Relative in the prior art using fixed, single verification mode, the present invention
Embodiment can be according to user's history behavioral data, and dynamic adjusts verification mode difficulty, and increase improves man-machine
Recognition accuracy, so as to improve the success rate for stopping malice instrument.
Each embodiment in this specification is described by the way of progressive, identical phase between each embodiment
As part mutually referring to, what each embodiment stressed be it is different from other embodiment it
Place.For apparatus embodiments, because it is substantially similar to embodiment of the method, so describing
Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Those of ordinary skill in the art can
It is that can be referred to by computer program to understand all or part of flow realized in above-described embodiment method
Related hardware is made to complete, described program can be stored in a computer read/write memory medium, the journey
Sequence is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can
For magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory
(Random Access Memory, RAM) etc..The foregoing is only a specific embodiment of the invention,
But protection scope of the present invention is not limited thereto, any one skilled in the art is in the present invention
In the technical scope of exposure, the change or replacement that can readily occur in should all be covered in protection scope of the present invention
Within.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (10)
- A kind of 1. service verification method, it is characterised in that including:The correct item of identifying code that the corresponding user of historical data generation identified according to corresponding user identifies, and At least two identifying codes identified according to the correct corresponding user of item generation of the identifying code, described at least two Kind identifying code sorts according to difficult parameters;Validation difficulty is determined according to the user behavior data that corresponding user identifies;The identifying code identified according to the corresponding user of identified validation difficulty extraction, and tested what is extracted Code is demonstrate,proved to issue to user equipment.
- 2. according to the method for claim 1, it is characterised in that the history number of corresponding user's mark According to including:Corresponding user's mark browses record, operation note, transaction record and/or logistics information, The transaction record includes corresponding to the sequence information of user's mark, the order in the range of at the appointed time Information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
- 3. according to the method for claim 1, it is characterised in that also include:According to predetermined period, the identifying code for corresponding to the user and identifying is generated according to the correct item of the identifying code, And the difficult parameters of generated identifying code and the identifying code generated are sent to checking equipment, in order to verify The identifying code to be sorted according to difficult parameters that renewal of the equipment is preserved.
- 4. according to the method for claim 1, it is characterised in that the user behavior data includes the time Information, address information and/or operation trace;The user behavior data identified according to corresponding user determines validation difficulty, including:Determined whether according to the temporal information within the business activity time specified, if then basis The type of the business activity specified determines validation difficulty;And/or the address information is parsed, and the content obtained according to parsing determines the peace of the address information Whole degree, validation difficulty is determined according to identified safe coefficient;And/or detect whether abnormal operation behavior be present according to the operation trace, tested if then selection is specified Demonstrate,prove the identifying code of difficulty.
- 5. according to the method for claim 1, it is characterised in that also include:The warning information that air control center is sent is received, if warning information points to user's mark, setting is tested Card difficulty is highest difficulty.
- 6. a kind of business verifies device, it is characterised in that including:Identifying code generation module, the historical data for being identified according to corresponding user generate the corresponding user and marked The correct item of identifying code of knowledge, and generate at least the two of corresponding user's mark according to the correct item of the identifying code Kind identifying code, at least two identifying code sort according to difficult parameters;Difficulty management module, the user behavior data for being identified according to corresponding user determine validation difficulty;Release module, the identifying code identified for the corresponding user of validation difficulty extraction determined by, And the identifying code extracted is issued to user equipment.
- 7. device according to claim 6, it is characterised in that the history number of corresponding user's mark According to including:Corresponding user's mark browses record, operation note, transaction record and/or logistics information, The transaction record includes corresponding to the sequence information of user's mark, the order in the range of at the appointed time Information includes the commodity category and/or commodity amount of user's purchase in the range of at the appointed time.
- 8. device according to claim 6, it is characterised in that also include:Update module, for according to predetermined period, the corresponding user to be generated according to the correct item of the identifying code The identifying code of mark, and join to the difficulty of checking the generated identifying code of equipment transmission and the identifying code generated Number, in order to verify the identifying code to be sorted according to difficult parameters that renewal of the equipment preserved.
- 9. device according to claim 6, it is characterised in that the difficulty management module is specific to use In being determined whether to be in the business activity time specified according to the temporal information, if then according to institute The type for stating the business activity specified determines validation difficulty, the user behavior data include temporal information, Location information and/or operation trace;And/or specifically for parsing the address information, and the content obtained according to parsing determines the address The safe coefficient of information, validation difficulty is determined according to identified safe coefficient;And/or specifically for detecting whether abnormal operation behavior be present according to the operation trace, if then selecting Select the identifying code of specific authentication difficulty.
- 10. device according to claim 6, it is characterised in that the difficulty management module, be additionally operable to The warning information that air control center is sent is received, if warning information points to user's mark, setting checking is difficult Spend for highest difficulty.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610272888.3A CN107341384A (en) | 2016-04-28 | 2016-04-28 | A kind of service verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610272888.3A CN107341384A (en) | 2016-04-28 | 2016-04-28 | A kind of service verification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107341384A true CN107341384A (en) | 2017-11-10 |
Family
ID=60221838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610272888.3A Pending CN107341384A (en) | 2016-04-28 | 2016-04-28 | A kind of service verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107341384A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108173864A (en) * | 2017-12-29 | 2018-06-15 | 咪咕文化科技有限公司 | Information verification mode adjusting method and device and storage medium |
CN108449186A (en) * | 2018-06-11 | 2018-08-24 | 北京京东金融科技控股有限公司 | Safe verification method and device |
CN108650226A (en) * | 2018-03-30 | 2018-10-12 | 平安科技(深圳)有限公司 | A kind of login validation method, device, terminal device and storage medium |
CN109447758A (en) * | 2018-11-02 | 2019-03-08 | 北京汉迪移动互联网科技股份有限公司 | Using the method and relevant apparatus of interior purchase |
CN110427745A (en) * | 2019-07-02 | 2019-11-08 | 五八有限公司 | Identifying code acquisition methods, device, electronic equipment and computer-readable medium |
CN110689400A (en) * | 2019-08-29 | 2020-01-14 | 苏宁云计算有限公司 | Man-machine similar track detection method and device based on screen segmentation |
CN111597538A (en) * | 2020-04-02 | 2020-08-28 | 上海瀚之友信息技术服务有限公司 | Verification code generation method and system |
CN112926037A (en) * | 2020-12-30 | 2021-06-08 | 南京披云信息科技有限公司 | Internet of things authentication method and device and storage medium |
CN113496017A (en) * | 2020-04-08 | 2021-10-12 | 阿里巴巴集团控股有限公司 | Verification method, device, equipment and storage medium |
CN113961891A (en) * | 2021-10-26 | 2022-01-21 | 北京天融信网络安全技术有限公司 | User authentication method and device |
CN114757729A (en) * | 2022-03-03 | 2022-07-15 | 未鲲(上海)科技服务有限公司 | Transaction request processing method and device, terminal equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
CN102750464A (en) * | 2012-02-06 | 2012-10-24 | 青岛印象派信息技术有限公司 | Verification code method based on user identification |
CN102957682A (en) * | 2011-08-30 | 2013-03-06 | 北京百度网讯科技有限公司 | Method and equipment for providing picture verification code based on verification security level |
CN103853948A (en) * | 2012-11-28 | 2014-06-11 | 阿里巴巴集团控股有限公司 | User identity recognizing and information filtering and searching method and server |
CN104038502A (en) * | 2014-06-24 | 2014-09-10 | 五八同城信息技术有限公司 | Verification method and system |
CN104580075A (en) * | 2013-10-14 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | User login validation method, device and system |
-
2016
- 2016-04-28 CN CN201610272888.3A patent/CN107341384A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
CN102957682A (en) * | 2011-08-30 | 2013-03-06 | 北京百度网讯科技有限公司 | Method and equipment for providing picture verification code based on verification security level |
CN102750464A (en) * | 2012-02-06 | 2012-10-24 | 青岛印象派信息技术有限公司 | Verification code method based on user identification |
CN103853948A (en) * | 2012-11-28 | 2014-06-11 | 阿里巴巴集团控股有限公司 | User identity recognizing and information filtering and searching method and server |
CN104580075A (en) * | 2013-10-14 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | User login validation method, device and system |
CN104038502A (en) * | 2014-06-24 | 2014-09-10 | 五八同城信息技术有限公司 | Verification method and system |
Non-Patent Citations (1)
Title |
---|
FOREVER小娘门: "《京东重置密码怎么操作》", 《百度经验HTTPSJINGYAN.BAIDU.COMARTICLE647F0115BC1A847F2048A875.HTML》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108173864A (en) * | 2017-12-29 | 2018-06-15 | 咪咕文化科技有限公司 | Information verification mode adjusting method and device and storage medium |
WO2019184122A1 (en) * | 2018-03-30 | 2019-10-03 | 平安科技(深圳)有限公司 | Login verification method and apparatus, terminal device and storage medium |
CN108650226A (en) * | 2018-03-30 | 2018-10-12 | 平安科技(深圳)有限公司 | A kind of login validation method, device, terminal device and storage medium |
CN108449186A (en) * | 2018-06-11 | 2018-08-24 | 北京京东金融科技控股有限公司 | Safe verification method and device |
CN109447758B (en) * | 2018-11-02 | 2021-07-06 | 北京汉迪移动互联网科技股份有限公司 | Method and related apparatus for in-application purchasing |
CN109447758A (en) * | 2018-11-02 | 2019-03-08 | 北京汉迪移动互联网科技股份有限公司 | Using the method and relevant apparatus of interior purchase |
CN110427745A (en) * | 2019-07-02 | 2019-11-08 | 五八有限公司 | Identifying code acquisition methods, device, electronic equipment and computer-readable medium |
CN110689400A (en) * | 2019-08-29 | 2020-01-14 | 苏宁云计算有限公司 | Man-machine similar track detection method and device based on screen segmentation |
CN110689400B (en) * | 2019-08-29 | 2022-02-25 | 苏宁云计算有限公司 | Man-machine similar track detection method and device based on screen segmentation |
CN111597538A (en) * | 2020-04-02 | 2020-08-28 | 上海瀚之友信息技术服务有限公司 | Verification code generation method and system |
CN113496017A (en) * | 2020-04-08 | 2021-10-12 | 阿里巴巴集团控股有限公司 | Verification method, device, equipment and storage medium |
CN112926037A (en) * | 2020-12-30 | 2021-06-08 | 南京披云信息科技有限公司 | Internet of things authentication method and device and storage medium |
CN113961891A (en) * | 2021-10-26 | 2022-01-21 | 北京天融信网络安全技术有限公司 | User authentication method and device |
CN114757729A (en) * | 2022-03-03 | 2022-07-15 | 未鲲(上海)科技服务有限公司 | Transaction request processing method and device, terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107341384A (en) | A kind of service verification method and system | |
CN109034209B (en) | Training method and device for active risk real-time recognition model | |
US20170221111A1 (en) | Method for detecting spam reviews written on websites | |
US20160140626A1 (en) | Web page advertisement configuration and optimization with visual editor and automatic website and webpage analysis | |
CN108876213B (en) | Block chain-based product management method, device, medium and electronic equipment | |
CN108022080A (en) | One kind complaint processing method and relevant device | |
CN107679054A (en) | Data comparison method, device and readable storage medium storing program for executing | |
CN105101122A (en) | Verification code input method and device | |
CN110310123B (en) | Risk judging method and device | |
CN106487603A (en) | A kind of response test method and device | |
CN113574843B (en) | Distributed log for anomaly monitoring | |
CN106485261A (en) | A kind of method and apparatus of image recognition | |
CN107302586A (en) | A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing | |
CN110392155A (en) | It has been shown that, processing method, device and the equipment of notification message | |
CN118115178B (en) | Quality tracing method, system and equipment based on industrial Internet of things | |
KR20190115343A (en) | Operating method for post product management using managing server | |
CN111784360B (en) | Anti-fraud prediction method and system based on network link backtracking | |
CN102819801B (en) | A kind of antiforge system of testing for anti counterfeit appts | |
KR20150045543A (en) | Genuine product certification and sns posting system, and method using nfc tag and smart phone | |
CN105450462A (en) | On-line state monitoring method and system | |
CN116402334A (en) | Multimode data compliance analysis and intelligent evaluation method and device | |
JP6928073B2 (en) | How to identify fraudulent use in online services, devices, and computer programs | |
CN108364219A (en) | A kind of single monitoring method of record and terminal | |
Parthasarathy et al. | A framework for managing ethics in data science projects | |
CN112085469B (en) | Data approval method, device, equipment and storage medium based on vector machine model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171110 |