Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Human-machine recognition method and equipment

A human-machine identification and equipment technology, applied in the field of human-machine identification, can solve problems such as high cost, unrecognizable human-machine identification, and cumbersome SMS process

Inactive Publication Date: 2017-11-07
SECBOOT INFORMATION TECH CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, restricting the client based on IP is a network resource restriction, and now there is not much restriction effect. If an attacker has a large number of IP resource pools, he can easily bypass this restriction; as for device fingerprints, it is a physical resource restriction. If Malicious attackers have a lot of physical resources and can easily bypass client restrictions; browser fingerprint restrictions are request header restrictions. In general, camouflage can be modified to bypass client restrictions
[0005] As for identification methods such as verification code identification and graphic verification, most of them can be quickly cracked; mobile phone text messages are relatively cumbersome and costly.
[0006] At present, none of the existing identifications can carry out simple and effective human-machine identification, so a simple and effective human-computer identification method is currently needed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Human-machine recognition method and equipment
  • Human-machine recognition method and equipment
  • Human-machine recognition method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1 of the present invention discloses a method for human-machine identification, such as figure 1 as well as figure 2 Shown, including:

[0045] Step 101: Obtain behavior data of the client in a running state;

[0046] Wherein, the behavior data includes rotation data of the client, force data of the client, and orientation data of the client;

[0047] Specifically, in an actual embodiment, the client is a mobile client, that is, a mobile terminal, such as a mobile phone, a tablet computer, etc., the rotation data is monitored by a gyroscope, and the force data is Is obtained by monitoring by the accelerometer, and the orientation data is obtained by monitoring by the magnetometer positioning device.

[0048] However, current mobile terminals, such as mobile phones, because the gyroscopes, accelerometers, and magnetometer positioning devices mentioned above are already built into the mobile phones, they can directly obtain behavior data, without the need for addition...

Embodiment 2

[0066] In order to further illustrate the present invention, Embodiment 2 of the present invention also discloses a human-machine identification device, such as image 3 Shown, including:

[0067] The obtaining module 201 is configured to obtain behavior data of the client in the running state; wherein the behavior data includes rotation data of the client, force data of the client, and orientation data of the client;

[0068] The recognition module 202 is configured to determine that the operator of the client is a human when the behavior data corresponds to the behavior characteristics of the corresponding person in the preset behavior analysis model; and when the behavior data and the preset behavior data judgment model When the behavior data of the person does not match, it is determined that the operator of the client is a machine.

[0069] In a specific embodiment, such as Figure 4 As shown, the equipment also includes:

[0070] The defense module 203 is configured to initiate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a human-machine recognition method and equipment. The human-machine recognition method comprises the steps of obtaining behavior data of a client side under a running condition; if the behavior data is matched with behavior features of a corresponding human in a preset behavior analysis model, determining that the operator of the client side is a human; if the behavior data is not matched with behavior data of a human in a preset behavior data judgement model, determining that the operator of the client side is a machine. In this way, whether a human or a machine operates the client side is judged according to the judgement whether or not the behavior data of the client side in running, namely rotation data, stress data and bearing data of the client side in running, is matched with the behavior features of the corresponding human in the preset behavior analysis model, so that whether the operator is a human or a machine is recognized on the basis of the behavior features of the human operating the client side, and recognition is simple, precise and quick.

Description

Technical field [0001] The present invention relates to the field of human-machine identification, in particular to a method and equipment for human-machine identification. Background technique [0002] With the rapid development of the Internet, the early traditional game plug-in industry, that is, the use of machine slots, has now penetrated into the Internet risk control business security field. At present, most business software on the market targets this anti-human-machine technology based on human-machine recognition. It has not been widely used or even not used, which has caused some security problems in related businesses. [0003] The existing man-machine identification methods mainly include technologies such as restricted IP, device fingerprints, browser fingerprints, verification codes, graphic verification, and mobile phone text messages. [0004] However, restricting the client to IP is a restriction of network resources. Nowadays, there is not much restrictive effect....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 冯继强
Owner SECBOOT INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products