Safety verification method and device based on mouse track and computer equipment

A mouse trajectory and security verification technology, applied in the computer field, can solve problems affecting the normal user experience, etc., and achieve the effects of high speed, security and high efficiency.

Pending Publication Date: 2021-12-17
JINGDONG TECH HLDG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Verification codes can block machine attacks to a large extent, but this method often affects the normal experience of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device based on mouse track and computer equipment
  • Safety verification method and device based on mouse track and computer equipment
  • Safety verification method and device based on mouse track and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0028] The mouse track-based security verification method, device, computer equipment, and storage medium of the embodiments of the present application are described below with reference to the accompanying drawings.

[0029] figure 1 It is a schematic flowchart of the mouse track-based security verification method provided by the embodiment of the present application.

[0030] In the embodiment of the present application, the mouse track-based security check method is configured in a mouse track-based security check device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety verification method and device based on a mouse track and computer equipment, and particularly relates to the technical field of computers. The method comprises the following steps: in response to an acquired service request sent by a client, acquiring a mouse track of the client in a preset time period; performing segmented aggregation on the mouse track of the client within a preset time period to determine a first aggregation feature corresponding to the mouse track; and under the condition that the first aggregation feature corresponding to the mouse track is matched with any preset illegal aggregation feature, refusing the service request. Therefore, when the service request sent by the client is obtained, segmented aggregation is performed on the obtained mouse track of the client, and when the corresponding first aggregation feature is matched with the illegal aggregation feature, the service request is rejected, so that machine attacks can be effectively intercepted, the safety is guaranteed, and moreover, the interception speed is higher, the efficiency is higher, and good experience is provided for the user.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a mouse track-based security check method, device and computer equipment. Background technique [0002] With the vigorous development of computer technology, there is more and more machine traffic on the Internet. Some machine traffic may be web crawlers that collect information, and some machine traffic may be machine attacks from black and gray industrial chains. In order to protect their normal operations and their own interests from infringement, Internet companies need to prevent harmful attacks in various ways, and various types of verification codes have emerged as the times require. Verification codes can block machine attacks to a large extent, but this method often affects the normal experience of users. How to effectively intercept machine attacks without affecting user experience is very important. Contents of the invention [0003] This application ai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/83G06F21/60
CPCG06F21/83G06F21/602
Inventor 陈海龙王美青
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products