Absrtact: Like unlocking the phone, drag the button to the right place to complete the puzzle to complete the verification. This is the verification solution for the validation of the tests. Compared with the traditional code-type verification, the user verification time can be
from the original because it eliminates the process of identification and input.
Like unlocking the phone, drag the button to the right place to complete the puzzle to complete the verification. This is the verification solution for the "Test of the Pole". Compared with the traditional code-type verification, because of the absence of "recognition", "input" and other processes, user verification time from the original possible more than 10 seconds reduced to only 2, 3 seconds. But the Wu Yu founder, said, although the process has become simple, but the security is much higher than the previous code-type verification.
Wu Yu revealed that this simple drag, the background can extract more than 40 variables, including drag position, drag speed and other dominant variables, and server data exchange and other recessive variables, as well as some random variables. Based on the above behavioral variables, and then through the core of the multiple behavior discriminant model, so that the background can distinguish between "human" and "malicious program."
The traditional code-type verification strategy is single, visible and static. The malicious program has been able to achieve the attack effect very maturely through the OCR recognition technology. Wu Yu It is difficult to quantify how much of the validation of an extremely validated behavior can improve security, but he gives an example. 265G Online Games Portal is one of the most inspected customers, it held every year of the game vote ranking activities "Billboard" are suspected of buying lists. And recently this time, there are many to provide a service to buy the list of hackers are to come to the door, said his home verification is no way to break, but has signed with customers, so to cooperate. Of course, the final refusal.
On the team side, Wu Yu was a former teacher at Wuhan University, the Wu National Key Laboratory for surveying and Mapping Remote sensing information (which is said to be one of the most important subjects in the world in Wu), and the research direction includes computer vision and machine learning. And the theory of Extreme examination includes computer vision, machine learning, biometrics, information security and other disciplines of the intersection. Another founder of the team worked in Huawei earlier. And the main members are Wu Yu in the field of some outstanding graduates, most of the international competition won. In short, this is a typical college-school team.
At present, the extremely inspection release product is called Gtweb, for the PC side website verification solution. Launched last October, in the absence of any promotion of the case has been more than 1300 Web site users, of which the game site is a large category, and also includes a higher security requirements of banks, securities and other institutions. Gtapp will also be introduced this year (for mobile end), Gtultimate (for banks, securities and other large customers to provide customized solutions).
In March last year, I got an investment in the small seed of the Angel Bay in Hangzhou, and this February I got a round of angels from Hubei province.
When it comes to innovation in validation, it is necessary to mention the point of contact. It also presents a validation based on behavior. User experience, touch requires the user to read the validation instructions, such as "Please drag the tie to the left of the appropriate position", the time may be slightly longer. And the security of this core barrier, two diverging, it is difficult to compare, stationmaster feel it attentively. Interestingly, the touch team is also a college school, by hit several graduates founder, take the Angel also from Hangzhou, an investment agency, media dream factory.