Security is much higher than the previous code verification

Source: Internet
Author: User
Keywords Unlock mobile phones solutions security
Tags behavior button code compared customers data exchange higher

Like unlocking the phone, drag the button to the right place to complete the puzzle to complete the verification. This is the verification solution for the "Test of the Pole". Compared with the traditional code-type verification, because of the absence of "recognition", "input" and other processes, user verification time from the original possible more than 10 seconds reduced to only 2, 3 seconds. But the Wu Yu founder, said, although the process has become simple, but the security is much higher than the previous code-type verification.

Wu Yu revealed that this simple drag, the background can extract more than 40 variables, including drag position, drag speed and other dominant variables, and server data exchange and other recessive variables, as well as some random variables. Based on the above behavioral variables, and then through the core of the multiple behavior discriminant model, so that the background can distinguish between "human" and "malicious program."

The traditional code-type verification strategy is single, visible and static. The malicious program has been able to achieve the attack effect very maturely through the OCR recognition technology. Wu Yu It is difficult to quantify how much of the validation of an extremely validated behavior can improve security, but he gives an example. 265G Online Games Portal is one of the most inspected customers, it held every year of the game vote ranking activities "Billboard" are suspected of buying lists. And recently this time, there are many to provide a service to buy the list of hackers are to come to the door, said his home verification is no way to break, but has signed with customers, so to cooperate. Of course, the final refusal.

On the team side, Wu Yu was a former teacher at Wuhan University, the Wu National Key Laboratory for surveying and Mapping Remote sensing information (which is said to be one of the most important subjects in the world in Wu), and the research direction includes computer vision and machine learning. And the theory of Extreme examination includes computer vision, machine learning, biometrics, information security and other disciplines of the intersection. Another founder of the team worked in Huawei earlier. And the main members are Wu Yu in the field of some outstanding graduates, most of the international competition won. In short, this is a typical college-school team.

At present, the extremely inspection release product is called Gtweb, for the PC side website verification solution. Launched last October, in the absence of any promotion of the case has been more than 1300 Web site users, of which the game site is a large category, and also includes a higher security requirements of banks, securities and other institutions. Gtapp will also be introduced this year (for mobile end), Gtultimate (for banks, securities and other large customers to provide customized solutions).

In March last year, I got an investment in the small seed of the Angel Bay in Hangzhou, and this February I got a round of angels from Hubei province.

When it comes to innovation in validation, it is necessary to mention the point of contact. It also presents a validation based on behavior. User experience, touch requires the user to read the validation instructions, such as "Please drag the tie to the left of the appropriate position", the time may be slightly longer. And the security of this core barrier, two diverging, it is difficult to compare, stationmaster feel it attentively. Interestingly, the touch team is also a college school, by hit several graduates founder, take the Angel also from Hangzhou, an investment agency, media dream factory.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.