Joke Collection Website - Blessing messages - What is the prospect of behavior verification code?

What is the prospect of behavior verification code?

When it comes to authentication security, people will think of "verification code technology" because in the past 14 years, there was only "verification code"

A "verification security technology". But now the contradiction of "verification code" is getting bigger and bigger, which is mainly manifested in two points:

1 security is too low. In fact, any verification code can be easily cracked by ocr technology or by hiring a manual coding platform. Many webmasters understand this problem, but there is no way, because verifying security is also based on this technology.

In order to improve security, the user experience must be sacrificed, which is caused by the concept of verification code technology. Nowadays, the development of the network advocates interaction, and the interactive places need to be verified for security, which affects the degree of interaction. This problem really makes many webmasters have a headache. Behavior verification technology is a new generation of verification security technology, which advocates the arrival of verification security 2.0 era. Because of the long-term influence of verification code, we always think that the protection means of verification security should be "computer graphics", but we must admit that it will only be a dead end to continue to use "computer graphics" to develop verification security technology now, because computer programs really could not understand the meaning of pictures before 14 years ago, but is this assumption still true? How to identify cursive Chinese characters by handwriting board can crack various verification codes through ocr technology. Therefore, "behavior verification technology" introduces a brand-new concept of verification through behavior, while computer graphics only plays a preliminary protective role. The more important task is to guide users to complete a specific behavior, and then use the pioneering "multiple behavior discrimination algorithm" to comprehensively discriminate this behavior. This is the core idea of behavior verification. For example, the traditional verification code is like a lock (only based on the protection of computer graphics), while the new generation of behavior verification technology is like dozens of serial locks (now we have counted dozens of different behavior characteristics of human beings for analysis), and these dozens of locks must be opened at the same time by behavior. Security is improved, and the user experience is also improved. On Luojiashan River, the average time for user authentication is usually only 3.82 seconds, which is less than one third of the traditional authentication time. Users can basically cancel authentication within seconds after using it for 2-3 times (about 1 second). Moreover, we found that users like this verification method very much, and more than 40% users will continue to play 3-4 times after the first verification. Passing the new generation of behavior verification is completely subconscious (only the right brain needs to pass the verification), which greatly reduces the user's thinking burden.