CN109150864B - Anti-cheating method and device based on secondary authentication - Google Patents

Anti-cheating method and device based on secondary authentication Download PDF

Info

Publication number
CN109150864B
CN109150864B CN201810883750.6A CN201810883750A CN109150864B CN 109150864 B CN109150864 B CN 109150864B CN 201810883750 A CN201810883750 A CN 201810883750A CN 109150864 B CN109150864 B CN 109150864B
Authority
CN
China
Prior art keywords
user
identification code
information
party server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810883750.6A
Other languages
Chinese (zh)
Other versions
CN109150864A (en
Inventor
张第
崔羽飞
魏进武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810883750.6A priority Critical patent/CN109150864B/en
Publication of CN109150864A publication Critical patent/CN109150864A/en
Application granted granted Critical
Publication of CN109150864B publication Critical patent/CN109150864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention discloses an anti-cheating method and device based on secondary authentication.A visit request comprises a first identification code distributed to a user by a third-party server, first user information corresponding to the first identification code is obtained according to user information corresponding to each identification code, the user is authenticated according to the first user information, if the user passes the authentication, the user is authenticated according to service authority data corresponding to each user identification code, an authority authentication result is obtained, the authority authentication result is sent to the third-party server, and whether the user accords with the qualification for participating in certain activity can be effectively judged by carrying out secondary authentication on the identity and the authority of the certain user, so that the user is effectively ensured to use one machine, and cheating is prevented.

Description

Anti-cheating method and device based on secondary authentication
Technical Field
The invention relates to the field of communication, in particular to a secondary authentication-based anti-cheating method and device.
Background
With the rapid development of the mobile internet, the mobile terminal user no longer satisfies the communication functions such as conversation, and it is a great trend of the mobile service development to obtain value-added services through the mobile terminal mainly based on the mobile phone. Mobile equipment manufacturers greatly improve the performance of mobile phones and provide technical support for popularization of mobile applications.
At present, with the continuous abundance of various products in the internet and the various marketing activities, manufacturers often draw a lottery, snatch gifts and other activities through the mobile phone numbers of users, the users visit a third-party website through mobile phones, and under many conditions, the third-party website cannot acquire the current mobile phone numbers of the users, so that some gamblers have the opportunity of using one mobile phone to input different mobile phone numbers to make a profit, and as an event host, the users are ensured to use one mobile phone to prevent cheating.
Therefore, how to effectively ensure that a user has one machine for use and prevent cheating becomes a technical problem which needs to be solved in the field.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for preventing cheating based on secondary authentication, so as to overcome the technical problem in the prior art how to effectively ensure that a user can use one machine for one use, thereby preventing cheating.
In a first aspect, an embodiment of the present application provides a secondary authentication-based anti-cheating method, including:
receiving an access request of a user, wherein the access request comprises a first identification code distributed to the user by a third-party server;
acquiring first user information corresponding to the first identification code according to user information corresponding to each identification code, and performing identity authentication on the user according to the first user information;
if the identity authentication is passed, performing authority authentication on the user according to the service authority data corresponding to each user identification code to obtain an authority authentication result;
and sending the authority authentication result to the third-party server.
With reference to the first aspect, an embodiment of the present application provides a first possible implementation manner of the first aspect, where the method further includes:
receiving and sending a registration request of a user to a third-party server so that the third-party server allocates a first identification code to the user;
acquiring first user information of the user according to the registration request, and acquiring a first identification code distributed to the user by the third-party server;
and establishing a corresponding relation between the first identification code and the first user information.
With reference to the first aspect, an embodiment of the present application provides a second possible implementation manner of the first aspect, where the method further includes:
and receiving and storing the service authority data corresponding to each identification code sent by the third-party server.
With reference to the first aspect, an embodiment of the present application provides a third possible implementation manner of the first aspect, where the method further includes:
acquiring user characteristics of each user according to historical service data of each user;
generating characteristic information of each user according to the identification code of each user, wherein the characteristic information of each user comprises the identification code and the user characteristic of the user;
and sending the characteristic information of each user to the third-party server.
With reference to the third possible implementation manner of the first aspect, an embodiment of the present application provides a fourth possible implementation manner of the first aspect, and the method further includes:
receiving a pushing request sent by a third-party server, wherein the pushing request comprises an identification code to be pushed and pushing information;
according to the user information corresponding to each identification code, obtaining the user information of the user to be pushed corresponding to the identification code to be pushed;
and pushing the push message to the user to be pushed according to the user information of the user to be pushed.
In a second aspect, an embodiment of the present application provides an anti-cheating device based on secondary authentication, including:
the receiving module is used for receiving an access request of a user, wherein the access request comprises a first identification code distributed to the user by a third-party server;
the first authentication module is used for acquiring first user information corresponding to the first identification code according to the user information corresponding to each identification code and authenticating the identity of the user according to the first user information;
the second authentication module is used for performing authority authentication on the user according to the service authority data corresponding to each user identification code if the identity authentication is passed, and acquiring an authority authentication result;
and the sending module is used for sending the authority authentication result to the third-party server.
In combination with the second aspect, this application provides a first possible implementation manner of the second aspect, and the apparatus further includes:
the request module is used for receiving and sending a registration request of a user to a third-party server so that the third-party server distributes a first identification code for the user;
the acquisition module is used for acquiring first user information of the user according to the registration request and acquiring a first identification code distributed to the user by the third-party server;
and the corresponding module is used for establishing the corresponding relation between the first identification code and the first user information.
In combination with the second aspect, this application provides a second possible implementation manner of the second aspect, and the apparatus further includes:
and the storage module is used for receiving and storing the service authority data corresponding to each identification code sent by the third-party server.
In combination with the second aspect, the present application provides a third possible implementation manner of the second aspect, where the apparatus further includes:
the characteristic module is used for acquiring the user characteristics of each user according to the historical service data of each user;
the characteristic module is also used for generating characteristic information of each user according to the identification code of each user, and the characteristic information of each user comprises the identification code and the user characteristics of the user;
the characteristic module is also used for generating characteristic information of each user, and the characteristic information comprises the identification code and the user characteristics of the user;
the characteristic module is also used for sending the characteristic information of each user to the third-party server.
With reference to the third possible implementation manner of the second aspect, the present application provides a fourth possible implementation manner of the second aspect, where the apparatus further includes:
the pushing module is used for receiving a pushing request sent by a third-party server, and the pushing request comprises an identification code to be pushed and pushing information;
the pushing module is further used for obtaining user information of the user to be pushed corresponding to the identification code to be pushed according to the user information corresponding to each identification code;
the pushing module is further configured to push the pushing message to the user to be pushed according to the user information of the user to be pushed.
The application provides a cheat-preventing method and device based on secondary authentication, operator authentication gateway receives user's access request, access request includes that the third party server does the first identification code that the user distributes, according to the user information that each identification code corresponds, acquires the first user information that first identification code corresponds, and according to first user information, right the user carries out authentication, accomplishes authentication for the first time to ensure the authenticity of user's identity, if authentication passes, then according to the business authority data that each user identification code corresponds, right the user carries out authority authentication, obtains the authority authentication result, accomplishes secondary authentication, in order to obtain the authority that the user participated in certain activity, then sends the authority authentication result to the third party server. By carrying out secondary authentication on the identity and the authority of a certain user, whether the user accords with the qualification of participating in certain activity can be effectively judged, so that the user is effectively ensured to use one machine, and cheating is prevented.
Drawings
Fig. 1 is a schematic flowchart of an anti-cheating method based on secondary authentication according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an anti-cheating method based on secondary authentication according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an anti-cheating device based on secondary authentication according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of an anti-cheating device based on secondary authentication according to a fourth embodiment of the present invention;
with the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Fig. 1 is a schematic flow chart of an anti-cheating method based on secondary authentication according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
101. receiving an access request of a user, wherein the access request comprises a first identification code distributed to the user by a third-party server;
102. acquiring first user information corresponding to the first identification code according to the user information corresponding to each identification code, and performing identity authentication on the user according to the first user information;
103. if the identity authentication is passed, performing authority authentication on the user according to the service authority data corresponding to each user identification code to obtain an authority authentication result;
104. and sending the authority authentication result to the third-party server.
In practical applications, the execution subject of the embodiment may be an anti-cheating device based on secondary authentication. In practical applications, the anti-cheating device based on the secondary authentication may be an operator authentication gateway, which may be implemented by a virtual device, such as a software code, or by an entity device written with a relevant execution code, such as a usb disk, or by an entity device integrated with a relevant execution code, such as a smart terminal, various computers, an authentication gateway, or the like. The anti-cheating device can be arranged independently or integrated on other devices, for example, the anti-cheating device can be integrated on an operator authentication gateway.
Examples are made in connection with actual scenarios: taking the execution subject of this embodiment as an operator authentication gateway as an example, in practical application, taking a lottery event that a user participates in a certain website as an example, the user connects to a base station of an operator through a mobile terminal, then the mobile terminal sends a request for participating in the lottery event to a third-party server through the base station, and the third-party server performs authority authentication on a telephone number in the request to determine whether the user can participate in the event. However, in many cases, the third-party server cannot acquire the corresponding relationship between the current mobile terminal and the phone number, which gives some speculators to use one mobile terminal to input different phone numbers (one machine has multiple purposes) to participate in the lottery for multiple times to make a profit.
In order to ensure one-machine use and prevent cheating, in the embodiment of the present application, specifically, a corresponding identification code is allocated to a user through a third-party server, and an operator authentication gateway receives an access request of the user, where the access request carries the identification code allocated to the user by the third-party server. It can be understood that the operator authentication gateway stores user information of the user, the user information includes related information such as a telephone number of the user, a serial number of the mobile terminal, and the like, and the operator authentication gateway can obtain the user information of the user who sends the request. The operator authentication gateway can acquire the user information corresponding to the identification code in the current user request according to the user information corresponding to each identification code, and perform identity authentication on the current user according to the acquired user information, wherein the content of the identity authentication can be whether the current user performs real-name registration or not. If the identity authentication is passed, then according to the service authority data corresponding to each user identification code, the service authority data can be the times, time and the like of the user's historical participation in the current request activity, the authority authentication is carried out on the current user, the authority authentication content can be whether the service authority data of the user meets the authentication standard, for example, whether the times of participation in the activity is greater than the times specified by the authentication standard or not, and then the authority authentication result can be obtained, and the operator authentication gateway sends the obtained authority authentication result to the third-party server. It should be noted that the third-party server may process the user request through the result of the authorization authentication, such as allowing or denying the user to participate in the activity.
For example: the third-party server distributes an identification code 001 for the user A, the operator authentication gateway receives an access request of the user A, the access request carries the identification code 001, the operator authentication gateway acquires user information such as a telephone number and a mobile terminal serial number of the user A, identity authentication is carried out on the user A according to the acquired telephone number and the acquired mobile terminal serial number, if the user A is registered in a real name, the identity authentication is passed, authority authentication is carried out on the user A, the authentication standard is whether the mobile terminal serial number corresponding to the user A participates in the current activity or not, then the authority authentication result is yes or no, and the operator authentication gateway sends the acquired authority authentication result to the third-party server. The third-party server can allow the user with the negative result to participate in the activity and reject the user with the positive result to participate in the activity according to the authority authentication result.
According to the anti-cheating method based on secondary authentication, the identity and the authority of a certain user are secondarily authenticated, and whether the user is qualified for participating in certain activity can be effectively judged, so that the user can be effectively ensured to use one machine, and cheating is prevented.
In order to establish a correspondence between the identification code and the user information, in an embodiment, the method may further include:
201. receiving and sending a registration request of a user to a third-party server so that the third-party server allocates a first identification code to the user;
202. acquiring first user information of a user according to a registration request, and acquiring a first identification code distributed to the user by a third-party server;
203. and establishing a corresponding relation between the first identification code and the first user information.
In practical application, specifically, before sending a request for participating in an activity, a user sends a registration request, an operator authentication gateway receives and sends the registration request of the user to a third-party server, the third-party server receives the registration request of the user, allocates a corresponding identification code for the user and returns the identification code to the operator authentication gateway and the user, and the operator authentication gateway acquires user information of the user according to the registration request, acquires the identification code of the user and establishes a corresponding relationship between the identification code of the user and the user information.
In the embodiment, through the registration request sent by the user, the third-party server allocates the corresponding identification code for the user, the corresponding relation between the identification code and the user information is established, the third-party server can perform related activities only by knowing the identification code of the user, and the third-party server can be prevented from directly acquiring the user information of the user, so that the purpose of protecting the privacy of the user is achieved.
There are various ways to acquire the service authority data used when performing the authority authentication on the user, and in one embodiment, the method may further include:
301. and receiving and storing the service authority data corresponding to each identification code sent by the third-party server.
In practical application, when the operator authentication gateway performs authority authentication on a user, service authority data of the user, such as the number of times of participating in a certain activity and corresponding time, are required, the service authority data can come from a third-party server, the third-party server sends the service authority data corresponding to each identification code to the operator authentication gateway, and the operator authentication gateway receives and stores the service authority data corresponding to each identification code so as to be used when the authority authentication is performed on the user corresponding to the identification code, thereby ensuring the accuracy of the authority authentication, being beneficial to ensuring that the user can use one machine and preventing cheating.
Example two
Fig. 2 is a schematic flow chart of an anti-cheating method based on secondary authentication according to a second embodiment of the present invention, where in order to output various activities hosted by a third-party server to a specific user group, as shown in fig. 2, on the basis of the first embodiment, the method may further include:
401. acquiring user characteristics of each user according to historical service data of each user;
402. generating characteristic information of each user according to the identification code of each user, wherein the characteristic information of each user comprises the identification code and the user characteristic of the user;
403. and sending the characteristic information of each user to a third-party server.
In practical application, specifically, the operator authentication gateway may obtain user characteristics of each user according to historical service data of each user, so as to classify the users. For example, the operator authentication gateway stores service data of the user a participating in the activities 1, 2 and 3, so that user characteristics such as frequency of the user a participating in various activities and types of preferred activities can be obtained. Secondly, feature information of each user is generated according to the identification code of each user, and the feature information of each user may include the identification code of the user and user features, for example, the feature information of the user a includes the identification code 001 of the user a and user features thereof. Finally, the operator authentication gateway sends the feature information of each user to the third-party server, so that the third-party server can select the required user according to the feature information of each user, for example, extracting a user group with low activity participation frequency or a user group preferring different types of activities.
In order to enable the third-party server to push the activity information to the user group of the corresponding type, in an implementation manner, on the basis of the second embodiment, the method may further include the following steps:
404. receiving a pushing request sent by a third-party server, wherein the pushing request comprises an identification code to be pushed and pushing information;
405. according to the user information corresponding to each identification code, obtaining the user information of the user to be pushed corresponding to the identification code to be pushed;
406. and pushing the push message to the user to be pushed according to the user information of the user to be pushed.
In practical application, firstly, the operator authentication gateway receives a push request sent by a third-party server, where the push request includes an identifier to be pushed and push information, where the identifier to be pushed refers to identifiers of users in a corresponding type of user group, and the push information may be information related to activities. Secondly, the operator authentication gateway can obtain the user information of the user to be pushed corresponding to the identification code to be pushed, such as the telephone number of the user to be pushed, according to the user information corresponding to each identification code. And finally, the operator authentication gateway pushes the push message to the user to be pushed, namely, the information related to the activity is pushed to the telephone number of the user to be pushed.
According to the anti-cheating method based on secondary authentication, on the premise that the user information of the user can not be directly provided for the third-party server, the characteristic information of the user is generated, various activities held by the third-party server can be output to make a user group, and then information related to the activities can be pushed to the user groups of corresponding types, so that the user privacy is protected, and the user participation rate and the activity effect of the related activities of the third party are improved.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
EXAMPLE III
Fig. 3 is a schematic structural diagram of an anti-cheating device based on secondary authentication according to a third embodiment of the present application, and as shown in fig. 3, the device may include:
the receiving module 501 is configured to receive an access request of a user, where the access request includes a first identification code allocated by a third-party server to the user;
the first authentication module 502 is configured to obtain first user information corresponding to the first identification code according to user information corresponding to each identification code, and perform identity authentication on a user according to the first user information;
the second authentication module 503 is configured to perform, if the identity authentication passes, authority authentication on the user according to the service authority data corresponding to each user identification code, so as to obtain an authority authentication result;
a sending module 504, configured to send the permission authentication result to the third-party server.
The anti-cheating device based on secondary authentication provided by the embodiment can effectively judge whether a user accords with the qualification of participating in certain activity or not by carrying out secondary authentication on the identity and the authority of the user, thereby effectively ensuring that the user can use one machine and preventing cheating.
In one embodiment, the apparatus may further comprise:
the request module is used for receiving and sending a registration request of a user to a third-party server so that the third-party server distributes a first identification code for the user;
the acquisition module is used for acquiring first user information of the user according to the registration request and acquiring a first identification code distributed to the user by the third-party server;
and the corresponding module is used for establishing the corresponding relation between the first identification code and the first user information.
In the embodiment, through the registration request sent by the user, the third-party server allocates the corresponding identification code for the user, the corresponding relation between the identification code and the user information is established, the third-party server can perform related activities only by knowing the identification code of the user, and the third-party server can be prevented from directly acquiring the user information of the user, so that the purpose of protecting the privacy of the user is achieved.
In one embodiment, the apparatus may further comprise:
and the storage module is used for receiving and storing the service authority data corresponding to each identification code sent by the third-party server.
In the embodiment, the operator authentication gateway receives and stores the service authority data corresponding to each identification code so as to be used when the authority authentication is performed on the user corresponding to the identification code, thereby ensuring the accuracy of the authority authentication, being beneficial to ensuring that the user can use one machine and preventing cheating.
Example four
Fig. 4 is a schematic structural diagram of an anti-cheating device based on secondary authentication according to a fourth embodiment of the present invention, as shown in fig. 4, on the basis of the third embodiment, the device may further include:
a feature module 601, configured to obtain user features of each user according to historical service data of each user;
the feature module 601 is further configured to generate feature information of each user according to the identification code of each user, where the feature information of each user includes the identification code of the user and user features;
the feature module 601 is further configured to generate feature information of each user, where the feature information includes an identification code of the user and a user feature;
the feature module 601 is further configured to send feature information of each user to a third-party server.
In one embodiment, the apparatus may further comprise:
the pushing module 602 is configured to receive a pushing request sent by a third-party server, where the pushing request includes an identification code to be pushed and pushing information;
the pushing module 602 is further configured to obtain user information of a user to be pushed corresponding to the identifier to be pushed according to the user information corresponding to each identifier;
the pushing module 602 is further configured to push the push message to the user to be pushed according to the user information of the user to be pushed.
The anti-cheating device based on secondary authentication provided by the embodiment can output various activities held by the third-party server to make user groups by generating the characteristic information of the user on the premise that the user information of the user can not be directly provided for the third-party server, and then can push the information related to the activities to the user groups of corresponding types, so that the user privacy is protected, and the user participation rate and the activity effect of the activities related to the third-party are improved.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. An anti-cheating method based on secondary authentication is characterized by comprising the following steps:
receiving an access request of a user, wherein the access request comprises a first identification code distributed to the user by a third-party server;
acquiring first user information corresponding to the first identification code according to user information corresponding to each identification code, and performing identity authentication on the user according to the first user information;
if the identity authentication is passed, performing authority authentication on the user according to the service authority data corresponding to each user identification code to obtain an authority authentication result;
sending the authority authentication result to the third-party server;
the method further comprises the following steps:
receiving and sending a registration request of a user to a third-party server so that the third-party server allocates a first identification code to the user;
acquiring first user information of the user according to the registration request, and acquiring a first identification code distributed to the user by the third-party server;
and establishing a corresponding relation between the first identification code and the first user information.
2. The method of claim 1, further comprising:
and receiving and storing the service authority data corresponding to each identification code sent by the third-party server.
3. The method of claim 1, further comprising:
acquiring user characteristics of each user according to historical service data of each user;
generating characteristic information of each user according to the identification code of each user, wherein the characteristic information of each user comprises the identification code and the user characteristic of the user;
and sending the characteristic information of each user to the third-party server.
4. The method of claim 3, further comprising:
receiving a pushing request sent by a third-party server, wherein the pushing request comprises an identification code to be pushed and pushing information;
according to the user information corresponding to each identification code, obtaining the user information of the user to be pushed corresponding to the identification code to be pushed;
and pushing the pushing information to the user to be pushed according to the user information of the user to be pushed.
5. An anti-cheating device based on secondary authentication, comprising:
the receiving module is used for receiving an access request of a user, wherein the access request comprises a first identification code distributed to the user by a third-party server;
the first authentication module is used for acquiring first user information corresponding to the first identification code according to the user information corresponding to each identification code and authenticating the identity of the user according to the first user information;
the second authentication module is used for performing authority authentication on the user according to the service authority data corresponding to each user identification code if the identity authentication is passed, and acquiring an authority authentication result;
the sending module is used for sending the authority authentication result to the third-party server;
the device further comprises:
the request module is used for receiving and sending a registration request of a user to a third-party server so that the third-party server distributes a first identification code for the user;
the acquisition module is used for acquiring first user information of the user according to the registration request and acquiring a first identification code distributed to the user by the third-party server;
and the corresponding module is used for establishing the corresponding relation between the first identification code and the first user information.
6. The apparatus of claim 5, further comprising:
and the storage module is used for receiving and storing the service authority data corresponding to each identification code sent by the third-party server.
7. The apparatus of claim 5, further comprising:
the characteristic module is used for acquiring the user characteristics of each user according to the historical service data of each user;
the characteristic module is also used for generating characteristic information of each user according to the identification code of each user, and the characteristic information of each user comprises the identification code and the user characteristics of the user;
the characteristic module is also used for generating characteristic information of each user, and the characteristic information comprises the identification code and the user characteristics of the user;
the characteristic module is also used for sending the characteristic information of each user to the third-party server.
8. The apparatus of claim 7, further comprising:
the pushing module is used for receiving a pushing request sent by a third-party server, and the pushing request comprises an identification code to be pushed and pushing information;
the pushing module is further used for obtaining user information of the user to be pushed corresponding to the identification code to be pushed according to the user information corresponding to each identification code;
the pushing module is further used for pushing the pushing information to the user to be pushed according to the user information of the user to be pushed.
CN201810883750.6A 2018-08-03 2018-08-03 Anti-cheating method and device based on secondary authentication Active CN109150864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810883750.6A CN109150864B (en) 2018-08-03 2018-08-03 Anti-cheating method and device based on secondary authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810883750.6A CN109150864B (en) 2018-08-03 2018-08-03 Anti-cheating method and device based on secondary authentication

Publications (2)

Publication Number Publication Date
CN109150864A CN109150864A (en) 2019-01-04
CN109150864B true CN109150864B (en) 2021-07-20

Family

ID=64791717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810883750.6A Active CN109150864B (en) 2018-08-03 2018-08-03 Anti-cheating method and device based on secondary authentication

Country Status (1)

Country Link
CN (1) CN109150864B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948362B (en) * 2019-03-08 2022-11-22 创新先进技术有限公司 Data access processing method and system
CN112105015B (en) * 2019-06-17 2022-08-26 华为技术有限公司 Secondary authentication method and device
CN114268461B (en) * 2021-11-26 2023-06-27 中国联合网络通信集团有限公司 User identity authentication method, device, server, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638473A (en) * 2012-05-04 2012-08-15 盛趣信息技术(上海)有限公司 User data authorization method, device and system
CN103269270A (en) * 2013-04-25 2013-08-28 安徽杨凌科技有限公司 Real-name authentication safe login method and system based on cell phone number
CN103401884A (en) * 2013-08-16 2013-11-20 深信服网络科技(深圳)有限公司 Authentication method and system for public wireless environment Internet access based on micro message
CN107204995A (en) * 2017-07-28 2017-09-26 郑州云海信息技术有限公司 A kind of system, certificate server and the method for control access rights

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11055721B2 (en) * 2013-10-30 2021-07-06 Tencent Technology (Shenzhen) Company Limited Method, device and system for information verification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638473A (en) * 2012-05-04 2012-08-15 盛趣信息技术(上海)有限公司 User data authorization method, device and system
CN103269270A (en) * 2013-04-25 2013-08-28 安徽杨凌科技有限公司 Real-name authentication safe login method and system based on cell phone number
CN103401884A (en) * 2013-08-16 2013-11-20 深信服网络科技(深圳)有限公司 Authentication method and system for public wireless environment Internet access based on micro message
CN107204995A (en) * 2017-07-28 2017-09-26 郑州云海信息技术有限公司 A kind of system, certificate server and the method for control access rights

Also Published As

Publication number Publication date
CN109150864A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
US11658963B2 (en) Cooperative communication validation
CN103944737A (en) User identity authentication method, third-party authentication platform and operator authentication platform
CN109150864B (en) Anti-cheating method and device based on secondary authentication
CN109327627A (en) Telephone number recognition methods, device and storage medium based on block chain
CN109769244B (en) Abnormal telephone card identification method, device, equipment and readable storage medium
CN104184713A (en) Terminal identification method, machine identification code registration method, and corresponding system and equipment
CN108055238A (en) A kind of account verification method and system
CN113067859B (en) Communication method and device based on cloud mobile phone
WO2015198136A1 (en) A method to authenticate calls in a telecommunication system
CN112866192B (en) Method and device for identifying abnormal aggregation behaviors
CN110611929A (en) Abnormal user identification method and device
CN111049822B (en) Short message verification code sending method and device, short message server and storage medium
CN106790199B (en) Verification code processing method and device
CN109558710B (en) User login method, device, system and storage medium
CN105187399A (en) Resource processing method and device
CN113709740A (en) Method and system for displaying account information on authorized login page
CN104967605B (en) Privacy protection method and privacy protection device
CN110366164B (en) Method for remotely controlling terminal, server, terminal and computing equipment
CN106254226A (en) A kind of information synchronization method and device
US11627218B2 (en) Caller identification information analyzer
CN105743859A (en) Method, device and system for authenticating light application
CN107809758B (en) SIM card information protection method and device
CN109600744B (en) Voice processing method and system
CN112004228B (en) Real person authentication method and system
KR102169265B1 (en) Checking Method for Information about Client's Mobile Phone Number, Information Providing Server, Client Managing Server, and Telecommunications Company Server Used Therein

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant