CN106953832A - Handle the method and system of the suspicious account of network game - Google Patents

Handle the method and system of the suspicious account of network game Download PDF

Info

Publication number
CN106953832A
CN106953832A CN201610009142.3A CN201610009142A CN106953832A CN 106953832 A CN106953832 A CN 106953832A CN 201610009142 A CN201610009142 A CN 201610009142A CN 106953832 A CN106953832 A CN 106953832A
Authority
CN
China
Prior art keywords
account
address
registering
log
suspicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610009142.3A
Other languages
Chinese (zh)
Other versions
CN106953832B (en
Inventor
黄钟贵
范福生
詹彦安
江洪
李正
郑晟
岳万恕
陈宏展
刘德建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN201610009142.3A priority Critical patent/CN106953832B/en
Publication of CN106953832A publication Critical patent/CN106953832A/en
Application granted granted Critical
Publication of CN106953832B publication Critical patent/CN106953832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of method and system for handling the suspicious account of network game, including:Obtain the log-on message and log-on message of account;Count same registering IP address, log in IP address, logging device UUID or the registration of other same ways or the account data logged in, it is determined whether be suspicious account.Through the above way, the present invention is rejected by illegal invalid account, the load of energy real-time ensuring game server;Also it can effectively contain a large amount of brush behaviors of operating room, improve the rights and interests and Consumer's Experience of normal player so that normal players log and game are unaffected.

Description

Handle the method and system of the suspicious account of network game
Technical field
The present invention relates to network game technical field, more particularly, to a kind of method for handling the suspicious account of network game and it is System.
Background technology
All there are large quantities of operating room's accounts in current proper network game, it is carried out big using plug-in or instrument The register account number of batch and login game carry out sequence of operations, such as get reward transaction or brush gold coin is disturbed The disorderly behavior of game order.To promote the fair, just of game, it is necessary to provide a kind of for which Detection process technical scheme.
The content of the invention
The technical problems to be solved by the invention are:Account data for operating room carries out analysis mining, sieve Select this partial account number and carry out particular procedure, a good game environment can be provided to player, while right Server reduces a part of load.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:There is provided a kind of processing network game can The method for doubting account, including:
Obtain the log-on message and log-on message of account;
Count same registering IP address, log in IP address, logging device UUID or the registration of other same ways Or the account data logged in, it is determined whether it is suspicious account.
To solve the above problems, the present invention also provides a kind of system for handling the suspicious account of network game, including:
Data obtaining module, log-on message and log-on message for obtaining account;
Statistical analysis module, for counting same registering IP address, logging in IP address, logging device UUID Or the registration of other same ways or the account data logged in, it is determined whether it is suspicious account.
The beneficial effects of the present invention are:Prior art is different from, registration of the present invention by obtaining account is believed Breath and log-on message, and statistical analysis is to obtain testing result, and account is included in corresponding list respectively. Through the above way, the present invention is rejected by illegal invalid account, the load of energy real-time ensuring game server; Also it can effectively contain a large amount of brush behaviors of operating room, improve the rights and interests and user's body of normal player Test so that normal players log and game are unaffected.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the inventive method embodiment one;
Fig. 2 is the operation chart one of the specific embodiment of the invention;
Fig. 3 is the operation chart two of the specific embodiment of the invention;
Fig. 4 is the structural representation of present system embodiment.
Embodiment
To describe technology contents, the objects and the effects of the present invention in detail, below in conjunction with embodiment simultaneously Accompanying drawing is coordinated to be explained.
The design of most critical of the present invention is:For account data point are carried out from this stage for being registered to login Analysis statistics, finds out illegal account, and handled.
Fig. 1~Fig. 3 is refer to, the embodiment of the present invention one provides a kind of method for handling the suspicious account of network game, bag Include:
S1:Obtain the log-on message and log-on message of account;
S2:Count same registering IP address, log in IP address, logging device UUID (Universally Unique Identifier, computer is uniquely indicated) or the registration of other same ways or the account data logged in, it is determined whether For suspicious account.
Specifically, the present invention needs registrar, game to log in client, application data layer, answer Use program traffic logical process;
The log-on message includes registering IP address, logon mode and the UUID for registering equipment;Wherein register Mode includes netpage registration, client end AP P registrations and registered by other APP;
The log-on message includes logging in the UUID of IP address, login mode and logging device.
Wherein registrar is in user's registration, and by the registering IP address of user, logon mode, (webpage is noted Volume or client registers) record be submitted to application data layer.
And play and log in client in User logs in, the login IP address and PC UUID of user are submitted to Application data layer.
Application data layer be mainly used for storing and inquire about, such as existing MySql and SqlServer, but also its His memory technology.This layer data can be used for game client judgement and applied business logical process layer to judge to use.
In addition application data layer submits registrar and game client the data come, i.e., above-mentioned The registration IP of user, logon mode, the last logins IP, the PCUUID of the last login enter Row is excavated, statistics, the retrieval statistics of analysis, mainly progress data.As shown in figure 3,
And application data layer also includes white (black) list of white (black) lists of registration IP, and account, is divided into people Work is configured and dynamic configuration.Wherein human configuration is the source having been acknowledged, is dynamically configured as system judgement Source.It is mainly used in client and logs in judgement.Such as user A is put on the blacklist, then is logging in game visitor During the end of family, User logs in game is refused in client query to black list user is configured to, then.
Therefore, before the present invention program is implemented, in addition it is also necessary to obtain registering IP address, log in IP address and account White black list etc..
The content of application data layer statistics includes but is not limited to:
With log in an IP, PCUUID, registration IP sections of time interval in account number, and account prefix or Person's suffix overlaps account number, and when it reaches critical configuration condition, at application program service logic Reason, such as handles or stops login by the illegal account title in this part.Simultaneously can be to follow-up similar data such as The direct title processing of account or stop of (log in IP, log in MAC, register IP) are logged in.
Specifically, in a specific embodiment:
According to the log-on message and log-on message, it is determined whether be suspicious account or normal account;Specifically may be used Including but not limited to following several situations:
(1) statistics ought interior for the previous period (such as 5 days), the IP of register account number and corresponding logon mode, When the account that same registration IP or logon mode or equipment UUID are registered exceedes certain amount, such as 1000 It is individual, then arranged by these accounts or by registration IP or logon mode or equipment the UUID all accounts registered For suspicious account;For example, a certain IP have registered 1100 accounts altogether at nearly 5 days, then by 1100 accounts Number whole is classified as suspicious account, it is preferred that by 1100 accounts and the chartered account of IP past attempts All it is classified as suspicious account.
(2) to extract be not logged in certain time (such as 10 days) after registration to play and (register but without logging into trip Play 10 days) all accounts, count registration IP or the logon mode of these accounts or the IP that once logs in or The UUID of logging device, if identical IP quantity exceedes certain amount (such as 1000), by this part Account is classified as suspicious account.For example, there are 10000 registered accounts all from being not logged in nearest ten days, IP address during this 10000 account registrations is then counted, if wherein thering are 1100 to belong to same IP address registration , then this 1100 accounts are classified as suspicious account;Or, count this 10000 accounts once logged IP address or equipment UUID, if wherein there is 2000 once to be stepped in same IP address or same equipment Recorded, then this 2000 accounts are classified as suspicious account.
(3) statistics is within nearly a period of time (such as 10 days), by identical IP address or login mode or equipment The account quantity that UUID is logged in, if more than certain amount (such as 1000), using those accounts or once All accounts that the IP address or login mode or equipment UUID are logged in are considered as suspicious account;For example, a certain IP logged in 1200 accounts altogether at nearly 5 days, then 1200 accounts was all classified as into suspicious account, excellent Choosing, 1200 accounts and the IP account logged in the past are all classified as suspicious account.
(4) be extracted in do not logged in specific time period and account grade be less than grade threshold all accounts, system The IP or the UUID of logging device for counting the registration IP of these accounts or once logging in, if identical IP quantity surpasses Certain amount (such as 1000) is crossed, then this partial account number is classified as suspicious account.For example, nearest ten Have in it 10000 registered accounts all from be not logged in and account grade be less than 10 grades, then count this 10000 The IP address during registration of individual account, if wherein thering are 1100 to belong to same IP address registration, by this 1100 Individual account is classified as suspicious account;Or, count this 10000 accounts once logged IP address or equipment UUID, if wherein have 2000 it is once logged in same IP address or same equipment, by this 2000 Individual account is classified as suspicious account.
Judge above-mentioned statistics account number whether be less than account amount threshold (above-mentioned 1000), limit when Between section (above-mentioned 10 days or 5 days) and account grade threshold (above-mentioned 10 grades), can be as needed Or Internet Use setting.
Further, in the above-mentioned various methods for judging suspicious account, if having exceeded configuration critical value (for example N times of threshold value), then concerned account numbers are directly piped off.For example in above-mentioned (1) kind situation, if A certain IP have registered 10000 accounts at nearly 5 days altogether, and the critical value set is 9999, then by it is all this A little accounts are once piped off with the IP all accounts registered.Further, white list also can be set, White list, for having been acknowledged that account source is normal account, can manually be included in white by manual configuration List.Certainly, blacklist also can be by manual configuration, although for not in the above-mentioned suspicious account counted on In, but the improper account in account source is had confirmed that, it can pipe off manually.
For suspicious account, when user asks to log in, stop and log in or title, its account of user can be reminded Number exception.For blacklist account, then directly stop and log in or title;Wherein, suspicious account and black name Single account is consistent, is both needed to login to be blocked and title, in order to realize interactive experience, can be directed to actual feelings Condition is reminded.To white list account, then do not process, can normally log in.Certainly, most of account can Can be neither suspicious account, nor blacklist or white list account, are not also processed, can normally log in makes With.
It is different from prior art, the log-on message and log-on message of the invention by obtaining account, and statistical Account is included in corresponding list by analysis respectively with obtaining testing result.Through the above way, it is of the invention It is rejected by illegal invalid account, the load of energy real-time ensuring game server;Also work can effectively have been contained Make a large amount of brush behaviors of room, improve the rights and interests and Consumer's Experience of normal player so that normal players log And play unaffected.
Hold, as shown in figure 4, the present invention also provides a kind of system 100 for handling the suspicious account of network game, including:
Data obtaining module 110, log-on message and log-on message for obtaining account;
Statistical analysis module 120, sets for the same registering IP address of statistical analysis, login IP address, login Standby UUID or the registration of other same ways or the account data logged in, it is determined whether be suspicious account.
Wherein, the log-on message includes registering IP address, logon mode and the UUID for registering equipment;Its Middle logon mode includes netpage registration, client end AP P registrations and registered by other APP;
The log-on message includes logging in the UUID of IP address, login mode and logging device.
The system 100 also includes:
List setup module 130, for the white black list for obtaining registering IP address, logging in IP address and account;
Processing module 140, for suspicious account to be included in into white black list.
The statistical analysis module 120 specifically for:
Count same registering IP address, log in IP address, logging device UUID or the registration of other same ways Or the account quantity logged in, if more than predetermined value, it is determined that the account of the quantity is suspicious account, or The registering IP address is determined, IP address, logging device UUID or the registration of other same ways is logged in or logs in Under all accounts be suspicious account.
The statistical analysis module 120 specifically for:
Count the register account number and its quantity of identical registering IP address or logon mode in specific time period;
Or count in all registered accounts for not making to log in specific time period, identical registering IP address or note Account and its quantity that volume mode is registered;
Or the identical login for logging in IP address or login mode or logging device UUID in specific time period of statistics Account and its quantity;
Or count in all accounts that special time period is not logged in, registering IP address, the login once used IP address or logging device UUID identicals account and its quantity;
Or statistics is not logged in specific time period and account grade is less than in all accounts of grade threshold, notes Volume IP address, the login IP address or logging device UUID identicals account and its quantity that once use;
Judge whether the account quantity of above-mentioned statistics is more than account amount threshold;
If, it is determined that these accounts are suspicious account.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, every profit The equivalents made with description of the invention and accompanying drawing content, or directly or indirectly it is used in the technology of correlation Field, is included within the scope of the present invention.

Claims (10)

1. a kind of method for handling the suspicious account of network game, it is characterised in that including:
Obtain the log-on message and log-on message of account;
Count same registering IP address, log in IP address, logging device UUID or the registration of other same ways Or the account data logged in, it is determined whether it is suspicious account.
2. the method for the suspicious account of network game is handled according to claim 1, it is characterised in that:
The log-on message includes registering IP address, logon mode and the UUID for registering equipment;Wherein register Mode includes netpage registration, client end AP P registrations and registered by other APP;
The log-on message includes logging in the UUID of IP address, login mode and logging device.
3. the method for the suspicious account of network game is handled according to claim 1, it is characterised in that statistics is same Registering IP address, the account for logging in IP address, logging device UUID or the registration of other same ways or login Data, it is determined whether be suspicious account the step of be specially:
Count same registering IP address, log in IP address, logging device UUID or the registration of other same ways Or the account quantity logged in, if more than predetermined value, it is determined that the account of the quantity is suspicious account, or The registering IP address is determined, IP address, logging device UUID or the registration of other same ways is logged in or logs in Under all accounts be suspicious account.
4. the method for the suspicious account of network game is handled according to claim 3, it is characterised in that statistics is same Registering IP address, login IP address or account and its quantity under logging device UUID include:
Count the register account number and its quantity of identical registering IP address or logon mode in specific time period;
Or count in all registered accounts for not making to log in specific time period, identical registering IP address or note Account and its quantity that volume mode is registered;
Or the identical login for logging in IP address or login mode or logging device UUID in specific time period of statistics Account and its quantity;
Or count in all accounts that special time period is not logged in, registering IP address, the login once used IP address or logging device UUID identicals account and its quantity;
Or statistics is not logged in specific time period and account grade is less than in all accounts of grade threshold, notes Volume IP address, the login IP address or logging device UUID identicals account and its quantity that once use.
5. the method for the suspicious account of network game is handled according to claim 4, it is characterised in that
If the quantity of above-mentioned statistics exceedes critical value, suspicious account is piped off.
6. a kind of system for handling the suspicious account of network game, it is characterised in that including:
Data obtaining module, log-on message and log-on message for obtaining account;
Statistical analysis module, for counting same registering IP address, logging in IP address, logging device UUID Or the registration of other same ways or the account data logged in, it is determined whether it is suspicious account.
7. the system of the suspicious account of network game is handled according to claim 6, it is characterised in that:
The log-on message includes registering IP address, logon mode and the UUID for registering equipment;Wherein register Mode includes netpage registration, client end AP P registrations and registered by other APP;
The log-on message includes logging in the UUID of IP address, login mode and logging device.
8. the system of the suspicious account of network game is handled according to claim 6, it is characterised in that also included:
List setup module, for the white black list for obtaining registering IP address, logging in IP address and account;
Processing module, for suspicious account to be included in into white black list.
9. the system of the suspicious account of network game is handled according to claim 6, it is characterised in that the statistics Analysis module specifically for:Count same registering IP address, log in IP address, logging device UUID or its The registration of his same way or the account quantity logged in, if more than predetermined value, it is determined that the registering IP address, step on All accounts under IP address, logging device UUID or other same ways are registered or logged in are recorded as suspicious account Number.
10. the system of the suspicious account of network game is handled according to claim 9, it is characterised in that the system Count analysis module specifically for:
Count the register account number and its quantity of identical registering IP address or logon mode in specific time period;
Or count in all registered accounts for not making to log in specific time period, identical registering IP address or note Account and its quantity that volume mode is registered;
Or the identical login for logging in IP address or login mode or logging device UUID in specific time period of statistics Account and its quantity;
Or count in all accounts that special time period is not logged in, registering IP address, the login once used IP address or logging device UUID identicals account and its quantity;
Or statistics is not logged in specific time period and account grade is less than in all accounts of grade threshold, notes Volume IP address, the login IP address or logging device UUID identicals account and its quantity that once use;
Judge whether the account quantity of above-mentioned statistics is more than account amount threshold; If, it is determined that these accounts are suspicious account.
CN201610009142.3A 2016-01-07 2016-01-07 Method and system for processing online game suspicious account Active CN106953832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610009142.3A CN106953832B (en) 2016-01-07 2016-01-07 Method and system for processing online game suspicious account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610009142.3A CN106953832B (en) 2016-01-07 2016-01-07 Method and system for processing online game suspicious account

Publications (2)

Publication Number Publication Date
CN106953832A true CN106953832A (en) 2017-07-14
CN106953832B CN106953832B (en) 2020-04-07

Family

ID=59465860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610009142.3A Active CN106953832B (en) 2016-01-07 2016-01-07 Method and system for processing online game suspicious account

Country Status (1)

Country Link
CN (1) CN106953832B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481126A (en) * 2017-09-27 2017-12-15 北京同城必应科技有限公司 A kind of single method of anti-brush, server and client side
CN107733883A (en) * 2017-10-09 2018-02-23 武汉斗鱼网络科技有限公司 A kind of method and device for detecting batch registration account
CN107819746A (en) * 2017-10-25 2018-03-20 珠海金山网络游戏科技有限公司 A kind of database server reads the method and device that account form control user logs in
CN108073945A (en) * 2017-11-13 2018-05-25 珠海金山网络游戏科技有限公司 A kind of method and apparatus that density anticipation game studios are logged in based on equipment
CN108282490A (en) * 2018-02-09 2018-07-13 深圳壹账通智能科技有限公司 Processing method, device, computer equipment and the storage medium of abnormal registration user
CN108295477A (en) * 2018-01-26 2018-07-20 珠海金山网络游戏科技有限公司 A kind of game account safety detection method, system and device based on big data
CN108596653A (en) * 2018-04-04 2018-09-28 顺丰科技有限公司 A kind of discount coupon is abnormal to use detecting system, method, equipment and storage medium
CN109091871A (en) * 2018-09-17 2018-12-28 网易(杭州)网络有限公司 The plug-in player's detection method of game and device
CN110227268A (en) * 2018-03-06 2019-09-13 腾讯科技(深圳)有限公司 A kind of method and device detecting violation game account number
CN110418173A (en) * 2019-07-18 2019-11-05 北京达佳互联信息技术有限公司 Determine method, apparatus, server and the storage medium of exception account
CN111064741A (en) * 2019-12-27 2020-04-24 全知科技(杭州)有限责任公司 Method for identifying account borrowing risk in web application system
CN111298444A (en) * 2018-12-12 2020-06-19 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN112245930A (en) * 2020-09-11 2021-01-22 杭州浮云网络科技有限公司 Risk behavior identification method and device and computer equipment
CN113570199A (en) * 2021-06-30 2021-10-29 北京达佳互联信息技术有限公司 Information processing method, electronic resource distribution method, device, electronic equipment and storage medium
WO2022041529A1 (en) * 2020-08-26 2022-03-03 完美世界(北京)软件科技发展有限公司 Game cheat detection method and apparatus, computer program, and readable medium
CN116747525A (en) * 2023-08-21 2023-09-15 成都初心互动科技有限公司 Automatic studio script detection method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316262A (en) * 2007-05-31 2008-12-03 中兴通讯股份有限公司 Method for controlling repeated registration of the same account terminal
CN101626295A (en) * 2008-07-08 2010-01-13 中国移动通信集团公司 Method, device and system for guaranteeing security of network logon
US20130074164A1 (en) * 2006-10-04 2013-03-21 Rob Bartlett Method and system of securing accounts
CN103905532A (en) * 2014-03-13 2014-07-02 微梦创科网络科技(中国)有限公司 Microblog marketing account recognition method and system
CN104426885A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method and device for providing abnormal account
CN104980421A (en) * 2014-10-15 2015-10-14 腾讯科技(深圳)有限公司 Method and system for processing batch requests

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130074164A1 (en) * 2006-10-04 2013-03-21 Rob Bartlett Method and system of securing accounts
CN101316262A (en) * 2007-05-31 2008-12-03 中兴通讯股份有限公司 Method for controlling repeated registration of the same account terminal
CN101626295A (en) * 2008-07-08 2010-01-13 中国移动通信集团公司 Method, device and system for guaranteeing security of network logon
CN104426885A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method and device for providing abnormal account
CN103905532A (en) * 2014-03-13 2014-07-02 微梦创科网络科技(中国)有限公司 Microblog marketing account recognition method and system
CN104980421A (en) * 2014-10-15 2015-10-14 腾讯科技(深圳)有限公司 Method and system for processing batch requests

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481126A (en) * 2017-09-27 2017-12-15 北京同城必应科技有限公司 A kind of single method of anti-brush, server and client side
CN107733883A (en) * 2017-10-09 2018-02-23 武汉斗鱼网络科技有限公司 A kind of method and device for detecting batch registration account
CN107819746A (en) * 2017-10-25 2018-03-20 珠海金山网络游戏科技有限公司 A kind of database server reads the method and device that account form control user logs in
CN108073945A (en) * 2017-11-13 2018-05-25 珠海金山网络游戏科技有限公司 A kind of method and apparatus that density anticipation game studios are logged in based on equipment
CN108295477A (en) * 2018-01-26 2018-07-20 珠海金山网络游戏科技有限公司 A kind of game account safety detection method, system and device based on big data
CN108295477B (en) * 2018-01-26 2021-10-15 珠海金山网络游戏科技有限公司 Game account safety detection method, system and device based on big data
CN108282490A (en) * 2018-02-09 2018-07-13 深圳壹账通智能科技有限公司 Processing method, device, computer equipment and the storage medium of abnormal registration user
CN110227268A (en) * 2018-03-06 2019-09-13 腾讯科技(深圳)有限公司 A kind of method and device detecting violation game account number
CN110227268B (en) * 2018-03-06 2022-06-07 腾讯科技(深圳)有限公司 Method and device for detecting illegal game account
CN108596653A (en) * 2018-04-04 2018-09-28 顺丰科技有限公司 A kind of discount coupon is abnormal to use detecting system, method, equipment and storage medium
CN109091871A (en) * 2018-09-17 2018-12-28 网易(杭州)网络有限公司 The plug-in player's detection method of game and device
CN111298444A (en) * 2018-12-12 2020-06-19 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN111298444B (en) * 2018-12-12 2023-10-20 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN110418173A (en) * 2019-07-18 2019-11-05 北京达佳互联信息技术有限公司 Determine method, apparatus, server and the storage medium of exception account
CN111064741A (en) * 2019-12-27 2020-04-24 全知科技(杭州)有限责任公司 Method for identifying account borrowing risk in web application system
WO2022041529A1 (en) * 2020-08-26 2022-03-03 完美世界(北京)软件科技发展有限公司 Game cheat detection method and apparatus, computer program, and readable medium
CN112245930A (en) * 2020-09-11 2021-01-22 杭州浮云网络科技有限公司 Risk behavior identification method and device and computer equipment
CN113570199A (en) * 2021-06-30 2021-10-29 北京达佳互联信息技术有限公司 Information processing method, electronic resource distribution method, device, electronic equipment and storage medium
CN116747525A (en) * 2023-08-21 2023-09-15 成都初心互动科技有限公司 Automatic studio script detection method, device, equipment and medium

Also Published As

Publication number Publication date
CN106953832B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN106953832A (en) Handle the method and system of the suspicious account of network game
Liang et al. Factors contributing to the high prevalence of multidrug-resistant tuberculosis: a study from China
US8694608B2 (en) Client application fingerprinting based on analysis of client requests
US20160359773A1 (en) Electronic Communication System
CN107483500A (en) A kind of Risk Identification Method based on user behavior, device and storage medium
CN105049418B (en) A kind of screen game logs in the method and system of account number
CN105871702B (en) A kind of information identifying method and server
US10009394B2 (en) Techniques to broadcast live event data in real-time
US9948739B2 (en) Techniques to aggregate and broadcast live event data in real-time
CN108295477B (en) Game account safety detection method, system and device based on big data
CN104484359B (en) A kind of the analysis of public opinion method and device based on social graph
CN107122445A (en) Real-time question-and-answer game apparatus implementation method based on mobile phone
CN107465593B (en) Electronic resource transfer method and device
CN109495378A (en) Detect method, apparatus, server and the storage medium of abnormal account number
CN106354725B (en) Event anti-brushing method, device, server and system
CN107196889A (en) The detection method and device of corpse account
CN110113346A (en) A kind of network verification method, user terminal and server
KR101710824B1 (en) Method and system for third-party service platform login
CN107872491A (en) A kind of data processing method and device
US7509290B1 (en) Methods and apparatuses for differentiating users in multi-player web-based entertainment environments
CN106658207A (en) Information extracting method and device
Shayo et al. An examination of online electoral campaigning in Tanzania
CN110069910A (en) A kind of machine behavior determines method, web browser and web page server
CN109657166A (en) The Internet activity participatory approaches, device, equipment and readable storage medium storing program for executing
CN112383785B (en) Method and device for processing heat value and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant