CN107770575A - The method and device of brush present is prevented in a kind of live platform - Google Patents
The method and device of brush present is prevented in a kind of live platform Download PDFInfo
- Publication number
- CN107770575A CN107770575A CN201710930940.4A CN201710930940A CN107770575A CN 107770575 A CN107770575 A CN 107770575A CN 201710930940 A CN201710930940 A CN 201710930940A CN 107770575 A CN107770575 A CN 107770575A
- Authority
- CN
- China
- Prior art keywords
- account
- spectators
- present
- hacker
- agreement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/643—Communication protocols
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides the method and device that brush present is prevented in a kind of live platform, and methods described includes:S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;S2, if it is hacker's account that at least one judged result, which is spectators' account, after the present under capturing spectators' account is transferred under main broadcaster's account, the present shifted under main broadcaster's account under spectators' account is removed.One aspect of the present invention, by carrying out multiple-authentication to hacker, so that hacker is difficult around detection, improve the accuracy of hacker's detection, on the other hand, do not handled at once when finding hacker, and the present for afterwards shifting hacker under main broadcaster's account in the case where the present of brush is transferred to main broadcaster's account by hacker is reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
Description
Technical field
The present invention relates to technical field of network security, more particularly, to the side that brush present is prevented in a kind of live platform
Method and device.
Background technology
With the development of network interaction platform, increasing user is exchanged by logging in network interaction platform.Its
In, network direct broadcasting is the application being popular in users very much.
Live platform can send some free gifts, or complete in spectators to attract spectators to be watched to spectators
Present is freely got in the case of some tasks, so that spectators give the free gift to main broadcaster.Main broadcaster can be by present
Carry out cashing acquisition income, but spectators can not be cashed present.Some hackers are by writing script batch registration user, so
Present agreement is got freely to get present by writing script transmission afterwards.After hacker gets free gift, will freely it lead
The present taken is transferred under the account of main broadcaster, carries out the present freely got under main broadcaster's account to cash acquisition income,
Brought about great losses to live platform.
In the prior art, when server detects brush behavior, brush operation is prevented in time.So, hacker is known that at which
Being serviced device detects that, so as to be readily apparent that the inspection policies of server, hacker can bypass the detection plan next time in step operation
Slightly, brush behavior is continued.
The content of the invention
The problem of to overcome above-mentioned hacker to be readily apparent that the inspection policies of server, solves above-mentioned ask at least in part
Topic, the invention provides the method and device that brush present is prevented in a kind of live platform.
According to the first aspect of the invention, there is provided a kind of method that brush present is prevented in live platform, including:
S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
S2, if it is hacker's account that at least one judged result, which is spectators' account, capturing spectators' account
Under present be transferred under main broadcaster's account after, the present shifted under main broadcaster's account under spectators' account is gone
Remove.
Specifically, the step S1 is specifically included:
According to spectators get present operation and spectators client send get present agreement, judge spectators' account
Number whether it is hacker's account.
Specifically, the step of whether spectators' account is hacker's account according to spectators get the operation judges of present is specific
Including:
Obtain the spectators and get one kind or more in the duration of the operating of present, the order of the operation and the operation
Kind, the clicking operation for operating the input operation and mouse that include keyboard;
According to the result of acquisition, judge whether spectators' account is hacker's account.
Specifically, the present agreement of getting sent according to the client of spectators judges whether spectators' account is hacker's account
Number the step of specifically include:
Increase protocol fields in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the increased protocol fields, know that spectators' account is
Hacker's account.
Specifically, the present agreement of getting sent according to the client of spectators judges whether spectators' account is hacker's account
Number the step of specifically include:
Increase new agreement in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the new agreement, it is hacker's account to know spectators' account
Number.
Specifically, according to the result of acquisition, judge that the step of whether spectators' account is hacker's account specifically includes:
If not getting the operation that the spectators get present, it is hacker's account to know spectators' account;
If the order of the operation is not preset order, it is hacker's account to know spectators' account;
If the duration respectively operated is less than corresponding preset duration, it is hacker's account to know spectators' account.
Specifically, the step of whether spectators' account is hacker's account according to spectators get the operation judges of present is also wrapped
Include:
Mobile present gets the position of control;
When capturing the spectators and clicking on the present and get the operation of control, obtain the spectators and click on the present
Get the position of control;
If the present gets the spectators before and after control movement, to click on the position that the present gets control identical, obtains
It is hacker's account to know spectators' account.
Specifically, the present agreement of getting includes the title of live platform, spectators' numbering, the number for getting present, sight
Many Token data, at the time of get present, the client numbering of spectators and live room number;
The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;
The new agreement include live room number, the Token data of spectators and at the time of get present in one kind or
It is a variety of.
According to the second aspect of the invention, there is provided the device of brush present is prevented in a kind of live platform, including:
Judging unit, for utilizing multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
Removal unit, for when it is hacker's account that at least one judged result, which is spectators' account, capturing
State after the present under spectators' account is transferred under main broadcaster's account, will be shifted under main broadcaster's account under spectators' account
Present remove.
According to the third aspect of the invention we, there is provided a kind of non-transient computer readable storage medium storing program for executing, for storing such as preceding institute
State the computer program of method.
The present invention provides the method and device that brush present is prevented in a kind of live platform, this method one side, by black
Visitor carries out multiple-authentication, so that hacker is difficult around detection, improves the accuracy of hacker's detection, on the other hand, is finding
Do not handled at once during hacker, and after the present of brush is transferred under main broadcaster's account by hacker, by under main broadcaster's account
The present of hacker's transfer is reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
Brief description of the drawings
Fig. 1 is the method overall flow schematic diagram that brush present is prevented in live platform provided in an embodiment of the present invention;
Fig. 2 is the device overall structure diagram that brush present is prevented in live platform provided in an embodiment of the present invention;
Fig. 3 is the equipment overall structure schematic diagram that brush present is prevented in live platform provided in an embodiment of the present invention.
Embodiment
With reference to the accompanying drawings and examples, the embodiment of the present invention is described in further detail.Implement below
Example is used to illustrate the present invention, but is not limited to the scope of the present invention.
There is provided in one embodiment of the invention prevents the method for brush present in a kind of live platform, Fig. 1 is the present invention
The method overall flow schematic diagram of brush present is prevented in the live platform that embodiment provides, this method includes:S1, utilize more re-examinations
Card method, whether the spectators' account for judging to get present is hacker's account;S2, if at least one judged result is spectators' account
Number it is hacker's account, then after the present under capturing spectators' account is transferred under main broadcaster's account, by the main broadcaster
The present shifted under account under spectators' account removes.
Specifically, in S1, in order to prevent strategy of the hacker around detection brush behavior, using multiple-authentication method.It is described more
Weight verification method be it is a variety of verify get present spectators' account whether be hacker's account method.A variety of verification methods can
All to use, the various methods in the multiple-authentication method can also be used according to sequencing, when a kind of verification method is tested
It is hacker's account to demonstrate,prove out spectators' account, then stops using verification method below to be verified, is calculated so as to reduce.Utilize
Whether spectators' account that the multiple-authentication method judges to get present is hacker's account.In S2, have in acquisition judged result more
A few judged result is that spectators' account is hacker's account, if it is hacker that at least one judged result, which is spectators' account,
Account, it is determined that spectators' account is hacker's account, starts simultaneously at the seizure spectators and gives the present got to main broadcaster
Operation.When capture the present under spectators' account give be transferred under main broadcaster's account after, by under main broadcaster's account
The present shifted under spectators' account removes.For live platform, even if spectators have present to enter from live platform
Row cash, only main broadcaster could be cashed present, therefore, it is latter in hacker's brush present as present can be given to main broadcaster,
Present is transferred under main broadcaster's account, present is then exchanged into cash under main broadcaster's account.When it is determined that the spectators
When account is hacker's account, present is got without the behavior for preventing hacker's brush present at once, but in hacker, and present is turned
After moving on under main broadcaster's account, the present shifted under main broadcaster's account by the hacker is removed, will be shifted by the hacker
The zeroing number of present under to main broadcaster's account, make brush present it is irredeemable in the case of, hacker can not aware services device
It is which step to detect that spectators' account is hacker's account in, so as to which the inspection policies of server can not be known, it is not easy to around
Cross the detection of server.
On the one hand the present embodiment, by carrying out multiple-authentication to hacker, so that hacker is difficult around detection, improves black
The accuracy of visitor's detection, on the other hand, is not handled at once when finding hacker, and the present of brush is transferred into master in hacker
After broadcasting under account, before the present brushed under main broadcaster's account is exchanged, by the present of hacker's transfer under main broadcaster's account
Reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
On the basis of above-described embodiment, step S1 described in the present embodiment specifically includes:Present is got according to spectators
What the client of operation and spectators were sent gets present agreement, judges whether spectators' account is hacker's account.
Specifically, certain operations can be carried out on the client during spectators get present, after spectators are operated,
The operation note of control can be added in the control of operation, such as inputted in control, click on control.When getting spectators
After getting present, the user end to server of the spectators, which is sent, gets present agreement, and the present agreement of getting includes
Protocol fields.The operation of present is got according to the spectators and gets present agreement with what the client of the spectators was sent, is judged
Whether spectators' account is hacker's account.Operation and the client of the spectators of present can be got according to the spectators simultaneously
The present agreement of getting that end is sent is judged that the operation that present can also be first got according to the spectators is judged.If sentence
Spectators' account of breaking is hacker's account, then the present agreement of getting not sent further according to the client of the spectators is sentenced
It is disconnected;If judging spectators' account not for hacker's account, continue to get present association according to what the client of the spectators was sent
View is judged, so as to avoid repeating judging, is improved efficiency, is economized on resources.
The present of getting that the present embodiment gets the operation of present and the client transmission of the spectators according to the spectators is assisted
View, so as to realize multiple-authentication, it is difficult the accuracy that hacker's detection is improved around detection to make hacker.
On the basis of above-described embodiment, in the present embodiment according to spectators get the operation judges of present spectators' account
The step of whether being hacker's account, specifically includes:Obtain the spectators and get the operating of present, the order of the operation and described
One or more in the duration of operation, the clicking operation for operating the input operation and mouse that include keyboard;According to acquisition
Result, judge whether spectators' account is hacker's account.
Specifically, the spectators get the operation of present including passing through the input operation and pass through mouse that keyboard is carried out to control
Mark the clicking operation carried out to control.The operation order that the spectators get present is the elder generation respectively operated during getting present
Order afterwards.The operation duration that the spectators get present can be to get respectively to operate the time spent respectively during present,
It can be each time for operating and spending altogether.Encryption after the result packing of acquisition is sent into server to be stored.According to obtaining
The result taken, judge whether spectators' account is hacker's account.
On the basis of above-described embodiment, the present agreement of getting sent in the present embodiment according to the client of spectators judges
The step of whether spectators' account is hacker's account specifically includes:Increase protocol fields in present agreement in described get;Connect
That receives the client transmission of the spectators gets present agreement;If receive it is described get in present agreement do not have it is increased described
Protocol fields, then it is hacker's account to know spectators' account.
Specifically, present agreement is got existing, server processes increase by one in present agreement in existing get
A little protocol fields, the protocol fields can be the fields that server generates at random.Receive the client transmission of the spectators
Get present agreement.Whether the client that server can record the spectators sends increased protocol fields.Gift is got when described
When not having the increased protocol fields in thing agreement, then it is hacker's account to know spectators' account, and marks the spectators
Account is hacker's account.Server can change the increased protocol fields every preset duration.Assuming that the existing spectators
Client when getting present, can request server get present operation interface, such as/api/get_reward.
No matter the described of reception gets whether have increased protocol fields in present agreement in the present embodiment, the spectators are
Present can be normally got, therefore hacker does not know that described get has increased protocol fields in present agreement, its hacker can be normal
Swipe present, hacker is set to think that server does not detect its brush present behavior, so as to not know the existing detection plan of server
Slightly.
On the basis of the various embodiments described above, the present agreement of getting sent in the present embodiment according to the client of spectators is sentenced
The step of whether spectators' account of breaking is hacker's account specifically includes:Increase new agreement in present agreement in described get;Connect
That receives the client transmission of the spectators gets present agreement;If described get in present agreement received does not have the new association
View, then it is hacker's account to know spectators' account.
Specifically, server can control client to increase by one or more new agreement in present agreement in existing get,
The agreement newly increased can't influence the existing function of getting fish ball, be only intended to recognize whether the behavior of brush present.
So even if sending the new agreement during hacker's brush present, hacker is also that can successfully get present, so hacker is simultaneously
Server will not be perceived new agreement is added in present agreement is got.Because the client of normal spectators is got in transmission
During present agreement, increased new agreement can be sent, and the script that hacker writes will not typically be sent when carrying out the operation of brush present
The new agreement.Server can then record whether client has the transmission new agreement.If do not sent, server then can
Record the spectators and the operation of brush present be present.The new agreement can be the server interface newly increased, the new agreement it is interior
Hold it is unlimited because only need count client whether send the new agreement, without concern for the particular content of new agreement.It is such as existing
Some interfaces are /api/get_reward, increase an interface as/api/get_data.
On the basis of above-described embodiment, judge whether spectators' account is black according to the result of acquisition in the present embodiment
The step of guest account, specifically includes:If not getting the operation that the spectators get present, know that spectators' account is
Hacker's account;If the order of the operation is not preset order, it is hacker's account to know spectators' account;If each behaviour
The duration of work is less than corresponding preset duration, then it is hacker's account to know spectators' account.
Specifically, because hacker uses the script write to carry out brush present, the operation of present may be got without described in, such as
Operation, the operation that mouse is clicked on and operation of control of input through keyboard etc., and normal spectators necessarily have the operation for getting present.
If not getting the operation that the spectators get present, it is hacker's account to know spectators' account.Hacker's use is write
Script carry out brush present, it is likely that certain operations can be skipped, and normal users can be operated according to preset order.It is if described
The order of operation is not preset order, then it is hacker's account to know spectators' account.Because hacker grasps to batch account
Make, operation note and movement locus are all fixed, and because hacker uses script operation, each operating procedure is than normal spectators'
Block is wanted in manual operations, if the duration respectively operated is less than corresponding preset duration, it is hacker's account to know spectators' account
Number.
On the basis of above-described embodiment, in the present embodiment according to spectators get the operation judges of present spectators' account
The step of whether being hacker's account, also includes:Mobile present gets the position of control;The gift is clicked on when capturing the spectators
When thing gets the operation of control, obtain the spectators and click on the position that the present gets control;If the present gets control
The position that spectators' click present gets control before and after movement is identical, then it is hacker's account to know spectators' account.
Specifically, the present control of getting refers to need the control operated during getting present, and gift is got in movement
The position of the control of thing refers to the position of the control carrying out dynamic micro-adjustments, such as the position of the control is finely tuned upwards
Deng whether the human eye of spectators can not be identified the control and is moved, and user is when being operated, because the position of control occurs
Change, the position that user clicks on can change.And hacker is hardly perceivable these trickle numberings, is forged in hacker and click on institute
When stating the operation of control, the position for not perceiving control changes, and the position of the click control of forgery will not become
Change.If the present gets the spectators before and after control movement, to click on the position that the present gets control identical, knows institute
It is hacker's account to state spectators' account.
Present agreement is got on the basis of above-described embodiment, described in the present embodiment to be included the title of live platform, sees
Crowd's numbering, the numbers for getting present, the Token data of spectators, at the time of get present, the client numbering of spectators and live room
Between number;The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;The new agreement
Including live room number, the Token data of spectators and at the time of get present in one or more.
There is provided in another embodiment of the present invention prevents the device of brush present in a kind of live platform, Fig. 2 is this hair
The device overall structure diagram of brush present is prevented in the live platform that bright embodiment provides, the device includes the He of judging unit 1
Removal unit 2, wherein:
The judging unit 1 is used to utilize multiple-authentication method, and whether the spectators' account for judging to get present is hacker's account
Number;The removal unit 2 is used for when it is hacker's account that at least one judged result, which is spectators' account, described capturing
After present under spectators' account is transferred under main broadcaster's account, by what is shifted under main broadcaster's account under spectators' account
Present removes.
Specifically, in order to prevent strategy of the hacker around detection brush behavior, using multiple-authentication method.The multiple-authentication
Method be it is a variety of verify get present spectators' account whether be hacker's account method.A variety of verification methods can all make
With, can also according to sequencing use the multiple-authentication method in various methods, when a kind of verification method verifies institute
It is hacker's account to state spectators' account, then stops using verification method below to be verified, is calculated so as to reduce.It is described to judge list
Whether spectators' account that member 1 judges to get present using the multiple-authentication method is hacker's account.The removal unit 2 obtains
How many judged result is that spectators' account is hacker's account in judged result, if at least one judged result is described
Spectators' account is hacker's account, it is determined that spectators' account is hacker's account, starts simultaneously at and catches the spectators and will get
Present gives the operation to main broadcaster.After capturing the present under spectators' account and being transferred under main broadcaster's account, by institute
The present shifted under spectators' account under main broadcaster's account is stated to remove.For live platform, even if spectators have present can not
Cashed from live platform, only main broadcaster could be cashed present, therefore, it is latter in hacker's brush present as can be by present
Give to main broadcaster, i.e., present is transferred under main broadcaster's account, present is then exchanged into cash under main broadcaster's account.When true
When fixed spectators' account is hacker's account, without the behavior of prevention hacker's brush present at once, but present is got in hacker,
And after present is transferred under main broadcaster's account, the present shifted under main broadcaster's account by the hacker is removed, will be by institute
State the zeroing number for the present that hacker is transferred under main broadcaster's account, make brush present it is irredeemable in the case of, hacker can not
Aware services device is which step to detect that spectators' account is hacker's account in, so as to know the detection plan of server
Slightly, it is not easy to around the detection of server.
On the one hand the present embodiment, by carrying out multiple-authentication to hacker, so that hacker is difficult around detection, improves black
The accuracy of visitor's detection, on the other hand, is not handled at once when finding hacker, and the present of brush is transferred into master in hacker
After broadcasting under account, before the present brushed under main broadcaster's account is exchanged, by the present of hacker's transfer under main broadcaster's account
Reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
On the basis of above-described embodiment, judging unit is specifically used for described in the present embodiment:Got according to the spectators
What the operation of present and the client of the spectators were sent gets present agreement, judges whether spectators' account is hacker's account
Number.
On the basis of above-described embodiment, judging unit is further specifically used for described in the present embodiment:Obtain the sight
Crowd gets the one or more in the duration of the operating of present, the order of the operation and the operation, and the operation includes key
The input operation of disk and the clicking operation of mouse;According to the result of acquisition, judge whether spectators' account is hacker's account.
On the basis of above-described embodiment, judging unit is further specifically used for described in the present embodiment:Got described
Increase protocol fields in present agreement;Receive the client transmission of the spectators gets present agreement;If the neck received
Taking in present agreement does not have the increased protocol fields, then it is hacker's account to know spectators' account.
On the basis of the various embodiments described above, judging unit is further specifically used for described in the present embodiment:In the neck
Taking increases new agreement in present agreement;Receive the client transmission of the spectators gets present agreement;If the neck received
Taking in present agreement does not have the new agreement, then it is hacker's account to know spectators' account.
On the basis of above-described embodiment, judging unit is further specifically used for described in the present embodiment:If do not obtain
The operation of present is got to the spectators, then it is hacker's account to know spectators' account;If the order of the operation is not pre-
If order, then it is hacker's account to know spectators' account;If the duration respectively operated is less than corresponding preset duration, obtain
It is hacker's account to know spectators' account.
On the basis of above-described embodiment, judging unit is additionally operable to described in the present embodiment:Mobile present gets control
Position;When capturing the spectators and clicking on the present and get the operation of control, obtain the spectators and click on the present neck
Take the position of control;If the spectators click on the position phase that the present gets control before and after the present gets control movement
Together, then it is hacker's account to know spectators' account.
Present agreement is got on the basis of above-described embodiment, described in the present embodiment to be included the title of live platform, sees
Crowd's numbering, the numbers for getting present, the Token data of spectators, at the time of get present, the client numbering of spectators and live room
Between number;The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;The new agreement
Including live room number, the Token data of spectators and at the time of get present in one or more.
The present embodiment provides the equipment that brush present is prevented in a kind of live platform, and Fig. 3 is provided in an embodiment of the present invention straight
Broadcasting prevents the equipment overall structure schematic diagram of brush present in platform, the equipment includes:At least one processor 31, at least one deposit
Reservoir 32 and bus 33;Wherein,
The processor 31 and memory 32 complete mutual communication by the bus 33;
The memory 32 is stored with the programmed instruction that can be performed by the processor 31, and the processor calls the journey
Sequence instruction is able to carry out the method that above-mentioned each method embodiment is provided, such as including:S1, using multiple-authentication method, judge
Whether the spectators' account for getting present is hacker's account;S2, if it is hacker's account that at least one judged result, which is spectators' account,
Number, then after the present under capturing spectators' account is transferred under main broadcaster's account, by under main broadcaster's account from institute
The present shifted under spectators' account is stated to remove.
The present embodiment provides a kind of non-transient computer readable storage medium storing program for executing, the non-transient computer readable storage medium storing program for executing
Computer instruction is stored, the computer instruction makes the computer perform the method that above-mentioned each method embodiment is provided, example
Such as include:S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;S2, if at least one
Judged result is that spectators' account is hacker's account, then the present in the case where capturing spectators' account is transferred to main broadcaster's account
After under number, the present shifted under main broadcaster's account under spectators' account is removed.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through
Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program
Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or light
Disk etc. is various can be with the medium of store program codes.
Prevent that the apparatus embodiments of brush present are only schematical in live platform described above, wherein the work
The unit illustrated for separating component can be or may not be physically separate, can be as the part that unit is shown
Or it may not be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be with
Some or all of module therein is selected to realize the purpose of this embodiment scheme according to the actual needs.The common skill in this area
Art personnel are not in the case where paying performing creative labour, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on
The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should
Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers
Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation
Method described in some parts of example or embodiment.
Finally, the present processes are only preferable embodiment, are not intended to limit the scope of the present invention.It is all
Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc., the protection of the present invention should be included in
Within the scope of.
Claims (10)
1. the method for brush present is prevented in a kind of live platform, it is characterised in that including:
S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
S2, if it is hacker's account that at least one judged result, which is spectators' account, in the case where capturing spectators' account
After present is transferred under main broadcaster's account, the present shifted under main broadcaster's account under spectators' account is removed.
2. according to the method for claim 1, it is characterised in that the step S1 is specifically included:
According to spectators get present operation and spectators client send get present agreement, judge that spectators' account is
No is hacker's account.
3. according to the method for claim 2, it is characterised in that spectators' account according to spectators get the operation judges of present
The step of number whether being hacker's account, specifically includes:
Obtain the spectators and get one or more in the duration of the operating of present, the order of the operation and the operation,
The clicking operation for operating the input operation and mouse that include keyboard;
According to the result of acquisition, judge whether spectators' account is hacker's account.
4. according to the method for claim 2, it is characterised in that sentenced according to the present agreement of getting that the client of spectators is sent
The step of whether spectators' account of breaking is hacker's account specifically includes:
Increase protocol fields in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the increased protocol fields, it is hacker to know spectators' account
Account.
5. according to the method for claim 4, it is characterised in that sentenced according to the present agreement of getting that the client of spectators is sent
The step of whether spectators' account of breaking is hacker's account specifically includes:
Increase new agreement in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the new agreement, it is hacker's account to know spectators' account.
6. according to the method for claim 3, it is characterised in that according to the result of acquisition, whether judge spectators' account
Specifically included for the step of hacker's account:
If not getting the operation that the spectators get present, it is hacker's account to know spectators' account;
If the order of the operation is not preset order, it is hacker's account to know spectators' account;
If the duration respectively operated is less than corresponding preset duration, it is hacker's account to know spectators' account.
7. according to the method for claim 2, it is characterised in that spectators' account according to spectators get the operation judges of present
The step of number whether being hacker's account, also includes:
Mobile present gets the position of control;
When capturing the spectators and clicking on the present and get the operation of control, obtain the spectators and click on the present and get
The position of control;
If the present gets the spectators before and after control movement, to click on the position that the present gets control identical, knows institute
It is hacker's account to state spectators' account.
8. according to the method for claim 5, it is characterised in that the title for getting present agreement including live platform,
Spectators' numbering, the number for getting present, the Token data of spectators, at the time of get present, the client numbering of spectators and live
Room number;
The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;
The new agreement include live room number, the Token data of spectators and at the time of get present in one or more.
9. the device of brush present is prevented in a kind of live platform, it is characterised in that including:
Judging unit, for utilizing multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
Removal unit, for when it is hacker's account that at least one judged result, which is spectators' account, capturing the sight
After present under many accounts is transferred under main broadcaster's account, gift that will be shifted under main broadcaster's account under spectators' account
Thing removes.
10. a kind of non-transient computer readable storage medium storing program for executing, it is characterised in that the non-transient computer readable storage medium storing program for executing is deposited
Computer instruction is stored up, the computer instruction makes the computer perform the method as described in claim 1 to 8 is any.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710930940.4A CN107770575B (en) | 2017-10-09 | 2017-10-09 | The method and device of brush present is prevented in a kind of live streaming platform |
PCT/CN2017/120147 WO2019071856A1 (en) | 2017-10-09 | 2017-12-29 | Method and device for preventing spam gift in live broadcasting platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710930940.4A CN107770575B (en) | 2017-10-09 | 2017-10-09 | The method and device of brush present is prevented in a kind of live streaming platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107770575A true CN107770575A (en) | 2018-03-06 |
CN107770575B CN107770575B (en) | 2019-11-01 |
Family
ID=61267069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710930940.4A Active CN107770575B (en) | 2017-10-09 | 2017-10-09 | The method and device of brush present is prevented in a kind of live streaming platform |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107770575B (en) |
WO (1) | WO2019071856A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108574697A (en) * | 2018-04-28 | 2018-09-25 | 广东亿迅科技有限公司 | Illegal method and device based on live streaming platform |
CN110933113A (en) * | 2019-12-30 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Block chain-based interactive behavior detection method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6643694B1 (en) * | 2000-02-09 | 2003-11-04 | Michael A. Chernin | System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface |
CN104935578A (en) * | 2015-05-04 | 2015-09-23 | 广州唯品会信息科技有限公司 | Website malicious attack prevention method and system |
CN106022826A (en) * | 2016-05-18 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Cheating user recognition method and system in webcast platform |
CN106227813A (en) * | 2016-07-22 | 2016-12-14 | 百度在线网络技术(北京)有限公司 | For the method and apparatus preventing voice ballot cheating |
CN106228410A (en) * | 2016-07-29 | 2016-12-14 | 武汉斗鱼网络科技有限公司 | Virtual present task anti-brush system and method in a kind of live platform |
CN106375327A (en) * | 2016-09-13 | 2017-02-01 | 湖北工业大学 | Anti-malicious attack proxy secret key mixing-based electronic voting system and method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8078515B2 (en) * | 2007-05-04 | 2011-12-13 | Michael Sasha John | Systems and methods for facilitating electronic transactions and deterring fraud |
CN105635745B (en) * | 2015-12-23 | 2019-10-22 | 广州华多网络科技有限公司 | Method and client that signature shines are generated based on online live streaming application |
CN105897770B (en) * | 2016-06-20 | 2018-11-27 | 武汉斗鱼网络科技有限公司 | A kind of virtual gift display method and device based on live streaming |
CN106599251A (en) * | 2016-12-20 | 2017-04-26 | 北京小米移动软件有限公司 | Method and device for displaying anchor rankings |
-
2017
- 2017-10-09 CN CN201710930940.4A patent/CN107770575B/en active Active
- 2017-12-29 WO PCT/CN2017/120147 patent/WO2019071856A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6643694B1 (en) * | 2000-02-09 | 2003-11-04 | Michael A. Chernin | System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface |
CN104935578A (en) * | 2015-05-04 | 2015-09-23 | 广州唯品会信息科技有限公司 | Website malicious attack prevention method and system |
CN106022826A (en) * | 2016-05-18 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Cheating user recognition method and system in webcast platform |
CN106227813A (en) * | 2016-07-22 | 2016-12-14 | 百度在线网络技术(北京)有限公司 | For the method and apparatus preventing voice ballot cheating |
CN106228410A (en) * | 2016-07-29 | 2016-12-14 | 武汉斗鱼网络科技有限公司 | Virtual present task anti-brush system and method in a kind of live platform |
CN106375327A (en) * | 2016-09-13 | 2017-02-01 | 湖北工业大学 | Anti-malicious attack proxy secret key mixing-based electronic voting system and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108574697A (en) * | 2018-04-28 | 2018-09-25 | 广东亿迅科技有限公司 | Illegal method and device based on live streaming platform |
CN110933113A (en) * | 2019-12-30 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Block chain-based interactive behavior detection method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107770575B (en) | 2019-11-01 |
WO2019071856A1 (en) | 2019-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109767271B (en) | Lottery method and equipment based on block chain | |
CN105556482B (en) | Monitor mobile application performance | |
CN103927253B (en) | Multiple browser compatibility testing method and system | |
CN104823198B (en) | The safety distinguishing apparatus and safety recognizing method of computing device | |
CN106294176B (en) | The method and system that application failure positions in Mac OS systems | |
CN108885666A (en) | For detecting and preventing the pseudo- system and method emitted | |
CN104598380A (en) | Method and system for automatic testing based on control | |
CN103873455B (en) | A kind of method and device of information checking | |
CN105144117B (en) | To the automatic correlation analysis method of allocating stack and context data | |
CN109600336A (en) | Store equipment, identifying code application method and device | |
CN106156133A (en) | Method that control table substance is submitted to again, Apparatus and system | |
CN106096034A (en) | application log management method and device | |
CN110347608B (en) | Interactive application testing method and related device | |
CN105337739B (en) | Safe login method, device, server and terminal | |
CN107770161A (en) | The method and device of brush present is prevented in a kind of live platform | |
CN105791246A (en) | Information verification method, device and system | |
CN107770575B (en) | The method and device of brush present is prevented in a kind of live streaming platform | |
CN103838720B (en) | Page file, which is loaded into, executes method and apparatus | |
CN107517139A (en) | Data processing method and system, device test system and bus test system | |
CN112989158A (en) | Method, device and storage medium for identifying webpage crawler behavior | |
CN106709335B (en) | Vulnerability detection method and device | |
CN106844219A (en) | Using detection method and apply detection means | |
CN111026945B (en) | Multi-platform crawler scheduling method, device and storage medium | |
CN109361806A (en) | Black number storage method, black number mark method, system and device | |
CN108243229A (en) | Request processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |