CN107770575A - The method and device of brush present is prevented in a kind of live platform - Google Patents

The method and device of brush present is prevented in a kind of live platform Download PDF

Info

Publication number
CN107770575A
CN107770575A CN201710930940.4A CN201710930940A CN107770575A CN 107770575 A CN107770575 A CN 107770575A CN 201710930940 A CN201710930940 A CN 201710930940A CN 107770575 A CN107770575 A CN 107770575A
Authority
CN
China
Prior art keywords
account
spectators
present
hacker
agreement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710930940.4A
Other languages
Chinese (zh)
Other versions
CN107770575B (en
Inventor
周志刚
张文明
陈少杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710930940.4A priority Critical patent/CN107770575B/en
Priority to PCT/CN2017/120147 priority patent/WO2019071856A1/en
Publication of CN107770575A publication Critical patent/CN107770575A/en
Application granted granted Critical
Publication of CN107770575B publication Critical patent/CN107770575B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides the method and device that brush present is prevented in a kind of live platform, and methods described includes:S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;S2, if it is hacker's account that at least one judged result, which is spectators' account, after the present under capturing spectators' account is transferred under main broadcaster's account, the present shifted under main broadcaster's account under spectators' account is removed.One aspect of the present invention, by carrying out multiple-authentication to hacker, so that hacker is difficult around detection, improve the accuracy of hacker's detection, on the other hand, do not handled at once when finding hacker, and the present for afterwards shifting hacker under main broadcaster's account in the case where the present of brush is transferred to main broadcaster's account by hacker is reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.

Description

The method and device of brush present is prevented in a kind of live platform
Technical field
The present invention relates to technical field of network security, more particularly, to the side that brush present is prevented in a kind of live platform Method and device.
Background technology
With the development of network interaction platform, increasing user is exchanged by logging in network interaction platform.Its In, network direct broadcasting is the application being popular in users very much.
Live platform can send some free gifts, or complete in spectators to attract spectators to be watched to spectators Present is freely got in the case of some tasks, so that spectators give the free gift to main broadcaster.Main broadcaster can be by present Carry out cashing acquisition income, but spectators can not be cashed present.Some hackers are by writing script batch registration user, so Present agreement is got freely to get present by writing script transmission afterwards.After hacker gets free gift, will freely it lead The present taken is transferred under the account of main broadcaster, carries out the present freely got under main broadcaster's account to cash acquisition income, Brought about great losses to live platform.
In the prior art, when server detects brush behavior, brush operation is prevented in time.So, hacker is known that at which Being serviced device detects that, so as to be readily apparent that the inspection policies of server, hacker can bypass the detection plan next time in step operation Slightly, brush behavior is continued.
The content of the invention
The problem of to overcome above-mentioned hacker to be readily apparent that the inspection policies of server, solves above-mentioned ask at least in part Topic, the invention provides the method and device that brush present is prevented in a kind of live platform.
According to the first aspect of the invention, there is provided a kind of method that brush present is prevented in live platform, including:
S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
S2, if it is hacker's account that at least one judged result, which is spectators' account, capturing spectators' account Under present be transferred under main broadcaster's account after, the present shifted under main broadcaster's account under spectators' account is gone Remove.
Specifically, the step S1 is specifically included:
According to spectators get present operation and spectators client send get present agreement, judge spectators' account Number whether it is hacker's account.
Specifically, the step of whether spectators' account is hacker's account according to spectators get the operation judges of present is specific Including:
Obtain the spectators and get one kind or more in the duration of the operating of present, the order of the operation and the operation Kind, the clicking operation for operating the input operation and mouse that include keyboard;
According to the result of acquisition, judge whether spectators' account is hacker's account.
Specifically, the present agreement of getting sent according to the client of spectators judges whether spectators' account is hacker's account Number the step of specifically include:
Increase protocol fields in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the increased protocol fields, know that spectators' account is Hacker's account.
Specifically, the present agreement of getting sent according to the client of spectators judges whether spectators' account is hacker's account Number the step of specifically include:
Increase new agreement in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the new agreement, it is hacker's account to know spectators' account Number.
Specifically, according to the result of acquisition, judge that the step of whether spectators' account is hacker's account specifically includes:
If not getting the operation that the spectators get present, it is hacker's account to know spectators' account;
If the order of the operation is not preset order, it is hacker's account to know spectators' account;
If the duration respectively operated is less than corresponding preset duration, it is hacker's account to know spectators' account.
Specifically, the step of whether spectators' account is hacker's account according to spectators get the operation judges of present is also wrapped Include:
Mobile present gets the position of control;
When capturing the spectators and clicking on the present and get the operation of control, obtain the spectators and click on the present Get the position of control;
If the present gets the spectators before and after control movement, to click on the position that the present gets control identical, obtains It is hacker's account to know spectators' account.
Specifically, the present agreement of getting includes the title of live platform, spectators' numbering, the number for getting present, sight Many Token data, at the time of get present, the client numbering of spectators and live room number;
The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;
The new agreement include live room number, the Token data of spectators and at the time of get present in one kind or It is a variety of.
According to the second aspect of the invention, there is provided the device of brush present is prevented in a kind of live platform, including:
Judging unit, for utilizing multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
Removal unit, for when it is hacker's account that at least one judged result, which is spectators' account, capturing State after the present under spectators' account is transferred under main broadcaster's account, will be shifted under main broadcaster's account under spectators' account Present remove.
According to the third aspect of the invention we, there is provided a kind of non-transient computer readable storage medium storing program for executing, for storing such as preceding institute State the computer program of method.
The present invention provides the method and device that brush present is prevented in a kind of live platform, this method one side, by black Visitor carries out multiple-authentication, so that hacker is difficult around detection, improves the accuracy of hacker's detection, on the other hand, is finding Do not handled at once during hacker, and after the present of brush is transferred under main broadcaster's account by hacker, by under main broadcaster's account The present of hacker's transfer is reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
Brief description of the drawings
Fig. 1 is the method overall flow schematic diagram that brush present is prevented in live platform provided in an embodiment of the present invention;
Fig. 2 is the device overall structure diagram that brush present is prevented in live platform provided in an embodiment of the present invention;
Fig. 3 is the equipment overall structure schematic diagram that brush present is prevented in live platform provided in an embodiment of the present invention.
Embodiment
With reference to the accompanying drawings and examples, the embodiment of the present invention is described in further detail.Implement below Example is used to illustrate the present invention, but is not limited to the scope of the present invention.
There is provided in one embodiment of the invention prevents the method for brush present in a kind of live platform, Fig. 1 is the present invention The method overall flow schematic diagram of brush present is prevented in the live platform that embodiment provides, this method includes:S1, utilize more re-examinations Card method, whether the spectators' account for judging to get present is hacker's account;S2, if at least one judged result is spectators' account Number it is hacker's account, then after the present under capturing spectators' account is transferred under main broadcaster's account, by the main broadcaster The present shifted under account under spectators' account removes.
Specifically, in S1, in order to prevent strategy of the hacker around detection brush behavior, using multiple-authentication method.It is described more Weight verification method be it is a variety of verify get present spectators' account whether be hacker's account method.A variety of verification methods can All to use, the various methods in the multiple-authentication method can also be used according to sequencing, when a kind of verification method is tested It is hacker's account to demonstrate,prove out spectators' account, then stops using verification method below to be verified, is calculated so as to reduce.Utilize Whether spectators' account that the multiple-authentication method judges to get present is hacker's account.In S2, have in acquisition judged result more A few judged result is that spectators' account is hacker's account, if it is hacker that at least one judged result, which is spectators' account, Account, it is determined that spectators' account is hacker's account, starts simultaneously at the seizure spectators and gives the present got to main broadcaster Operation.When capture the present under spectators' account give be transferred under main broadcaster's account after, by under main broadcaster's account The present shifted under spectators' account removes.For live platform, even if spectators have present to enter from live platform Row cash, only main broadcaster could be cashed present, therefore, it is latter in hacker's brush present as present can be given to main broadcaster, Present is transferred under main broadcaster's account, present is then exchanged into cash under main broadcaster's account.When it is determined that the spectators When account is hacker's account, present is got without the behavior for preventing hacker's brush present at once, but in hacker, and present is turned After moving on under main broadcaster's account, the present shifted under main broadcaster's account by the hacker is removed, will be shifted by the hacker The zeroing number of present under to main broadcaster's account, make brush present it is irredeemable in the case of, hacker can not aware services device It is which step to detect that spectators' account is hacker's account in, so as to which the inspection policies of server can not be known, it is not easy to around Cross the detection of server.
On the one hand the present embodiment, by carrying out multiple-authentication to hacker, so that hacker is difficult around detection, improves black The accuracy of visitor's detection, on the other hand, is not handled at once when finding hacker, and the present of brush is transferred into master in hacker After broadcasting under account, before the present brushed under main broadcaster's account is exchanged, by the present of hacker's transfer under main broadcaster's account Reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
On the basis of above-described embodiment, step S1 described in the present embodiment specifically includes:Present is got according to spectators What the client of operation and spectators were sent gets present agreement, judges whether spectators' account is hacker's account.
Specifically, certain operations can be carried out on the client during spectators get present, after spectators are operated, The operation note of control can be added in the control of operation, such as inputted in control, click on control.When getting spectators After getting present, the user end to server of the spectators, which is sent, gets present agreement, and the present agreement of getting includes Protocol fields.The operation of present is got according to the spectators and gets present agreement with what the client of the spectators was sent, is judged Whether spectators' account is hacker's account.Operation and the client of the spectators of present can be got according to the spectators simultaneously The present agreement of getting that end is sent is judged that the operation that present can also be first got according to the spectators is judged.If sentence Spectators' account of breaking is hacker's account, then the present agreement of getting not sent further according to the client of the spectators is sentenced It is disconnected;If judging spectators' account not for hacker's account, continue to get present association according to what the client of the spectators was sent View is judged, so as to avoid repeating judging, is improved efficiency, is economized on resources.
The present of getting that the present embodiment gets the operation of present and the client transmission of the spectators according to the spectators is assisted View, so as to realize multiple-authentication, it is difficult the accuracy that hacker's detection is improved around detection to make hacker.
On the basis of above-described embodiment, in the present embodiment according to spectators get the operation judges of present spectators' account The step of whether being hacker's account, specifically includes:Obtain the spectators and get the operating of present, the order of the operation and described One or more in the duration of operation, the clicking operation for operating the input operation and mouse that include keyboard;According to acquisition Result, judge whether spectators' account is hacker's account.
Specifically, the spectators get the operation of present including passing through the input operation and pass through mouse that keyboard is carried out to control Mark the clicking operation carried out to control.The operation order that the spectators get present is the elder generation respectively operated during getting present Order afterwards.The operation duration that the spectators get present can be to get respectively to operate the time spent respectively during present, It can be each time for operating and spending altogether.Encryption after the result packing of acquisition is sent into server to be stored.According to obtaining The result taken, judge whether spectators' account is hacker's account.
On the basis of above-described embodiment, the present agreement of getting sent in the present embodiment according to the client of spectators judges The step of whether spectators' account is hacker's account specifically includes:Increase protocol fields in present agreement in described get;Connect That receives the client transmission of the spectators gets present agreement;If receive it is described get in present agreement do not have it is increased described Protocol fields, then it is hacker's account to know spectators' account.
Specifically, present agreement is got existing, server processes increase by one in present agreement in existing get A little protocol fields, the protocol fields can be the fields that server generates at random.Receive the client transmission of the spectators Get present agreement.Whether the client that server can record the spectators sends increased protocol fields.Gift is got when described When not having the increased protocol fields in thing agreement, then it is hacker's account to know spectators' account, and marks the spectators Account is hacker's account.Server can change the increased protocol fields every preset duration.Assuming that the existing spectators Client when getting present, can request server get present operation interface, such as/api/get_reward.
No matter the described of reception gets whether have increased protocol fields in present agreement in the present embodiment, the spectators are Present can be normally got, therefore hacker does not know that described get has increased protocol fields in present agreement, its hacker can be normal Swipe present, hacker is set to think that server does not detect its brush present behavior, so as to not know the existing detection plan of server Slightly.
On the basis of the various embodiments described above, the present agreement of getting sent in the present embodiment according to the client of spectators is sentenced The step of whether spectators' account of breaking is hacker's account specifically includes:Increase new agreement in present agreement in described get;Connect That receives the client transmission of the spectators gets present agreement;If described get in present agreement received does not have the new association View, then it is hacker's account to know spectators' account.
Specifically, server can control client to increase by one or more new agreement in present agreement in existing get, The agreement newly increased can't influence the existing function of getting fish ball, be only intended to recognize whether the behavior of brush present. So even if sending the new agreement during hacker's brush present, hacker is also that can successfully get present, so hacker is simultaneously Server will not be perceived new agreement is added in present agreement is got.Because the client of normal spectators is got in transmission During present agreement, increased new agreement can be sent, and the script that hacker writes will not typically be sent when carrying out the operation of brush present The new agreement.Server can then record whether client has the transmission new agreement.If do not sent, server then can Record the spectators and the operation of brush present be present.The new agreement can be the server interface newly increased, the new agreement it is interior Hold it is unlimited because only need count client whether send the new agreement, without concern for the particular content of new agreement.It is such as existing Some interfaces are /api/get_reward, increase an interface as/api/get_data.
On the basis of above-described embodiment, judge whether spectators' account is black according to the result of acquisition in the present embodiment The step of guest account, specifically includes:If not getting the operation that the spectators get present, know that spectators' account is Hacker's account;If the order of the operation is not preset order, it is hacker's account to know spectators' account;If each behaviour The duration of work is less than corresponding preset duration, then it is hacker's account to know spectators' account.
Specifically, because hacker uses the script write to carry out brush present, the operation of present may be got without described in, such as Operation, the operation that mouse is clicked on and operation of control of input through keyboard etc., and normal spectators necessarily have the operation for getting present. If not getting the operation that the spectators get present, it is hacker's account to know spectators' account.Hacker's use is write Script carry out brush present, it is likely that certain operations can be skipped, and normal users can be operated according to preset order.It is if described The order of operation is not preset order, then it is hacker's account to know spectators' account.Because hacker grasps to batch account Make, operation note and movement locus are all fixed, and because hacker uses script operation, each operating procedure is than normal spectators' Block is wanted in manual operations, if the duration respectively operated is less than corresponding preset duration, it is hacker's account to know spectators' account Number.
On the basis of above-described embodiment, in the present embodiment according to spectators get the operation judges of present spectators' account The step of whether being hacker's account, also includes:Mobile present gets the position of control;The gift is clicked on when capturing the spectators When thing gets the operation of control, obtain the spectators and click on the position that the present gets control;If the present gets control The position that spectators' click present gets control before and after movement is identical, then it is hacker's account to know spectators' account.
Specifically, the present control of getting refers to need the control operated during getting present, and gift is got in movement The position of the control of thing refers to the position of the control carrying out dynamic micro-adjustments, such as the position of the control is finely tuned upwards Deng whether the human eye of spectators can not be identified the control and is moved, and user is when being operated, because the position of control occurs Change, the position that user clicks on can change.And hacker is hardly perceivable these trickle numberings, is forged in hacker and click on institute When stating the operation of control, the position for not perceiving control changes, and the position of the click control of forgery will not become Change.If the present gets the spectators before and after control movement, to click on the position that the present gets control identical, knows institute It is hacker's account to state spectators' account.
Present agreement is got on the basis of above-described embodiment, described in the present embodiment to be included the title of live platform, sees Crowd's numbering, the numbers for getting present, the Token data of spectators, at the time of get present, the client numbering of spectators and live room Between number;The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;The new agreement Including live room number, the Token data of spectators and at the time of get present in one or more.
There is provided in another embodiment of the present invention prevents the device of brush present in a kind of live platform, Fig. 2 is this hair The device overall structure diagram of brush present is prevented in the live platform that bright embodiment provides, the device includes the He of judging unit 1 Removal unit 2, wherein:
The judging unit 1 is used to utilize multiple-authentication method, and whether the spectators' account for judging to get present is hacker's account Number;The removal unit 2 is used for when it is hacker's account that at least one judged result, which is spectators' account, described capturing After present under spectators' account is transferred under main broadcaster's account, by what is shifted under main broadcaster's account under spectators' account Present removes.
Specifically, in order to prevent strategy of the hacker around detection brush behavior, using multiple-authentication method.The multiple-authentication Method be it is a variety of verify get present spectators' account whether be hacker's account method.A variety of verification methods can all make With, can also according to sequencing use the multiple-authentication method in various methods, when a kind of verification method verifies institute It is hacker's account to state spectators' account, then stops using verification method below to be verified, is calculated so as to reduce.It is described to judge list Whether spectators' account that member 1 judges to get present using the multiple-authentication method is hacker's account.The removal unit 2 obtains How many judged result is that spectators' account is hacker's account in judged result, if at least one judged result is described Spectators' account is hacker's account, it is determined that spectators' account is hacker's account, starts simultaneously at and catches the spectators and will get Present gives the operation to main broadcaster.After capturing the present under spectators' account and being transferred under main broadcaster's account, by institute The present shifted under spectators' account under main broadcaster's account is stated to remove.For live platform, even if spectators have present can not Cashed from live platform, only main broadcaster could be cashed present, therefore, it is latter in hacker's brush present as can be by present Give to main broadcaster, i.e., present is transferred under main broadcaster's account, present is then exchanged into cash under main broadcaster's account.When true When fixed spectators' account is hacker's account, without the behavior of prevention hacker's brush present at once, but present is got in hacker, And after present is transferred under main broadcaster's account, the present shifted under main broadcaster's account by the hacker is removed, will be by institute State the zeroing number for the present that hacker is transferred under main broadcaster's account, make brush present it is irredeemable in the case of, hacker can not Aware services device is which step to detect that spectators' account is hacker's account in, so as to know the detection plan of server Slightly, it is not easy to around the detection of server.
On the one hand the present embodiment, by carrying out multiple-authentication to hacker, so that hacker is difficult around detection, improves black The accuracy of visitor's detection, on the other hand, is not handled at once when finding hacker, and the present of brush is transferred into master in hacker After broadcasting under account, before the present brushed under main broadcaster's account is exchanged, by the present of hacker's transfer under main broadcaster's account Reset, so that hacker can not know the reason for being detected, it is difficult to around the detection of server.
On the basis of above-described embodiment, judging unit is specifically used for described in the present embodiment:Got according to the spectators What the operation of present and the client of the spectators were sent gets present agreement, judges whether spectators' account is hacker's account Number.
On the basis of above-described embodiment, judging unit is further specifically used for described in the present embodiment:Obtain the sight Crowd gets the one or more in the duration of the operating of present, the order of the operation and the operation, and the operation includes key The input operation of disk and the clicking operation of mouse;According to the result of acquisition, judge whether spectators' account is hacker's account.
On the basis of above-described embodiment, judging unit is further specifically used for described in the present embodiment:Got described Increase protocol fields in present agreement;Receive the client transmission of the spectators gets present agreement;If the neck received Taking in present agreement does not have the increased protocol fields, then it is hacker's account to know spectators' account.
On the basis of the various embodiments described above, judging unit is further specifically used for described in the present embodiment:In the neck Taking increases new agreement in present agreement;Receive the client transmission of the spectators gets present agreement;If the neck received Taking in present agreement does not have the new agreement, then it is hacker's account to know spectators' account.
On the basis of above-described embodiment, judging unit is further specifically used for described in the present embodiment:If do not obtain The operation of present is got to the spectators, then it is hacker's account to know spectators' account;If the order of the operation is not pre- If order, then it is hacker's account to know spectators' account;If the duration respectively operated is less than corresponding preset duration, obtain It is hacker's account to know spectators' account.
On the basis of above-described embodiment, judging unit is additionally operable to described in the present embodiment:Mobile present gets control Position;When capturing the spectators and clicking on the present and get the operation of control, obtain the spectators and click on the present neck Take the position of control;If the spectators click on the position phase that the present gets control before and after the present gets control movement Together, then it is hacker's account to know spectators' account.
Present agreement is got on the basis of above-described embodiment, described in the present embodiment to be included the title of live platform, sees Crowd's numbering, the numbers for getting present, the Token data of spectators, at the time of get present, the client numbering of spectators and live room Between number;The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;The new agreement Including live room number, the Token data of spectators and at the time of get present in one or more.
The present embodiment provides the equipment that brush present is prevented in a kind of live platform, and Fig. 3 is provided in an embodiment of the present invention straight Broadcasting prevents the equipment overall structure schematic diagram of brush present in platform, the equipment includes:At least one processor 31, at least one deposit Reservoir 32 and bus 33;Wherein,
The processor 31 and memory 32 complete mutual communication by the bus 33;
The memory 32 is stored with the programmed instruction that can be performed by the processor 31, and the processor calls the journey Sequence instruction is able to carry out the method that above-mentioned each method embodiment is provided, such as including:S1, using multiple-authentication method, judge Whether the spectators' account for getting present is hacker's account;S2, if it is hacker's account that at least one judged result, which is spectators' account, Number, then after the present under capturing spectators' account is transferred under main broadcaster's account, by under main broadcaster's account from institute The present shifted under spectators' account is stated to remove.
The present embodiment provides a kind of non-transient computer readable storage medium storing program for executing, the non-transient computer readable storage medium storing program for executing Computer instruction is stored, the computer instruction makes the computer perform the method that above-mentioned each method embodiment is provided, example Such as include:S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;S2, if at least one Judged result is that spectators' account is hacker's account, then the present in the case where capturing spectators' account is transferred to main broadcaster's account After under number, the present shifted under main broadcaster's account under spectators' account is removed.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
Prevent that the apparatus embodiments of brush present are only schematical in live platform described above, wherein the work The unit illustrated for separating component can be or may not be physically separate, can be as the part that unit is shown Or it may not be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be with Some or all of module therein is selected to realize the purpose of this embodiment scheme according to the actual needs.The common skill in this area Art personnel are not in the case where paying performing creative labour, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.
Finally, the present processes are only preferable embodiment, are not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc., the protection of the present invention should be included in Within the scope of.

Claims (10)

1. the method for brush present is prevented in a kind of live platform, it is characterised in that including:
S1, using multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
S2, if it is hacker's account that at least one judged result, which is spectators' account, in the case where capturing spectators' account After present is transferred under main broadcaster's account, the present shifted under main broadcaster's account under spectators' account is removed.
2. according to the method for claim 1, it is characterised in that the step S1 is specifically included:
According to spectators get present operation and spectators client send get present agreement, judge that spectators' account is No is hacker's account.
3. according to the method for claim 2, it is characterised in that spectators' account according to spectators get the operation judges of present The step of number whether being hacker's account, specifically includes:
Obtain the spectators and get one or more in the duration of the operating of present, the order of the operation and the operation, The clicking operation for operating the input operation and mouse that include keyboard;
According to the result of acquisition, judge whether spectators' account is hacker's account.
4. according to the method for claim 2, it is characterised in that sentenced according to the present agreement of getting that the client of spectators is sent The step of whether spectators' account of breaking is hacker's account specifically includes:
Increase protocol fields in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the increased protocol fields, it is hacker to know spectators' account Account.
5. according to the method for claim 4, it is characterised in that sentenced according to the present agreement of getting that the client of spectators is sent The step of whether spectators' account of breaking is hacker's account specifically includes:
Increase new agreement in present agreement in described get;
Receive the client transmission of the spectators gets present agreement;
If described get in present agreement received does not have the new agreement, it is hacker's account to know spectators' account.
6. according to the method for claim 3, it is characterised in that according to the result of acquisition, whether judge spectators' account Specifically included for the step of hacker's account:
If not getting the operation that the spectators get present, it is hacker's account to know spectators' account;
If the order of the operation is not preset order, it is hacker's account to know spectators' account;
If the duration respectively operated is less than corresponding preset duration, it is hacker's account to know spectators' account.
7. according to the method for claim 2, it is characterised in that spectators' account according to spectators get the operation judges of present The step of number whether being hacker's account, also includes:
Mobile present gets the position of control;
When capturing the spectators and clicking on the present and get the operation of control, obtain the spectators and click on the present and get The position of control;
If the present gets the spectators before and after control movement, to click on the position that the present gets control identical, knows institute It is hacker's account to state spectators' account.
8. according to the method for claim 5, it is characterised in that the title for getting present agreement including live platform, Spectators' numbering, the number for getting present, the Token data of spectators, at the time of get present, the client numbering of spectators and live Room number;
The protocol fields are at the time of the getting present of random number, keyword or encryption generated at random;
The new agreement include live room number, the Token data of spectators and at the time of get present in one or more.
9. the device of brush present is prevented in a kind of live platform, it is characterised in that including:
Judging unit, for utilizing multiple-authentication method, whether the spectators' account for judging to get present is hacker's account;
Removal unit, for when it is hacker's account that at least one judged result, which is spectators' account, capturing the sight After present under many accounts is transferred under main broadcaster's account, gift that will be shifted under main broadcaster's account under spectators' account Thing removes.
10. a kind of non-transient computer readable storage medium storing program for executing, it is characterised in that the non-transient computer readable storage medium storing program for executing is deposited Computer instruction is stored up, the computer instruction makes the computer perform the method as described in claim 1 to 8 is any.
CN201710930940.4A 2017-10-09 2017-10-09 The method and device of brush present is prevented in a kind of live streaming platform Active CN107770575B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710930940.4A CN107770575B (en) 2017-10-09 2017-10-09 The method and device of brush present is prevented in a kind of live streaming platform
PCT/CN2017/120147 WO2019071856A1 (en) 2017-10-09 2017-12-29 Method and device for preventing spam gift in live broadcasting platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710930940.4A CN107770575B (en) 2017-10-09 2017-10-09 The method and device of brush present is prevented in a kind of live streaming platform

Publications (2)

Publication Number Publication Date
CN107770575A true CN107770575A (en) 2018-03-06
CN107770575B CN107770575B (en) 2019-11-01

Family

ID=61267069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710930940.4A Active CN107770575B (en) 2017-10-09 2017-10-09 The method and device of brush present is prevented in a kind of live streaming platform

Country Status (2)

Country Link
CN (1) CN107770575B (en)
WO (1) WO2019071856A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574697A (en) * 2018-04-28 2018-09-25 广东亿迅科技有限公司 Illegal method and device based on live streaming platform
CN110933113A (en) * 2019-12-30 2020-03-27 腾讯科技(深圳)有限公司 Block chain-based interactive behavior detection method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643694B1 (en) * 2000-02-09 2003-11-04 Michael A. Chernin System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface
CN104935578A (en) * 2015-05-04 2015-09-23 广州唯品会信息科技有限公司 Website malicious attack prevention method and system
CN106022826A (en) * 2016-05-18 2016-10-12 武汉斗鱼网络科技有限公司 Cheating user recognition method and system in webcast platform
CN106227813A (en) * 2016-07-22 2016-12-14 百度在线网络技术(北京)有限公司 For the method and apparatus preventing voice ballot cheating
CN106228410A (en) * 2016-07-29 2016-12-14 武汉斗鱼网络科技有限公司 Virtual present task anti-brush system and method in a kind of live platform
CN106375327A (en) * 2016-09-13 2017-02-01 湖北工业大学 Anti-malicious attack proxy secret key mixing-based electronic voting system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8078515B2 (en) * 2007-05-04 2011-12-13 Michael Sasha John Systems and methods for facilitating electronic transactions and deterring fraud
CN105635745B (en) * 2015-12-23 2019-10-22 广州华多网络科技有限公司 Method and client that signature shines are generated based on online live streaming application
CN105897770B (en) * 2016-06-20 2018-11-27 武汉斗鱼网络科技有限公司 A kind of virtual gift display method and device based on live streaming
CN106599251A (en) * 2016-12-20 2017-04-26 北京小米移动软件有限公司 Method and device for displaying anchor rankings

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643694B1 (en) * 2000-02-09 2003-11-04 Michael A. Chernin System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface
CN104935578A (en) * 2015-05-04 2015-09-23 广州唯品会信息科技有限公司 Website malicious attack prevention method and system
CN106022826A (en) * 2016-05-18 2016-10-12 武汉斗鱼网络科技有限公司 Cheating user recognition method and system in webcast platform
CN106227813A (en) * 2016-07-22 2016-12-14 百度在线网络技术(北京)有限公司 For the method and apparatus preventing voice ballot cheating
CN106228410A (en) * 2016-07-29 2016-12-14 武汉斗鱼网络科技有限公司 Virtual present task anti-brush system and method in a kind of live platform
CN106375327A (en) * 2016-09-13 2017-02-01 湖北工业大学 Anti-malicious attack proxy secret key mixing-based electronic voting system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574697A (en) * 2018-04-28 2018-09-25 广东亿迅科技有限公司 Illegal method and device based on live streaming platform
CN110933113A (en) * 2019-12-30 2020-03-27 腾讯科技(深圳)有限公司 Block chain-based interactive behavior detection method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN107770575B (en) 2019-11-01
WO2019071856A1 (en) 2019-04-18

Similar Documents

Publication Publication Date Title
CN109767271B (en) Lottery method and equipment based on block chain
CN105556482B (en) Monitor mobile application performance
CN103927253B (en) Multiple browser compatibility testing method and system
CN104823198B (en) The safety distinguishing apparatus and safety recognizing method of computing device
CN106294176B (en) The method and system that application failure positions in Mac OS systems
CN108885666A (en) For detecting and preventing the pseudo- system and method emitted
CN104598380A (en) Method and system for automatic testing based on control
CN103873455B (en) A kind of method and device of information checking
CN105144117B (en) To the automatic correlation analysis method of allocating stack and context data
CN109600336A (en) Store equipment, identifying code application method and device
CN106156133A (en) Method that control table substance is submitted to again, Apparatus and system
CN106096034A (en) application log management method and device
CN110347608B (en) Interactive application testing method and related device
CN105337739B (en) Safe login method, device, server and terminal
CN107770161A (en) The method and device of brush present is prevented in a kind of live platform
CN105791246A (en) Information verification method, device and system
CN107770575B (en) The method and device of brush present is prevented in a kind of live streaming platform
CN103838720B (en) Page file, which is loaded into, executes method and apparatus
CN107517139A (en) Data processing method and system, device test system and bus test system
CN112989158A (en) Method, device and storage medium for identifying webpage crawler behavior
CN106709335B (en) Vulnerability detection method and device
CN106844219A (en) Using detection method and apply detection means
CN111026945B (en) Multi-platform crawler scheduling method, device and storage medium
CN109361806A (en) Black number storage method, black number mark method, system and device
CN108243229A (en) Request processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant