CN108089849A - A kind of method for preventing cheating program from quickly submitting - Google Patents
A kind of method for preventing cheating program from quickly submitting Download PDFInfo
- Publication number
- CN108089849A CN108089849A CN201711377653.1A CN201711377653A CN108089849A CN 108089849 A CN108089849 A CN 108089849A CN 201711377653 A CN201711377653 A CN 201711377653A CN 108089849 A CN108089849 A CN 108089849A
- Authority
- CN
- China
- Prior art keywords
- answer
- server
- salt
- hash
- submitting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
- G06F8/22—Procedural
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
- G06F8/43—Checking; Contextual analysis
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to Website development technical fields, and in particular to a kind of method for preventing cheating program from quickly submitting.Method of the present invention is that server-side generates a random number as salt figure and is stored in session, and the page carries out answer by script the Hash calculation of salt figure, and answer is since 0 up to obtained cryptographic Hash meets the requirements;List submits answer when submitting together;Whether meet the requirements in server-side verification answer, so as to identify whether there is cheating.The present invention solves the normal forms page and is easily cracked by cheating program, the problem of quickly repeated to submit waste advertisements information in the short time.
Description
Technical field
The present invention relates to Website development technical fields, and in particular to a kind of method for preventing cheating program from quickly submitting.
Background technology
Current web list submit page be usually taken identifying code and limit single IP submission times interval measure prevent by
Program of practising fraud quickly repeats to submit waste advertisements information.But with technological progress, identifying code, which is easily identified, to be cracked, it is difficult to be identified
Identifying code then influence user experience, IP limitations are then easily replaced IP by cheating program and are cracked automatically.
The content of the invention
Present invention solves the technical problem that being to provide a kind of method for preventing cheating program from quickly submitting, existing test is solved
The problem of card code and IP limitations mode influence user experience and are easily cracked by cheating program.
The present invention solve above-mentioned technical problem technical solution be:
The method is that server-side generates a random number as salt figure and is stored in session, and the page passes through foot
This carries out answer the Hash calculation of salt figure, and answer is since 0 up to obtained cryptographic Hash meets the requirements;When list is submitted
Answer is submitted together;Whether meet the requirements in server-side verification answer, so as to identify whether there is cheating.
The method comprises the steps of:
Step 1: when forms pages initialize, server-side generates a random number, and is stored in
In session [" question "];
Step 2: the Hash calculation that front end page carries out salt figure in script using the random number of generation obtains answer's
Hash value, answer is since 0, until the hash value being calculated meets the requirements;
Step 3: during user's submission form, server-side is submitted to together using answer as parameter value, if do not counted at this time
It calculates and completes, then user is prompted to submit too fast, wait calculating and complete;
Step 4: the answer parameter values that server-side receives, the value of session [" question "] is taken as salt figure,
Hash value is calculated, whether verification answer is correct, so as to determine whether cheating.
The judgement, which is that answer verifications are correct, then assert that there is no cheatings.
Beneficial effects of the present invention:Make hash value using the salt figure of generation on the page to calculate and obtain defined result;
Although needing to expend the regular hour, due to being to fill in list with user to be carried out at the same time, user, which will not discover, to be influenced
User experience.The defensive measure of the present invention is different from identifying code, and common program of practising fraud is difficult to crack.Even if program of practising fraud is on request
Make hash value to calculate and submit, similarly need to expend certain time;So as to prevent cheating program from quickly waste advertisements being submitted to believe
Breath.This hair invention method can arrange in pairs or groups again traditional identifying code, IP limitation etc. measures, greatly limitation cheating program work
With.
Description of the drawings
The present invention is further described below in conjunction with the accompanying drawings:
Fig. 1 is flow chart of the method for the present invention.
Specific embodiment
As shown in Figure 1, the present invention uses following steps:
Step 1: when forms pages initialize, server-side generates 4 random positive integers, and is stored in session
In [" question "];
Random rd=new Random ();
Int question=rd.Next (1000,9999);
Session [" question "]=question;
Step 2: front end page uses the random number of generation to calculate the hash value of answer as salt figure in script,
Answer is since 0, until 4 characters are " 1111 " before the hash value being calculated;
Step 3: during user's submission form, server-side is submitted to together using answer as parameter value, if do not counted at this time
It calculates and completes, then user is prompted to submit too fast, wait calculating and complete;
Step 4: the answer parameter values that server-side receives, the value of session [" question "] is taken as salt figure,
Hash value is calculated, whether verification answer is correct, so as to determine whether cheating.
Claims (2)
- A kind of 1. method for preventing cheating program from quickly submitting, it is characterised in that:The method be server-side generate one with Machine number is as salt figure and is stored in session, the page by script to answer carry out salt figure Hash calculation, answer from 0 starts until obtained cryptographic Hash meets the requirements;List submits answer when submitting together;It is in server-side verification answer It is no to meet the requirements, so as to identify whether there is cheating.
- 2. according to the method described in claim 1, it is characterized in that:The method comprises the steps of:Step 1: when forms pages initialize, server-side generates a random number, and is stored in session [" question "] In;Step 2: front end page carries out the Hash of the Hash calculation acquisition answer of salt figure in script using the random number of generation Value, answer is since 0, until the hash value being calculated meets the requirements;Step 3: during user's submission form, server-side is submitted to together using answer as parameter value, if do not had been calculated at this time Into, then prompt user submit it is too fast, wait calculate complete;Step 4: the answer parameter values that server-side receives, take the value of session [" question "] to be calculated as salt figure Hash value, whether verification answer is correct, so as to determine whether cheating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711377653.1A CN108089849B (en) | 2017-12-19 | 2017-12-19 | Method for preventing cheating program from being rapidly submitted |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711377653.1A CN108089849B (en) | 2017-12-19 | 2017-12-19 | Method for preventing cheating program from being rapidly submitted |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108089849A true CN108089849A (en) | 2018-05-29 |
CN108089849B CN108089849B (en) | 2021-04-27 |
Family
ID=62177290
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711377653.1A Active CN108089849B (en) | 2017-12-19 | 2017-12-19 | Method for preventing cheating program from being rapidly submitted |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108089849B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080320567A1 (en) * | 2007-06-20 | 2008-12-25 | Imperva, Inc. | System and method for preventing web frauds committed using client-scripting attacks |
CN102469091A (en) * | 2010-11-18 | 2012-05-23 | 金蝶软件(中国)有限公司 | Method for processing verification codes of pages, device and terminal |
CN104035923A (en) * | 2013-03-04 | 2014-09-10 | 阿里巴巴集团控股有限公司 | Data inquiry method and device |
CN104881479A (en) * | 2015-06-03 | 2015-09-02 | 北京京东尚科信息技术有限公司 | Method and device for limiting minimum operating interval of users |
CN106713336A (en) * | 2017-01-03 | 2017-05-24 | 厦门法信公证云科技有限公司 | Electronic data safekeeping system and method based on double and asymmetric encryption technology |
CN107016035A (en) * | 2016-12-27 | 2017-08-04 | 阿里巴巴集团控股有限公司 | form data processing method and server |
CN107172121A (en) * | 2017-03-29 | 2017-09-15 | 努比亚技术有限公司 | A kind of devices and methods therefor for preventing Data duplication from submitting |
-
2017
- 2017-12-19 CN CN201711377653.1A patent/CN108089849B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080320567A1 (en) * | 2007-06-20 | 2008-12-25 | Imperva, Inc. | System and method for preventing web frauds committed using client-scripting attacks |
CN102469091A (en) * | 2010-11-18 | 2012-05-23 | 金蝶软件(中国)有限公司 | Method for processing verification codes of pages, device and terminal |
CN104035923A (en) * | 2013-03-04 | 2014-09-10 | 阿里巴巴集团控股有限公司 | Data inquiry method and device |
CN104881479A (en) * | 2015-06-03 | 2015-09-02 | 北京京东尚科信息技术有限公司 | Method and device for limiting minimum operating interval of users |
CN107016035A (en) * | 2016-12-27 | 2017-08-04 | 阿里巴巴集团控股有限公司 | form data processing method and server |
CN106713336A (en) * | 2017-01-03 | 2017-05-24 | 厦门法信公证云科技有限公司 | Electronic data safekeeping system and method based on double and asymmetric encryption technology |
CN107172121A (en) * | 2017-03-29 | 2017-09-15 | 努比亚技术有限公司 | A kind of devices and methods therefor for preventing Data duplication from submitting |
Non-Patent Citations (3)
Title |
---|
CQWF95925: "高级表单验证-针对多次提交表单(转)", 《HTTPS://BLOG.CSDN.NET/CQWF95925/ARTICLE/DETAILS/100267345》 * |
SHARKER_: "防止表单重复提交的校验", 《HTTPS://BLOG.CSDN.NET/ELSERY/ARTICLE/DETAILS/50143555》 * |
活水源头LOVE: "JS限制客户频繁提交表单", 《HTTPS://WWW.CNBLOGS.COM/SHUIYUANLOVE/P/3412248.HTML》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108089849B (en) | 2021-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108156237B (en) | Product information pushing method and device, storage medium and computer equipment | |
US8296568B2 (en) | Systems and methods for authenticating an electronic transaction | |
CN103888254B (en) | A kind of method and apparatus of network authentication information | |
RU2018128778A (en) | PROTECTED AUTHENTICATION USING BIOMETRIC INPUT DATA | |
CN109993004B (en) | Block chain autonomous method and system based on credit mechanism | |
CN107682368B (en) | Verification method, client, server and system based on interactive operation | |
WO2017085159A1 (en) | Method to verify the execution integrity of an application in a target device | |
CN105101180B (en) | Terminal authenticity verification method and device | |
CN108900311B (en) | Certificateless Bluetooth key signature method and system | |
KR20200101328A (en) | Declarative smart contract | |
CN105024885A (en) | Anti-plug-in online game system | |
CN110460617A (en) | Machine examines examination system and Related product | |
CN108512850A (en) | Processing method of intelligent verification code based on question and answer questions | |
CN108089849A (en) | A kind of method for preventing cheating program from quickly submitting | |
Dong et al. | Elasticoin: Low-volatility cryptocurrency with proofs of sequential work | |
KR20070106850A (en) | Web-based golf club fitting service method | |
WO2014108007A1 (en) | Method for interaction and, server and network platform therefor | |
CN108355244A (en) | A kind of muscle training apparatus, device and storage medium | |
CN106301787B (en) | A method of with time authentication code | |
CN107844696A (en) | A kind of identifying code interference method and server | |
CN114386936A (en) | Storage method and device for bid document | |
US10997827B2 (en) | Distributed and deterministic random number generation for lottery drawings | |
CN108882005B (en) | Barrage verification method, computer equipment and storage medium | |
Chorley et al. | Effect of varying recovery intensities on power outputs during severe intensity intervals in trained cyclists during the Covid-19 pandemic | |
CN113783824B (en) | Method, apparatus, client, system and medium for preventing cross-site request forgery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523808 19th floor, Cloud Computing Center, Chinese Academy of Sciences, No.1 Kehui Road, Songshanhu high tech Industrial Development Zone, Dongguan City, Guangdong Province Applicant after: G-CLOUD TECHNOLOGY Co.,Ltd. Address before: 523808 No. 14 Building, Songke Garden, Songshan Lake Science and Technology Industrial Park, Dongguan City, Guangdong Province Applicant before: G-CLOUD TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |